{"appstream.enable": {"declarations": ["nixos/modules/config/appstream.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install files to support the\n[AppStream metadata specification](https://www.freedesktop.org/software/appstream/docs/index.html).\n"}, "loc": ["appstream", "enable"], "readOnly": false, "type": "boolean"}, "boot.binfmt.emulatedSystems": {"declarations": ["nixos/modules/system/boot/binfmt.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of systems to emulate. Will also configure Nix to\nsupport your new systems.\nWarning: the builder can execute all emulated systems within the same build, which introduces impurities in the case of cross compilation.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"wasm32-wasi\"\n  \"x86_64-windows\"\n  \"aarch64-linux\"\n]"}, "loc": ["boot", "binfmt", "emulatedSystems"], "readOnly": false, "type": "list of string"}, "boot.binfmt.registrations": {"declarations": ["nixos/modules/system/boot/binfmt.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra binary formats to register with the kernel.\nSee https://www.kernel.org/doc/html/latest/admin-guide/binfmt-misc.html for more details.\n"}, "loc": ["boot", "binfmt", "registrations"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.binfmt.registrations.<name>.fixBinary": {"declarations": ["nixos/modules/system/boot/binfmt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the interpreter file as soon as the\nregistration is loaded, rather than waiting for a\nrelevant file to be invoked.\n\nSee the description of the 'F' flag in the kernel docs\nfor more details.\n"}, "loc": ["boot", "binfmt", "registrations", "<name>", "fixBinary"], "readOnly": false, "type": "boolean"}, "boot.binfmt.registrations.<name>.interpreter": {"declarations": ["nixos/modules/system/boot/binfmt.nix"], "description": {"_type": "mdDoc", "text": "The interpreter to invoke to run the program.\n\nNote that the actual registration will point to\n/run/binfmt/${name}, so the kernel interpreter length\nlimit doesn't apply.\n"}, "loc": ["boot", "binfmt", "registrations", "<name>", "interpreter"], "readOnly": false, "type": "path"}, "boot.binfmt.registrations.<name>.magicOrExtension": {"declarations": ["nixos/modules/system/boot/binfmt.nix"], "description": {"_type": "mdDoc", "text": "The magic number or extension to match on."}, "loc": ["boot", "binfmt", "registrations", "<name>", "magicOrExtension"], "readOnly": false, "type": "string"}, "boot.binfmt.registrations.<name>.mask": {"declarations": ["nixos/modules/system/boot/binfmt.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A mask to be ANDed with the byte sequence of the file before matching"}, "loc": ["boot", "binfmt", "registrations", "<name>", "mask"], "readOnly": false, "type": "null or string"}, "boot.binfmt.registrations.<name>.matchCredentials": {"declarations": ["nixos/modules/system/boot/binfmt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to launch with the credentials and security\ntoken of the binary, not the interpreter (e.g. setuid\nbit).\n\nSee the description of the 'C' flag in the kernel docs\nfor more details.\n\nImplies/requires openBinary = true.\n"}, "loc": ["boot", "binfmt", "registrations", "<name>", "matchCredentials"], "readOnly": false, "type": "boolean"}, "boot.binfmt.registrations.<name>.offset": {"declarations": ["nixos/modules/system/boot/binfmt.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The byte offset of the magic number used for recognition."}, "loc": ["boot", "binfmt", "registrations", "<name>", "offset"], "readOnly": false, "type": "null or signed integer"}, "boot.binfmt.registrations.<name>.openBinary": {"declarations": ["nixos/modules/system/boot/binfmt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to pass the binary to the interpreter as an open\nfile descriptor, instead of a path.\n"}, "loc": ["boot", "binfmt", "registrations", "<name>", "openBinary"], "readOnly": false, "type": "boolean"}, "boot.binfmt.registrations.<name>.preserveArgvZero": {"declarations": ["nixos/modules/system/boot/binfmt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to pass the original argv[0] to the interpreter.\n\nSee the description of the 'P' flag in the kernel docs\nfor more details;\n"}, "loc": ["boot", "binfmt", "registrations", "<name>", "preserveArgvZero"], "readOnly": false, "type": "boolean"}, "boot.binfmt.registrations.<name>.recognitionType": {"declarations": ["nixos/modules/system/boot/binfmt.nix"], "default": {"_type": "literalExpression", "text": "\"magic\""}, "description": {"_type": "mdDoc", "text": "Whether to recognize executables by magic number or extension."}, "loc": ["boot", "binfmt", "registrations", "<name>", "recognitionType"], "readOnly": false, "type": "one of \"magic\", \"extension\""}, "boot.binfmt.registrations.<name>.wrapInterpreterInShell": {"declarations": ["nixos/modules/system/boot/binfmt.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to wrap the interpreter in a shell script.\n\nThis allows a shell command to be set as the interpreter.\n"}, "loc": ["boot", "binfmt", "registrations", "<name>", "wrapInterpreterInShell"], "readOnly": false, "type": "boolean"}, "boot.blacklistedKernelModules": {"declarations": ["nixos/modules/system/boot/modprobe.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of names of kernel modules that should not be loaded\nautomatically by the hardware probing code.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"cirrusfb\"\n  \"i2c_piix4\"\n]"}, "loc": ["boot", "blacklistedKernelModules"], "readOnly": false, "type": "list of string"}, "boot.bootspec.enableValidation": {"declarations": ["nixos/modules/system/activation/bootspec.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the validation of bootspec documents for each build.\n      This will introduce Go in the build-time closure as we are relying on [Cuelang](https://cuelang.org/) for schema validation.\n      Enable this option if you want to ascertain that your documents are correct.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["boot", "bootspec", "enableValidation"], "readOnly": false, "type": "boolean"}, "boot.bootspec.extensions": {"declarations": ["nixos/modules/system/activation/bootspec.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "User-defined data that extends the bootspec document.\n\nTo reduce incompatibility and prevent names from clashing\nbetween applications, it is **highly recommended** to use a\nunique namespace for your extensions.\n"}, "loc": ["boot", "bootspec", "extensions"], "readOnly": false, "type": "attribute set of anything"}, "boot.consoleLogLevel": {"declarations": ["nixos/modules/system/boot/kernel.nix"], "default": {"_type": "literalExpression", "text": "4"}, "description": {"_type": "mdDoc", "text": "The kernel console `loglevel`. All Kernel Messages with a log level smaller\nthan this setting will be printed to the console.\n"}, "loc": ["boot", "consoleLogLevel"], "readOnly": false, "type": "signed integer"}, "boot.crashDump.enable": {"declarations": ["nixos/modules/misc/crashdump.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, NixOS will set up a kernel that will\nboot on crash, and leave the user in systemd rescue\nto be able to save the crashed kernel dump at\n/proc/vmcore.\nIt also activates the NMI watchdog.\n"}, "loc": ["boot", "crashDump", "enable"], "readOnly": false, "type": "boolean"}, "boot.crashDump.kernelParams": {"declarations": ["nixos/modules/misc/crashdump.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"1\"\n  \"boot.shell_on_fail\"\n]"}, "description": {"_type": "mdDoc", "text": "Parameters that will be passed to the kernel kexec-ed on crash.\n"}, "loc": ["boot", "crashDump", "kernelParams"], "readOnly": false, "type": "list of string"}, "boot.crashDump.reservedMemory": {"declarations": ["nixos/modules/misc/crashdump.nix"], "default": {"_type": "literalExpression", "text": "\"128M\""}, "description": {"_type": "mdDoc", "text": "The amount of memory reserved for the crashdump kernel.\nIf you choose a too high value, dmesg will mention\n\"crashkernel reservation failed\".\n"}, "loc": ["boot", "crashDump", "reservedMemory"], "readOnly": false, "type": "string"}, "boot.devShmSize": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "\"50%\""}, "description": {"_type": "mdDoc", "text": "Size limit for the /dev/shm tmpfs. Look at mount(8), tmpfs size option,\nfor the accepted syntax.\n"}, "example": {"_type": "literalExpression", "text": "\"256m\""}, "loc": ["boot", "devShmSize"], "readOnly": false, "type": "string"}, "boot.devSize": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "\"5%\""}, "description": {"_type": "mdDoc", "text": "Size limit for the /dev tmpfs. Look at mount(8), tmpfs size option,\nfor the accepted syntax.\n"}, "example": {"_type": "literalExpression", "text": "\"32m\""}, "loc": ["boot", "devSize"], "readOnly": false, "type": "string"}, "boot.enableContainers": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable support for NixOS containers. Defaults to true\n(at no cost if containers are not actually used).\n"}, "loc": ["boot", "enableContainers"], "readOnly": false, "type": "boolean"}, "boot.extraModprobeConfig": {"declarations": ["nixos/modules/system/boot/modprobe.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Any additional configuration to be appended to the generated\n{file}`modprobe.conf`.  This is typically used to\nspecify module options.  See\n{manpage}`modprobe.d(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "''\n  options parport_pc io=0x378 irq=7 dma=1\n''"}, "loc": ["boot", "extraModprobeConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.extraModulePackages": {"declarations": ["nixos/modules/system/boot/kernel.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of additional packages supplying kernel modules."}, "example": {"_type": "literalExpression", "text": "[ config.boot.kernelPackages.nvidia_x11 ]"}, "loc": ["boot", "extraModulePackages"], "readOnly": false, "type": "list of package"}, "boot.extraSystemdUnitPaths": {"declarations": ["nixos/modules/system/boot/stage-2.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional paths that get appended to the SYSTEMD_UNIT_PATH environment variable\nthat can contain mutable unit files.\n"}, "loc": ["boot", "extraSystemdUnitPaths"], "readOnly": false, "type": "list of string"}, "boot.growPartition": {"declarations": ["nixos/modules/system/boot/grow-partition.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable grow the root partition on boot."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["boot", "growPartition"], "readOnly": false, "type": "boolean"}, "boot.hardwareScan": {"declarations": ["nixos/modules/services/hardware/udev.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to try to load kernel modules for all detected hardware.\nUsually this does a good job of providing you with the modules\nyou need, but sometimes it can crash the system or cause other\nnasty effects.\n"}, "loc": ["boot", "hardwareScan"], "readOnly": false, "type": "boolean"}, "boot.initrd.availableKernelModules": {"declarations": ["nixos/modules/system/boot/kernel.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The set of kernel modules in the initial ramdisk used during the\nboot process.  This set must include all modules necessary for\nmounting the root device.  That is, it should include modules\nfor the physical device (e.g., SCSI drivers) and for the file\nsystem (e.g., ext3).  The set specified here is automatically\nclosed under the module dependency relation, i.e., all\ndependencies of the modules list here are included\nautomatically.  The modules listed here are available in the\ninitrd, but are only loaded on demand (e.g., the ext3 module is\nloaded automatically when an ext3 filesystem is mounted, and\nmodules for PCI devices are loaded when they match the PCI ID\nof a device in your system).  To force a module to be loaded,\ninclude it in {option}`boot.initrd.kernelModules`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"sata_nv\"\n  \"ext3\"\n]"}, "loc": ["boot", "initrd", "availableKernelModules"], "readOnly": false, "type": "list of string"}, "boot.initrd.checkJournalingFS": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to run {command}`fsck` on journaling filesystems such as ext3.\n"}, "loc": ["boot", "initrd", "checkJournalingFS"], "readOnly": false, "type": "boolean"}, "boot.initrd.compressor": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalMD", "text": "`zstd` if the kernel supports it (5.9+), `gzip` if not"}, "description": {"_type": "mdDoc", "text": "The compressor to use on the initrd image. May be any of:\n\n- The name of one of the predefined compressors, see {file}`pkgs/build-support/kernel/initrd-compressor-meta.nix` for the definitions.\n- A function which, given the nixpkgs package set, returns the path to a compressor tool, e.g. `pkgs: \"${pkgs.pigz}/bin/pigz\"`\n- (not recommended, because it does not work when cross-compiling) the full path to a compressor tool, e.g. `\"${pkgs.pigz}/bin/pigz\"`\n\nThe given program should read data from stdin and write it to stdout compressed.\n"}, "example": {"_type": "literalExpression", "text": "\"xz\""}, "loc": ["boot", "initrd", "compressor"], "readOnly": false, "type": "string or function that evaluates to a(n) string"}, "boot.initrd.compressorArgs": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Arguments to pass to the compressor for the initrd image, or null to use the compressor's defaults."}, "loc": ["boot", "initrd", "compressorArgs"], "readOnly": false, "type": "null or (list of string)"}, "boot.initrd.enable": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "!config.boot.isContainer"}, "description": {"_type": "mdDoc", "text": "Whether to enable the NixOS initial RAM disk (initrd). This may be\nneeded to perform some initialisation tasks (like mounting\nnetwork/encrypted file systems) before continuing the boot process.\n"}, "loc": ["boot", "initrd", "enable"], "readOnly": false, "type": "boolean"}, "boot.initrd.extraFiles": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra files to link and copy in to the initrd.\n"}, "loc": ["boot", "initrd", "extraFiles"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.initrd.extraFiles.<name>.source": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "description": {"_type": "mdDoc", "text": "The object to make available inside the initrd."}, "loc": ["boot", "initrd", "extraFiles", "<name>", "source"], "readOnly": false, "type": "package"}, "boot.initrd.includeDefaultModules": {"declarations": ["nixos/modules/system/boot/kernel.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "This option, if set, adds a collection of default kernel modules\nto {option}`boot.initrd.availableKernelModules` and\n{option}`boot.initrd.kernelModules`.\n"}, "loc": ["boot", "initrd", "includeDefaultModules"], "readOnly": false, "type": "boolean"}, "boot.initrd.kernelModules": {"declarations": ["nixos/modules/system/boot/kernel.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of modules that are always loaded by the initrd."}, "loc": ["boot", "initrd", "kernelModules"], "readOnly": false, "type": "list of string"}, "boot.initrd.luks.cryptoModules": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"aes\"\n  \"aes_generic\"\n  \"blowfish\"\n  \"twofish\"\n  \"serpent\"\n  \"cbc\"\n  \"xts\"\n  \"lrw\"\n  \"sha1\"\n  \"sha256\"\n  \"sha512\"\n  \"af_alg\"\n  \"algif_skcipher\"\n]"}, "description": {"_type": "mdDoc", "text": "A list of cryptographic kernel modules needed to decrypt the root device(s).\nThe default includes all common modules.\n"}, "loc": ["boot", "initrd", "luks", "cryptoModules"], "readOnly": false, "type": "list of string"}, "boot.initrd.luks.devices": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The encrypted disk that should be opened before the root\nfilesystem is mounted. Both LVM-over-LUKS and LUKS-over-LVM\nsetups are supported. The unencrypted devices can be accessed as\n{file}`/dev/mapper/\u00abname\u00bb`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  luksroot = {\n    device = \"/dev/disk/by-uuid/430e9eff-d852-4f68-aa3b-2fa3599ebe08\";\n  };\n}"}, "loc": ["boot", "initrd", "luks", "devices"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.initrd.luks.devices.<name>.allowDiscards": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow TRIM requests to the underlying device. This option\nhas security implications; please read the LUKS documentation before\nactivating it.\nThis option is incompatible with authenticated encryption (dm-crypt\nstacked over dm-integrity).\n"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "allowDiscards"], "readOnly": false, "type": "boolean"}, "boot.initrd.luks.devices.<name>.bypassWorkqueues": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to bypass dm-crypt's internal read and write workqueues.\nEnabling this should improve performance on SSDs; see\n[here](https://wiki.archlinux.org/index.php/Dm-crypt/Specialties#Disable_workqueue_for_increased_solid_state_drive_(SSD)_performance)\nfor more information. Needs Linux 5.9 or later.\n"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "bypassWorkqueues"], "readOnly": false, "type": "boolean"}, "boot.initrd.luks.devices.<name>.device": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "description": {"_type": "mdDoc", "text": "Path of the underlying encrypted block device."}, "example": {"_type": "literalExpression", "text": "\"/dev/disk/by-uuid/430e9eff-d852-4f68-aa3b-2fa3599ebe08\""}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "device"], "readOnly": false, "type": "string"}, "boot.initrd.luks.devices.<name>.fallbackToPassword": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to fallback to interactive passphrase prompt if the keyfile\ncannot be found. This will prevent unattended boot should the keyfile\ngo missing.\n"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "fallbackToPassword"], "readOnly": false, "type": "boolean"}, "boot.initrd.luks.devices.<name>.fido2.credential": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The FIDO2 credential ID."}, "example": {"_type": "literalExpression", "text": "\"f1d00200d8dc783f7fb1e10ace8da27f8312d72692abfca2f7e4960a73f48e82e1f7571f6ebfcee9fb434f9886ccc8fcc52a6614d8d2\""}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "fido2", "credential"], "readOnly": false, "type": "null or string"}, "boot.initrd.luks.devices.<name>.fido2.credentials": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of FIDO2 credential IDs.\n\nUse this if you have multiple FIDO2 keys you want to use for the same luks device.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"f1d00200d8dc783f7fb1e10ace8da27f8312d72692abfca2f7e4960a73f48e82e1f7571f6ebfcee9fb434f9886ccc8fcc52a6614d8d2\"\n]"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "fido2", "credentials"], "readOnly": false, "type": "list of string"}, "boot.initrd.luks.devices.<name>.fido2.gracePeriod": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Time in seconds to wait for the FIDO2 key."}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "fido2", "gracePeriod"], "readOnly": false, "type": "signed integer"}, "boot.initrd.luks.devices.<name>.fido2.passwordLess": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Defines whatever to use an empty string as a default salt.\n\nEnable only when your device is PIN protected, such as [Trezor](https://trezor.io/).\n"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "fido2", "passwordLess"], "readOnly": false, "type": "boolean"}, "boot.initrd.luks.devices.<name>.gpgCard": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The option to use this LUKS device with a GPG encrypted luks password by the GPG Smartcard.\nIf null (the default), GPG-Smartcard will be disabled for this device.\n"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "gpgCard"], "readOnly": false, "type": "null or (submodule)"}, "boot.initrd.luks.devices.<name>.gpgCard.encryptedPass": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "description": {"_type": "mdDoc", "text": "Path to the GPG encrypted passphrase."}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "gpgCard", "encryptedPass"], "readOnly": false, "type": "path"}, "boot.initrd.luks.devices.<name>.gpgCard.gracePeriod": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Time in seconds to wait for the GPG Smartcard."}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "gpgCard", "gracePeriod"], "readOnly": false, "type": "signed integer"}, "boot.initrd.luks.devices.<name>.gpgCard.publicKey": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "description": {"_type": "mdDoc", "text": "Path to the Public Key."}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "gpgCard", "publicKey"], "readOnly": false, "type": "path"}, "boot.initrd.luks.devices.<name>.header": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the file or block device that\nshould be used as header for the encrypted device.\n"}, "example": {"_type": "literalExpression", "text": "\"/root/header.img\""}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "header"], "readOnly": false, "type": "null or string"}, "boot.initrd.luks.devices.<name>.keyFile": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the file (can be a raw device or a partition) that\nshould be used as the decryption key for the encrypted device. If\nnot specified, you will be prompted for a passphrase instead.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/sdb1\""}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "keyFile"], "readOnly": false, "type": "null or string"}, "boot.initrd.luks.devices.<name>.keyFileOffset": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The offset of the key file. Use this in combination with\n`keyFileSize` to use part of a file as key file\n(often the case if a raw device or partition is used as a key file).\nIf not specified, the key begins at the first byte of\n`keyFile`.\n"}, "example": {"_type": "literalExpression", "text": "4096"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "keyFileOffset"], "readOnly": false, "type": "null or signed integer"}, "boot.initrd.luks.devices.<name>.keyFileSize": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The size of the key file. Use this if only the beginning of the\nkey file should be used as a key (often the case if a raw device\nor partition is used as key file). If not specified, the whole\n`keyFile` will be used decryption, instead of just\nthe first `keyFileSize` bytes.\n"}, "example": {"_type": "literalExpression", "text": "4096"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "keyFileSize"], "readOnly": false, "type": "null or signed integer"}, "boot.initrd.luks.devices.<name>.keyFileTimeout": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The amount of time in seconds for a keyFile to appear before\ntiming out and trying passwords.\n"}, "example": {"_type": "literalExpression", "text": "5"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "keyFileTimeout"], "readOnly": false, "type": "null or signed integer"}, "boot.initrd.luks.devices.<name>.postOpenCommands": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Commands that should be run right after we have mounted our LUKS device.\n"}, "example": {"_type": "literalExpression", "text": "''\n  umount /tmp/persistent\n''"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "postOpenCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.initrd.luks.devices.<name>.preLVM": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the luksOpen will be attempted before LVM scan or after it."}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "preLVM"], "readOnly": false, "type": "boolean"}, "boot.initrd.luks.devices.<name>.preOpenCommands": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Commands that should be run right before we try to mount our LUKS device.\nThis can be useful, if the keys needed to open the drive is on another partition.\n"}, "example": {"_type": "literalExpression", "text": "''\n  mkdir -p /tmp/persistent\n  mount -t zfs rpool/safe/persistent /tmp/persistent\n''"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "preOpenCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.initrd.luks.devices.<name>.tryEmptyPassphrase": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If keyFile fails then try an empty passphrase first before\nprompting for password.\n"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "tryEmptyPassphrase"], "readOnly": false, "type": "boolean"}, "boot.initrd.luks.devices.<name>.yubikey": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The options to use for this LUKS device in YubiKey-PBA.\nIf null (the default), YubiKey-PBA will be disabled for this device.\n"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "yubikey"], "readOnly": false, "type": "null or (submodule)"}, "boot.initrd.luks.devices.<name>.yubikey.gracePeriod": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Time in seconds to wait for the YubiKey."}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "yubikey", "gracePeriod"], "readOnly": false, "type": "signed integer"}, "boot.initrd.luks.devices.<name>.yubikey.iterationStep": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "How much the iteration count for PBKDF2 is increased at each successful authentication."}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "yubikey", "iterationStep"], "readOnly": false, "type": "signed integer"}, "boot.initrd.luks.devices.<name>.yubikey.keyLength": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "64"}, "description": {"_type": "mdDoc", "text": "Length of the LUKS slot key derived with PBKDF2 in byte."}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "yubikey", "keyLength"], "readOnly": false, "type": "signed integer"}, "boot.initrd.luks.devices.<name>.yubikey.saltLength": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "16"}, "description": {"_type": "mdDoc", "text": "Length of the new salt in byte (64 is the effective maximum)."}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "yubikey", "saltLength"], "readOnly": false, "type": "signed integer"}, "boot.initrd.luks.devices.<name>.yubikey.slot": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Which slot on the YubiKey to challenge."}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "yubikey", "slot"], "readOnly": false, "type": "signed integer"}, "boot.initrd.luks.devices.<name>.yubikey.storage.device": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "\"/dev/sda1\""}, "description": {"_type": "mdDoc", "text": "An unencrypted device that will temporarily be mounted in stage-1.\nMust contain the current salt to create the challenge for this LUKS device.\n"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "yubikey", "storage", "device"], "readOnly": false, "type": "path"}, "boot.initrd.luks.devices.<name>.yubikey.storage.fsType": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "\"vfat\""}, "description": {"_type": "mdDoc", "text": "The filesystem of the unencrypted device."}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "yubikey", "storage", "fsType"], "readOnly": false, "type": "string"}, "boot.initrd.luks.devices.<name>.yubikey.storage.path": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "\"/crypt-storage/default\""}, "description": {"_type": "mdDoc", "text": "Absolute path of the salt on the unencrypted device with\nthat device's root directory as \"/\".\n"}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "yubikey", "storage", "path"], "readOnly": false, "type": "string"}, "boot.initrd.luks.devices.<name>.yubikey.twoFactor": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to use a passphrase and a YubiKey (true), or only a YubiKey (false)."}, "loc": ["boot", "initrd", "luks", "devices", "<name>", "yubikey", "twoFactor"], "readOnly": false, "type": "boolean"}, "boot.initrd.luks.fido2Support": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables support for authenticating with FIDO2 devices.\n"}, "loc": ["boot", "initrd", "luks", "fido2Support"], "readOnly": false, "type": "boolean"}, "boot.initrd.luks.gpgSupport": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables support for authenticating with a GPG encrypted password.\n"}, "loc": ["boot", "initrd", "luks", "gpgSupport"], "readOnly": false, "type": "boolean"}, "boot.initrd.luks.mitigateDMAAttacks": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Unless enabled, encryption keys can be easily recovered by an attacker with physical\naccess to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port.\nMore information is available at <http://en.wikipedia.org/wiki/DMA_attack>.\n\nThis option blacklists FireWire drivers, but doesn't remove them. You can manually\nload the drivers if you need to use a FireWire device, but don't forget to unload them!\n"}, "loc": ["boot", "initrd", "luks", "mitigateDMAAttacks"], "readOnly": false, "type": "boolean"}, "boot.initrd.luks.reusePassphrases": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "When opening a new LUKS device try reusing last successful\npassphrase.\n\nUseful for mounting a number of devices that use the same\npassphrase without retyping it several times.\n\nSuch setup can be useful if you use {command}`cryptsetup luksSuspend`.\nDifferent LUKS devices will still have\ndifferent master keys even when using the same passphrase.\n"}, "loc": ["boot", "initrd", "luks", "reusePassphrases"], "readOnly": false, "type": "boolean"}, "boot.initrd.luks.yubikeySupport": {"declarations": ["nixos/modules/system/boot/luksroot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables support for authenticating with a YubiKey on LUKS devices.\nSee the NixOS wiki for information on how to properly setup a LUKS device\nand a YubiKey to work with this feature.\n"}, "loc": ["boot", "initrd", "luks", "yubikeySupport"], "readOnly": false, "type": "boolean"}, "boot.initrd.network.enable": {"declarations": ["nixos/modules/system/boot/initrd-network.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Add network connectivity support to initrd. The network may be\nconfigured using the `ip` kernel parameter,\nas described in [the kernel documentation](https://www.kernel.org/doc/Documentation/filesystems/nfs/nfsroot.txt).\nOtherwise, if\n{option}`networking.useDHCP` is enabled, an IP address\nis acquired using DHCP.\n\nYou should add the module(s) required for your network card to\nboot.initrd.availableKernelModules.\n`lspci -v | grep -iA8 'network\\|ethernet'`\nwill tell you which.\n"}, "loc": ["boot", "initrd", "network", "enable"], "readOnly": false, "type": "boolean"}, "boot.initrd.network.flushBeforeStage2": {"declarations": ["nixos/modules/system/boot/initrd-network.nix"], "default": {"_type": "literalExpression", "text": "\"!config.boot.initrd.systemd.enable\""}, "description": {"_type": "mdDoc", "text": "Whether to clear the configuration of the interfaces that were set up in\nthe initrd right before stage 2 takes over. Stage 2 will do the regular network\nconfiguration based on the NixOS networking options.\n\nThe default is false when systemd is enabled in initrd,\nbecause the systemd-networkd documentation suggests it.\n"}, "loc": ["boot", "initrd", "network", "flushBeforeStage2"], "readOnly": false, "type": "boolean"}, "boot.initrd.network.openvpn.configuration": {"declarations": ["nixos/modules/system/boot/initrd-openvpn.nix"], "description": {"_type": "mdDoc", "text": "The configuration file for OpenVPN.\n\n::: {.warning}\nUnless your bootloader supports initrd secrets, this configuration\nis stored insecurely in the global Nix store.\n:::\n"}, "example": {"_type": "literalExpression", "text": "./configuration.ovpn"}, "loc": ["boot", "initrd", "network", "openvpn", "configuration"], "readOnly": false, "type": "path"}, "boot.initrd.network.openvpn.enable": {"declarations": ["nixos/modules/system/boot/initrd-openvpn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Starts an OpenVPN client during initrd boot. It can be used to e.g.\nremotely accessing the SSH service controlled by\n{option}`boot.initrd.network.ssh` or other network services\nincluded. Service is killed when stage-1 boot is finished.\n"}, "loc": ["boot", "initrd", "network", "openvpn", "enable"], "readOnly": false, "type": "boolean"}, "boot.initrd.network.postCommands": {"declarations": ["nixos/modules/system/boot/initrd-network.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to be executed after stage 1 of the\nboot has initialised the network.\n"}, "loc": ["boot", "initrd", "network", "postCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.initrd.network.ssh.authorizedKeys": {"declarations": ["nixos/modules/system/boot/initrd-ssh.nix"], "default": {"_type": "literalExpression", "text": "config.users.users.root.openssh.authorizedKeys.keys"}, "description": {"_type": "mdDoc", "text": "Authorized keys for the root user on initrd.\n"}, "loc": ["boot", "initrd", "network", "ssh", "authorizedKeys"], "readOnly": false, "type": "list of string"}, "boot.initrd.network.ssh.enable": {"declarations": ["nixos/modules/system/boot/initrd-ssh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Start SSH service during initrd boot. It can be used to debug failing\nboot on a remote server, enter pasphrase for an encrypted partition etc.\nService is killed when stage-1 boot is finished.\n\nThe sshd configuration is largely inherited from\n{option}`services.openssh`.\n"}, "loc": ["boot", "initrd", "network", "ssh", "enable"], "readOnly": false, "type": "boolean"}, "boot.initrd.network.ssh.extraConfig": {"declarations": ["nixos/modules/system/boot/initrd-ssh.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim contents of {file}`sshd_config`."}, "loc": ["boot", "initrd", "network", "ssh", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.initrd.network.ssh.hostKeys": {"declarations": ["nixos/modules/system/boot/initrd-ssh.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Specify SSH host keys to import into the initrd.\n\nTo generate keys, use\n{manpage}`ssh-keygen(1)`\nas root:\n\n```\nssh-keygen -t rsa -N \"\" -f /etc/secrets/initrd/ssh_host_rsa_key\nssh-keygen -t ed25519 -N \"\" -f /etc/secrets/initrd/ssh_host_ed25519_key\n```\n\n::: {.warning}\nUnless your bootloader supports initrd secrets, these keys\nare stored insecurely in the global Nix store. Do NOT use\nyour regular SSH host private keys for this purpose or\nyou'll expose them to regular users!\n\nAdditionally, even if your initrd supports secrets, if\nyou're using initrd SSH to unlock an encrypted disk then\nusing your regular host keys exposes the private keys on\nyour unencrypted boot partition.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/etc/secrets/initrd/ssh_host_rsa_key\"\n  \"/etc/secrets/initrd/ssh_host_ed25519_key\"\n]"}, "loc": ["boot", "initrd", "network", "ssh", "hostKeys"], "readOnly": false, "type": "list of (string or path)"}, "boot.initrd.network.ssh.ignoreEmptyHostKeys": {"declarations": ["nixos/modules/system/boot/initrd-ssh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow leaving {option}`config.boot.initrd.network.ssh` empty,\nto deploy ssh host keys out of band.\n"}, "loc": ["boot", "initrd", "network", "ssh", "ignoreEmptyHostKeys"], "readOnly": false, "type": "boolean"}, "boot.initrd.network.ssh.port": {"declarations": ["nixos/modules/system/boot/initrd-ssh.nix"], "default": {"_type": "literalExpression", "text": "22"}, "description": {"_type": "mdDoc", "text": "Port on which SSH initrd service should listen.\n"}, "loc": ["boot", "initrd", "network", "ssh", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "boot.initrd.network.ssh.shell": {"declarations": ["nixos/modules/system/boot/initrd-ssh.nix"], "default": {"_type": "literalExpression", "text": "\"\\\"/bin/ash\\\"\""}, "description": {"_type": "mdDoc", "text": "Login shell of the remote user. Can be used to limit actions user can do.\n"}, "loc": ["boot", "initrd", "network", "ssh", "shell"], "readOnly": false, "type": "null or string"}, "boot.initrd.network.udhcpc.extraArgs": {"declarations": ["nixos/modules/system/boot/initrd-network.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command-line arguments passed verbatim to udhcpc if\n{option}`boot.initrd.network.enable` and {option}`networking.useDHCP`\nare enabled.\n"}, "loc": ["boot", "initrd", "network", "udhcpc", "extraArgs"], "readOnly": false, "type": "list of string"}, "boot.initrd.postDeviceCommands": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to be executed immediately after stage 1 of the\nboot has loaded kernel modules and created device nodes in\n{file}`/dev`.\n"}, "loc": ["boot", "initrd", "postDeviceCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.initrd.postMountCommands": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to be executed immediately after the stage 1\nfilesystems have been mounted.\n"}, "loc": ["boot", "initrd", "postMountCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.initrd.preDeviceCommands": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to be executed before udev is started to create\ndevice nodes.\n"}, "loc": ["boot", "initrd", "preDeviceCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.initrd.preFailCommands": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to be executed before the failure prompt is shown.\n"}, "loc": ["boot", "initrd", "preFailCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.initrd.preLVMCommands": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to be executed immediately before LVM discovery.\n"}, "loc": ["boot", "initrd", "preLVMCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.initrd.prepend": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Other initrd files to prepend to the final initrd we are building.\n"}, "loc": ["boot", "initrd", "prepend"], "readOnly": false, "type": "list of string"}, "boot.initrd.secrets": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Secrets to append to the initrd. The attribute name is the\npath the secret should have inside the initrd, the value\nis the path it should be copied from (or null for the same\npath inside and out).\n"}, "example": {"_type": "literalExpression", "text": "{ \"/etc/dropbear/dropbear_rsa_host_key\" =\n    ./secret-dropbear-key;\n}\n"}, "loc": ["boot", "initrd", "secrets"], "readOnly": false, "type": "attribute set of (null or path)"}, "boot.initrd.services.swraid.mdadmConf": {"declarations": ["nixos/modules/tasks/swraid.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Contents of {file}`/etc/mdadm.conf` in initrd."}, "loc": ["boot", "initrd", "services", "swraid", "mdadmConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.initrd.services.udev.rules": {"declarations": ["nixos/modules/services/hardware/udev.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "{command}`udev` rules to include in the initrd\n*only*. They'll be written into file\n{file}`99-local.rules`. Thus they are read and applied\nafter the essential initrd rules.\n"}, "example": {"_type": "literalExpression", "text": "''\n  SUBSYSTEM==\"net\", ACTION==\"add\", DRIVERS==\"?*\", ATTR{address}==\"00:1D:60:B9:6D:4F\", KERNEL==\"eth*\", NAME=\"my_fast_network_card\"\n''"}, "loc": ["boot", "initrd", "services", "udev", "rules"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.initrd.supportedFilesystems": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Names of supported filesystem types in the initial ramdisk."}, "example": {"_type": "literalExpression", "text": "[\n  \"btrfs\"\n]"}, "loc": ["boot", "initrd", "supportedFilesystems"], "readOnly": false, "type": "list of string"}, "boot.initrd.systemd.additionalUpstreamUnits": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional units shipped with systemd that shall be enabled.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"debug-shell.service\"\n  \"systemd-quotacheck.service\"\n]"}, "loc": ["boot", "initrd", "systemd", "additionalUpstreamUnits"], "readOnly": false, "type": "list of string"}, "boot.initrd.systemd.automounts": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Definition of systemd automount units.\nThis is a list instead of an attrSet, because systemd mandates the names to be derived from\nthe 'where' attribute.\n"}, "loc": ["boot", "initrd", "systemd", "automounts"], "readOnly": false, "type": "list of (submodule)"}, "boot.initrd.systemd.contents": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of files that have to be linked into the initrd"}, "example": {"_type": "literalExpression", "text": "{\n  \"/etc/hostname\".text = \"mymachine\";\n}\n"}, "loc": ["boot", "initrd", "systemd", "contents"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.initrd.systemd.contents.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable copying of this file and symlinking it."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["boot", "initrd", "systemd", "contents", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "boot.initrd.systemd.contents.<name>.source": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "description": {"_type": "mdDoc", "text": "Path of the source file."}, "loc": ["boot", "initrd", "systemd", "contents", "<name>", "source"], "readOnly": false, "type": "path"}, "boot.initrd.systemd.contents.<name>.target": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Path of the symlink.\n"}, "loc": ["boot", "initrd", "systemd", "contents", "<name>", "target"], "readOnly": false, "type": "path"}, "boot.initrd.systemd.contents.<name>.text": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Text of the file."}, "loc": ["boot", "initrd", "systemd", "contents", "<name>", "text"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "boot.initrd.systemd.emergencyAccess": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to true for unauthenticated emergency access, and false for\nno emergency access.\n\nCan also be set to a hashed super user password to allow\nauthenticated access to the emergency mode.\n"}, "loc": ["boot", "initrd", "systemd", "emergencyAccess"], "readOnly": false, "type": "boolean or null or string, not containing newlines or colons"}, "boot.initrd.systemd.enable": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable systemd in initrd. The unit options such as\n{option}`boot.initrd.systemd.services` are the same as their\nstage 2 counterparts such as {option}`systemd.services`,\nexcept that `restartTriggers` and `reloadTriggers` are not\nsupported.\n\nNote: This is experimental. Some of the `boot.initrd` options\nare not supported when this is enabled, and the options under\n`boot.initrd.systemd` are subject to change.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["boot", "initrd", "systemd", "enable"], "readOnly": false, "type": "boolean"}, "boot.initrd.systemd.extraBin": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Tools to add to /bin\n"}, "example": {"_type": "literalExpression", "text": "{\n  umount = ${pkgs.util-linux}/bin/umount;\n}\n"}, "loc": ["boot", "initrd", "systemd", "extraBin"], "readOnly": false, "type": "attribute set of path"}, "boot.initrd.systemd.extraConfig": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config options for systemd. See systemd-system.conf(5) man page\nfor available options.\n"}, "example": {"_type": "literalExpression", "text": "\"DefaultLimitCORE=infinity\""}, "loc": ["boot", "initrd", "systemd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.initrd.systemd.initrdBin": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages to include in /bin for the stage 1 emergency shell.\n"}, "loc": ["boot", "initrd", "systemd", "initrdBin"], "readOnly": false, "type": "list of package"}, "boot.initrd.systemd.managerEnvironment": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables of PID 1. These variables are\n*not* passed to started units.\n"}, "example": {"_type": "literalExpression", "text": "{\n  SYSTEMD_LOG_LEVEL = \"debug\";\n}"}, "loc": ["boot", "initrd", "systemd", "managerEnvironment"], "readOnly": false, "type": "attribute set of (null or string or path or package)"}, "boot.initrd.systemd.mounts": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Definition of systemd mount units.\nThis is a list instead of an attrSet, because systemd mandates the names to be derived from\nthe 'where' attribute.\n"}, "loc": ["boot", "initrd", "systemd", "mounts"], "readOnly": false, "type": "list of (submodule)"}, "boot.initrd.systemd.network.config": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of global systemd network config."}, "loc": ["boot", "initrd", "systemd", "network", "config"], "readOnly": false, "type": "submodule"}, "boot.initrd.systemd.network.enable": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable networkd or not.\n"}, "loc": ["boot", "initrd", "systemd", "network", "enable"], "readOnly": false, "type": "boolean"}, "boot.initrd.systemd.network.links": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd network links."}, "loc": ["boot", "initrd", "systemd", "network", "links"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.initrd.systemd.network.netdevs": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd network devices."}, "loc": ["boot", "initrd", "systemd", "network", "netdevs"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.initrd.systemd.network.networks": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd networks."}, "loc": ["boot", "initrd", "systemd", "network", "networks"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.initrd.systemd.network.wait-online.anyInterface": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to consider the network online when any interface is online, as opposed to all of them.\nThis is useful on portable machines with a wired and a wireless interface, for example.\n"}, "loc": ["boot", "initrd", "systemd", "network", "wait-online", "anyInterface"], "readOnly": false, "type": "boolean"}, "boot.initrd.systemd.network.wait-online.enable": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the systemd-networkd-wait-online service.\n\nsystemd-networkd-wait-online can timeout and fail if there are no network interfaces\navailable for it to manage. When systemd-networkd is enabled but a different service is\nresponsible for managing the system's internet connection (for example, NetworkManager or\nconnman are used to manage WiFi connections), this service is unnecessary and can be\ndisabled.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["boot", "initrd", "systemd", "network", "wait-online", "enable"], "readOnly": false, "type": "boolean"}, "boot.initrd.systemd.network.wait-online.extraArgs": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command-line arguments to pass to systemd-networkd-wait-online.\nThese also affect per-interface `systemd-network-wait-online@` services.\n\nSee {manpage}`systemd-networkd-wait-online.service(8)` for all available options.\n"}, "loc": ["boot", "initrd", "systemd", "network", "wait-online", "extraArgs"], "readOnly": false, "type": "list of string"}, "boot.initrd.systemd.network.wait-online.ignoredInterfaces": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Network interfaces to be ignored when deciding if the system is online.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"wg0\"\n]"}, "loc": ["boot", "initrd", "systemd", "network", "wait-online", "ignoredInterfaces"], "readOnly": false, "type": "list of string"}, "boot.initrd.systemd.network.wait-online.timeout": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "120"}, "description": {"_type": "mdDoc", "text": "Time to wait for the network to come online, in seconds. Set to 0 to disable.\n"}, "example": {"_type": "literalExpression", "text": "0"}, "loc": ["boot", "initrd", "systemd", "network", "wait-online", "timeout"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "boot.initrd.systemd.package": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.systemdStage1"}, "description": {"_type": "mdDoc", "text": "The systemd package to use."}, "loc": ["boot", "initrd", "systemd", "package"], "readOnly": false, "type": "package"}, "boot.initrd.systemd.packages": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages providing systemd units and hooks."}, "example": {"_type": "literalExpression", "text": "[ pkgs.systemd-cryptsetup-generator ]"}, "loc": ["boot", "initrd", "systemd", "packages"], "readOnly": false, "type": "list of package"}, "boot.initrd.systemd.paths": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd path units."}, "loc": ["boot", "initrd", "systemd", "paths"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.initrd.systemd.repart.device": {"declarations": ["nixos/modules/system/boot/systemd/repart.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The device to operate on.\n\nIf `device == null`, systemd-repart will operate on the device\nbacking the root partition. So in order to dynamically *create* the\nroot partition in the initrd you need to set a device.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/vda\""}, "loc": ["boot", "initrd", "systemd", "repart", "device"], "readOnly": false, "type": "null or string"}, "boot.initrd.systemd.repart.enable": {"declarations": ["nixos/modules/system/boot/systemd/repart.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Grow and add partitions to a partition table at boot time in the initrd.\nsystemd-repart only works with GPT partition tables.\n\nTo run systemd-repart after the initrd, see\n`options.systemd.repart.enable`.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["boot", "initrd", "systemd", "repart", "enable"], "readOnly": false, "type": "boolean"}, "boot.initrd.systemd.services": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd service units."}, "loc": ["boot", "initrd", "systemd", "services"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.initrd.systemd.slices": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of slice configurations."}, "loc": ["boot", "initrd", "systemd", "slices"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.initrd.systemd.sockets": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd socket units."}, "loc": ["boot", "initrd", "systemd", "sockets"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.initrd.systemd.storePaths": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Store paths to copy into the initrd as well.\n"}, "loc": ["boot", "initrd", "systemd", "storePaths"], "readOnly": false, "type": "list of ((optionally newline-terminated) single-line string or package)"}, "boot.initrd.systemd.strip": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to completely strip executables and libraries copied to the initramfs.\n\nSetting this to false may save on the order of 30MiB on the\nmachine building the system (by avoiding a binutils\nreference), at the cost of ~1MiB of initramfs size. This puts\nthis option firmly in the territory of micro-optimisation.\n"}, "loc": ["boot", "initrd", "systemd", "strip"], "readOnly": false, "type": "boolean"}, "boot.initrd.systemd.suppressedStorePaths": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Store paths specified in the storePaths option that\nshould not be copied.\n"}, "loc": ["boot", "initrd", "systemd", "suppressedStorePaths"], "readOnly": false, "type": "list of (optionally newline-terminated) single-line string"}, "boot.initrd.systemd.suppressedUnits": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of units to skip when generating system systemd configuration directory. This has\npriority over upstream units, {option}`boot.initrd.systemd.units`, and\n{option}`boot.initrd.systemd.additionalUpstreamUnits`. The main purpose of this is to\nprevent a upstream systemd unit from being added to the initrd with any modifications made to it\nby other NixOS modules.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"systemd-backlight@.service\"\n]"}, "loc": ["boot", "initrd", "systemd", "suppressedUnits"], "readOnly": false, "type": "list of string"}, "boot.initrd.systemd.targets": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd target units."}, "loc": ["boot", "initrd", "systemd", "targets"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.initrd.systemd.timers": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd timer units."}, "loc": ["boot", "initrd", "systemd", "timers"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.initrd.systemd.units": {"declarations": ["nixos/modules/system/boot/systemd/initrd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd units."}, "loc": ["boot", "initrd", "systemd", "units"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.initrd.verbose": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Verbosity of the initrd. Please note that disabling verbosity removes\nonly the mandatory messages generated by the NixOS scripts. For a\ncompletely silent boot, you might also want to set the two following\nconfiguration options:\n\n- `boot.consoleLogLevel = 0;`\n- `boot.kernelParams = [ \"quiet\" \"udev.log_level=3\" ];`\n"}, "loc": ["boot", "initrd", "verbose"], "readOnly": false, "type": "boolean"}, "boot.isContainer": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether this NixOS machine is a lightweight container running\nin another NixOS system.\n"}, "loc": ["boot", "isContainer"], "readOnly": false, "type": "boolean"}, "boot.iscsi-initiator.discoverPortal": {"declarations": ["nixos/modules/services/networking/iscsi/root-initiator.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "iSCSI portal to boot from.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.1.1:3260\""}, "loc": ["boot", "iscsi-initiator", "discoverPortal"], "readOnly": false, "type": "null or string"}, "boot.iscsi-initiator.extraConfig": {"declarations": ["nixos/modules/services/networking/iscsi/root-initiator.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Extra lines to append to /etc/iscsid.conf"}, "loc": ["boot", "iscsi-initiator", "extraConfig"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "boot.iscsi-initiator.extraConfigFile": {"declarations": ["nixos/modules/services/networking/iscsi/root-initiator.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Append an additional file's contents to `/etc/iscsid.conf`. Use a non-store path\nand store passwords in this file. Note: the file specified here must be available\nin the initrd, see: `boot.initrd.secrets`.\n"}, "loc": ["boot", "iscsi-initiator", "extraConfigFile"], "readOnly": false, "type": "null or string"}, "boot.iscsi-initiator.extraIscsiCommands": {"declarations": ["nixos/modules/services/networking/iscsi/root-initiator.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra iscsi commands to run in the initrd."}, "loc": ["boot", "iscsi-initiator", "extraIscsiCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.iscsi-initiator.logLevel": {"declarations": ["nixos/modules/services/networking/iscsi/root-initiator.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Higher numbers elicits more logs.\n"}, "example": {"_type": "literalExpression", "text": "8"}, "loc": ["boot", "iscsi-initiator", "logLevel"], "readOnly": false, "type": "signed integer"}, "boot.iscsi-initiator.loginAll": {"declarations": ["nixos/modules/services/networking/iscsi/root-initiator.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Do not log into a specific target on the portal, but to all that we discover.\nThis overrides setting target.\n"}, "loc": ["boot", "iscsi-initiator", "loginAll"], "readOnly": false, "type": "boolean"}, "boot.iscsi-initiator.name": {"declarations": ["nixos/modules/services/networking/iscsi/root-initiator.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the iSCSI initiator to boot from. Note, booting from iscsi\nrequires networkd based networking.\n"}, "example": {"_type": "literalExpression", "text": "\"iqn.2020-08.org.linux-iscsi.initiatorhost:example\""}, "loc": ["boot", "iscsi-initiator", "name"], "readOnly": false, "type": "null or string"}, "boot.iscsi-initiator.target": {"declarations": ["nixos/modules/services/networking/iscsi/root-initiator.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the iSCSI target to boot from.\n"}, "example": {"_type": "literalExpression", "text": "\"iqn.2020-08.org.linux-iscsi.targethost:example\""}, "loc": ["boot", "iscsi-initiator", "target"], "readOnly": false, "type": "null or string"}, "boot.kernel.enable": {"declarations": ["nixos/modules/system/boot/kernel.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Linux kernel. This is useful for systemd-like containers which do not require a kernel."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["boot", "kernel", "enable"], "readOnly": false, "type": "boolean"}, "boot.kernel.randstructSeed": {"declarations": ["nixos/modules/system/boot/kernel.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Provides a custom seed for the {var}`RANDSTRUCT` security\noption of the Linux kernel. Note that {var}`RANDSTRUCT` is\nonly enabled in NixOS hardened kernels. Using a custom seed requires\nbuilding the kernel and dependent packages locally, since this\ncustomization happens at build time.\n"}, "example": {"_type": "literalExpression", "text": "\"my secret seed\""}, "loc": ["boot", "kernel", "randstructSeed"], "readOnly": false, "type": "string"}, "boot.kernel.sysctl": {"declarations": ["nixos/modules/config/sysctl.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Runtime parameters of the Linux kernel, as set by\n{manpage}`sysctl(8)`.  Note that sysctl\nparameters names must be enclosed in quotes\n(e.g. `\"vm.swappiness\"` instead of\n`vm.swappiness`).  The value of each\nparameter may be a string, integer, boolean, or null\n(signifying the option will not appear at all).\n"}, "example": {"_type": "literalExpression", "text": "{ \"net.ipv4.tcp_syncookies\" = false; \"vm.swappiness\" = 60; }\n"}, "loc": ["boot", "kernel", "sysctl"], "readOnly": false, "type": "attribute set of (sysctl option value)"}, "boot.kernel.sysctl.\"net.core.rmem_max\"": {"declarations": ["nixos/modules/config/sysctl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The maximum socket receive buffer size. In case of conflicting values, the highest will be used."}, "loc": ["boot", "kernel", "sysctl", "net.core.rmem_max"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "boot.kernelModules": {"declarations": ["nixos/modules/system/boot/kernel.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The set of kernel modules to be loaded in the second stage of\nthe boot process.  Note that modules that are needed to\nmount the root file system should be added to\n{option}`boot.initrd.availableKernelModules` or\n{option}`boot.initrd.kernelModules`.\n"}, "loc": ["boot", "kernelModules"], "readOnly": false, "type": "list of string"}, "boot.kernelPackages": {"declarations": ["nixos/modules/system/boot/kernel.nix"], "default": {"_type": "literalExpression", "text": "pkgs.linuxPackages"}, "description": {"_type": "mdDoc", "text": "This option allows you to override the Linux kernel used by\nNixOS.  Since things like external kernel module packages are\ntied to the kernel you're using, it also overrides those.\nThis option is a function that takes Nixpkgs as an argument\n(as a convenience), and returns an attribute set containing at\nthe very least an attribute {var}`kernel`.\nAdditional attributes may be needed depending on your\nconfiguration.  For instance, if you use the NVIDIA X driver,\nthen it also needs to contain an attribute\n{var}`nvidia_x11`.\n\nPlease note that we strictly support kernel versions that are\nmaintained by the Linux developers only. More information on the\navailability of kernel versions is documented\n[in the Linux section of the manual](https://nixos.org/manual/nixos/unstable/index.html#sec-kernel-config).\n"}, "example": {"_type": "literalExpression", "text": "pkgs.linuxKernel.packages.linux_5_10"}, "loc": ["boot", "kernelPackages"], "readOnly": false, "type": "raw value"}, "boot.kernelParams": {"declarations": ["nixos/modules/system/boot/kernel.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Parameters added to the kernel command line."}, "loc": ["boot", "kernelParams"], "readOnly": false, "type": "list of string, with spaces inside double quotes"}, "boot.kernelPatches": {"declarations": ["nixos/modules/system/boot/kernel.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of additional patches to apply to the kernel.\n\nEvery item should be an attribute set with the following attributes:\n\n```nix\n{\n  name = \"foo\";                 # descriptive name, required\n\n  patch = ./foo.patch;          # path or derivation that contains the patch source\n                                # (required, but can be null if only config changes\n                                # are needed)\n\n  extraStructuredConfig = {     # attrset of extra configuration parameters\n    FOO = lib.kernel.yes;       # (without the CONFIG_ prefix, optional)\n  };                            # values should generally be lib.kernel.yes,\n                                # lib.kernel.no or lib.kernel.module\n\n  features = {                  # attrset of extra \"features\" the kernel is considered to have\n    foo = true;                 # (may be checked by other NixOS modules, optional)\n  };\n\n  extraConfig = \"CONFIG_FOO y\"; # extra configuration options in string form\n                                # (deprecated, use extraStructuredConfig instead, optional)\n}\n```\n\nThere's a small set of existing kernel patches in Nixpkgs, available as `pkgs.kernelPatches`,\nthat follow this format and can be used directly.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    name = \"foo\";\n    patch = ./foo.patch;\n    extraStructuredConfig.FOO = lib.kernel.yes;\n    features.foo = true;\n  }\n]\n"}, "loc": ["boot", "kernelPatches"], "readOnly": false, "type": "list of (attribute set)"}, "boot.loader.efi.canTouchEfiVariables": {"declarations": ["nixos/modules/system/boot/loader/efi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the installation process is allowed to modify EFI boot variables."}, "loc": ["boot", "loader", "efi", "canTouchEfiVariables"], "readOnly": false, "type": "boolean"}, "boot.loader.efi.efiSysMountPoint": {"declarations": ["nixos/modules/system/boot/loader/efi.nix"], "default": {"_type": "literalExpression", "text": "\"/boot\""}, "description": {"_type": "mdDoc", "text": "Where the EFI System Partition is mounted."}, "loc": ["boot", "loader", "efi", "efiSysMountPoint"], "readOnly": false, "type": "string"}, "boot.loader.external.enable": {"declarations": ["nixos/modules/system/boot/loader/external/external.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable use an external tool to install your bootloader."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["boot", "loader", "external", "enable"], "readOnly": false, "type": "boolean"}, "boot.loader.external.installHook": {"declarations": ["nixos/modules/system/boot/loader/external/external.nix"], "description": {"_type": "mdDoc", "text": "The full path to a program of your choosing which performs the bootloader installation process.\n\nThe program will be called with an argument pointing to the output of the system's toplevel.\n"}, "loc": ["boot", "loader", "external", "installHook"], "readOnly": false, "type": "path"}, "boot.loader.generationsDir.copyKernels": {"declarations": ["nixos/modules/system/boot/loader/generations-dir/generations-dir.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether copy the necessary boot files into /boot, so\n/nix/store is not needed by the boot loader.\n"}, "loc": ["boot", "loader", "generationsDir", "copyKernels"], "readOnly": false, "type": "boolean"}, "boot.loader.generationsDir.enable": {"declarations": ["nixos/modules/system/boot/loader/generations-dir/generations-dir.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to create symlinks to the system generations under\n`/boot`.  When enabled,\n`/boot/default/kernel`,\n`/boot/default/initrd`, etc., are updated to\npoint to the current generation's kernel image, initial RAM\ndisk, and other bootstrap files.\n\nThis optional is not necessary with boot loaders such as GNU GRUB\nfor which the menu is updated to point to the latest bootstrap\nfiles.  However, it is needed for U-Boot on platforms where the\nboot command line is stored in flash memory rather than in a\nmenu file.\n"}, "loc": ["boot", "loader", "generationsDir", "enable"], "readOnly": false, "type": "boolean"}, "boot.loader.generic-extlinux-compatible.configurationLimit": {"declarations": ["nixos/modules/system/boot/loader/generic-extlinux-compatible"], "default": {"_type": "literalExpression", "text": "20"}, "description": {"_type": "mdDoc", "text": "Maximum number of configurations in the boot menu.\n"}, "example": {"_type": "literalExpression", "text": "10"}, "loc": ["boot", "loader", "generic-extlinux-compatible", "configurationLimit"], "readOnly": false, "type": "signed integer"}, "boot.loader.generic-extlinux-compatible.enable": {"declarations": ["nixos/modules/system/boot/loader/generic-extlinux-compatible"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to generate an extlinux-compatible configuration file\nunder `/boot/extlinux.conf`.  For instance,\nU-Boot's generic distro boot support uses this file format.\n\nSee [U-boot's documentation](http://git.denx.de/?p=u-boot.git;a=blob;f=doc/README.distro;hb=refs/heads/master)\nfor more information.\n"}, "loc": ["boot", "loader", "generic-extlinux-compatible", "enable"], "readOnly": false, "type": "boolean"}, "boot.loader.generic-extlinux-compatible.populateCmd": {"declarations": ["nixos/modules/system/boot/loader/generic-extlinux-compatible"], "description": {"_type": "mdDoc", "text": "Contains the builder command used to populate an image,\nhonoring all options except the `-c <path-to-default-configuration>`\nargument.\nUseful to have for sdImage.populateRootCommands\n"}, "loc": ["boot", "loader", "generic-extlinux-compatible", "populateCmd"], "readOnly": true, "type": "string"}, "boot.loader.generic-extlinux-compatible.useGenerationDeviceTree": {"declarations": ["nixos/modules/system/boot/loader/generic-extlinux-compatible"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to generate Device Tree-related directives in the\nextlinux configuration.\n\nWhen enabled, the bootloader will attempt to load the device\ntree binaries from the generation's kernel.\n\nNote that this affects all generations, regardless of the\nsetting value used in their configurations.\n"}, "loc": ["boot", "loader", "generic-extlinux-compatible", "useGenerationDeviceTree"], "readOnly": false, "type": "boolean"}, "boot.loader.grub.backgroundColor": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Background color to be used for GRUB to fill the areas the image isn't filling.\n\n::: {.note}\nThis options has no effect for GRUB 1.\n:::\n"}, "example": {"_type": "literalExpression", "text": "\"#7EBAE4\""}, "loc": ["boot", "loader", "grub", "backgroundColor"], "readOnly": false, "type": "null or string"}, "boot.loader.grub.configurationLimit": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "100"}, "description": {"_type": "mdDoc", "text": "Maximum of configurations in boot menu. GRUB has problems when\nthere are too many entries.\n"}, "example": {"_type": "literalExpression", "text": "120"}, "loc": ["boot", "loader", "grub", "configurationLimit"], "readOnly": false, "type": "signed integer"}, "boot.loader.grub.configurationName": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "GRUB entry name instead of default.\n"}, "example": {"_type": "literalExpression", "text": "\"Stable 2.6.21\""}, "loc": ["boot", "loader", "grub", "configurationName"], "readOnly": false, "type": "string"}, "boot.loader.grub.copyKernels": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the GRUB menu builder should copy kernels and initial\nramdisks to /boot.  This is done automatically if /boot is\non a different partition than /.\n"}, "loc": ["boot", "loader", "grub", "copyKernels"], "readOnly": false, "type": "boolean"}, "boot.loader.grub.default": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"0\""}, "description": {"_type": "mdDoc", "text": "Index of the default menu item to be booted.\nCan also be set to \"saved\", which will make GRUB select\nthe menu item that was used at the last boot.\n"}, "loc": ["boot", "loader", "grub", "default"], "readOnly": false, "type": "signed integer or string"}, "boot.loader.grub.device": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The device on which the GRUB boot loader will be installed.\nThe special value `nodev` means that a GRUB\nboot menu will be generated, but GRUB itself will not\nactually be installed.  To install GRUB on multiple devices,\nuse `boot.loader.grub.devices`.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/disk/by-id/wwn-0x500001234567890a\""}, "loc": ["boot", "loader", "grub", "device"], "readOnly": false, "type": "string"}, "boot.loader.grub.devices": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The devices on which the boot loader, GRUB, will be\ninstalled. Can be used instead of `device` to\ninstall GRUB onto multiple devices.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/dev/disk/by-id/wwn-0x500001234567890a\"\n]"}, "loc": ["boot", "loader", "grub", "devices"], "readOnly": false, "type": "list of string"}, "boot.loader.grub.efiInstallAsRemovable": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to invoke `grub-install` with\n`--removable`.\n\nUnless you turn this on, GRUB will install itself somewhere in\n`boot.loader.efi.efiSysMountPoint` (exactly where\ndepends on other config variables). If you've set\n`boot.loader.efi.canTouchEfiVariables` *AND* you\nare currently booted in UEFI mode, then GRUB will use\n`efibootmgr` to modify the boot order in the\nEFI variables of your firmware to include this location. If you are\n*not* booted in UEFI mode at the time GRUB is being installed, the\nNVRAM will not be modified, and your system will not find GRUB at\nboot time. However, GRUB will still return success so you may miss\nthe warning that gets printed (\"`efibootmgr: EFI variables\nare not supported on this system.`\").\n\nIf you turn this feature on, GRUB will install itself in a\nspecial location within `efiSysMountPoint` (namely\n`EFI/boot/boot$arch.efi`) which the firmwares\nare hardcoded to try first, regardless of NVRAM EFI variables.\n\nTo summarize, turn this on if:\n- You are installing NixOS and want it to boot in UEFI mode,\n  but you are currently booted in legacy mode\n- You want to make a drive that will boot regardless of\n  the NVRAM state of the computer (like a USB \"removable\" drive)\n- You simply dislike the idea of depending on NVRAM\n  state to make your drive bootable\n"}, "loc": ["boot", "loader", "grub", "efiInstallAsRemovable"], "readOnly": false, "type": "boolean"}, "boot.loader.grub.efiSupport": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether GRUB should be built with EFI support.\nEFI support is only available for GRUB v2.\nThis option is ignored for GRUB v1.\n"}, "loc": ["boot", "loader", "grub", "efiSupport"], "readOnly": false, "type": "boolean"}, "boot.loader.grub.enable": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "!config.boot.isContainer"}, "description": {"_type": "mdDoc", "text": "Whether to enable the GNU GRUB boot loader.\n"}, "loc": ["boot", "loader", "grub", "enable"], "readOnly": false, "type": "boolean"}, "boot.loader.grub.enableCryptodisk": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable support for encrypted partitions. GRUB should automatically\nunlock the correct encrypted partition and look for filesystems.\n"}, "loc": ["boot", "loader", "grub", "enableCryptodisk"], "readOnly": false, "type": "boolean"}, "boot.loader.grub.entryOptions": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"--class nixos --unrestricted\""}, "description": {"_type": "mdDoc", "text": "Options applied to the primary NixOS menu entry.\n\n::: {.note}\nThis options has no effect for GRUB 1.\n:::\n"}, "loc": ["boot", "loader", "grub", "entryOptions"], "readOnly": false, "type": "null or string"}, "boot.loader.grub.extraConfig": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional GRUB commands inserted in the configuration file\njust before the menu entries.\n"}, "example": {"_type": "literalExpression", "text": "''\n  serial --unit=0 --speed=115200 --word=8 --parity=no --stop=1\n  terminal_input --append serial\n  terminal_output --append serial\n''"}, "loc": ["boot", "loader", "grub", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.loader.grub.extraEntries": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Any additional entries you want added to the GRUB boot menu.\n"}, "example": {"_type": "literalExpression", "text": "''\n  # GRUB 1 example (not GRUB 2 compatible)\n  title Windows\n    chainloader (hd0,1)+1\n  \n  # GRUB 2 example\n  menuentry \"Windows 7\" {\n    chainloader (hd0,4)+1\n  }\n  \n  # GRUB 2 with UEFI example, chainloading another distro\n  menuentry \"Fedora\" {\n    set root=(hd1,1)\n    chainloader /efi/fedora/grubx64.efi\n  }\n''"}, "loc": ["boot", "loader", "grub", "extraEntries"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.loader.grub.extraEntriesBeforeNixOS": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether extraEntries are included before the default option.\n"}, "loc": ["boot", "loader", "grub", "extraEntriesBeforeNixOS"], "readOnly": false, "type": "boolean"}, "boot.loader.grub.extraFiles": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of files to be copied to {file}`/boot`.\nEach attribute name denotes the destination file name in\n{file}`/boot`, while the corresponding\nattribute value specifies the source file.\n"}, "example": {"_type": "literalExpression", "text": "{ \"memtest.bin\" = \"${pkgs.memtest86plus}/memtest.bin\"; }\n"}, "loc": ["boot", "loader", "grub", "extraFiles"], "readOnly": false, "type": "attribute set of path"}, "boot.loader.grub.extraGrubInstallArgs": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional arguments passed to `grub-install`.\n\nA use case for this is to build specific GRUB2 modules\ndirectly into the GRUB2 kernel image, so that they are available\nand activated even in the `grub rescue` shell.\n\nThey are also necessary when the BIOS/UEFI is bugged and cannot\ncorrectly read large disks (e.g. above 2 TB), so GRUB2's own\n`nativedisk` and related modules can be used\nto use its own disk drivers. The example shows one such case.\nThis is also useful for booting from USB.\nSee the\n[\nGRUB source code\n](http://git.savannah.gnu.org/cgit/grub.git/tree/grub-core/commands/nativedisk.c?h=grub-2.04#n326)\nfor which disk modules are available.\n\nThe list elements are passed directly as `argv`\narguments to the `grub-install` program, in order.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--modules=nativedisk ahci pata part_gpt part_msdos diskfilter mdraid1x lvm ext2\"\n]"}, "loc": ["boot", "loader", "grub", "extraGrubInstallArgs"], "readOnly": false, "type": "list of string"}, "boot.loader.grub.extraInstallCommands": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional shell commands inserted in the bootloader installer\nscript after generating menu entries.\n"}, "example": {"_type": "literalExpression", "text": "''\n  # the example below generates detached signatures that GRUB can verify\n  # https://www.gnu.org/software/grub/manual/grub/grub.html#Using-digital-signatures\n  ''${pkgs.findutils}/bin/find /boot -not -path \"/boot/efi/*\" -type f -name '*.sig' -delete\n  old_gpg_home=$GNUPGHOME\n  export GNUPGHOME=\"$(mktemp -d)\"\n  ''${pkgs.gnupg}/bin/gpg --import ''${priv_key} > /dev/null 2>&1\n  ''${pkgs.findutils}/bin/find /boot -not -path \"/boot/efi/*\" -type f -exec ''${pkgs.gnupg}/bin/gpg --detach-sign \"{}\" \\; > /dev/null 2>&1\n  rm -rf $GNUPGHOME\n  export GNUPGHOME=$old_gpg_home\n''"}, "loc": ["boot", "loader", "grub", "extraInstallCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.loader.grub.extraPerEntryConfig": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional GRUB commands inserted in the configuration file\nat the start of each NixOS menu entry.\n"}, "example": {"_type": "literalExpression", "text": "\"root (hd0)\""}, "loc": ["boot", "loader", "grub", "extraPerEntryConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.loader.grub.extraPrepareConfig": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional bash commands to be run at the script that\nprepares the GRUB menu entries.\n"}, "loc": ["boot", "loader", "grub", "extraPrepareConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.loader.grub.font": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.grub2}/share/grub/unicode.pf2\""}, "description": {"_type": "mdDoc", "text": "Path to a TrueType, OpenType, or pf2 font to be used by Grub.\n"}, "loc": ["boot", "loader", "grub", "font"], "readOnly": false, "type": "null or path"}, "boot.loader.grub.fontSize": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Font size for the grub menu. Ignored unless `font`\nis set to a ttf or otf font.\n"}, "example": {"_type": "literalExpression", "text": "16"}, "loc": ["boot", "loader", "grub", "fontSize"], "readOnly": false, "type": "null or signed integer"}, "boot.loader.grub.forceInstall": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to try and forcibly install GRUB even if problems are\ndetected. It is not recommended to enable this unless you know what\nyou are doing.\n"}, "loc": ["boot", "loader", "grub", "forceInstall"], "readOnly": false, "type": "boolean"}, "boot.loader.grub.forcei686": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to force the use of a ia32 boot loader on x64 systems. Required\nto install and run NixOS on 64bit x86 systems with 32bit (U)EFI.\n"}, "loc": ["boot", "loader", "grub", "forcei686"], "readOnly": false, "type": "boolean"}, "boot.loader.grub.fsIdentifier": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"uuid\""}, "description": {"_type": "mdDoc", "text": "Determines how GRUB will identify devices when generating the\nconfiguration file. A value of uuid / label signifies that grub\nwill always resolve the uuid or label of the device before using\nit in the configuration. A value of provided means that GRUB will\nuse the device name as show in {command}`df` or\n{command}`mount`. Note, zfs zpools / datasets are ignored\nand will always be mounted using their labels.\n"}, "loc": ["boot", "loader", "grub", "fsIdentifier"], "readOnly": false, "type": "one of \"uuid\", \"label\", \"provided\""}, "boot.loader.grub.gfxmodeBios": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"1024x768\""}, "description": {"_type": "mdDoc", "text": "The gfxmode to pass to GRUB when loading a graphical boot interface under BIOS.\n"}, "example": {"_type": "literalExpression", "text": "\"auto\""}, "loc": ["boot", "loader", "grub", "gfxmodeBios"], "readOnly": false, "type": "string"}, "boot.loader.grub.gfxmodeEfi": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"auto\""}, "description": {"_type": "mdDoc", "text": "The gfxmode to pass to GRUB when loading a graphical boot interface under EFI.\n"}, "example": {"_type": "literalExpression", "text": "\"1024x768\""}, "loc": ["boot", "loader", "grub", "gfxmodeEfi"], "readOnly": false, "type": "string"}, "boot.loader.grub.gfxpayloadBios": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"text\""}, "description": {"_type": "mdDoc", "text": "The gfxpayload to pass to GRUB when loading a graphical boot interface under BIOS.\n"}, "example": {"_type": "literalExpression", "text": "\"keep\""}, "loc": ["boot", "loader", "grub", "gfxpayloadBios"], "readOnly": false, "type": "string"}, "boot.loader.grub.gfxpayloadEfi": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"keep\""}, "description": {"_type": "mdDoc", "text": "The gfxpayload to pass to GRUB when loading a graphical boot interface under EFI.\n"}, "example": {"_type": "literalExpression", "text": "\"text\""}, "loc": ["boot", "loader", "grub", "gfxpayloadEfi"], "readOnly": false, "type": "string"}, "boot.loader.grub.ipxe": {"declarations": ["nixos/modules/system/boot/loader/grub/ipxe.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of iPXE scripts available for\nbooting from the GRUB boot menu.\n"}, "example": {"_type": "literalExpression", "text": "{ demo = ''\n    #!ipxe\n    dhcp\n    chain http://boot.ipxe.org/demo/boot.php\n  '';\n}\n"}, "loc": ["boot", "loader", "grub", "ipxe"], "readOnly": false, "type": "attribute set of (path or string)"}, "boot.loader.grub.memtest86.enable": {"declarations": ["nixos/modules/system/boot/loader/grub/memtest.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Make Memtest86+ (or MemTest86 if EFI support is enabled),\na memory testing program, available from the\nGRUB boot menu. MemTest86 is an unfree program, so\nthis requires `allowUnfree` to be set to\n`true`.\n"}, "loc": ["boot", "loader", "grub", "memtest86", "enable"], "readOnly": false, "type": "boolean"}, "boot.loader.grub.memtest86.params": {"declarations": ["nixos/modules/system/boot/loader/grub/memtest.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Parameters added to the Memtest86+ command line. As of memtest86+ 5.01\nthe following list of (apparently undocumented) parameters are\naccepted:\n\n- `console=...`, set up a serial console.\n  Examples:\n  `console=ttyS0`,\n  `console=ttyS0,9600` or\n  `console=ttyS0,115200n8`.\n\n- `btrace`, enable boot trace.\n\n- `maxcpus=N`, limit number of CPUs.\n\n- `onepass`, run one pass and exit if there\n  are no errors.\n\n- `tstlist=...`, list of tests to run.\n  Example: `0,1,2`.\n\n- `cpumask=...`, set a CPU mask, to select CPUs\n  to use for testing.\n\nThis list of command line options was obtained by reading the\nMemtest86+ source code.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"console=ttyS0,115200\"\n]"}, "loc": ["boot", "loader", "grub", "memtest86", "params"], "readOnly": false, "type": "list of string"}, "boot.loader.grub.mirroredBoots": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Mirror the boot configuration to multiple partitions and install grub\nto the respective devices corresponding to those partitions.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    devices = [\n      \"/dev/disk/by-id/wwn-0x500001234567890a\"\n    ];\n    path = \"/boot1\";\n  }\n  {\n    devices = [\n      \"/dev/disk/by-id/wwn-0x500009876543210a\"\n    ];\n    path = \"/boot2\";\n  }\n]"}, "loc": ["boot", "loader", "grub", "mirroredBoots"], "readOnly": false, "type": "list of (submodule)"}, "boot.loader.grub.mirroredBoots.*.devices": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The path to the devices which will have the GRUB MBR written.\nNote these are typically device paths and not paths to partitions.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/dev/disk/by-id/wwn-0x500001234567890a\"\n  \"/dev/disk/by-id/wwn-0x500009876543210a\"\n]"}, "loc": ["boot", "loader", "grub", "mirroredBoots", "*", "devices"], "readOnly": false, "type": "list of string"}, "boot.loader.grub.mirroredBoots.*.efiBootloaderId": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The id of the bootloader to store in efi nvram.\nThe default is to name it NixOS and append the path or efiSysMountPoint.\nThis is only used if `boot.loader.efi.canTouchEfiVariables` is true.\n"}, "example": {"_type": "literalExpression", "text": "\"NixOS-fsid\""}, "loc": ["boot", "loader", "grub", "mirroredBoots", "*", "efiBootloaderId"], "readOnly": false, "type": "null or string"}, "boot.loader.grub.mirroredBoots.*.efiSysMountPoint": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the efi system mount point. Usually this is the same\npartition as the above path and can be left as null.\n"}, "example": {"_type": "literalExpression", "text": "\"/boot1/efi\""}, "loc": ["boot", "loader", "grub", "mirroredBoots", "*", "efiSysMountPoint"], "readOnly": false, "type": "null or string"}, "boot.loader.grub.mirroredBoots.*.path": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "description": {"_type": "mdDoc", "text": "The path to the boot directory where GRUB will be written. Generally\nthis boot path should double as an EFI path.\n"}, "example": {"_type": "literalExpression", "text": "\"/boot1\""}, "loc": ["boot", "loader", "grub", "mirroredBoots", "*", "path"], "readOnly": false, "type": "string"}, "boot.loader.grub.splashImage": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "description": {"_type": "mdDoc", "text": "Background image used for GRUB.\nSet to `null` to run GRUB in text mode.\n\n::: {.note}\nFor grub 1:\nIt must be a 640x480,\n14-colour image in XPM format, optionally compressed with\n{command}`gzip` or {command}`bzip2`.\n:::\n\n::: {.note}\nFor grub 2:\nFile must be one of .png, .tga, .jpg, or .jpeg. JPEG images must\nnot be progressive.\nThe image will be scaled if necessary to fit the screen.\n:::\n"}, "example": {"_type": "literalExpression", "text": "./my-background.png"}, "loc": ["boot", "loader", "grub", "splashImage"], "readOnly": false, "type": "null or path"}, "boot.loader.grub.splashMode": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"stretch\""}, "description": {"_type": "mdDoc", "text": "Whether to stretch the image or show the image in the top-left corner unstretched.\n\n::: {.note}\nThis options has no effect for GRUB 1.\n:::\n"}, "loc": ["boot", "loader", "grub", "splashMode"], "readOnly": false, "type": "one of \"normal\", \"stretch\""}, "boot.loader.grub.storePath": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"/nix/store\""}, "description": {"_type": "mdDoc", "text": "Path to the Nix store when looking for kernels at boot.\nOnly makes sense when copyKernels is false.\n"}, "loc": ["boot", "loader", "grub", "storePath"], "readOnly": false, "type": "string"}, "boot.loader.grub.subEntryOptions": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "\"--class nixos\""}, "description": {"_type": "mdDoc", "text": "Options applied to the secondary NixOS submenu entry.\n\n::: {.note}\nThis options has no effect for GRUB 1.\n:::\n"}, "loc": ["boot", "loader", "grub", "subEntryOptions"], "readOnly": false, "type": "null or string"}, "boot.loader.grub.theme": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Grub theme to be used.\n\n::: {.note}\nThis options has no effect for GRUB 1.\n:::\n"}, "example": {"_type": "literalExpression", "text": "pkgs.nixos-grub2-theme"}, "loc": ["boot", "loader", "grub", "theme"], "readOnly": false, "type": "null or path"}, "boot.loader.grub.useOSProber": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set to true, append entries for other OSs detected by os-prober.\n"}, "loc": ["boot", "loader", "grub", "useOSProber"], "readOnly": false, "type": "boolean"}, "boot.loader.grub.users": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "User accounts for GRUB. When specified, the GRUB command line and\nall boot options except the default are password-protected.\nAll passwords and hashes provided will be stored in /boot/grub/grub.cfg,\nand will be visible to any local user who can read this file. Additionally,\nany passwords and hashes provided directly in a Nix configuration\n(as opposed to external files) will be copied into the Nix store, and\nwill be visible to all local users.\n"}, "example": {"_type": "literalExpression", "text": "{\n  root = {\n    hashedPasswordFile = \"/path/to/file\";\n  };\n}"}, "loc": ["boot", "loader", "grub", "users"], "readOnly": false, "type": "attribute set of (submodule)"}, "boot.loader.grub.users.<name>.hashedPassword": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the password hash for the account,\ngenerated with grub-mkpasswd-pbkdf2.\nThis hash will be copied to the Nix store, and will be visible to all local users.\n"}, "example": {"_type": "literalExpression", "text": "\"grub.pbkdf2.sha512.10000.674DFFDEF76E13EA...2CC972B102CF4355\""}, "loc": ["boot", "loader", "grub", "users", "<name>", "hashedPassword"], "readOnly": false, "type": "null or string"}, "boot.loader.grub.users.<name>.hashedPasswordFile": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the path to a file containing the password hash\nfor the account, generated with grub-mkpasswd-pbkdf2.\nThis hash will be stored in /boot/grub/grub.cfg, and will\nbe visible to any local user who can read this file.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/file\""}, "loc": ["boot", "loader", "grub", "users", "<name>", "hashedPasswordFile"], "readOnly": false, "type": "null or string"}, "boot.loader.grub.users.<name>.password": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the clear text password for the account.\nThis password will be copied to the Nix store, and will be visible to all local users.\n"}, "example": {"_type": "literalExpression", "text": "\"Pa$$w0rd!\""}, "loc": ["boot", "loader", "grub", "users", "<name>", "password"], "readOnly": false, "type": "null or string"}, "boot.loader.grub.users.<name>.passwordFile": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the path to a file containing the\nclear text password for the account.\nThis password will be stored in /boot/grub/grub.cfg, and will\nbe visible to any local user who can read this file.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/file\""}, "loc": ["boot", "loader", "grub", "users", "<name>", "passwordFile"], "readOnly": false, "type": "null or string"}, "boot.loader.grub.zfsSupport": {"declarations": ["nixos/modules/system/boot/loader/grub/grub.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether GRUB should be built against libzfs.\nZFS support is only available for GRUB v2.\nThis option is ignored for GRUB v1.\n"}, "loc": ["boot", "loader", "grub", "zfsSupport"], "readOnly": false, "type": "boolean"}, "boot.loader.initScript.enable": {"declarations": ["nixos/modules/system/boot/loader/init-script/init-script.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Some systems require a /sbin/init script which is started.\nOr having it makes starting NixOS easier.\nThis applies to some kind of hosting services and user mode linux.\n\nAdditionally this script will create\n/boot/init-other-configurations-contents.txt containing\ncontents of remaining configurations. You can copy paste them into\n/sbin/init manually running a rescue system or such.\n"}, "loc": ["boot", "loader", "initScript", "enable"], "readOnly": false, "type": "boolean"}, "boot.loader.raspberryPi.enable": {"declarations": ["nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to create files with the system generations in\n`/boot`.\n`/boot/old` will hold files from old generations.\n"}, "loc": ["boot", "loader", "raspberryPi", "enable"], "readOnly": false, "type": "boolean"}, "boot.loader.raspberryPi.firmwareConfig": {"declarations": ["nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Extra options that will be appended to `/boot/config.txt` file.\nFor possible values, see: https://www.raspberrypi.com/documentation/computers/config_txt.html\n"}, "loc": ["boot", "loader", "raspberryPi", "firmwareConfig"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "boot.loader.raspberryPi.uboot.configurationLimit": {"declarations": ["nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix"], "default": {"_type": "literalExpression", "text": "20"}, "description": {"_type": "mdDoc", "text": "Maximum number of configurations in the boot menu.\n"}, "example": {"_type": "literalExpression", "text": "10"}, "loc": ["boot", "loader", "raspberryPi", "uboot", "configurationLimit"], "readOnly": false, "type": "signed integer"}, "boot.loader.raspberryPi.uboot.enable": {"declarations": ["nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable using uboot as bootmanager for the raspberry pi.\n"}, "loc": ["boot", "loader", "raspberryPi", "uboot", "enable"], "readOnly": false, "type": "boolean"}, "boot.loader.raspberryPi.version": {"declarations": ["nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": ""}, "loc": ["boot", "loader", "raspberryPi", "version"], "readOnly": false, "type": "one of 0, 1, 2, 3, 4"}, "boot.loader.systemd-boot.configurationLimit": {"declarations": ["nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum number of latest generations in the boot menu.\nUseful to prevent boot partition running out of disk space.\n\n`null` means no limit i.e. all generations\nthat were not garbage collected yet.\n"}, "example": {"_type": "literalExpression", "text": "120"}, "loc": ["boot", "loader", "systemd-boot", "configurationLimit"], "readOnly": false, "type": "null or signed integer"}, "boot.loader.systemd-boot.consoleMode": {"declarations": ["nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix"], "default": {"_type": "literalExpression", "text": "\"keep\""}, "description": {"_type": "mdDoc", "text": "The resolution of the console. The following values are valid:\n\n- `\"0\"`: Standard UEFI 80x25 mode\n- `\"1\"`: 80x50 mode, not supported by all devices\n- `\"2\"`: The first non-standard mode provided by the device firmware, if any\n- `\"auto\"`: Pick a suitable mode automatically using heuristics\n- `\"max\"`: Pick the highest-numbered available mode\n- `\"keep\"`: Keep the mode selected by firmware (the default)\n"}, "loc": ["boot", "loader", "systemd-boot", "consoleMode"], "readOnly": false, "type": "one of \"0\", \"1\", \"2\", \"auto\", \"max\", \"keep\""}, "boot.loader.systemd-boot.editor": {"declarations": ["nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to allow editing the kernel command-line before\nboot. It is recommended to set this to false, as it allows\ngaining root access by passing init=/bin/sh as a kernel\nparameter. However, it is enabled by default for backwards\ncompatibility.\n"}, "loc": ["boot", "loader", "systemd-boot", "editor"], "readOnly": false, "type": "boolean"}, "boot.loader.systemd-boot.enable": {"declarations": ["nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the systemd-boot (formerly gummiboot) EFI boot manager"}, "loc": ["boot", "loader", "systemd-boot", "enable"], "readOnly": false, "type": "boolean"}, "boot.loader.systemd-boot.extraEntries": {"declarations": ["nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Any additional entries you want added to the `systemd-boot` menu.\nThese entries will be copied to {file}`/boot/loader/entries`.\nEach attribute name denotes the destination file name,\nand the corresponding attribute value is the contents of the entry.\n\n`systemd-boot` orders the menu entries by the config file names,\nso if you want something to appear after all the NixOS entries,\nit should start with {file}`o` or onwards.\n"}, "example": {"_type": "literalExpression", "text": "{ \"memtest86.conf\" = ''\n  title MemTest86\n  efi /efi/memtest86/memtest86.efi\n''; }\n"}, "loc": ["boot", "loader", "systemd-boot", "extraEntries"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "boot.loader.systemd-boot.extraFiles": {"declarations": ["nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of files to be copied to {file}`/boot`.\nEach attribute name denotes the destination file name in\n{file}`/boot`, while the corresponding\nattribute value specifies the source file.\n"}, "example": {"_type": "literalExpression", "text": "{ \"efi/memtest86/memtest86.efi\" = \"${pkgs.memtest86-efi}/BOOTX64.efi\"; }\n"}, "loc": ["boot", "loader", "systemd-boot", "extraFiles"], "readOnly": false, "type": "attribute set of path"}, "boot.loader.systemd-boot.extraInstallCommands": {"declarations": ["nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional shell commands inserted in the bootloader installer\nscript after generating menu entries. It can be used to expand\non extra boot entries that cannot incorporate certain pieces of\ninformation (such as the resulting `init=` kernel parameter).\n"}, "example": {"_type": "literalExpression", "text": "''\n  default_cfg=$(cat /boot/loader/loader.conf | grep default | awk '{print $2}')\n  init_value=$(cat /boot/loader/entries/$default_cfg | grep init= | awk '{print $2}')\n  sed -i \"s|@INIT@|$init_value|g\" /boot/custom/config_with_placeholder.conf\n''"}, "loc": ["boot", "loader", "systemd-boot", "extraInstallCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.loader.systemd-boot.graceful": {"declarations": ["nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Invoke `bootctl install` with the `--graceful` option,\nwhich ignores errors when EFI variables cannot be written or when the EFI System Partition\ncannot be found. Currently only applies to random seed operations.\n\nOnly enable this option if `systemd-boot` otherwise fails to install, as the\nscope or implication of the `--graceful` option may change in the future.\n"}, "loc": ["boot", "loader", "systemd-boot", "graceful"], "readOnly": false, "type": "boolean"}, "boot.loader.systemd-boot.memtest86.enable": {"declarations": ["nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Make MemTest86 available from the systemd-boot menu. MemTest86 is a\nprogram for testing memory.  MemTest86 is an unfree program, so\nthis requires `allowUnfree` to be set to\n`true`.\n"}, "loc": ["boot", "loader", "systemd-boot", "memtest86", "enable"], "readOnly": false, "type": "boolean"}, "boot.loader.systemd-boot.memtest86.entryFilename": {"declarations": ["nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix"], "default": {"_type": "literalExpression", "text": "\"memtest86.conf\""}, "description": {"_type": "mdDoc", "text": "`systemd-boot` orders the menu entries by the config file names,\nso if you want something to appear after all the NixOS entries,\nit should start with {file}`o` or onwards.\n"}, "loc": ["boot", "loader", "systemd-boot", "memtest86", "entryFilename"], "readOnly": false, "type": "string"}, "boot.loader.systemd-boot.netbootxyz.enable": {"declarations": ["nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Make `netboot.xyz` available from the\n`systemd-boot` menu. `netboot.xyz`\nis a menu system that allows you to boot OS installers and\nutilities over the network.\n"}, "loc": ["boot", "loader", "systemd-boot", "netbootxyz", "enable"], "readOnly": false, "type": "boolean"}, "boot.loader.systemd-boot.netbootxyz.entryFilename": {"declarations": ["nixos/modules/system/boot/loader/systemd-boot/systemd-boot.nix"], "default": {"_type": "literalExpression", "text": "\"o_netbootxyz.conf\""}, "description": {"_type": "mdDoc", "text": "`systemd-boot` orders the menu entries by the config file names,\nso if you want something to appear after all the NixOS entries,\nit should start with {file}`o` or onwards.\n"}, "loc": ["boot", "loader", "systemd-boot", "netbootxyz", "entryFilename"], "readOnly": false, "type": "string"}, "boot.loader.timeout": {"declarations": ["nixos/modules/system/boot/loader/loader.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Timeout (in seconds) until loader boots the default menu item. Use null if the loader menu should be displayed indefinitely.\n"}, "loc": ["boot", "loader", "timeout"], "readOnly": false, "type": "null or signed integer"}, "boot.modprobeConfig.enable": {"declarations": ["nixos/modules/system/boot/modprobe.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable modprobe config. This is useful for systems like containers which do not require a kernel."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["boot", "modprobeConfig", "enable"], "readOnly": false, "type": "boolean"}, "boot.plymouth.enable": {"declarations": ["nixos/modules/system/boot/plymouth.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Plymouth boot splash screen."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["boot", "plymouth", "enable"], "readOnly": false, "type": "boolean"}, "boot.plymouth.extraConfig": {"declarations": ["nixos/modules/system/boot/plymouth.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Literal string to append to `configFile`\nand the config file generated by the plymouth module.\n"}, "loc": ["boot", "plymouth", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.plymouth.font": {"declarations": ["nixos/modules/system/boot/plymouth.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.dejavu_fonts.minimal}/share/fonts/truetype/DejaVuSans.ttf\""}, "description": {"_type": "mdDoc", "text": "Font file made available for displaying text on the splash screen.\n"}, "loc": ["boot", "plymouth", "font"], "readOnly": false, "type": "path"}, "boot.plymouth.logo": {"declarations": ["nixos/modules/system/boot/plymouth.nix"], "default": {"_type": "literalExpression", "text": "pkgs.fetchurl {\n          url = \"https://nixos.org/logo/nixos-hires.png\";\n          sha256 = \"1ivzgd7iz0i06y36p8m5w48fd8pjqwxhdaavc0pxs7w1g7mcy5si\";\n        }"}, "description": {"_type": "mdDoc", "text": "Logo which is displayed on the splash screen.\n"}, "loc": ["boot", "plymouth", "logo"], "readOnly": false, "type": "path"}, "boot.plymouth.theme": {"declarations": ["nixos/modules/system/boot/plymouth.nix"], "default": {"_type": "literalExpression", "text": "\"bgrt\""}, "description": {"_type": "mdDoc", "text": "Splash screen theme.\n"}, "loc": ["boot", "plymouth", "theme"], "readOnly": false, "type": "string"}, "boot.plymouth.themePackages": {"declarations": ["nixos/modules/system/boot/plymouth.nix"], "default": {"_type": "literalMD", "text": "A NixOS branded variant of the breeze theme when\n`config.boot.plymouth.theme == \"breeze\"`, otherwise\n`[ ]`.\n"}, "description": {"_type": "mdDoc", "text": "Extra theme packages for plymouth.\n"}, "loc": ["boot", "plymouth", "themePackages"], "readOnly": false, "type": "list of package"}, "boot.postBootCommands": {"declarations": ["nixos/modules/system/boot/stage-2.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to be executed just before systemd is started.\n"}, "example": {"_type": "literalExpression", "text": "\"rm -f /var/log/messages\""}, "loc": ["boot", "postBootCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "boot.readOnlyNixStore": {"declarations": ["nixos/modules/system/boot/stage-2.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set, NixOS will enforce the immutability of the Nix store\nby making {file}`/nix/store` a read-only bind\nmount.  Nix will automatically make the store writable when\nneeded.\n"}, "loc": ["boot", "readOnlyNixStore"], "readOnly": false, "type": "boolean"}, "boot.resumeDevice": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Device for manual resume attempt during boot. This should be used primarily\nif you want to resume from file. If left empty, the swap partitions are used.\nSpecify here the device where the file resides.\nYou should also use {var}`boot.kernelParams` to specify\n`\u00abresume_offset\u00bb`.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/sda3\""}, "loc": ["boot", "resumeDevice"], "readOnly": false, "type": "string"}, "boot.runSize": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "\"25%\""}, "description": {"_type": "mdDoc", "text": "Size limit for the /run tmpfs. Look at mount(8), tmpfs size option,\nfor the accepted syntax.\n"}, "example": {"_type": "literalExpression", "text": "\"256m\""}, "loc": ["boot", "runSize"], "readOnly": false, "type": "string"}, "boot.specialFileSystems.<name>.depends": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of paths that should be mounted before this one. This filesystem's\n{option}`device` and {option}`mountPoint` are always\nchecked and do not need to be included explicitly. If a path is added\nto this list, any other filesystem whose mount point is a parent of\nthe path will be mounted before this filesystem. The paths do not need\nto actually be the {option}`mountPoint` of some other filesystem.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/persist\"\n]"}, "loc": ["boot", "specialFileSystems", "<name>", "depends"], "readOnly": false, "type": "list of string (with check: non-empty without trailing slash)"}, "boot.specialFileSystems.<name>.device": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Location of the device."}, "example": {"_type": "literalExpression", "text": "\"/dev/sda\""}, "loc": ["boot", "specialFileSystems", "<name>", "device"], "readOnly": false, "type": "null or string (with check: non-empty)"}, "boot.specialFileSystems.<name>.fsType": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "\"auto\""}, "description": {"_type": "mdDoc", "text": "Type of the file system."}, "example": {"_type": "literalExpression", "text": "\"ext3\""}, "loc": ["boot", "specialFileSystems", "<name>", "fsType"], "readOnly": false, "type": "string (with check: non-empty)"}, "boot.specialFileSystems.<name>.mountPoint": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "description": {"_type": "mdDoc", "text": "Location of the mounted file system."}, "example": {"_type": "literalExpression", "text": "\"/mnt/usb\""}, "loc": ["boot", "specialFileSystems", "<name>", "mountPoint"], "readOnly": false, "type": "string (with check: non-empty without trailing slash)"}, "boot.specialFileSystems.<name>.options": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"defaults\"\n]"}, "description": {"_type": "mdDoc", "text": "Options used to mount the file system."}, "example": {"_type": "literalExpression", "text": "[\n  \"data=journal\"\n]"}, "loc": ["boot", "specialFileSystems", "<name>", "options"], "readOnly": false, "type": "non-empty (list of string (with check: non-empty))"}, "boot.supportedFilesystems": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Names of supported filesystem types."}, "example": {"_type": "literalExpression", "text": "[\n  \"btrfs\"\n]"}, "loc": ["boot", "supportedFilesystems"], "readOnly": false, "type": "list of string"}, "boot.systemdExecutable": {"declarations": ["nixos/modules/system/boot/stage-2.nix"], "default": {"_type": "literalExpression", "text": "\"/run/current-system/systemd/lib/systemd/systemd\""}, "description": {"_type": "mdDoc", "text": "The program to execute to start systemd.\n"}, "loc": ["boot", "systemdExecutable"], "readOnly": false, "type": "string"}, "boot.tmp.cleanOnBoot": {"declarations": ["nixos/modules/system/boot/tmp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to delete all files in {file}`/tmp` during boot.\n"}, "loc": ["boot", "tmp", "cleanOnBoot"], "readOnly": false, "type": "boolean"}, "boot.tmp.tmpfsSize": {"declarations": ["nixos/modules/system/boot/tmp.nix"], "default": {"_type": "literalExpression", "text": "\"50%\""}, "description": {"_type": "mdDoc", "text": "Size of tmpfs in percentage.\nPercentage is defined by systemd.\n"}, "loc": ["boot", "tmp", "tmpfsSize"], "readOnly": false, "type": "string or positive integer, meaning >0"}, "boot.tmp.useTmpfs": {"declarations": ["nixos/modules/system/boot/tmp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to mount a tmpfs on {file}`/tmp` during boot.\n\n::: {.note}\nLarge Nix builds can fail if the mounted tmpfs is not large enough.\nIn such a case either increase the tmpfsSize or disable this option.\n:::\n"}, "loc": ["boot", "tmp", "useTmpfs"], "readOnly": false, "type": "boolean"}, "boot.uvesafb.enable": {"declarations": ["nixos/modules/system/boot/uvesafb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable uvesafb."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["boot", "uvesafb", "enable"], "readOnly": false, "type": "boolean"}, "boot.uvesafb.gfx-mode": {"declarations": ["nixos/modules/system/boot/uvesafb.nix"], "default": {"_type": "literalExpression", "text": "\"1024x768-32\""}, "description": {"_type": "mdDoc", "text": "Screen resolution in modedb format. See [uvesafb](https://docs.kernel.org/fb/uvesafb.html) and [modedb](https://docs.kernel.org/fb/modedb.html) documentation for more details. The default value is a sensible default but may be not ideal for all setups."}, "loc": ["boot", "uvesafb", "gfx-mode"], "readOnly": false, "type": "string"}, "boot.uvesafb.v86d.package": {"declarations": ["nixos/modules/system/boot/uvesafb.nix"], "default": {"_type": "literalExpression", "text": "''\n  config.boot.kernelPackages.v86d.overrideAttrs (old: {\n            hardeningDisable = [ \"all\" ];\n          })''"}, "description": {"_type": "mdDoc", "text": "Which v86d package to use with uvesafb"}, "loc": ["boot", "uvesafb", "v86d", "package"], "readOnly": false, "type": "package"}, "boot.vesa": {"declarations": ["nixos/modules/system/boot/kernel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "(Deprecated) This option, if set, activates the VESA 800x600 video\nmode on boot and disables kernel modesetting. It is equivalent to\nspecifying `[ \"vga=0x317\" \"nomodeset\" ]` in the\n{option}`boot.kernelParams` option. This option is\ndeprecated as of 2020: Xorg now works better with modesetting, and\nyou might want a different VESA vga setting, anyway.\n"}, "loc": ["boot", "vesa"], "readOnly": false, "type": "boolean"}, "boot.zfs.allowHibernation": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow hibernation support, this may be a unsafe option depending on your\nsetup. Make sure to NOT use Swap on ZFS.\n"}, "loc": ["boot", "zfs", "allowHibernation"], "readOnly": false, "type": "boolean"}, "boot.zfs.devNodes": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "\"/dev/disk/by-id\""}, "description": {"_type": "mdDoc", "text": "Name of directory from which to import ZFS devices.\n\nThis should be a path under /dev containing stable names for all devices needed, as\nimport may fail if device nodes are renamed concurrently with a device failing.\n"}, "loc": ["boot", "zfs", "devNodes"], "readOnly": false, "type": "path"}, "boot.zfs.enableUnstable": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use the unstable zfs package. This might be an option, if the latest\nkernel is not yet supported by a published release of ZFS. Enabling\nthis option will install a development version of ZFS on Linux. The\nversion will have already passed an extensive test suite, but it is\nmore likely to hit an undiscovered bug compared to running a released\nversion of ZFS on Linux.\n"}, "loc": ["boot", "zfs", "enableUnstable"], "readOnly": false, "type": "boolean"}, "boot.zfs.enabled": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalMD", "text": "`true` if ZFS filesystem support is enabled"}, "description": {"_type": "mdDoc", "text": "True if ZFS filesystem support is enabled"}, "loc": ["boot", "zfs", "enabled"], "readOnly": true, "type": "boolean"}, "boot.zfs.extraPools": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Name or GUID of extra ZFS pools that you wish to import during boot.\n\nUsually this is not necessary. Instead, you should set the mountpoint property\nof ZFS filesystems to `legacy` and add the ZFS filesystems to\nNixOS's {option}`fileSystems` option, which makes NixOS automatically\nimport the associated pool.\n\nHowever, in some cases (e.g. if you have many filesystems) it may be preferable\nto exclusively use ZFS commands to manage filesystems. If so, since NixOS/systemd\nwill not be managing those filesystems, you will need to specify the ZFS pool here\nso that NixOS automatically imports it on every boot.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"tank\"\n  \"data\"\n]"}, "loc": ["boot", "zfs", "extraPools"], "readOnly": false, "type": "list of string"}, "boot.zfs.forceImportAll": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Forcibly import all ZFS pool(s).\n\nIf you set this option to `false` and NixOS subsequently fails to\nimport your non-root ZFS pool(s), you should manually import each pool with\n\"zpool import -f \\<pool-name\\>\", and then reboot. You should only need to do\nthis once.\n"}, "loc": ["boot", "zfs", "forceImportAll"], "readOnly": false, "type": "boolean"}, "boot.zfs.forceImportRoot": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Forcibly import the ZFS root pool(s) during early boot.\n\nThis is enabled by default for backwards compatibility purposes, but it is highly\nrecommended to disable this option, as it bypasses some of the safeguards ZFS uses\nto protect your ZFS pools.\n\nIf you set this option to `false` and NixOS subsequently fails to\nboot because it cannot import the root pool, you should boot with the\n`zfs_force=1` option as a kernel parameter (e.g. by manually\nediting the kernel params in grub during boot). You should only need to do this\nonce.\n"}, "loc": ["boot", "zfs", "forceImportRoot"], "readOnly": false, "type": "boolean"}, "boot.zfs.package": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "if config.boot.zfs.enableUnstable then pkgs.zfsUnstable else pkgs.zfs"}, "description": {"_type": "mdDoc", "text": "Configured ZFS userland tools package."}, "loc": ["boot", "zfs", "package"], "readOnly": true, "type": "package"}, "boot.zfs.passwordTimeout": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Timeout in seconds to wait for password entry for decrypt at boot.\n\nDefaults to 0, which waits forever.\n"}, "loc": ["boot", "zfs", "passwordTimeout"], "readOnly": false, "type": "signed integer"}, "boot.zfs.removeLinuxDRM": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Linux 6.2 dropped some kernel symbols required on aarch64 required by zfs.\nEnabling this option will bring them back to allow this kernel version.\nNote that in some jurisdictions this may be illegal as it might be considered\nremoving copyright protection from the code.\nSee https://www.ifross.org/?q=en/artikel/ongoing-dispute-over-value-exportsymbolgpl-function for further information.\n"}, "loc": ["boot", "zfs", "removeLinuxDRM"], "readOnly": false, "type": "boolean"}, "boot.zfs.requestEncryptionCredentials": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If true on import encryption keys or passwords for all encrypted datasets\nare requested. To only decrypt selected datasets supply a list of dataset\nnames instead. For root pools the encryption key can be supplied via both\nan interactive prompt (keylocation=prompt) and from a file (keylocation=file://).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"tank\"\n  \"data\"\n]"}, "loc": ["boot", "zfs", "requestEncryptionCredentials"], "readOnly": false, "type": "boolean or list of string"}, "console.colors": {"declarations": ["nixos/modules/config/console.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The 16 colors palette used by the virtual consoles.\nLeave empty to use the default colors.\nColors must be in hexadecimal format and listed in\norder from color 0 to color 15.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"002b36\"\n  \"dc322f\"\n  \"859900\"\n  \"b58900\"\n  \"268bd2\"\n  \"d33682\"\n  \"2aa198\"\n  \"eee8d5\"\n  \"002b36\"\n  \"cb4b16\"\n  \"586e75\"\n  \"657b83\"\n  \"839496\"\n  \"6c71c4\"\n  \"93a1a1\"\n  \"fdf6e3\"\n]"}, "loc": ["console", "colors"], "readOnly": false, "type": "list of string matching the pattern [[:xdigit:]]{6}"}, "console.earlySetup": {"declarations": ["nixos/modules/config/console.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable setting virtual console options as early as possible (in initrd).\n"}, "loc": ["console", "earlySetup"], "readOnly": false, "type": "boolean"}, "console.enable": {"declarations": ["nixos/modules/config/console.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable virtual console."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["console", "enable"], "readOnly": false, "type": "boolean"}, "console.font": {"declarations": ["nixos/modules/config/console.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The font used for the virtual consoles.\nCan be `null`, a font name, or a path to a PSF font file.\n\nUse `null` to let the kernel choose a built-in font.\nThe default is 8x16, and, as of Linux 5.3, Terminus 32 bold for display\nresolutions of 2560x1080 and higher.\nThese fonts cover the [IBM437][] character set.\n\n[IBM437]: https://en.wikipedia.org/wiki/Code_page_437\n"}, "example": {"_type": "literalExpression", "text": "\"LatArCyrHeb-16\""}, "loc": ["console", "font"], "readOnly": false, "type": "null or string or path"}, "console.keyMap": {"declarations": ["nixos/modules/config/console.nix"], "default": {"_type": "literalExpression", "text": "\"us\""}, "description": {"_type": "mdDoc", "text": "The keyboard mapping table for the virtual consoles.\n"}, "example": {"_type": "literalExpression", "text": "\"fr\""}, "loc": ["console", "keyMap"], "readOnly": false, "type": "string or path"}, "console.packages": {"declarations": ["nixos/modules/config/console.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of additional packages that provide console fonts, keymaps and\nother resources for virtual consoles use.\n"}, "loc": ["console", "packages"], "readOnly": false, "type": "list of package"}, "console.useXkbConfig": {"declarations": ["nixos/modules/config/console.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, configure the virtual console keymap from the xserver\nkeyboard settings.\n"}, "loc": ["console", "useXkbConfig"], "readOnly": false, "type": "boolean"}, "containers": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of NixOS system configurations to be run as lightweight\ncontainers.  Each container appears as a service\n`container-\u00abname\u00bb`\non the host system, allowing it to be started and stopped via\n{command}`systemctl`.\n"}, "example": {"_type": "literalExpression", "text": "{ webserver =\n    { path = \"/nix/var/nix/profiles/webserver\";\n    };\n  database =\n    { config =\n        { config, pkgs, ... }:\n        { services.postgresql.enable = true;\n          services.postgresql.package = pkgs.postgresql_14;\n\n          system.stateVersion = \"21.05\";\n        };\n    };\n}\n"}, "loc": ["containers"], "readOnly": false, "type": "attribute set of (submodule)"}, "containers.<name>.additionalCapabilities": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Grant additional capabilities to the container.  See the\ncapabilities(7) and systemd-nspawn(1) man pages for more\ninformation.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"CAP_NET_ADMIN\"\n  \"CAP_MKNOD\"\n]"}, "loc": ["containers", "<name>", "additionalCapabilities"], "readOnly": false, "type": "list of string"}, "containers.<name>.allowedDevices": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of device nodes to which the containers has access to.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    modifier = \"rw\";\n    node = \"/dev/net/tun\";\n  }\n]"}, "loc": ["containers", "<name>", "allowedDevices"], "readOnly": false, "type": "list of (submodule)"}, "containers.<name>.allowedDevices.*.modifier": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "description": {"_type": "mdDoc", "text": "Device node access modifier. Takes a combination\n`r` (read), `w` (write), and\n`m` (mknod). See the\n`systemd.resource-control(5)` man page for more\ninformation."}, "example": {"_type": "literalExpression", "text": "\"rw\""}, "loc": ["containers", "<name>", "allowedDevices", "*", "modifier"], "readOnly": false, "type": "string"}, "containers.<name>.allowedDevices.*.node": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "description": {"_type": "mdDoc", "text": "Path to device node"}, "example": {"_type": "literalExpression", "text": "\"/dev/net/tun\""}, "loc": ["containers", "<name>", "allowedDevices", "*", "node"], "readOnly": false, "type": "string"}, "containers.<name>.autoStart": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the container is automatically started at boot-time.\n"}, "loc": ["containers", "<name>", "autoStart"], "readOnly": false, "type": "boolean"}, "containers.<name>.bindMounts": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "An extra list of directories that is bound to the container.\n"}, "example": {"_type": "literalExpression", "text": "{ \"/home\" = { hostPath = \"/home/alice\";\n              isReadOnly = false; };\n}\n"}, "loc": ["containers", "<name>", "bindMounts"], "readOnly": false, "type": "attribute set of (submodule)"}, "containers.<name>.bindMounts.<name>.hostPath": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Location of the host path to be mounted."}, "example": {"_type": "literalExpression", "text": "\"/home/alice\""}, "loc": ["containers", "<name>", "bindMounts", "<name>", "hostPath"], "readOnly": false, "type": "null or string"}, "containers.<name>.bindMounts.<name>.isReadOnly": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Determine whether the mounted path will be accessed in read-only mode."}, "loc": ["containers", "<name>", "bindMounts", "<name>", "isReadOnly"], "readOnly": false, "type": "boolean"}, "containers.<name>.bindMounts.<name>.mountPoint": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "description": {"_type": "mdDoc", "text": "Mount point on the container file system."}, "example": {"_type": "literalExpression", "text": "\"/mnt/usb\""}, "loc": ["containers", "<name>", "bindMounts", "<name>", "mountPoint"], "readOnly": false, "type": "string"}, "containers.<name>.config": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "description": {"_type": "mdDoc", "text": "A specification of the desired configuration of this\ncontainer, as a NixOS module.\n"}, "loc": ["containers", "<name>", "config"], "readOnly": false, "type": "Toplevel NixOS config"}, "containers.<name>.enableTun": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allows the container to create and setup tunnel interfaces\nby granting the `NET_ADMIN` capability and\nenabling access to `/dev/net/tun`.\n"}, "loc": ["containers", "<name>", "enableTun"], "readOnly": false, "type": "boolean"}, "containers.<name>.ephemeral": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Runs container in ephemeral mode with the empty root filesystem at boot.\nThis way container will be bootstrapped from scratch on each boot\nand will be cleaned up on shutdown leaving no traces behind.\nUseful for completely stateless, reproducible containers.\n\nNote that this option might require to do some adjustments to the container configuration,\ne.g. you might want to set\n{var}`systemd.network.networks.$interface.dhcpV4Config.ClientIdentifier` to \"mac\"\nif you use {var}`macvlans` option.\nThis way dhcp client identifier will be stable between the container restarts.\n\nNote that the container journal will not be linked to the host if this option is enabled.\n"}, "loc": ["containers", "<name>", "ephemeral"], "readOnly": false, "type": "boolean"}, "containers.<name>.extraFlags": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags passed to the systemd-nspawn command.\nSee systemd-nspawn(1) for details.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--drop-capability=CAP_SYS_CHROOT\"\n]"}, "loc": ["containers", "<name>", "extraFlags"], "readOnly": false, "type": "list of string"}, "containers.<name>.extraVeths": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra veth-pairs to be created for the container.\n"}, "loc": ["containers", "<name>", "extraVeths"], "readOnly": false, "type": "attribute set of (submodule)"}, "containers.<name>.extraVeths.<name>.forwardPorts": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of forwarded ports from host to container. Each forwarded port\nis specified by protocol, hostPort and containerPort. By default,\nprotocol is tcp and hostPort and containerPort are assumed to be\nthe same if containerPort is not explicitly given.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    containerPort = 80;\n    hostPort = 8080;\n    protocol = \"tcp\";\n  }\n]"}, "loc": ["containers", "<name>", "extraVeths", "<name>", "forwardPorts"], "readOnly": false, "type": "list of (submodule)"}, "containers.<name>.extraVeths.<name>.forwardPorts.*.containerPort": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Target port of container"}, "loc": ["containers", "<name>", "extraVeths", "<name>", "forwardPorts", "*", "containerPort"], "readOnly": false, "type": "null or signed integer"}, "containers.<name>.extraVeths.<name>.forwardPorts.*.hostPort": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "description": {"_type": "mdDoc", "text": "Source port of the external interface on host"}, "loc": ["containers", "<name>", "extraVeths", "<name>", "forwardPorts", "*", "hostPort"], "readOnly": false, "type": "signed integer"}, "containers.<name>.extraVeths.<name>.forwardPorts.*.protocol": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "\"tcp\""}, "description": {"_type": "mdDoc", "text": "The protocol specifier for port forwarding between host and container"}, "loc": ["containers", "<name>", "extraVeths", "<name>", "forwardPorts", "*", "protocol"], "readOnly": false, "type": "string"}, "containers.<name>.extraVeths.<name>.hostAddress": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The IPv4 address assigned to the host interface.\n(Not used when hostBridge is set.)\n"}, "example": {"_type": "literalExpression", "text": "\"10.231.136.1\""}, "loc": ["containers", "<name>", "extraVeths", "<name>", "hostAddress"], "readOnly": false, "type": "null or string"}, "containers.<name>.extraVeths.<name>.hostAddress6": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The IPv6 address assigned to the host interface.\n(Not used when hostBridge is set.)\n"}, "example": {"_type": "literalExpression", "text": "\"fc00::1\""}, "loc": ["containers", "<name>", "extraVeths", "<name>", "hostAddress6"], "readOnly": false, "type": "null or string"}, "containers.<name>.extraVeths.<name>.hostBridge": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Put the host-side of the veth-pair into the named bridge.\nOnly one of hostAddress* or hostBridge can be given.\n"}, "example": {"_type": "literalExpression", "text": "\"br0\""}, "loc": ["containers", "<name>", "extraVeths", "<name>", "hostBridge"], "readOnly": false, "type": "null or string"}, "containers.<name>.extraVeths.<name>.localAddress": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The IPv4 address assigned to the interface in the container.\nIf a hostBridge is used, this should be given with netmask to access\nthe whole network. Otherwise the default netmask is /32 and routing is\nset up from localAddress to hostAddress and back.\n"}, "example": {"_type": "literalExpression", "text": "\"10.231.136.2\""}, "loc": ["containers", "<name>", "extraVeths", "<name>", "localAddress"], "readOnly": false, "type": "null or string"}, "containers.<name>.extraVeths.<name>.localAddress6": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The IPv6 address assigned to the interface in the container.\nIf a hostBridge is used, this should be given with netmask to access\nthe whole network. Otherwise the default netmask is /128 and routing is\nset up from localAddress6 to hostAddress6 and back.\n"}, "example": {"_type": "literalExpression", "text": "\"fc00::2\""}, "loc": ["containers", "<name>", "extraVeths", "<name>", "localAddress6"], "readOnly": false, "type": "null or string"}, "containers.<name>.forwardPorts": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of forwarded ports from host to container. Each forwarded port\nis specified by protocol, hostPort and containerPort. By default,\nprotocol is tcp and hostPort and containerPort are assumed to be\nthe same if containerPort is not explicitly given.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    containerPort = 80;\n    hostPort = 8080;\n    protocol = \"tcp\";\n  }\n]"}, "loc": ["containers", "<name>", "forwardPorts"], "readOnly": false, "type": "list of (submodule)"}, "containers.<name>.forwardPorts.*.containerPort": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Target port of container"}, "loc": ["containers", "<name>", "forwardPorts", "*", "containerPort"], "readOnly": false, "type": "null or signed integer"}, "containers.<name>.forwardPorts.*.hostPort": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "description": {"_type": "mdDoc", "text": "Source port of the external interface on host"}, "loc": ["containers", "<name>", "forwardPorts", "*", "hostPort"], "readOnly": false, "type": "signed integer"}, "containers.<name>.forwardPorts.*.protocol": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "\"tcp\""}, "description": {"_type": "mdDoc", "text": "The protocol specifier for port forwarding between host and container"}, "loc": ["containers", "<name>", "forwardPorts", "*", "protocol"], "readOnly": false, "type": "string"}, "containers.<name>.hostAddress": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The IPv4 address assigned to the host interface.\n(Not used when hostBridge is set.)\n"}, "example": {"_type": "literalExpression", "text": "\"10.231.136.1\""}, "loc": ["containers", "<name>", "hostAddress"], "readOnly": false, "type": "null or string"}, "containers.<name>.hostAddress6": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The IPv6 address assigned to the host interface.\n(Not used when hostBridge is set.)\n"}, "example": {"_type": "literalExpression", "text": "\"fc00::1\""}, "loc": ["containers", "<name>", "hostAddress6"], "readOnly": false, "type": "null or string"}, "containers.<name>.hostBridge": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Put the host-side of the veth-pair into the named bridge.\nOnly one of hostAddress* or hostBridge can be given.\n"}, "example": {"_type": "literalExpression", "text": "\"br0\""}, "loc": ["containers", "<name>", "hostBridge"], "readOnly": false, "type": "null or string"}, "containers.<name>.interfaces": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The list of interfaces to be moved into the container.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"eth1\"\n  \"eth2\"\n]"}, "loc": ["containers", "<name>", "interfaces"], "readOnly": false, "type": "list of string"}, "containers.<name>.localAddress": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The IPv4 address assigned to the interface in the container.\nIf a hostBridge is used, this should be given with netmask to access\nthe whole network. Otherwise the default netmask is /32 and routing is\nset up from localAddress to hostAddress and back.\n"}, "example": {"_type": "literalExpression", "text": "\"10.231.136.2\""}, "loc": ["containers", "<name>", "localAddress"], "readOnly": false, "type": "null or string"}, "containers.<name>.localAddress6": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The IPv6 address assigned to the interface in the container.\nIf a hostBridge is used, this should be given with netmask to access\nthe whole network. Otherwise the default netmask is /128 and routing is\nset up from localAddress6 to hostAddress6 and back.\n"}, "example": {"_type": "literalExpression", "text": "\"fc00::2\""}, "loc": ["containers", "<name>", "localAddress6"], "readOnly": false, "type": "null or string"}, "containers.<name>.macvlans": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The list of host interfaces from which macvlans will be\ncreated. For each interface specified, a macvlan interface\nwill be created and moved to the container.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"eth1\"\n  \"eth2\"\n]"}, "loc": ["containers", "<name>", "macvlans"], "readOnly": false, "type": "list of string"}, "containers.<name>.nixpkgs": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "pkgs.path"}, "description": {"_type": "mdDoc", "text": "A path to the nixpkgs that provide the modules, pkgs and lib for evaluating the container.\n\nTo only change the `pkgs` argument used inside the container modules,\nset the `nixpkgs.*` options in the container {option}`config`.\nSetting `config.nixpkgs.pkgs = pkgs` speeds up the container evaluation\nby reusing the system pkgs, but the `nixpkgs.config` option in the\ncontainer config is ignored in this case.\n"}, "loc": ["containers", "<name>", "nixpkgs"], "readOnly": false, "type": "path"}, "containers.<name>.path": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "description": {"_type": "mdDoc", "text": "As an alternative to specifying\n{option}`config`, you can specify the path to\nthe evaluated NixOS system configuration, typically a\nsymlink to a system profile.\n"}, "example": {"_type": "literalExpression", "text": "\"/nix/var/nix/profiles/per-container/webserver\""}, "loc": ["containers", "<name>", "path"], "readOnly": false, "type": "path"}, "containers.<name>.privateNetwork": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to give the container its own private virtual\nEthernet interface.  The interface is called\n`eth0`, and is hooked up to the interface\n`ve-\u00abcontainer-name\u00bb`\non the host.  If this option is not set, then the\ncontainer shares the network interfaces of the host,\nand can bind to any port on any interface.\n"}, "loc": ["containers", "<name>", "privateNetwork"], "readOnly": false, "type": "boolean"}, "containers.<name>.specialArgs": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of special arguments to be passed to NixOS modules.\nThis will be merged into the `specialArgs` used to evaluate\nthe NixOS configurations.\n"}, "loc": ["containers", "<name>", "specialArgs"], "readOnly": false, "type": "attribute set of unspecified value"}, "containers.<name>.timeoutStartSec": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "\"1min\""}, "description": {"_type": "mdDoc", "text": "Time for the container to start. In case of a timeout,\nthe container processes get killed.\nSee {manpage}`systemd.time(7)`\nfor more information about the format.\n"}, "loc": ["containers", "<name>", "timeoutStartSec"], "readOnly": false, "type": "string"}, "containers.<name>.tmpfs": {"declarations": ["nixos/modules/virtualisation/nixos-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Mounts a set of tmpfs file systems into the container.\nMultiple paths can be specified.\nValid items must conform to the --tmpfs argument\nof systemd-nspawn. See systemd-nspawn(1) for details.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/var\"\n]"}, "loc": ["containers", "<name>", "tmpfs"], "readOnly": false, "type": "list of string"}, "documentation.dev.enable": {"declarations": ["nixos/modules/misc/documentation.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install documentation targeted at developers.\n* This includes man pages targeted at developers if {option}`documentation.man.enable` is\n  set (this also includes \"devman\" outputs).\n* This includes info pages targeted at developers if {option}`documentation.info.enable`\n  is set (this also includes \"devinfo\" outputs).\n* This includes other pages targeted at developers if {option}`documentation.doc.enable`\n  is set (this also includes \"devdoc\" outputs).\n"}, "loc": ["documentation", "dev", "enable"], "readOnly": false, "type": "boolean"}, "documentation.doc.enable": {"declarations": ["nixos/modules/misc/documentation.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install documentation distributed in packages' `/share/doc`.\nUsually plain text and/or HTML.\nThis also includes \"doc\" outputs.\n"}, "loc": ["documentation", "doc", "enable"], "readOnly": false, "type": "boolean"}, "documentation.enable": {"declarations": ["nixos/modules/misc/documentation.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install documentation of packages from\n{option}`environment.systemPackages` into the generated system path.\n\nSee \"Multiple-output packages\" chapter in the nixpkgs manual for more info.\n"}, "loc": ["documentation", "enable"], "readOnly": false, "type": "boolean"}, "documentation.info.enable": {"declarations": ["nixos/modules/misc/documentation.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install info pages and the {command}`info` command.\nThis also includes \"info\" outputs.\n"}, "loc": ["documentation", "info", "enable"], "readOnly": false, "type": "boolean"}, "documentation.man.enable": {"declarations": ["nixos/modules/misc/documentation.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install manual pages.\nThis also includes `man` outputs.\n"}, "loc": ["documentation", "man", "enable"], "readOnly": false, "type": "boolean"}, "documentation.man.generateCaches": {"declarations": ["nixos/modules/misc/documentation.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to generate the manual page index caches.\nThis allows searching for a page or\nkeyword using utilities like {manpage}`apropos(1)`\nand the `-k` option of\n{manpage}`man(1)`.\n"}, "loc": ["documentation", "man", "generateCaches"], "readOnly": false, "type": "boolean"}, "documentation.man.man-db.enable": {"declarations": ["nixos/modules/misc/man-db.nix"], "default": {"_type": "literalExpression", "text": "config.documentation.man.enable"}, "description": {"_type": "mdDoc", "text": "Whether to enable man-db as the default man page viewer."}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["documentation", "man", "man-db", "enable"], "readOnly": false, "type": "boolean"}, "documentation.man.man-db.manualPages": {"declarations": ["nixos/modules/misc/man-db.nix"], "default": {"_type": "literalMD", "text": "all man pages in {option}`config.environment.systemPackages`"}, "description": {"_type": "mdDoc", "text": "The manual pages to generate caches for if {option}`documentation.man.generateCaches`\nis enabled. Must be a path to a directory with man pages under\n`/share/man`; see the source for an example.\nAdvanced users can make this a content-addressed derivation to save a few rebuilds.\n"}, "loc": ["documentation", "man", "man-db", "manualPages"], "readOnly": false, "type": "path"}, "documentation.man.man-db.package": {"declarations": ["nixos/modules/misc/man-db.nix"], "default": {"_type": "literalExpression", "text": "pkgs.man-db"}, "description": {"_type": "mdDoc", "text": "The `man-db` derivation to use. Useful to override\nconfiguration options used for the package.\n"}, "loc": ["documentation", "man", "man-db", "package"], "readOnly": false, "type": "package"}, "documentation.man.mandoc.enable": {"declarations": ["nixos/modules/misc/mandoc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable mandoc as the default man page viewer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["documentation", "man", "mandoc", "enable"], "readOnly": false, "type": "boolean"}, "documentation.man.mandoc.manPath": {"declarations": ["nixos/modules/misc/mandoc.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"share/man\"\n]"}, "description": {"_type": "mdDoc", "text": "Change the manpath, i. e. the directories where\n{manpage}`man(1)`\nlooks for section-specific directories of man pages.\nYou only need to change this setting if you want extra man pages\n(e. g. in non-english languages). All values must be strings that\nare a valid path from the target prefix (without including it).\nThe first value given takes priority.\n"}, "example": {"_type": "literalExpression", "text": "[ \"share/man\" \"share/man/fr\" ]"}, "loc": ["documentation", "man", "mandoc", "manPath"], "readOnly": false, "type": "list of string"}, "documentation.man.mandoc.package": {"declarations": ["nixos/modules/misc/mandoc.nix"], "default": {"_type": "literalExpression", "text": "pkgs.mandoc"}, "description": {"_type": "mdDoc", "text": "The `mandoc` derivation to use. Useful to override\nconfiguration options used for the package.\n"}, "loc": ["documentation", "man", "mandoc", "package"], "readOnly": false, "type": "package"}, "documentation.nixos.enable": {"declarations": ["nixos/modules/misc/documentation.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install NixOS's own documentation.\n\n- This includes man pages like\n  {manpage}`configuration.nix(5)` if {option}`documentation.man.enable` is\n  set.\n- This includes the HTML manual and the {command}`nixos-help` command if\n  {option}`documentation.doc.enable` is set.\n"}, "loc": ["documentation", "nixos", "enable"], "readOnly": false, "type": "boolean"}, "documentation.nixos.extraModuleSources": {"declarations": ["nixos/modules/misc/documentation.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Which extra NixOS module paths the generated NixOS's documentation should strip\nfrom options.\n"}, "example": {"_type": "literalExpression", "text": "# e.g. with options from modules in ${pkgs.customModules}/nix:\n[ pkgs.customModules ]\n"}, "loc": ["documentation", "nixos", "extraModuleSources"], "readOnly": false, "type": "list of (path or string)"}, "documentation.nixos.extraModules": {"declarations": ["nixos/modules/misc/documentation.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Modules for which to show options even when not imported.\n"}, "loc": ["documentation", "nixos", "extraModules"], "readOnly": false, "type": "list of raw value"}, "documentation.nixos.includeAllModules": {"declarations": ["nixos/modules/misc/documentation.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the generated NixOS's documentation should include documentation for all\nthe options from all the NixOS modules included in the current\n`configuration.nix`. Disabling this will make the manual\ngenerator to ignore options defined outside of `baseModules`.\n"}, "loc": ["documentation", "nixos", "includeAllModules"], "readOnly": false, "type": "boolean"}, "documentation.nixos.options.allowDocBook": {"declarations": ["nixos/modules/misc/documentation.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to allow DocBook option docs. When set to `false` all option using\nDocBook documentation will cause a manual build error; additionally a new\nrenderer may be used.\n\n::: {.note}\nThe `false` setting for this option is not yet fully supported. While it\nshould work fine and produce the same output as the previous toolchain\nusing DocBook it may not work in all circumstances. Whether markdown option\ndocumentation is allowed is independent of this option.\n:::\n"}, "loc": ["documentation", "nixos", "options", "allowDocBook"], "readOnly": false, "type": "boolean"}, "documentation.nixos.options.splitBuild": {"declarations": ["nixos/modules/misc/documentation.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to split the option docs build into a cacheable and an uncacheable part.\nSplitting the build can substantially decrease the amount of time needed to build\nthe manual, but some user modules may be incompatible with this splitting.\n"}, "loc": ["documentation", "nixos", "options", "splitBuild"], "readOnly": false, "type": "boolean"}, "documentation.nixos.options.warningsAreErrors": {"declarations": ["nixos/modules/misc/documentation.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Treat warning emitted during the option documentation build (eg for missing option\ndescriptions) as errors.\n"}, "loc": ["documentation", "nixos", "options", "warningsAreErrors"], "readOnly": false, "type": "boolean"}, "dysnomia.components": {"declarations": ["nixos/modules/services/misc/dysnomia.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "An attribute set in which each key represents a container and each value an attribute set in which each key represents a component and each value a derivation constructing its initial state"}, "loc": ["dysnomia", "components"], "readOnly": false, "type": "attribute set of (attribute set)"}, "dysnomia.containers": {"declarations": ["nixos/modules/services/misc/dysnomia.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "An attribute set in which each key represents a container and each value an attribute set providing its configuration properties"}, "loc": ["dysnomia", "containers"], "readOnly": false, "type": "attribute set of (attribute set)"}, "dysnomia.enable": {"declarations": ["nixos/modules/services/misc/dysnomia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Dysnomia"}, "loc": ["dysnomia", "enable"], "readOnly": false, "type": "boolean"}, "dysnomia.enableAuthentication": {"declarations": ["nixos/modules/services/misc/dysnomia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to publish privacy-sensitive authentication credentials"}, "loc": ["dysnomia", "enableAuthentication"], "readOnly": false, "type": "boolean"}, "dysnomia.enableLegacyModules": {"declarations": ["nixos/modules/services/misc/dysnomia.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable Dysnomia legacy process and wrapper modules"}, "loc": ["dysnomia", "enableLegacyModules"], "readOnly": false, "type": "boolean"}, "dysnomia.extraContainerPaths": {"declarations": ["nixos/modules/services/misc/dysnomia.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of paths containing additional container configurations that are added to the search folders"}, "loc": ["dysnomia", "extraContainerPaths"], "readOnly": false, "type": "list of path"}, "dysnomia.extraContainerProperties": {"declarations": ["nixos/modules/services/misc/dysnomia.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "An attribute set providing additional container settings in addition to the default properties"}, "loc": ["dysnomia", "extraContainerProperties"], "readOnly": false, "type": "attribute set"}, "dysnomia.extraModulePaths": {"declarations": ["nixos/modules/services/misc/dysnomia.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of paths containing additional modules that are added to the search folders"}, "loc": ["dysnomia", "extraModulePaths"], "readOnly": false, "type": "list of path"}, "dysnomia.package": {"declarations": ["nixos/modules/services/misc/dysnomia.nix"], "description": {"_type": "mdDoc", "text": "The Dysnomia package"}, "loc": ["dysnomia", "package"], "readOnly": false, "type": "path"}, "dysnomia.properties": {"declarations": ["nixos/modules/services/misc/dysnomia.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "An attribute set in which each attribute represents a machine property. Optionally, these values can be shell substitutions."}, "loc": ["dysnomia", "properties"], "readOnly": false, "type": "attribute set"}, "ec2.zfs.datasets": {"declarations": ["nixos/modules/virtualisation/amazon-options.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Datasets to create under the `tank` and `boot` zpools.\n\n**NOTE:** This option is used only at image creation time, and\ndoes not attempt to declaratively create or manage datasets\non an existing system.\n"}, "loc": ["ec2", "zfs", "datasets"], "readOnly": false, "type": "attribute set of (submodule)"}, "ec2.zfs.datasets.<name>.mount": {"declarations": ["nixos/modules/virtualisation/amazon-options.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Where to mount this dataset."}, "loc": ["ec2", "zfs", "datasets", "<name>", "mount"], "readOnly": false, "type": "null or string"}, "ec2.zfs.datasets.<name>.properties": {"declarations": ["nixos/modules/virtualisation/amazon-options.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Properties to set on this dataset."}, "loc": ["ec2", "zfs", "datasets", "<name>", "properties"], "readOnly": false, "type": "attribute set of string"}, "environment.budgie.excludePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/budgie.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Which packages Budgie should exclude from the default environment."}, "example": {"_type": "literalExpression", "text": "[ pkgs.mate-terminal ]"}, "loc": ["environment", "budgie", "excludePackages"], "readOnly": false, "type": "list of package"}, "environment.cinnamon.excludePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/cinnamon.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Which packages cinnamon should exclude from the default environment"}, "example": {"_type": "literalExpression", "text": "[ pkgs.cinnamon.blueberry ]"}, "loc": ["environment", "cinnamon", "excludePackages"], "readOnly": false, "type": "list of package"}, "environment.deepin.excludePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/deepin.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of default packages to exclude from the configuration"}, "loc": ["environment", "deepin", "excludePackages"], "readOnly": false, "type": "list of package"}, "environment.defaultPackages": {"declarations": ["nixos/modules/config/system-path.nix"], "default": {"_type": "literalMD", "text": "these packages, with their `meta.priority` numerically increased\n(thus lowering their installation priority):\n\n    [ pkgs.nano pkgs.perl pkgs.rsync pkgs.strace ]\n"}, "description": {"_type": "mdDoc", "text": "Set of default packages that aren't strictly necessary\nfor a running system, entries can be removed for a more\nminimal NixOS installation.\n\nNote: If `pkgs.nano` is removed from this list,\nmake sure another editor is installed and the\n`EDITOR` environment variable is set to it.\nEnvironment variables can be set using\n{option}`environment.variables`.\n\nLike with systemPackages, packages are installed to\n{file}`/run/current-system/sw`. They are\nautomatically available to all users, and are\nautomatically updated every time you rebuild the system\nconfiguration.\n"}, "example": {"_type": "literalExpression", "text": "[ ]"}, "loc": ["environment", "defaultPackages"], "readOnly": false, "type": "list of package"}, "environment.enableAllTerminfo": {"declarations": ["nixos/modules/config/terminfo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install all terminfo outputs\n"}, "loc": ["environment", "enableAllTerminfo"], "readOnly": false, "type": "boolean"}, "environment.enableDebugInfo": {"declarations": ["nixos/modules/config/debug-info.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Some NixOS packages provide debug symbols. However, these are\nnot included in the system closure by default to save disk\nspace. Enabling this option causes the debug symbols to appear\nin {file}`/run/current-system/sw/lib/debug/.build-id`,\nwhere tools such as {command}`gdb` can find them.\nIf you need debug symbols for a package that doesn't\nprovide them by default, you can enable them as follows:\n\n    nixpkgs.config.packageOverrides = pkgs: {\n      hello = pkgs.hello.overrideAttrs (oldAttrs: {\n        separateDebugInfo = true;\n      });\n    };\n"}, "loc": ["environment", "enableDebugInfo"], "readOnly": false, "type": "boolean"}, "environment.etc": {"declarations": ["nixos/modules/system/etc/etc.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of files that have to be linked in {file}`/etc`.\n"}, "example": {"_type": "literalExpression", "text": "{ example-configuration-file =\n    { source = \"/nix/store/.../etc/dir/file.conf.example\";\n      mode = \"0440\";\n    };\n  \"default/useradd\".text = \"GROUP=100 ...\";\n}\n"}, "loc": ["environment", "etc"], "readOnly": false, "type": "attribute set of (submodule)"}, "environment.etc.<name>.enable": {"declarations": ["nixos/modules/system/etc/etc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether this /etc file should be generated.  This\noption allows specific /etc files to be disabled.\n"}, "loc": ["environment", "etc", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "environment.etc.<name>.gid": {"declarations": ["nixos/modules/system/etc/etc.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "GID of created file. Only takes effect when the file is\ncopied (that is, the mode is not 'symlink').\n"}, "loc": ["environment", "etc", "<name>", "gid"], "readOnly": false, "type": "signed integer"}, "environment.etc.<name>.group": {"declarations": ["nixos/modules/system/etc/etc.nix"], "default": {"_type": "literalExpression", "text": "\"+0\""}, "description": {"_type": "mdDoc", "text": "Group name of created file.\nOnly takes effect when the file is copied (that is, the mode is not 'symlink').\nChanging this option takes precedence over `gid`.\n"}, "loc": ["environment", "etc", "<name>", "group"], "readOnly": false, "type": "string"}, "environment.etc.<name>.mode": {"declarations": ["nixos/modules/system/etc/etc.nix"], "default": {"_type": "literalExpression", "text": "\"symlink\""}, "description": {"_type": "mdDoc", "text": "If set to something else than `symlink`,\nthe file is copied instead of symlinked, with the given\nfile mode.\n"}, "example": {"_type": "literalExpression", "text": "\"0600\""}, "loc": ["environment", "etc", "<name>", "mode"], "readOnly": false, "type": "string"}, "environment.etc.<name>.source": {"declarations": ["nixos/modules/system/etc/etc.nix"], "description": {"_type": "mdDoc", "text": "Path of the source file."}, "loc": ["environment", "etc", "<name>", "source"], "readOnly": false, "type": "path"}, "environment.etc.<name>.target": {"declarations": ["nixos/modules/system/etc/etc.nix"], "description": {"_type": "mdDoc", "text": "Name of symlink (relative to\n{file}`/etc`).  Defaults to the attribute\nname.\n"}, "loc": ["environment", "etc", "<name>", "target"], "readOnly": false, "type": "string"}, "environment.etc.<name>.text": {"declarations": ["nixos/modules/system/etc/etc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Text of the file."}, "loc": ["environment", "etc", "<name>", "text"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "environment.etc.<name>.uid": {"declarations": ["nixos/modules/system/etc/etc.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "UID of created file. Only takes effect when the file is\ncopied (that is, the mode is not 'symlink').\n"}, "loc": ["environment", "etc", "<name>", "uid"], "readOnly": false, "type": "signed integer"}, "environment.etc.<name>.user": {"declarations": ["nixos/modules/system/etc/etc.nix"], "default": {"_type": "literalExpression", "text": "\"+0\""}, "description": {"_type": "mdDoc", "text": "User name of created file.\nOnly takes effect when the file is copied (that is, the mode is not 'symlink').\nChanging this option takes precedence over `uid`.\n"}, "loc": ["environment", "etc", "<name>", "user"], "readOnly": false, "type": "string"}, "environment.extraInit": {"declarations": ["nixos/modules/config/shells-environment.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code called during global environment initialisation\nafter all variables and profileVariables have been set.\nThis code is assumed to be shell-independent, which means you should\nstick to pure sh without sh word split.\n"}, "loc": ["environment", "extraInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "environment.extraOutputsToInstall": {"declarations": ["nixos/modules/config/system-path.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of additional package outputs to be symlinked into {file}`/run/current-system/sw`."}, "example": {"_type": "literalExpression", "text": "[\n  \"doc\"\n  \"info\"\n  \"devdoc\"\n]"}, "loc": ["environment", "extraOutputsToInstall"], "readOnly": false, "type": "list of string"}, "environment.extraSetup": {"declarations": ["nixos/modules/config/system-path.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell fragments to be run after the system environment has been created. This should only be used for things that need to modify the internals of the environment, e.g. generating MIME caches. The environment being built can be accessed at $out."}, "loc": ["environment", "extraSetup"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "environment.freetds": {"declarations": ["nixos/modules/programs/freetds.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configure freetds database entries. Each attribute denotes\na section within freetds.conf, and the value (a string) is the config\ncontent for that section. When at least one entry is configured\nthe global environment variables FREETDSCONF, FREETDS and SYBASE\nwill be configured to allow the programs that use freetds to find the\nlibrary and config.\n"}, "example": {"_type": "literalExpression", "text": "{ MYDATABASE = ''\n    host = 10.0.2.100\n    port = 1433\n    tds version = 7.2\n  '';\n}\n"}, "loc": ["environment", "freetds"], "readOnly": false, "type": "attribute set of string"}, "environment.gnome.excludePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Which packages gnome should exclude from the default environment"}, "example": {"_type": "literalExpression", "text": "[ pkgs.gnome.totem ]"}, "loc": ["environment", "gnome", "excludePackages"], "readOnly": false, "type": "list of package"}, "environment.homeBinInPath": {"declarations": ["nixos/modules/config/shells-environment.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Include ~/bin/ in $PATH.\n"}, "loc": ["environment", "homeBinInPath"], "readOnly": false, "type": "boolean"}, "environment.interactiveShellInit": {"declarations": ["nixos/modules/config/shells-environment.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code called during interactive shell initialisation.\nThis code is assumed to be shell-independent, which means you should\nstick to pure sh without sh word split.\n"}, "loc": ["environment", "interactiveShellInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "environment.localBinInPath": {"declarations": ["nixos/modules/config/shells-environment.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Add ~/.local/bin/ to $PATH\n"}, "loc": ["environment", "localBinInPath"], "readOnly": false, "type": "boolean"}, "environment.loginShellInit": {"declarations": ["nixos/modules/config/shells-environment.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code called during login shell initialisation.\nThis code is assumed to be shell-independent, which means you should\nstick to pure sh without sh word split.\n"}, "loc": ["environment", "loginShellInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "environment.lxqt.excludePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/lxqt.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Which LXQt packages to exclude from the default environment"}, "example": {"_type": "literalExpression", "text": "[ pkgs.lxqt.qterminal ]"}, "loc": ["environment", "lxqt", "excludePackages"], "readOnly": false, "type": "list of package"}, "environment.mate.excludePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/mate.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Which MATE packages to exclude from the default environment"}, "example": {"_type": "literalExpression", "text": "[ pkgs.mate.mate-terminal pkgs.mate.pluma ]"}, "loc": ["environment", "mate", "excludePackages"], "readOnly": false, "type": "list of package"}, "environment.memoryAllocator.provider": {"declarations": ["nixos/modules/config/malloc.nix"], "default": {"_type": "literalExpression", "text": "\"libc\""}, "description": {"_type": "mdDoc", "text": "The system-wide memory allocator.\n\nBriefly, the system-wide memory allocator providers are:\n\n- `libc`: the standard allocator provided by libc\n- `graphene-hardened`: An allocator designed to mitigate memory corruption attacks, such as those caused by use-after-free bugs. \n- `jemalloc`: A general purpose allocator that emphasizes fragmentation avoidance and scalable concurrency support. \n- `mimalloc`: A compact and fast general purpose allocator, which may optionally be built with mitigations against various heap vulnerabilities. \n- `scudo`: A user-mode allocator based on LLVM Sanitizer\u2019s CombinedAllocator, which aims at providing additional mitigations against heap based vulnerabilities, while maintaining good performance. \n\n::: {.warning}\nSelecting an alternative allocator (i.e., anything other than\n`libc`) may result in instability, data loss,\nand/or service failure.\n:::\n"}, "loc": ["environment", "memoryAllocator", "provider"], "readOnly": false, "type": "one of \"libc\", \"graphene-hardened\", \"jemalloc\", \"mimalloc\", \"scudo\""}, "environment.noXlibs": {"declarations": ["nixos/modules/config/no-x-libs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Switch off the options in the default configuration that\nrequire X11 libraries. This includes client-side font\nconfiguration and SSH forwarding of X11 authentication\nin. Thus, you probably do not want to enable this option if\nyou want to run X11 programs on this machine via SSH.\n"}, "loc": ["environment", "noXlibs"], "readOnly": false, "type": "boolean"}, "environment.pantheon.excludePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/pantheon.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Which packages pantheon should exclude from the default environment"}, "example": {"_type": "literalExpression", "text": "[ pkgs.pantheon.elementary-camera ]"}, "loc": ["environment", "pantheon", "excludePackages"], "readOnly": false, "type": "list of package"}, "environment.pathsToLink": {"declarations": ["nixos/modules/config/system-path.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of directories to be symlinked in {file}`/run/current-system/sw`."}, "example": {"_type": "literalExpression", "text": "[\n  \"/\"\n]"}, "loc": ["environment", "pathsToLink"], "readOnly": false, "type": "list of string"}, "environment.plasma5.excludePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/plasma5.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of default packages to exclude from the configuration"}, "example": {"_type": "literalExpression", "text": "[ pkgs.plasma5Packages.oxygen ]"}, "loc": ["environment", "plasma5", "excludePackages"], "readOnly": false, "type": "list of package"}, "environment.profileRelativeEnvVars": {"declarations": ["nixos/modules/config/shells-environment.nix"], "description": {"_type": "mdDoc", "text": "Attribute set of environment variable.  Each attribute maps to a list\nof relative paths.  Each relative path is appended to the each profile\nof {option}`environment.profiles` to form the content of the\ncorresponding environment variable.\n"}, "example": {"_type": "literalExpression", "text": "{\n  MANPATH = [\n    \"/man\"\n    \"/share/man\"\n  ];\n  PATH = [\n    \"/bin\"\n  ];\n}"}, "loc": ["environment", "profileRelativeEnvVars"], "readOnly": false, "type": "attribute set of list of string"}, "environment.profileRelativeSessionVariables": {"declarations": ["nixos/modules/config/system-environment.nix"], "description": {"_type": "mdDoc", "text": "Attribute set of environment variable used in the global\nenvironment. These variables will be set by PAM early in the\nlogin process.\n\nVariable substitution is available as described in\n{manpage}`pam_env.conf(5)`.\n\nEach attribute maps to a list of relative paths. Each relative\npath is appended to the each profile of\n{option}`environment.profiles` to form the content of\nthe corresponding environment variable.\n\nAlso, these variables are merged into\n[](#opt-environment.profileRelativeEnvVars) and it is\ntherefore not possible to use PAM style variables such as\n`@{HOME}`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  MANPATH = [\n    \"/man\"\n    \"/share/man\"\n  ];\n  PATH = [\n    \"/bin\"\n  ];\n}"}, "loc": ["environment", "profileRelativeSessionVariables"], "readOnly": false, "type": "attribute set of list of string"}, "environment.profiles": {"declarations": ["nixos/modules/config/shells-environment.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of profiles used to setup the global environment.\n"}, "loc": ["environment", "profiles"], "readOnly": false, "type": "list of string"}, "environment.sessionVariables": {"declarations": ["nixos/modules/config/system-environment.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of environment variables used in the global environment.\nThese variables will be set by PAM early in the login process.\n\nThe value of each session variable can be either a string or a\nlist of strings. The latter is concatenated, interspersed with\ncolon characters.\n\nNote, due to limitations in the PAM format values may not\ncontain the `\"` character.\n\nAlso, these variables are merged into\n[](#opt-environment.variables) and it is\ntherefore not possible to use PAM style variables such as\n`@{HOME}`.\n"}, "loc": ["environment", "sessionVariables"], "readOnly": false, "type": "attribute set of ((list of string) or string or path)"}, "environment.shellAliases": {"declarations": ["nixos/modules/config/shells-environment.nix"], "description": {"_type": "mdDoc", "text": "An attribute set that maps aliases (the top level attribute names in\nthis option) to command strings or directly to build outputs. The\naliases are added to all users' shells.\nAliases mapped to `null` are ignored.\n"}, "example": {"_type": "literalExpression", "text": "{\n  l = null;\n  ll = \"ls -l\";\n}"}, "loc": ["environment", "shellAliases"], "readOnly": false, "type": "attribute set of (null or string or path)"}, "environment.shellInit": {"declarations": ["nixos/modules/config/shells-environment.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code called during shell initialisation.\nThis code is assumed to be shell-independent, which means you should\nstick to pure sh without sh word split.\n"}, "loc": ["environment", "shellInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "environment.shells": {"declarations": ["nixos/modules/config/shells-environment.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of permissible login shells for user accounts.\nNo need to mention `/bin/sh`\nhere, it is placed into this list implicitly.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.bashInteractive pkgs.zsh ]"}, "loc": ["environment", "shells"], "readOnly": false, "type": "list of (package or path)"}, "environment.systemPackages": {"declarations": ["nixos/modules/config/system-path.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The set of packages that appear in\n/run/current-system/sw.  These packages are\nautomatically available to all users, and are\nautomatically updated every time you rebuild the system\nconfiguration.  (The latter is the main difference with\ninstalling them in the default profile,\n{file}`/nix/var/nix/profiles/default`.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.firefox pkgs.thunderbird ]"}, "loc": ["environment", "systemPackages"], "readOnly": false, "type": "list of package"}, "environment.unixODBCDrivers": {"declarations": ["nixos/modules/config/unix-odbc-drivers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Specifies Unix ODBC drivers to be registered in\n{file}`/etc/odbcinst.ini`.  You may also want to\nadd `pkgs.unixODBC` to the system path to get\na command line client to connect to ODBC databases.\n"}, "example": {"_type": "literalExpression", "text": "with pkgs.unixODBCDrivers; [ sqlite psql ]"}, "loc": ["environment", "unixODBCDrivers"], "readOnly": false, "type": "list of package"}, "environment.variables": {"declarations": ["nixos/modules/config/shells-environment.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of environment variables used in the global environment.\nThese variables will be set on shell initialisation (e.g. in /etc/profile).\nThe value of each variable can be either a string or a list of\nstrings.  The latter is concatenated, interspersed with colon\ncharacters.\n"}, "example": {"_type": "literalExpression", "text": "{\n  EDITOR = \"nvim\";\n  VISUAL = \"nvim\";\n}"}, "loc": ["environment", "variables"], "readOnly": false, "type": "attribute set of ((list of string) or string or path)"}, "environment.wordlist.enable": {"declarations": ["nixos/modules/misc/wordlist.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable environment variables for lists of words."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["environment", "wordlist", "enable"], "readOnly": false, "type": "boolean"}, "environment.wordlist.lists": {"declarations": ["nixos/modules/misc/wordlist.nix"], "default": {"_type": "literalExpression", "text": "{\n  WORDLIST = [ \"${pkgs.scowl}/share/dict/words.txt\" ];\n}\n"}, "description": {"_type": "mdDoc", "text": "A set with the key names being the environment variable you'd like to\nset and the values being a list of paths to text documents containing\nlists of words. The various files will be merged, sorted, duplicates\nremoved, and extraneous spacing removed.\n\nIf you have a handful of words that you want to add to an already\nexisting wordlist, you may find `builtins.toFile` useful for this\ntask.\n"}, "example": {"_type": "literalExpression", "text": "{\n  WORDLIST = [ \"${pkgs.scowl}/share/dict/words.txt\" ];\n  AUGMENTED_WORDLIST = [\n    \"${pkgs.scowl}/share/dict/words.txt\"\n    \"${pkgs.scowl}/share/dict/words.variants.txt\"\n    (builtins.toFile \"extra-words\" ''\n      desynchonization\n      oobleck'')\n  ];\n}\n"}, "loc": ["environment", "wordlist", "lists"], "readOnly": false, "type": "attribute set of non-empty (list of path)"}, "fileSystems": {"declarations": ["nixos/modules/tasks/filesystems.nix", "nixos/modules/tasks/encrypted-devices.nix", "nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The file systems to be mounted.  It must include an entry for\nthe root directory (`mountPoint = \"/\"`).  Each\nentry in the list is an attribute set with the following fields:\n`mountPoint`, `device`,\n`fsType` (a file system type recognised by\n{command}`mount`; defaults to\n`\"auto\"`), and `options`\n(the mount options passed to {command}`mount` using the\n{option}`-o` flag; defaults to `[ \"defaults\" ]`).\n\nInstead of specifying `device`, you can also\nspecify a volume label (`label`) for file\nsystems that support it, such as ext2/ext3 (see {command}`mke2fs -L`).\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\".device = \"/dev/hda1\";\n  \"/data\" = {\n    device = \"/dev/hda2\";\n    fsType = \"ext3\";\n    options = [ \"data=journal\" ];\n  };\n  \"/bigdisk\".label = \"bigdisk\";\n}\n"}, "loc": ["fileSystems"], "readOnly": false, "type": "attribute set of (submodule)"}, "fileSystems.<name>.autoFormat": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If the device does not currently contain a filesystem (as\ndetermined by {command}`blkid`, then automatically\nformat it with the filesystem type specified in\n{option}`fsType`.  Use with caution.\n"}, "loc": ["fileSystems", "<name>", "autoFormat"], "readOnly": false, "type": "boolean"}, "fileSystems.<name>.autoResize": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, the filesystem is grown to its maximum size before\nbeing mounted. (This is typically the size of the containing\npartition.) This is currently only supported for ext2/3/4\nfilesystems that are mounted during early boot.\n"}, "loc": ["fileSystems", "<name>", "autoResize"], "readOnly": false, "type": "boolean"}, "fileSystems.<name>.depends": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of paths that should be mounted before this one. This filesystem's\n{option}`device` and {option}`mountPoint` are always\nchecked and do not need to be included explicitly. If a path is added\nto this list, any other filesystem whose mount point is a parent of\nthe path will be mounted before this filesystem. The paths do not need\nto actually be the {option}`mountPoint` of some other filesystem.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/persist\"\n]"}, "loc": ["fileSystems", "<name>", "depends"], "readOnly": false, "type": "list of string (with check: non-empty without trailing slash)"}, "fileSystems.<name>.device": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Location of the device."}, "example": {"_type": "literalExpression", "text": "\"/dev/sda\""}, "loc": ["fileSystems", "<name>", "device"], "readOnly": false, "type": "null or string (with check: non-empty)"}, "fileSystems.<name>.encrypted.blkDev": {"declarations": ["nixos/modules/tasks/encrypted-devices.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Location of the backing encrypted device."}, "example": {"_type": "literalExpression", "text": "\"/dev/sda1\""}, "loc": ["fileSystems", "<name>", "encrypted", "blkDev"], "readOnly": false, "type": "null or string"}, "fileSystems.<name>.encrypted.enable": {"declarations": ["nixos/modules/tasks/encrypted-devices.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "The block device is backed by an encrypted one, adds this device as a initrd luks entry."}, "loc": ["fileSystems", "<name>", "encrypted", "enable"], "readOnly": false, "type": "boolean"}, "fileSystems.<name>.encrypted.keyFile": {"declarations": ["nixos/modules/tasks/encrypted-devices.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a keyfile used to unlock the backing encrypted\ndevice. At the time this keyfile is accessed, the\n`neededForBoot` filesystems (see\n`fileSystems.<name?>.neededForBoot`)\nwill have been mounted under `/mnt-root`,\nso the keyfile path should usually start with \"/mnt-root/\".\n"}, "example": {"_type": "literalExpression", "text": "\"/mnt-root/root/.swapkey\""}, "loc": ["fileSystems", "<name>", "encrypted", "keyFile"], "readOnly": false, "type": "null or string"}, "fileSystems.<name>.encrypted.label": {"declarations": ["nixos/modules/tasks/encrypted-devices.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Label of the unlocked encrypted device. Set `fileSystems.<name?>.device` to `/dev/mapper/<label>` to mount the unlocked device."}, "example": {"_type": "literalExpression", "text": "\"rootfs\""}, "loc": ["fileSystems", "<name>", "encrypted", "label"], "readOnly": false, "type": "null or string"}, "fileSystems.<name>.formatOptions": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "If {option}`autoFormat` option is set specifies\nextra options passed to mkfs.\n"}, "loc": ["fileSystems", "<name>", "formatOptions"], "readOnly": false, "type": "string"}, "fileSystems.<name>.fsType": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "\"auto\""}, "description": {"_type": "mdDoc", "text": "Type of the file system."}, "example": {"_type": "literalExpression", "text": "\"ext3\""}, "loc": ["fileSystems", "<name>", "fsType"], "readOnly": false, "type": "string (with check: non-empty)"}, "fileSystems.<name>.label": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Label of the device (if any)."}, "example": {"_type": "literalExpression", "text": "\"root-partition\""}, "loc": ["fileSystems", "<name>", "label"], "readOnly": false, "type": "null or string (with check: non-empty)"}, "fileSystems.<name>.mountPoint": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "description": {"_type": "mdDoc", "text": "Location of the mounted file system."}, "example": {"_type": "literalExpression", "text": "\"/mnt/usb\""}, "loc": ["fileSystems", "<name>", "mountPoint"], "readOnly": false, "type": "string (with check: non-empty without trailing slash)"}, "fileSystems.<name>.neededForBoot": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, this file system will be mounted in the initial ramdisk.\nNote that the file system will always be mounted in the initial\nramdisk if its mount point is one of the following:\n{file}`/`, {file}`/nix`, {file}`/nix/store`, {file}`/var`, {file}`/var/log`, {file}`/var/lib`, {file}`/var/lib/nixos`, {file}`/etc`, {file}`/usr`.\n"}, "loc": ["fileSystems", "<name>", "neededForBoot"], "readOnly": false, "type": "boolean"}, "fileSystems.<name>.noCheck": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable running fsck on this filesystem."}, "loc": ["fileSystems", "<name>", "noCheck"], "readOnly": false, "type": "boolean"}, "fileSystems.<name>.options": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"defaults\"\n]"}, "description": {"_type": "mdDoc", "text": "Options used to mount the file system."}, "example": {"_type": "literalExpression", "text": "[\n  \"data=journal\"\n]"}, "loc": ["fileSystems", "<name>", "options"], "readOnly": false, "type": "non-empty (list of string (with check: non-empty))"}, "fonts.enableDefaultFonts": {"declarations": ["nixos/modules/config/fonts/fonts.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable a basic set of fonts providing several font styles\nand families and reasonable coverage of Unicode.\n"}, "loc": ["fonts", "enableDefaultFonts"], "readOnly": false, "type": "boolean"}, "fonts.enableGhostscriptFonts": {"declarations": ["nixos/modules/config/fonts/ghostscript.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add the fonts provided by Ghostscript (such as\nvarious URW fonts and the \u201cBase-14\u201d Postscript fonts) to the\nlist of system fonts, making them available to X11\napplications.\n"}, "loc": ["fonts", "enableGhostscriptFonts"], "readOnly": false, "type": "boolean"}, "fonts.fontDir.decompressFonts": {"declarations": ["nixos/modules/config/fonts/fontdir.nix"], "default": {"_type": "literalExpression", "text": "config.programs.xwayland.enable"}, "description": {"_type": "mdDoc", "text": "Whether to decompress fonts in\n{file}`/run/current-system/sw/share/X11/fonts`.\n"}, "loc": ["fonts", "fontDir", "decompressFonts"], "readOnly": false, "type": "boolean"}, "fonts.fontDir.enable": {"declarations": ["nixos/modules/config/fonts/fontdir.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to create a directory with links to all fonts in\n{file}`/run/current-system/sw/share/X11/fonts`.\n"}, "loc": ["fonts", "fontDir", "enable"], "readOnly": false, "type": "boolean"}, "fonts.fontconfig.allowBitmaps": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow bitmap fonts. Set to `false` to ban all\nbitmap fonts.\n"}, "loc": ["fonts", "fontconfig", "allowBitmaps"], "readOnly": false, "type": "boolean"}, "fonts.fontconfig.allowType1": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow Type-1 fonts. Default is `false` because of\npoor rendering.\n"}, "loc": ["fonts", "fontconfig", "allowType1"], "readOnly": false, "type": "boolean"}, "fonts.fontconfig.antialias": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable font antialiasing. At high resolution (> 200 DPI),\nantialiasing has no visible effect; users of such displays may want\nto disable this option.\n"}, "loc": ["fonts", "fontconfig", "antialias"], "readOnly": false, "type": "boolean"}, "fonts.fontconfig.cache32Bit": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Generate system fonts cache for 32-bit applications.\n"}, "loc": ["fonts", "fontconfig", "cache32Bit"], "readOnly": false, "type": "boolean"}, "fonts.fontconfig.defaultFonts.emoji": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"Noto Color Emoji\"\n]"}, "description": {"_type": "mdDoc", "text": "System-wide default emoji font(s). Multiple fonts may be listed\nin case a font does not support all emoji.\n\nNote that fontconfig matches color emoji fonts preferentially,\nso if you want to use a black and white font while having\na color font installed (eg. Noto Color Emoji installed alongside\nNoto Emoji), fontconfig will still choose the color font even\nwhen it is later in the list.\n"}, "loc": ["fonts", "fontconfig", "defaultFonts", "emoji"], "readOnly": false, "type": "list of string"}, "fonts.fontconfig.defaultFonts.monospace": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"DejaVu Sans Mono\"\n]"}, "description": {"_type": "mdDoc", "text": "System-wide default monospace font(s). Multiple fonts may be\nlisted in case multiple languages must be supported.\n"}, "loc": ["fonts", "fontconfig", "defaultFonts", "monospace"], "readOnly": false, "type": "list of string"}, "fonts.fontconfig.defaultFonts.sansSerif": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"DejaVu Sans\"\n]"}, "description": {"_type": "mdDoc", "text": "System-wide default sans serif font(s). Multiple fonts may be\nlisted in case multiple languages must be supported.\n"}, "loc": ["fonts", "fontconfig", "defaultFonts", "sansSerif"], "readOnly": false, "type": "list of string"}, "fonts.fontconfig.defaultFonts.serif": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"DejaVu Serif\"\n]"}, "description": {"_type": "mdDoc", "text": "System-wide default serif font(s). Multiple fonts may be listed\nin case multiple languages must be supported.\n"}, "loc": ["fonts", "fontconfig", "defaultFonts", "serif"], "readOnly": false, "type": "list of string"}, "fonts.fontconfig.enable": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If enabled, a Fontconfig configuration file will be built\npointing to a set of default fonts.  If you don't care about\nrunning X11 applications or any other program that uses\nFontconfig, you can turn this option off and prevent a\ndependency on all those fonts.\n"}, "loc": ["fonts", "fontconfig", "enable"], "readOnly": false, "type": "boolean"}, "fonts.fontconfig.hinting.autohint": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the autohinter in place of the default interpreter.\nThe results are usually lower quality than correctly-hinted\nfonts, but better than unhinted fonts.\n"}, "loc": ["fonts", "fontconfig", "hinting", "autohint"], "readOnly": false, "type": "boolean"}, "fonts.fontconfig.hinting.enable": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable font hinting. Hinting aligns glyphs to pixel boundaries to\nimprove rendering sharpness at low resolution. At high resolution\n(> 200 dpi) hinting will do nothing (at best); users of such\ndisplays may want to disable this option.\n"}, "loc": ["fonts", "fontconfig", "hinting", "enable"], "readOnly": false, "type": "boolean"}, "fonts.fontconfig.hinting.style": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "\"hintslight\""}, "description": {"_type": "mdDoc", "text": "Hintstyle is the amount of font reshaping done to line up\nto the grid.\n\nhintslight will make the font more fuzzy to line up to the grid\nbut will be better in retaining font shape, while hintfull will\nbe a crisp font that aligns well to the pixel grid but will lose\na greater amount of font shape.\n"}, "loc": ["fonts", "fontconfig", "hinting", "style"], "readOnly": false, "type": "one of \"hintnone\", \"hintslight\", \"hintmedium\", \"hintfull\""}, "fonts.fontconfig.includeUserConf": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Include the user configuration from\n{file}`~/.config/fontconfig/fonts.conf` or\n{file}`~/.config/fontconfig/conf.d`.\n"}, "loc": ["fonts", "fontconfig", "includeUserConf"], "readOnly": false, "type": "boolean"}, "fonts.fontconfig.localConf": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "System-wide customization file contents, has higher priority than\n`defaultFonts` settings.\n"}, "loc": ["fonts", "fontconfig", "localConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "fonts.fontconfig.subpixel.lcdfilter": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "\"default\""}, "description": {"_type": "mdDoc", "text": "FreeType LCD filter. At high resolution (> 200 DPI), LCD filtering\nhas no visible effect; users of such displays may want to select\n`none`.\n"}, "loc": ["fonts", "fontconfig", "subpixel", "lcdfilter"], "readOnly": false, "type": "one of \"none\", \"default\", \"light\", \"legacy\""}, "fonts.fontconfig.subpixel.rgba": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "\"rgb\""}, "description": {"_type": "mdDoc", "text": "Subpixel order. The overwhelming majority of displays are\n`rgb` in their normal orientation. Select\n`vrgb` for mounting such a display 90 degrees\nclockwise from its normal orientation or `vbgr`\nfor mounting 90 degrees counter-clockwise. Select\n`bgr` in the unlikely event of mounting 180\ndegrees from the normal orientation. Reverse these directions in\nthe improbable event that the display's native subpixel order is\n`bgr`.\n"}, "loc": ["fonts", "fontconfig", "subpixel", "rgba"], "readOnly": false, "type": "one of \"rgb\", \"bgr\", \"vrgb\", \"vbgr\", \"none\""}, "fonts.fontconfig.useEmbeddedBitmaps": {"declarations": ["nixos/modules/config/fonts/fontconfig.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use embedded bitmaps in fonts like Calibri."}, "loc": ["fonts", "fontconfig", "useEmbeddedBitmaps"], "readOnly": false, "type": "boolean"}, "fonts.fonts": {"declarations": ["nixos/modules/config/fonts/fonts.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of primary font paths."}, "example": {"_type": "literalExpression", "text": "[ pkgs.dejavu_fonts ]"}, "loc": ["fonts", "fonts"], "readOnly": false, "type": "list of path"}, "gnu": {"declarations": ["nixos/modules/config/gnu.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When enabled, GNU software is chosen by default whenever a there is\na choice between GNU and non-GNU software (e.g., GNU lsh\nvs. OpenSSH).\n"}, "loc": ["gnu"], "readOnly": false, "type": "boolean"}, "gtk.iconCache.enable": {"declarations": ["nixos/modules/config/gtk/gtk-icon-cache.nix"], "default": {"_type": "literalExpression", "text": "config.services.xserver.enable"}, "description": {"_type": "mdDoc", "text": "Whether to build icon theme caches for GTK applications.\n"}, "loc": ["gtk", "iconCache", "enable"], "readOnly": false, "type": "boolean"}, "hardware.acpilight.enable": {"declarations": ["nixos/modules/hardware/acpilight.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable acpilight.\nThis will allow brightness control via xbacklight from users in the video group\n"}, "loc": ["hardware", "acpilight", "enable"], "readOnly": false, "type": "boolean"}, "hardware.bladeRF.enable": {"declarations": ["nixos/modules/hardware/bladeRF.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables udev rules for BladeRF devices. By default grants access\nto users in the \"bladerf\" group. You may want to install the\nlibbladeRF package.\n"}, "loc": ["hardware", "bladeRF", "enable"], "readOnly": false, "type": "boolean"}, "hardware.bluetooth.disabledPlugins": {"declarations": ["nixos/modules/services/hardware/bluetooth.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Built-in plugins to disable"}, "loc": ["hardware", "bluetooth", "disabledPlugins"], "readOnly": false, "type": "list of string"}, "hardware.bluetooth.enable": {"declarations": ["nixos/modules/services/hardware/bluetooth.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable support for Bluetooth."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "bluetooth", "enable"], "readOnly": false, "type": "boolean"}, "hardware.bluetooth.hsphfpd.enable": {"declarations": ["nixos/modules/services/hardware/bluetooth.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable support for hsphfpd[-prototype] implementation."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "bluetooth", "hsphfpd", "enable"], "readOnly": false, "type": "boolean"}, "hardware.bluetooth.input": {"declarations": ["nixos/modules/services/hardware/bluetooth.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set configuration for the input service (/etc/bluetooth/input.conf)."}, "example": {"_type": "literalExpression", "text": "{\n  General = {\n    ClassicBondedOnly = true;\n    IdleTimeout = 30;\n  };\n}"}, "loc": ["hardware", "bluetooth", "input"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "hardware.bluetooth.network": {"declarations": ["nixos/modules/services/hardware/bluetooth.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set configuration for the network service (/etc/bluetooth/network.conf)."}, "example": {"_type": "literalExpression", "text": "{\n  General = {\n    DisableSecurity = true;\n  };\n}"}, "loc": ["hardware", "bluetooth", "network"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "hardware.bluetooth.package": {"declarations": ["nixos/modules/services/hardware/bluetooth.nix"], "default": {"_type": "literalExpression", "text": "pkgs.bluez"}, "description": {"_type": "mdDoc", "text": "Which BlueZ package to use.\n"}, "loc": ["hardware", "bluetooth", "package"], "readOnly": false, "type": "package"}, "hardware.bluetooth.powerOnBoot": {"declarations": ["nixos/modules/services/hardware/bluetooth.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to power up the default Bluetooth controller on boot."}, "loc": ["hardware", "bluetooth", "powerOnBoot"], "readOnly": false, "type": "boolean"}, "hardware.bluetooth.settings": {"declarations": ["nixos/modules/services/hardware/bluetooth.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set configuration for system-wide bluetooth (/etc/bluetooth/main.conf)."}, "example": {"_type": "literalExpression", "text": "{\n  General = {\n    ControllerMode = \"bredr\";\n  };\n}"}, "loc": ["hardware", "bluetooth", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "hardware.brillo.enable": {"declarations": ["nixos/modules/hardware/brillo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable brillo in userspace.\nThis will allow brightness control from users in the video group\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "brillo", "enable"], "readOnly": false, "type": "boolean"}, "hardware.bumblebee.connectDisplay": {"declarations": ["nixos/modules/hardware/video/bumblebee.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to true if you intend to connect your discrete card to a\nmonitor. This option will set up your Nvidia card for EDID\ndiscovery and to turn on the monitor signal.\n\nOnly nvidia driver is supported so far.\n"}, "loc": ["hardware", "bumblebee", "connectDisplay"], "readOnly": false, "type": "boolean"}, "hardware.bumblebee.driver": {"declarations": ["nixos/modules/hardware/video/bumblebee.nix"], "default": {"_type": "literalExpression", "text": "\"nvidia\""}, "description": {"_type": "mdDoc", "text": "Set driver used by bumblebeed. Supported are nouveau and nvidia.\n"}, "loc": ["hardware", "bumblebee", "driver"], "readOnly": false, "type": "one of \"nvidia\", \"nouveau\""}, "hardware.bumblebee.enable": {"declarations": ["nixos/modules/hardware/video/bumblebee.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the bumblebee daemon to manage Optimus hybrid video cards.\nThis should power off secondary GPU until its use is requested\nby running an application with optirun.\n"}, "loc": ["hardware", "bumblebee", "enable"], "readOnly": false, "type": "boolean"}, "hardware.bumblebee.group": {"declarations": ["nixos/modules/hardware/video/bumblebee.nix"], "default": {"_type": "literalExpression", "text": "\"wheel\""}, "description": {"_type": "mdDoc", "text": "Group for bumblebee socket"}, "example": {"_type": "literalExpression", "text": "\"video\""}, "loc": ["hardware", "bumblebee", "group"], "readOnly": false, "type": "string"}, "hardware.bumblebee.pmMethod": {"declarations": ["nixos/modules/hardware/video/bumblebee.nix"], "default": {"_type": "literalExpression", "text": "\"auto\""}, "description": {"_type": "mdDoc", "text": "Set preferred power management method for unused card.\n"}, "loc": ["hardware", "bumblebee", "pmMethod"], "readOnly": false, "type": "one of \"auto\", \"bbswitch\", \"switcheroo\", \"none\""}, "hardware.ckb-next.enable": {"declarations": ["nixos/modules/hardware/ckb-next.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Corsair keyboard/mouse driver."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "ckb-next", "enable"], "readOnly": false, "type": "boolean"}, "hardware.ckb-next.gid": {"declarations": ["nixos/modules/hardware/ckb-next.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Limit access to the ckb daemon to a particular group.\n"}, "example": {"_type": "literalExpression", "text": "100"}, "loc": ["hardware", "ckb-next", "gid"], "readOnly": false, "type": "null or signed integer"}, "hardware.ckb-next.package": {"declarations": ["nixos/modules/hardware/ckb-next.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ckb-next"}, "description": {"_type": "mdDoc", "text": "The package implementing the Corsair keyboard/mouse driver.\n"}, "loc": ["hardware", "ckb-next", "package"], "readOnly": false, "type": "package"}, "hardware.cpu.amd.sev.enable": {"declarations": ["nixos/modules/hardware/cpu/amd-sev.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable access to the AMD SEV device."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "cpu", "amd", "sev", "enable"], "readOnly": false, "type": "boolean"}, "hardware.cpu.amd.sev.group": {"declarations": ["nixos/modules/hardware/cpu/amd-sev.nix"], "default": {"_type": "literalExpression", "text": "\"sev\""}, "description": {"_type": "mdDoc", "text": "Group to assign to the SEV device."}, "loc": ["hardware", "cpu", "amd", "sev", "group"], "readOnly": false, "type": "string"}, "hardware.cpu.amd.sev.mode": {"declarations": ["nixos/modules/hardware/cpu/amd-sev.nix"], "default": {"_type": "literalExpression", "text": "\"0660\""}, "description": {"_type": "mdDoc", "text": "Mode to set for the SEV device."}, "loc": ["hardware", "cpu", "amd", "sev", "mode"], "readOnly": false, "type": "string"}, "hardware.cpu.amd.sev.user": {"declarations": ["nixos/modules/hardware/cpu/amd-sev.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "Owner to assign to the SEV device."}, "loc": ["hardware", "cpu", "amd", "sev", "user"], "readOnly": false, "type": "string"}, "hardware.cpu.amd.updateMicrocode": {"declarations": ["nixos/modules/hardware/cpu/amd-microcode.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Update the CPU microcode for AMD processors.\n"}, "loc": ["hardware", "cpu", "amd", "updateMicrocode"], "readOnly": false, "type": "boolean"}, "hardware.cpu.intel.sgx.enableDcapCompat": {"declarations": ["nixos/modules/hardware/cpu/intel-sgx.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable backward compatibility for SGX software build for the\nout-of-tree Intel SGX DCAP driver.\n\nCreates symbolic links for the SGX devices `/dev/sgx_enclave`\nand `/dev/sgx_provision` to make them available as\n`/dev/sgx/enclave`  and `/dev/sgx/provision`,\nrespectively.\n"}, "loc": ["hardware", "cpu", "intel", "sgx", "enableDcapCompat"], "readOnly": false, "type": "boolean"}, "hardware.cpu.intel.sgx.provision.enable": {"declarations": ["nixos/modules/hardware/cpu/intel-sgx.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable access to the Intel SGX provisioning device."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "cpu", "intel", "sgx", "provision", "enable"], "readOnly": false, "type": "boolean"}, "hardware.cpu.intel.sgx.provision.group": {"declarations": ["nixos/modules/hardware/cpu/intel-sgx.nix"], "default": {"_type": "literalExpression", "text": "\"sgx_prv\""}, "description": {"_type": "mdDoc", "text": "Group to assign to the SGX provisioning device."}, "loc": ["hardware", "cpu", "intel", "sgx", "provision", "group"], "readOnly": false, "type": "string"}, "hardware.cpu.intel.sgx.provision.mode": {"declarations": ["nixos/modules/hardware/cpu/intel-sgx.nix"], "default": {"_type": "literalExpression", "text": "\"0660\""}, "description": {"_type": "mdDoc", "text": "Mode to set for the SGX provisioning device."}, "loc": ["hardware", "cpu", "intel", "sgx", "provision", "mode"], "readOnly": false, "type": "string"}, "hardware.cpu.intel.sgx.provision.user": {"declarations": ["nixos/modules/hardware/cpu/intel-sgx.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "Owner to assign to the SGX provisioning device."}, "loc": ["hardware", "cpu", "intel", "sgx", "provision", "user"], "readOnly": false, "type": "string"}, "hardware.cpu.intel.updateMicrocode": {"declarations": ["nixos/modules/hardware/cpu/intel-microcode.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Update the CPU microcode for Intel processors.\n"}, "loc": ["hardware", "cpu", "intel", "updateMicrocode"], "readOnly": false, "type": "boolean"}, "hardware.deviceTree.enable": {"declarations": ["nixos/modules/hardware/device-tree.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Build device tree files. These are used to describe the\nnon-discoverable hardware of a system.\n"}, "loc": ["hardware", "deviceTree", "enable"], "readOnly": false, "type": "boolean"}, "hardware.deviceTree.filter": {"declarations": ["nixos/modules/hardware/device-tree.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Only include .dtb files matching glob expression.\n"}, "example": {"_type": "literalExpression", "text": "\"*rpi*.dtb\""}, "loc": ["hardware", "deviceTree", "filter"], "readOnly": false, "type": "null or string"}, "hardware.deviceTree.kernelPackage": {"declarations": ["nixos/modules/hardware/device-tree.nix"], "default": {"_type": "literalExpression", "text": "config.boot.kernelPackages.kernel"}, "description": {"_type": "mdDoc", "text": "Kernel package containing the base device-tree (.dtb) to boot. Uses\ndevice trees bundled with the Linux kernel by default.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.linux_latest"}, "loc": ["hardware", "deviceTree", "kernelPackage"], "readOnly": false, "type": "path"}, "hardware.deviceTree.name": {"declarations": ["nixos/modules/hardware/device-tree.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of an explicit dtb to be loaded, relative to the dtb base.\nUseful in extlinux scenarios if the bootloader doesn't pick the\nright .dtb file from FDTDIR.\n"}, "example": {"_type": "literalExpression", "text": "\"some-dtb.dtb\""}, "loc": ["hardware", "deviceTree", "name"], "readOnly": false, "type": "null or string"}, "hardware.deviceTree.overlays": {"declarations": ["nixos/modules/hardware/device-tree.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of overlays to apply to base device-tree (.dtb) files.\n"}, "example": {"_type": "literalExpression", "text": "[\n  { name = \"pps\"; dtsFile = ./dts/pps.dts; }\n  { name = \"spi\";\n    dtsText = \"...\";\n  }\n  { name = \"precompiled\"; dtboFile = ./dtbos/example.dtbo; }\n]\n"}, "loc": ["hardware", "deviceTree", "overlays"], "readOnly": false, "type": "list of ((submodule) or path convertible to it)"}, "hardware.deviceTree.overlays.*.dtboFile": {"declarations": ["nixos/modules/hardware/device-tree.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to .dtbo compiled overlay file.\n"}, "loc": ["hardware", "deviceTree", "overlays", "*", "dtboFile"], "readOnly": false, "type": "null or path"}, "hardware.deviceTree.overlays.*.dtsFile": {"declarations": ["nixos/modules/hardware/device-tree.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to .dts overlay file, overlay is applied to\neach .dtb file matching \"compatible\" of the overlay.\n"}, "example": {"_type": "literalExpression", "text": "./dts/overlays.dts"}, "loc": ["hardware", "deviceTree", "overlays", "*", "dtsFile"], "readOnly": false, "type": "null or path"}, "hardware.deviceTree.overlays.*.dtsText": {"declarations": ["nixos/modules/hardware/device-tree.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Literal DTS contents, overlay is applied to\neach .dtb file matching \"compatible\" of the overlay.\n"}, "example": {"_type": "literalExpression", "text": "''\n  /dts-v1/;\n  /plugin/;\n  / {\n          compatible = \"raspberrypi\";\n  };\n  &{/soc} {\n          pps {\n                  compatible = \"pps-gpio\";\n                  status = \"okay\";\n          };\n  };\n''"}, "loc": ["hardware", "deviceTree", "overlays", "*", "dtsText"], "readOnly": false, "type": "null or string"}, "hardware.deviceTree.overlays.*.filter": {"declarations": ["nixos/modules/hardware/device-tree.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Only apply to .dtb files matching glob expression.\n"}, "example": {"_type": "literalExpression", "text": "\"*rpi*.dtb\""}, "loc": ["hardware", "deviceTree", "overlays", "*", "filter"], "readOnly": false, "type": "null or string"}, "hardware.deviceTree.overlays.*.name": {"declarations": ["nixos/modules/hardware/device-tree.nix"], "description": {"_type": "mdDoc", "text": "Name of this overlay\n"}, "loc": ["hardware", "deviceTree", "overlays", "*", "name"], "readOnly": false, "type": "string"}, "hardware.digitalbitbox.enable": {"declarations": ["nixos/modules/hardware/digitalbitbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables udev rules for Digital Bitbox devices.\n"}, "loc": ["hardware", "digitalbitbox", "enable"], "readOnly": false, "type": "boolean"}, "hardware.digitalbitbox.package": {"declarations": ["nixos/modules/hardware/digitalbitbox.nix"], "default": {"_type": "literalExpression", "text": "pkgs.digitalbitbox"}, "description": {"_type": "mdDoc", "text": "The Digital Bitbox package to use. This can be used to install a package with udev rules that differ from the defaults."}, "loc": ["hardware", "digitalbitbox", "package"], "readOnly": false, "type": "package"}, "hardware.enableAllFirmware": {"declarations": ["nixos/modules/hardware/all-firmware.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Turn on this option if you want to enable all the firmware.\n"}, "loc": ["hardware", "enableAllFirmware"], "readOnly": false, "type": "boolean"}, "hardware.enableRedistributableFirmware": {"declarations": ["nixos/modules/hardware/all-firmware.nix"], "default": {"_type": "literalExpression", "text": "config.hardware.enableAllFirmware"}, "description": {"_type": "mdDoc", "text": "Turn on this option if you want to enable all the firmware with a license allowing redistribution.\n"}, "loc": ["hardware", "enableRedistributableFirmware"], "readOnly": false, "type": "boolean"}, "hardware.facetimehd.enable": {"declarations": ["nixos/modules/hardware/video/webcam/facetimehd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable facetimehd kernel module."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "facetimehd", "enable"], "readOnly": false, "type": "boolean"}, "hardware.facetimehd.withCalibration": {"declarations": ["nixos/modules/hardware/video/webcam/facetimehd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to include sensor calibration files for facetimehd.\nThis makes colors look much better but is experimental, see\n<https://github.com/patjak/facetimehd/wiki/Extracting-the-sensor-calibration-files>\nfor details.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "facetimehd", "withCalibration"], "readOnly": false, "type": "boolean"}, "hardware.fancontrol.config": {"declarations": ["nixos/modules/services/hardware/fancontrol.nix"], "description": {"_type": "mdDoc", "text": "Required fancontrol configuration file content. See {manpage}`pwmconfig(8)` from the lm_sensors package."}, "example": {"_type": "literalExpression", "text": "''\n  # Configuration file generated by pwmconfig\n  INTERVAL=10\n  DEVPATH=hwmon3=devices/virtual/thermal/thermal_zone2 hwmon4=devices/platform/f71882fg.656\n  DEVNAME=hwmon3=soc_dts1 hwmon4=f71869a\n  FCTEMPS=hwmon4/device/pwm1=hwmon3/temp1_input\n  FCFANS=hwmon4/device/pwm1=hwmon4/device/fan1_input\n  MINTEMP=hwmon4/device/pwm1=35\n  MAXTEMP=hwmon4/device/pwm1=65\n  MINSTART=hwmon4/device/pwm1=150\n  MINSTOP=hwmon4/device/pwm1=0\n''"}, "loc": ["hardware", "fancontrol", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "hardware.fancontrol.enable": {"declarations": ["nixos/modules/services/hardware/fancontrol.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable software fan control (requires fancontrol.config)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "fancontrol", "enable"], "readOnly": false, "type": "boolean"}, "hardware.firmware": {"declarations": ["nixos/modules/services/hardware/udev.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of packages containing firmware files.  Such files\nwill be loaded automatically if the kernel asks for them\n(i.e., when it has detected specific hardware that requires\nfirmware to function).  If multiple packages contain firmware\nfiles with the same name, the first package in the list takes\nprecedence.  Note that you must rebuild your system if you add\nfiles to any of these directories.\n"}, "loc": ["hardware", "firmware"], "readOnly": false, "type": "list of package"}, "hardware.flipperzero.enable": {"declarations": ["nixos/modules/hardware/flipperzero.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable udev rules and software for Flipper Zero devices."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "flipperzero", "enable"], "readOnly": false, "type": "boolean"}, "hardware.flirc.enable": {"declarations": ["nixos/modules/hardware/flirc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable software to configure a Flirc USB device."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "flirc", "enable"], "readOnly": false, "type": "boolean"}, "hardware.gkraken.enable": {"declarations": ["nixos/modules/hardware/gkraken.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable gkraken's udev rules for NZXT AIO liquid coolers."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "gkraken", "enable"], "readOnly": false, "type": "boolean"}, "hardware.gpgSmartcards.enable": {"declarations": ["nixos/modules/hardware/gpgsmartcards.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable udev rules for gnupg smart cards."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "gpgSmartcards", "enable"], "readOnly": false, "type": "boolean"}, "hardware.hackrf.enable": {"declarations": ["nixos/modules/hardware/hackrf.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables hackrf udev rules and ensures 'plugdev' group exists.\nThis is a prerequisite to using HackRF devices without being root, since HackRF USB descriptors will be owned by plugdev through udev.\n"}, "loc": ["hardware", "hackrf", "enable"], "readOnly": false, "type": "boolean"}, "hardware.i2c.enable": {"declarations": ["nixos/modules/hardware/i2c.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable i2c devices support. By default access is granted to users in the \"i2c\"\ngroup (will be created if non-existent) and any user with a seat, meaning\nlogged on the computer locally.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "i2c", "enable"], "readOnly": false, "type": "boolean"}, "hardware.i2c.group": {"declarations": ["nixos/modules/hardware/i2c.nix"], "default": {"_type": "literalExpression", "text": "\"i2c\""}, "description": {"_type": "mdDoc", "text": "Grant access to i2c devices (/dev/i2c-*) to users in this group.\n"}, "loc": ["hardware", "i2c", "group"], "readOnly": false, "type": "string"}, "hardware.ipu6.enable": {"declarations": ["nixos/modules/hardware/video/webcam/ipu6.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable support for Intel IPU6/MIPI cameras."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "ipu6", "enable"], "readOnly": false, "type": "boolean"}, "hardware.ipu6.platform": {"declarations": ["nixos/modules/hardware/video/webcam/ipu6.nix"], "description": {"_type": "mdDoc", "text": "Choose the version for your hardware platform.\n\nUse `ipu6` for Tiger Lake and `ipu6ep` for Alder Lake respectively.\n"}, "loc": ["hardware", "ipu6", "platform"], "readOnly": false, "type": "one of \"ipu6\", \"ipu6ep\""}, "hardware.keyboard.qmk.enable": {"declarations": ["nixos/modules/hardware/keyboard/qmk.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable non-root access to the firmware of QMK keyboards."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "keyboard", "qmk", "enable"], "readOnly": false, "type": "boolean"}, "hardware.keyboard.teck.enable": {"declarations": ["nixos/modules/hardware/keyboard/teck.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable non-root access to the firmware of TECK keyboards."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "keyboard", "teck", "enable"], "readOnly": false, "type": "boolean"}, "hardware.keyboard.uhk.enable": {"declarations": ["nixos/modules/hardware/keyboard/uhk.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable non-root access to the firmware of UHK keyboards.\nYou need it when you want to flash a new firmware on the keyboard.\nAccess to the keyboard is granted to users in the \"input\" group.\nYou may want to install the uhk-agent package.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "keyboard", "uhk", "enable"], "readOnly": false, "type": "boolean"}, "hardware.keyboard.zsa.enable": {"declarations": ["nixos/modules/hardware/keyboard/zsa.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable udev rules for keyboards from ZSA like the ErgoDox EZ, Planck EZ and Moonlander Mark I.\nYou need it when you want to flash a new configuration on the keyboard\nor use their live training in the browser.\nYou may want to install the wally-cli package.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "keyboard", "zsa", "enable"], "readOnly": false, "type": "boolean"}, "hardware.ksm.enable": {"declarations": ["nixos/modules/hardware/ksm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Kernel Same-Page Merging."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "ksm", "enable"], "readOnly": false, "type": "boolean"}, "hardware.ksm.sleep": {"declarations": ["nixos/modules/hardware/ksm.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How many milliseconds ksmd should sleep between scans.\nSetting it to `null` uses the kernel's default time.\n"}, "loc": ["hardware", "ksm", "sleep"], "readOnly": false, "type": "null or signed integer"}, "hardware.ledger.enable": {"declarations": ["nixos/modules/hardware/ledger.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable udev rules for Ledger devices."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "ledger", "enable"], "readOnly": false, "type": "boolean"}, "hardware.logitech.lcd.devices": {"declarations": ["nixos/modules/hardware/logitech.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"0a07\"\n  \"c222\"\n  \"c225\"\n  \"c227\"\n  \"c251\"\n]"}, "description": {"_type": "mdDoc", "text": "List of USB device ids supported by g15daemon.\n\nYou most likely do not need to change this.\n"}, "loc": ["hardware", "logitech", "lcd", "devices"], "readOnly": false, "type": "list of string"}, "hardware.logitech.lcd.enable": {"declarations": ["nixos/modules/hardware/logitech.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Logitech LCD Devices."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "logitech", "lcd", "enable"], "readOnly": false, "type": "boolean"}, "hardware.logitech.lcd.startWhenNeeded": {"declarations": ["nixos/modules/hardware/logitech.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Only run the service when an actual supported device is plugged.\n"}, "loc": ["hardware", "logitech", "lcd", "startWhenNeeded"], "readOnly": false, "type": "boolean"}, "hardware.logitech.wireless.enable": {"declarations": ["nixos/modules/hardware/logitech.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Logitech Wireless Devices."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "logitech", "wireless", "enable"], "readOnly": false, "type": "boolean"}, "hardware.logitech.wireless.enableGraphical": {"declarations": ["nixos/modules/hardware/logitech.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable graphical support applications."}, "loc": ["hardware", "logitech", "wireless", "enableGraphical"], "readOnly": false, "type": "boolean"}, "hardware.mcelog.enable": {"declarations": ["nixos/modules/hardware/mcelog.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the Machine Check Exception logger.\n"}, "loc": ["hardware", "mcelog", "enable"], "readOnly": false, "type": "boolean"}, "hardware.mwProCapture.enable": {"declarations": ["nixos/modules/hardware/video/capture/mwprocapture.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Magewell Pro Capture family kernel module."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "mwProCapture", "enable"], "readOnly": false, "type": "boolean"}, "hardware.new-lg4ff.enable": {"declarations": ["nixos/modules/hardware/new-lg4ff.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables improved Linux module drivers for Logitech driving wheels.\nThis will replace the existing in-kernel hid-logitech modules.\nWorks most notably on the Logitech G25, G27, G29 and Driving Force (GT).\n"}, "loc": ["hardware", "new-lg4ff", "enable"], "readOnly": false, "type": "boolean"}, "hardware.nitrokey.enable": {"declarations": ["nixos/modules/hardware/nitrokey.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables udev rules for Nitrokey devices. By default grants access\nto users in the \"nitrokey\" group. You may want to install the\nnitrokey-app package, depending on your device and needs.\n"}, "loc": ["hardware", "nitrokey", "enable"], "readOnly": false, "type": "boolean"}, "hardware.nvidia.forceFullCompositionPipeline": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to force-enable the full composition pipeline.\nThis sometimes fixes screen tearing issues.\nThis has been reported to reduce the performance of some OpenGL applications and may produce issues in WebGL.\nIt also drastically increases the time the driver needs to clock down after load.\n"}, "loc": ["hardware", "nvidia", "forceFullCompositionPipeline"], "readOnly": false, "type": "boolean"}, "hardware.nvidia.modesetting.enable": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable kernel modesetting when using the NVIDIA proprietary driver.\n\nEnabling this fixes screen tearing when using Optimus via PRIME (see\n{option}`hardware.nvidia.prime.sync.enable`. This is not enabled\nby default because it is not officially supported by NVIDIA and would not\nwork with SLI.\n"}, "loc": ["hardware", "nvidia", "modesetting", "enable"], "readOnly": false, "type": "boolean"}, "hardware.nvidia.nvidiaPersistenced": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Update for NVIDA GPU headless mode, i.e. nvidia-persistenced. It ensures all\nGPUs stay awake even during headless mode.\n"}, "loc": ["hardware", "nvidia", "nvidiaPersistenced"], "readOnly": false, "type": "boolean"}, "hardware.nvidia.nvidiaSettings": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to add nvidia-settings, NVIDIA's GUI configuration tool, to\nsystemPackages.\n"}, "loc": ["hardware", "nvidia", "nvidiaSettings"], "readOnly": false, "type": "boolean"}, "hardware.nvidia.open": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use the open source kernel module\n"}, "loc": ["hardware", "nvidia", "open"], "readOnly": false, "type": "boolean"}, "hardware.nvidia.package": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "config.boot.kernelPackages.nvidiaPackages.stable"}, "description": {"_type": "mdDoc", "text": "The NVIDIA X11 derivation to use.\n"}, "example": {"_type": "literalExpression", "text": "config.boot.kernelPackages.nvidiaPackages.legacy_340"}, "loc": ["hardware", "nvidia", "package"], "readOnly": false, "type": "package"}, "hardware.nvidia.powerManagement.enable": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Experimental power management through systemd. For more information, see\nthe NVIDIA docs, on Chapter 21. Configuring Power Management Support.\n"}, "loc": ["hardware", "nvidia", "powerManagement", "enable"], "readOnly": false, "type": "boolean"}, "hardware.nvidia.powerManagement.finegrained": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Experimental power management of PRIME offload. For more information, see\nthe NVIDIA docs, chapter 22. PCI-Express runtime power management.\n"}, "loc": ["hardware", "nvidia", "powerManagement", "finegrained"], "readOnly": false, "type": "boolean"}, "hardware.nvidia.prime.allowExternalGpu": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Configure X to allow external NVIDIA GPUs when using Prime [Reverse] sync optimus.\n"}, "loc": ["hardware", "nvidia", "prime", "allowExternalGpu"], "readOnly": false, "type": "boolean"}, "hardware.nvidia.prime.amdgpuBusId": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Bus ID of the AMD APU. You can find it using lspci; for example if lspci\nshows the AMD APU at \"04:00.0\", set this option to \"PCI:4:0:0\".\n"}, "example": {"_type": "literalExpression", "text": "\"PCI:4:0:0\""}, "loc": ["hardware", "nvidia", "prime", "amdgpuBusId"], "readOnly": false, "type": "string matching the pattern ([[:print:]]+[:@][0-9]{1,3}:[0-9]{1,2}:[0-9])?"}, "hardware.nvidia.prime.intelBusId": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Bus ID of the Intel GPU. You can find it using lspci; for example if lspci\nshows the Intel GPU at \"00:02.0\", set this option to \"PCI:0:2:0\".\n"}, "example": {"_type": "literalExpression", "text": "\"PCI:0:2:0\""}, "loc": ["hardware", "nvidia", "prime", "intelBusId"], "readOnly": false, "type": "string matching the pattern ([[:print:]]+[:@][0-9]{1,3}:[0-9]{1,2}:[0-9])?"}, "hardware.nvidia.prime.nvidiaBusId": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Bus ID of the NVIDIA GPU. You can find it using lspci; for example if lspci\nshows the NVIDIA GPU at \"01:00.0\", set this option to \"PCI:1:0:0\".\n"}, "example": {"_type": "literalExpression", "text": "\"PCI:1:0:0\""}, "loc": ["hardware", "nvidia", "prime", "nvidiaBusId"], "readOnly": false, "type": "string matching the pattern ([[:print:]]+[:@][0-9]{1,3}:[0-9]{1,2}:[0-9])?"}, "hardware.nvidia.prime.offload.enable": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable render offload support using the NVIDIA proprietary driver via PRIME.\n\nIf this is enabled, then the bus IDs of the NVIDIA and Intel/AMD GPUs have to\nbe specified ({option}`hardware.nvidia.prime.nvidiaBusId` and\n{option}`hardware.nvidia.prime.intelBusId` or\n{option}`hardware.nvidia.prime.amdgpuBusId`).\n"}, "loc": ["hardware", "nvidia", "prime", "offload", "enable"], "readOnly": false, "type": "boolean"}, "hardware.nvidia.prime.offload.enableOffloadCmd": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Adds a `nvidia-offload` convenience script to {option}`environment.systemPackages`\nfor offloading programs to an nvidia device. To work, should have also enabled\n{option}`hardware.nvidia.prime.offload.enable` or {option}`hardware.nvidia.prime.reverseSync.enable`.\n\nExample usage `nvidia-offload sauerbraten_client`.\n"}, "loc": ["hardware", "nvidia", "prime", "offload", "enableOffloadCmd"], "readOnly": false, "type": "boolean"}, "hardware.nvidia.prime.reverseSync.enable": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Warning: This feature is relatively new, depending on your system this might\nwork poorly. AMD support, especially so.\nSee: https://forums.developer.nvidia.com/t/the-all-new-outputsink-feature-aka-reverse-prime/129828\n\nEnable NVIDIA Optimus support using the NVIDIA proprietary driver via reverse\nPRIME. If enabled, the Intel/AMD GPU will be used for all rendering, while\nenabling output to displays attached only to the NVIDIA GPU without a\nmultiplexer.\n\nNote that this option only has any effect if the \"nvidia\" driver is specified\nin {option}`services.xserver.videoDrivers`, and it should preferably\nbe the only driver there.\n\nIf this is enabled, then the bus IDs of the NVIDIA and Intel/AMD GPUs have to\nbe specified ({option}`hardware.nvidia.prime.nvidiaBusId` and\n{option}`hardware.nvidia.prime.intelBusId` or\n{option}`hardware.nvidia.prime.amdgpuBusId`).\n\nIf you enable this, you may want to also enable kernel modesetting for the\nNVIDIA driver ({option}`hardware.nvidia.modesetting.enable`) in order\nto prevent tearing.\n\nNote that this configuration will only be successful when a display manager\nfor which the {option}`services.xserver.displayManager.setupCommands`\noption is supported is used.\n"}, "loc": ["hardware", "nvidia", "prime", "reverseSync", "enable"], "readOnly": false, "type": "boolean"}, "hardware.nvidia.prime.sync.enable": {"declarations": ["nixos/modules/hardware/video/nvidia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable NVIDIA Optimus support using the NVIDIA proprietary driver via PRIME.\nIf enabled, the NVIDIA GPU will be always on and used for all rendering,\nwhile enabling output to displays attached only to the integrated Intel/AMD\nGPU without a multiplexer.\n\nNote that this option only has any effect if the \"nvidia\" driver is specified\nin {option}`services.xserver.videoDrivers`, and it should preferably\nbe the only driver there.\n\nIf this is enabled, then the bus IDs of the NVIDIA and Intel/AMD GPUs have to\nbe specified ({option}`hardware.nvidia.prime.nvidiaBusId` and\n{option}`hardware.nvidia.prime.intelBusId` or\n{option}`hardware.nvidia.prime.amdgpuBusId`).\n\nIf you enable this, you may want to also enable kernel modesetting for the\nNVIDIA driver ({option}`hardware.nvidia.modesetting.enable`) in order\nto prevent tearing.\n\nNote that this configuration will only be successful when a display manager\nfor which the {option}`services.xserver.displayManager.setupCommands`\noption is supported is used.\n"}, "loc": ["hardware", "nvidia", "prime", "sync", "enable"], "readOnly": false, "type": "boolean"}, "hardware.nvidiaOptimus.disable": {"declarations": ["nixos/modules/services/hardware/nvidia-optimus.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Completely disable the NVIDIA graphics card and use the\nintegrated graphics processor instead.\n"}, "loc": ["hardware", "nvidiaOptimus", "disable"], "readOnly": false, "type": "boolean"}, "hardware.onlykey.enable": {"declarations": ["nixos/modules/hardware/onlykey/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable OnlyKey device (https://crp.to/p/) support.\n"}, "loc": ["hardware", "onlykey", "enable"], "readOnly": false, "type": "boolean"}, "hardware.opengl.driSupport": {"declarations": ["nixos/modules/hardware/opengl.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable accelerated OpenGL rendering through the\nDirect Rendering Interface (DRI).\n"}, "loc": ["hardware", "opengl", "driSupport"], "readOnly": false, "type": "boolean"}, "hardware.opengl.driSupport32Bit": {"declarations": ["nixos/modules/hardware/opengl.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "On 64-bit systems, whether to support Direct Rendering for\n32-bit applications (such as Wine).  This is currently only\nsupported for the `nvidia` as well as\n`Mesa`.\n"}, "loc": ["hardware", "opengl", "driSupport32Bit"], "readOnly": false, "type": "boolean"}, "hardware.opengl.enable": {"declarations": ["nixos/modules/hardware/opengl.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OpenGL drivers. This is needed to enable\nOpenGL support in X11 systems, as well as for Wayland compositors\nlike sway and Weston. It is enabled by default\nby the corresponding modules, so you do not usually have to\nset it yourself, only if there is no module for your wayland\ncompositor of choice. See services.xserver.enable and\nprograms.sway.enable.\n"}, "loc": ["hardware", "opengl", "enable"], "readOnly": false, "type": "boolean"}, "hardware.opengl.extraPackages": {"declarations": ["nixos/modules/hardware/opengl.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional packages to add to OpenGL drivers.\nThis can be used to add OpenCL drivers, VA-API/VDPAU drivers etc.\n\n::: {.note}\nintel-media-driver supports hardware Broadwell (2014) or newer. Older hardware should use the mostly unmaintained vaapiIntel driver.\n:::\n"}, "example": {"_type": "literalExpression", "text": "with pkgs; [ intel-media-driver intel-ocl vaapiIntel ]"}, "loc": ["hardware", "opengl", "extraPackages"], "readOnly": false, "type": "list of package"}, "hardware.opengl.extraPackages32": {"declarations": ["nixos/modules/hardware/opengl.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional packages to add to 32-bit OpenGL drivers on 64-bit systems.\nUsed when {option}`driSupport32Bit` is set. This can be used to add OpenCL drivers, VA-API/VDPAU drivers etc.\n\n::: {.note}\nintel-media-driver supports hardware Broadwell (2014) or newer. Older hardware should use the mostly unmaintained vaapiIntel driver.\n:::\n"}, "example": {"_type": "literalExpression", "text": "with pkgs.pkgsi686Linux; [ intel-media-driver vaapiIntel ]"}, "loc": ["hardware", "opengl", "extraPackages32"], "readOnly": false, "type": "list of package"}, "hardware.openrazer.devicesOffOnScreensaver": {"declarations": ["nixos/modules/hardware/openrazer.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Turn off the devices when the systems screensaver kicks in.\n"}, "loc": ["hardware", "openrazer", "devicesOffOnScreensaver"], "readOnly": false, "type": "boolean"}, "hardware.openrazer.enable": {"declarations": ["nixos/modules/hardware/openrazer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OpenRazer drivers and userspace daemon.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "openrazer", "enable"], "readOnly": false, "type": "boolean"}, "hardware.openrazer.keyStatistics": {"declarations": ["nixos/modules/hardware/openrazer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collects number of keypresses per hour per key used to\ngenerate a heatmap.\n"}, "loc": ["hardware", "openrazer", "keyStatistics"], "readOnly": false, "type": "boolean"}, "hardware.openrazer.mouseBatteryNotifier": {"declarations": ["nixos/modules/hardware/openrazer.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Mouse battery notifier.\n"}, "loc": ["hardware", "openrazer", "mouseBatteryNotifier"], "readOnly": false, "type": "boolean"}, "hardware.openrazer.syncEffectsEnabled": {"declarations": ["nixos/modules/hardware/openrazer.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Set the sync effects flag to true so any assignment of\neffects will work across devices.\n"}, "loc": ["hardware", "openrazer", "syncEffectsEnabled"], "readOnly": false, "type": "boolean"}, "hardware.openrazer.users": {"declarations": ["nixos/modules/hardware/openrazer.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Usernames to be added to the \"openrazer\" group, so that they\ncan start and interact with the OpenRazer userspace daemon.\n"}, "loc": ["hardware", "openrazer", "users"], "readOnly": false, "type": "list of string"}, "hardware.openrazer.verboseLogging": {"declarations": ["nixos/modules/hardware/openrazer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable verbose logging. Logs debug messages.\n"}, "loc": ["hardware", "openrazer", "verboseLogging"], "readOnly": false, "type": "boolean"}, "hardware.opentabletdriver.blacklistedKernelModules": {"declarations": ["nixos/modules/hardware/opentabletdriver.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"hid-uclogic\"\n  \"wacom\"\n]"}, "description": {"_type": "mdDoc", "text": "Blacklist of kernel modules known to conflict with OpenTabletDriver.\n"}, "loc": ["hardware", "opentabletdriver", "blacklistedKernelModules"], "readOnly": false, "type": "list of string"}, "hardware.opentabletdriver.daemon.enable": {"declarations": ["nixos/modules/hardware/opentabletdriver.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to start OpenTabletDriver daemon as a systemd user service.\n"}, "loc": ["hardware", "opentabletdriver", "daemon", "enable"], "readOnly": false, "type": "boolean"}, "hardware.opentabletdriver.enable": {"declarations": ["nixos/modules/hardware/opentabletdriver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable OpenTabletDriver udev rules, user service and blacklist kernel\nmodules known to conflict with OpenTabletDriver.\n"}, "loc": ["hardware", "opentabletdriver", "enable"], "readOnly": false, "type": "boolean"}, "hardware.opentabletdriver.package": {"declarations": ["nixos/modules/hardware/opentabletdriver.nix"], "default": {"_type": "literalExpression", "text": "pkgs.opentabletdriver"}, "description": {"_type": "mdDoc", "text": "OpenTabletDriver derivation to use.\n"}, "loc": ["hardware", "opentabletdriver", "package"], "readOnly": false, "type": "package"}, "hardware.parallels.autoMountShares": {"declarations": ["nixos/modules/virtualisation/parallels-guest.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Control prlfsmountd service. When this service is running, shares can not be manually\nmounted through `mount -t prl_fs ...` as this service will remount and trample any set options.\nRecommended to enable for simple file sharing, but extended share use such as for code should\ndisable this to manually mount shares.\n"}, "loc": ["hardware", "parallels", "autoMountShares"], "readOnly": false, "type": "boolean"}, "hardware.parallels.enable": {"declarations": ["nixos/modules/virtualisation/parallels-guest.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This enables Parallels Tools for Linux guests, along with provided\nvideo, mouse and other hardware drivers.\n"}, "loc": ["hardware", "parallels", "enable"], "readOnly": false, "type": "boolean"}, "hardware.parallels.package": {"declarations": ["nixos/modules/virtualisation/parallels-guest.nix"], "default": {"_type": "literalExpression", "text": "\"config.boot.kernelPackages.prl-tools\""}, "description": {"_type": "mdDoc", "text": "Defines which package to use for prl-tools. Override to change the version.\n"}, "example": {"_type": "literalExpression", "text": "config.boot.kernelPackages.prl-tools"}, "loc": ["hardware", "parallels", "package"], "readOnly": false, "type": "null or package"}, "hardware.pcmcia.config": {"declarations": ["nixos/modules/hardware/pcmcia.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the configuration file which maps the memory, IRQs\nand ports used by the PCMCIA hardware.\n"}, "loc": ["hardware", "pcmcia", "config"], "readOnly": false, "type": "null or path"}, "hardware.pcmcia.enable": {"declarations": ["nixos/modules/hardware/pcmcia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable this option to support PCMCIA card.\n"}, "loc": ["hardware", "pcmcia", "enable"], "readOnly": false, "type": "boolean"}, "hardware.pcmcia.firmware": {"declarations": ["nixos/modules/hardware/pcmcia.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of firmware used to handle specific PCMCIA card.\n"}, "loc": ["hardware", "pcmcia", "firmware"], "readOnly": false, "type": "list of path"}, "hardware.printers.ensureDefaultPrinter": {"declarations": ["nixos/modules/hardware/printers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Ensures the named printer is the default CUPS printer / printer queue.\n"}, "loc": ["hardware", "printers", "ensureDefaultPrinter"], "readOnly": false, "type": "null or printable string without spaces, # and /"}, "hardware.printers.ensurePrinters": {"declarations": ["nixos/modules/hardware/printers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Will regularly ensure that the given CUPS printers are configured as declared here.\nIf a printer's options are manually changed afterwards, they will be overwritten eventually.\nThis option will never delete any printer, even if removed from this list.\nYou can check existing printers with {command}`lpstat -s`\nand remove printers with {command}`lpadmin -x <printer-name>`.\nPrinters not listed here can still be manually configured.\n"}, "loc": ["hardware", "printers", "ensurePrinters"], "readOnly": false, "type": "list of (submodule)"}, "hardware.printers.ensurePrinters.*.description": {"declarations": ["nixos/modules/hardware/printers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional human-readable description.\n"}, "example": {"_type": "literalExpression", "text": "\"Brother HL-5140\""}, "loc": ["hardware", "printers", "ensurePrinters", "*", "description"], "readOnly": false, "type": "null or string"}, "hardware.printers.ensurePrinters.*.deviceUri": {"declarations": ["nixos/modules/hardware/printers.nix"], "description": {"_type": "mdDoc", "text": "How to reach the printer.\n{command}`lpinfo -v` shows a list of supported device URIs and schemes.\n"}, "example": {"_type": "literalExpression", "text": "\"ipp://printserver.local/printers/BrotherHL_Workroom\"\n\"usb://HP/DESKJET%20940C?serial=CN16E6C364BH\"\n"}, "loc": ["hardware", "printers", "ensurePrinters", "*", "deviceUri"], "readOnly": false, "type": "string"}, "hardware.printers.ensurePrinters.*.location": {"declarations": ["nixos/modules/hardware/printers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional human-readable location.\n"}, "example": {"_type": "literalExpression", "text": "\"Workroom\""}, "loc": ["hardware", "printers", "ensurePrinters", "*", "location"], "readOnly": false, "type": "null or string"}, "hardware.printers.ensurePrinters.*.model": {"declarations": ["nixos/modules/hardware/printers.nix"], "description": {"_type": "mdDoc", "text": "Location of the ppd driver file for the printer.\n{command}`lpinfo -m` shows a list of supported models.\n"}, "example": {"_type": "literalExpression", "text": "\"gutenprint.${lib.versions.majorMinor (lib.getVersion pkgs.gutenprint)}://brother-hl-5140/expert\"\n"}, "loc": ["hardware", "printers", "ensurePrinters", "*", "model"], "readOnly": false, "type": "string"}, "hardware.printers.ensurePrinters.*.name": {"declarations": ["nixos/modules/hardware/printers.nix"], "description": {"_type": "mdDoc", "text": "Name of the printer / printer queue.\nMay contain any printable characters except \"/\", \"#\", and space.\n"}, "example": {"_type": "literalExpression", "text": "\"BrotherHL_Workroom\""}, "loc": ["hardware", "printers", "ensurePrinters", "*", "name"], "readOnly": false, "type": "printable string without spaces, # and /"}, "hardware.printers.ensurePrinters.*.ppdOptions": {"declarations": ["nixos/modules/hardware/printers.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Sets PPD options for the printer.\n{command}`lpoptions [-p printername] -l` shows supported PPD options for the given printer.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Duplex = \"DuplexNoTumble\";\n  PageSize = \"A4\";\n}"}, "loc": ["hardware", "printers", "ensurePrinters", "*", "ppdOptions"], "readOnly": false, "type": "attribute set of string"}, "hardware.pulseaudio.configFile": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "description": {"_type": "mdDoc", "text": "The path to the default configuration options the PulseAudio server\nshould use. By default, the \"default.pa\" configuration\nfrom the PulseAudio distribution is used.\n"}, "loc": ["hardware", "pulseaudio", "configFile"], "readOnly": false, "type": "null or path"}, "hardware.pulseaudio.daemon.config": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Config of the pulse daemon. See `man pulse-daemon.conf`."}, "example": {"_type": "literalExpression", "text": "{ realtime-scheduling = \"yes\"; }"}, "loc": ["hardware", "pulseaudio", "daemon", "config"], "readOnly": false, "type": "attribute set of unspecified value"}, "hardware.pulseaudio.daemon.logLevel": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "\"notice\""}, "description": {"_type": "mdDoc", "text": "The log level that the system-wide pulseaudio daemon should use,\nif activated.\n"}, "loc": ["hardware", "pulseaudio", "daemon", "logLevel"], "readOnly": false, "type": "string"}, "hardware.pulseaudio.enable": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the PulseAudio sound server.\n"}, "loc": ["hardware", "pulseaudio", "enable"], "readOnly": false, "type": "boolean"}, "hardware.pulseaudio.extraClientConf": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration appended to pulse/client.conf file.\n"}, "loc": ["hardware", "pulseaudio", "extraClientConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "hardware.pulseaudio.extraConfig": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Literal string to append to `configFile`\nand the config file generated by the pulseaudio module.\n"}, "loc": ["hardware", "pulseaudio", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "hardware.pulseaudio.extraModules": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra pulseaudio modules to use. This is intended for out-of-tree\npulseaudio modules like extra bluetooth codecs.\n\nExtra modules take precedence over built-in pulseaudio modules.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.pulseaudio-modules-bt ]"}, "loc": ["hardware", "pulseaudio", "extraModules"], "readOnly": false, "type": "list of package"}, "hardware.pulseaudio.package": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "pkgs.pulseaudio"}, "description": {"_type": "mdDoc", "text": "The PulseAudio derivation to use.  This can be used to enable\nfeatures (such as JACK support, Bluetooth) via the\n`pulseaudioFull` package.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.pulseaudioFull"}, "loc": ["hardware", "pulseaudio", "package"], "readOnly": false, "type": "package"}, "hardware.pulseaudio.support32Bit": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to include the 32-bit pulseaudio libraries in the system or not.\nThis is only useful on 64-bit systems and currently limited to x86_64-linux.\n"}, "loc": ["hardware", "pulseaudio", "support32Bit"], "readOnly": false, "type": "boolean"}, "hardware.pulseaudio.systemWide": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If false, a PulseAudio server is launched automatically for\neach user that tries to use the sound system. The server runs\nwith user privileges. If true, one system-wide PulseAudio\nserver is launched on boot, running as the user \"pulse\", and\nonly users in the \"pulse-access\" group will have access to the server.\nPlease read the PulseAudio documentation for more details.\n\nDon't enable this option unless you know what you are doing.\n"}, "loc": ["hardware", "pulseaudio", "systemWide"], "readOnly": false, "type": "boolean"}, "hardware.pulseaudio.tcp.anonymousClients.allowAll": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable all anonymous clients to stream to the server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "pulseaudio", "tcp", "anonymousClients", "allowAll"], "readOnly": false, "type": "boolean"}, "hardware.pulseaudio.tcp.anonymousClients.allowedIpRanges": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of IP subnets that are allowed to stream to the server.\n"}, "example": {"_type": "literalExpression", "text": "[ \"127.0.0.1\" \"192.168.1.0/24\" ]"}, "loc": ["hardware", "pulseaudio", "tcp", "anonymousClients", "allowedIpRanges"], "readOnly": false, "type": "list of string"}, "hardware.pulseaudio.tcp.enable": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable tcp streaming support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "pulseaudio", "tcp", "enable"], "readOnly": false, "type": "boolean"}, "hardware.pulseaudio.zeroconf.discovery.enable": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable discovery of pulseaudio sinks in the local network."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "pulseaudio", "zeroconf", "discovery", "enable"], "readOnly": false, "type": "boolean"}, "hardware.pulseaudio.zeroconf.publish.enable": {"declarations": ["nixos/modules/config/pulseaudio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable publishing the pulseaudio sink in the local network."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "pulseaudio", "zeroconf", "publish", "enable"], "readOnly": false, "type": "boolean"}, "hardware.raid.HPSmartArray.enable": {"declarations": ["nixos/modules/hardware/raid/hpsa.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HP Smart Array kernel modules and CLI utility."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "raid", "HPSmartArray", "enable"], "readOnly": false, "type": "boolean"}, "hardware.rasdaemon.config": {"declarations": ["nixos/modules/services/hardware/rasdaemon.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "rasdaemon configuration, currently only used for CE PFA\nfor details, read rasdaemon.outPath/etc/sysconfig/rasdaemon's comments\n"}, "example": {"_type": "literalExpression", "text": "''\n  # defaults from included config\n  PAGE_CE_REFRESH_CYCLE=\"24h\"\n  PAGE_CE_THRESHOLD=\"50\"\n  PAGE_CE_ACTION=\"soft\"\n''"}, "loc": ["hardware", "rasdaemon", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "hardware.rasdaemon.enable": {"declarations": ["nixos/modules/services/hardware/rasdaemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable RAS logging daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "rasdaemon", "enable"], "readOnly": false, "type": "boolean"}, "hardware.rasdaemon.extraModules": {"declarations": ["nixos/modules/services/hardware/rasdaemon.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "extra kernel modules to load"}, "example": {"_type": "literalExpression", "text": "[\n  \"i7core_edac\"\n]"}, "loc": ["hardware", "rasdaemon", "extraModules"], "readOnly": false, "type": "list of string"}, "hardware.rasdaemon.labels": {"declarations": ["nixos/modules/services/hardware/rasdaemon.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional memory module label descriptions to be placed in /etc/ras/dimm_labels.d/labels"}, "example": {"_type": "literalExpression", "text": "''\n  # vendor and model may be shown by 'ras-mc-ctl --mainboard'\n  vendor: ASRock\n    product: To Be Filled By O.E.M.\n    model: B450M Pro4\n      # these labels are names for the motherboard slots\n      # the numbers may be shown by `ras-mc-ctl --error-count`\n      # they are mc:csrow:channel\n      DDR4_A1: 0.2.0;  DDR4_B1: 0.2.1;\n      DDR4_A2: 0.3.0;  DDR4_B2: 0.3.1;\n''"}, "loc": ["hardware", "rasdaemon", "labels"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "hardware.rasdaemon.mainboard": {"declarations": ["nixos/modules/services/hardware/rasdaemon.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Custom mainboard description, see {manpage}`ras-mc-ctl(8)` for more details."}, "example": {"_type": "literalExpression", "text": "''\n  vendor = ASRock\n  model = B450M Pro4\n  \n  # it should default to such values from\n  # /sys/class/dmi/id/board_[vendor|name]\n  # alternatively one can supply a script\n  # that returns the same format as above\n  \n  script = <path to script>\n''"}, "loc": ["hardware", "rasdaemon", "mainboard"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "hardware.rasdaemon.record": {"declarations": ["nixos/modules/services/hardware/rasdaemon.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "record events via sqlite3, required for ras-mc-ctl"}, "loc": ["hardware", "rasdaemon", "record"], "readOnly": false, "type": "boolean"}, "hardware.rasdaemon.testing": {"declarations": ["nixos/modules/services/hardware/rasdaemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable error injection infrastructure."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "rasdaemon", "testing"], "readOnly": false, "type": "boolean"}, "hardware.rtl-sdr.enable": {"declarations": ["nixos/modules/hardware/rtl-sdr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables rtl-sdr udev rules, ensures 'plugdev' group exists, and blacklists DVB kernel modules.\nThis is a prerequisite to using devices supported by rtl-sdr without being root, since rtl-sdr USB descriptors will be owned by plugdev through udev.\n"}, "loc": ["hardware", "rtl-sdr", "enable"], "readOnly": false, "type": "boolean"}, "hardware.saleae-logic.enable": {"declarations": ["nixos/modules/hardware/saleae-logic.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable udev rules for Saleae Logic devices."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "saleae-logic", "enable"], "readOnly": false, "type": "boolean"}, "hardware.saleae-logic.package": {"declarations": ["nixos/modules/hardware/saleae-logic.nix"], "default": {"_type": "literalExpression", "text": "pkgs.saleae-logic-2"}, "description": {"_type": "mdDoc", "text": "Saleae Logic package to use.\n"}, "loc": ["hardware", "saleae-logic", "package"], "readOnly": false, "type": "package"}, "hardware.sane.brscan4.enable": {"declarations": ["nixos/modules/services/hardware/sane_extra_backends/brscan4.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When enabled, will automatically register the \"brscan4\" sane\nbackend and bring configuration files to their expected location.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "sane", "brscan4", "enable"], "readOnly": false, "type": "boolean"}, "hardware.sane.brscan4.netDevices": {"declarations": ["nixos/modules/services/hardware/sane_extra_backends/brscan4.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The list of network devices that will be registered against the brscan4\nsane backend.\n"}, "example": {"_type": "literalExpression", "text": "{\n  office1 = {\n    ip = \"192.168.1.2\";\n    model = \"MFC-7860DW\";\n  };\n  office2 = {\n    model = \"MFC-7860DW\";\n    nodename = \"BRW0080927AFBCE\";\n  };\n}"}, "loc": ["hardware", "sane", "brscan4", "netDevices"], "readOnly": false, "type": "attribute set of (submodule)"}, "hardware.sane.brscan4.netDevices.<name>.ip": {"declarations": ["nixos/modules/services/hardware/sane_extra_backends/brscan4.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The ip address of the device. If undefined, you will have to\nprovide a nodename.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.1.2\""}, "loc": ["hardware", "sane", "brscan4", "netDevices", "<name>", "ip"], "readOnly": false, "type": "null or string"}, "hardware.sane.brscan4.netDevices.<name>.model": {"declarations": ["nixos/modules/services/hardware/sane_extra_backends/brscan4.nix"], "description": {"_type": "mdDoc", "text": "The model of the network device.\n"}, "example": {"_type": "literalExpression", "text": "\"MFC-7860DW\""}, "loc": ["hardware", "sane", "brscan4", "netDevices", "<name>", "model"], "readOnly": false, "type": "string"}, "hardware.sane.brscan4.netDevices.<name>.name": {"declarations": ["nixos/modules/services/hardware/sane_extra_backends/brscan4.nix"], "description": {"_type": "mdDoc", "text": "The friendly name you give to the network device. If undefined,\nthe name of attribute will be used.\n"}, "example": {"_type": "literalExpression", "text": "\"office1\""}, "loc": ["hardware", "sane", "brscan4", "netDevices", "<name>", "name"], "readOnly": false, "type": "string"}, "hardware.sane.brscan4.netDevices.<name>.nodename": {"declarations": ["nixos/modules/services/hardware/sane_extra_backends/brscan4.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The node name of the device. If undefined, you will have to\nprovide an ip.\n"}, "example": {"_type": "literalExpression", "text": "\"BRW0080927AFBCE\""}, "loc": ["hardware", "sane", "brscan4", "netDevices", "<name>", "nodename"], "readOnly": false, "type": "null or string"}, "hardware.sane.brscan5.enable": {"declarations": ["nixos/modules/services/hardware/sane_extra_backends/brscan5.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Brother brscan5 sane backend."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "sane", "brscan5", "enable"], "readOnly": false, "type": "boolean"}, "hardware.sane.brscan5.netDevices": {"declarations": ["nixos/modules/services/hardware/sane_extra_backends/brscan5.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The list of network devices that will be registered against the brscan5\nsane backend.\n"}, "example": {"_type": "literalExpression", "text": "{\n  office1 = {\n    ip = \"192.168.1.2\";\n    model = \"MFC-7860DW\";\n  };\n  office2 = {\n    model = \"MFC-7860DW\";\n    nodename = \"BRW0080927AFBCE\";\n  };\n}"}, "loc": ["hardware", "sane", "brscan5", "netDevices"], "readOnly": false, "type": "attribute set of (submodule)"}, "hardware.sane.brscan5.netDevices.<name>.ip": {"declarations": ["nixos/modules/services/hardware/sane_extra_backends/brscan5.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The ip address of the device. If undefined, you will have to\nprovide a nodename.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.1.2\""}, "loc": ["hardware", "sane", "brscan5", "netDevices", "<name>", "ip"], "readOnly": false, "type": "null or string"}, "hardware.sane.brscan5.netDevices.<name>.model": {"declarations": ["nixos/modules/services/hardware/sane_extra_backends/brscan5.nix"], "description": {"_type": "mdDoc", "text": "The model of the network device.\n"}, "example": {"_type": "literalExpression", "text": "\"ADS-1200\""}, "loc": ["hardware", "sane", "brscan5", "netDevices", "<name>", "model"], "readOnly": false, "type": "string"}, "hardware.sane.brscan5.netDevices.<name>.name": {"declarations": ["nixos/modules/services/hardware/sane_extra_backends/brscan5.nix"], "description": {"_type": "mdDoc", "text": "The friendly name you give to the network device. If undefined,\nthe name of attribute will be used.\n"}, "example": {"_type": "literalExpression", "text": "\"office1\""}, "loc": ["hardware", "sane", "brscan5", "netDevices", "<name>", "name"], "readOnly": false, "type": "string"}, "hardware.sane.brscan5.netDevices.<name>.nodename": {"declarations": ["nixos/modules/services/hardware/sane_extra_backends/brscan5.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The node name of the device. If undefined, you will have to\nprovide an ip.\n"}, "example": {"_type": "literalExpression", "text": "\"BRW0080927AFBCE\""}, "loc": ["hardware", "sane", "brscan5", "netDevices", "<name>", "nodename"], "readOnly": false, "type": "null or string"}, "hardware.sane.disabledDefaultBackends": {"declarations": ["nixos/modules/services/hardware/sane.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Names of backends which are enabled by default but should be disabled.\nSee `$SANE_CONFIG_DIR/dll.conf` for the list of possible names.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"v4l\"\n]"}, "loc": ["hardware", "sane", "disabledDefaultBackends"], "readOnly": false, "type": "list of string"}, "hardware.sane.drivers.scanSnap.enable": {"declarations": ["nixos/modules/services/hardware/sane.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable drivers for the Fujitsu ScanSnap scanners.\n\nThe driver files are unfree and extracted from the Windows driver image.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "sane", "drivers", "scanSnap", "enable"], "readOnly": false, "type": "boolean"}, "hardware.sane.drivers.scanSnap.package": {"declarations": ["nixos/modules/services/hardware/sane.nix"], "default": {"_type": "literalExpression", "text": "pkgs.sane-drivers.epjitsu"}, "description": {"_type": "mdDoc", "text": "Epjitsu driver package to use. Useful if you want to extract the driver files yourself.\n\nThe process is described in the `/etc/sane.d/epjitsu.conf` file in\nthe `sane-backends` package.\n"}, "loc": ["hardware", "sane", "drivers", "scanSnap", "package"], "readOnly": false, "type": "package"}, "hardware.sane.dsseries.enable": {"declarations": ["nixos/modules/services/hardware/sane_extra_backends/dsseries.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When enabled, will automatically register the \"dsseries\" SANE backend.\n\nThis supports the Brother DSmobile scanner series, including the\nDS-620, DS-720D, DS-820W, and DS-920DW scanners.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "sane", "dsseries", "enable"], "readOnly": false, "type": "boolean"}, "hardware.sane.enable": {"declarations": ["nixos/modules/services/hardware/sane.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable support for SANE scanners.\n\n::: {.note}\nUsers in the \"scanner\" group will gain access to the scanner, or the \"lp\" group if it's also a printer.\n:::\n"}, "loc": ["hardware", "sane", "enable"], "readOnly": false, "type": "boolean"}, "hardware.sane.extraBackends": {"declarations": ["nixos/modules/services/hardware/sane.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages providing extra SANE backends to enable.\n\n::: {.note}\nThe example contains the package for HP scanners, and the package for\nApple AirScan and Microsoft WSD support (supports many\nvendors/devices).\n:::\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.hplipWithPlugin pkgs.sane-airscan ]"}, "loc": ["hardware", "sane", "extraBackends"], "readOnly": false, "type": "list of path"}, "hardware.sane.netConf": {"declarations": ["nixos/modules/services/hardware/sane.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Network hosts that should be probed for remote scanners.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.0.16\""}, "loc": ["hardware", "sane", "netConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "hardware.sane.openFirewall": {"declarations": ["nixos/modules/services/hardware/sane.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports needed for discovery of scanners on the local network, e.g.\nneeded for Canon scanners (BJNP protocol).\n"}, "loc": ["hardware", "sane", "openFirewall"], "readOnly": false, "type": "boolean"}, "hardware.sane.snapshot": {"declarations": ["nixos/modules/services/hardware/sane.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use a development snapshot of SANE scanner drivers."}, "loc": ["hardware", "sane", "snapshot"], "readOnly": false, "type": "boolean"}, "hardware.sata.timeout.deciSeconds": {"declarations": ["nixos/modules/hardware/sata.nix"], "description": {"_type": "mdDoc", "text": "Set SCT Error Recovery Control timeout in deciseconds for use in RAID configurations.\n\nValues are as follows:\n   0 = disable SCT ERT\n  70 = default in consumer drives (7 seconds)\n\nMaximum is disk dependant but probably 60 seconds.\n"}, "example": {"_type": "literalExpression", "text": "70"}, "loc": ["hardware", "sata", "timeout", "deciSeconds"], "readOnly": false, "type": "signed integer"}, "hardware.sata.timeout.drives": {"declarations": ["nixos/modules/hardware/sata.nix"], "description": {"_type": "mdDoc", "text": "List of drives for which to configure the timeout."}, "loc": ["hardware", "sata", "timeout", "drives"], "readOnly": false, "type": "list of (submodule)"}, "hardware.sata.timeout.drives.*.idBy": {"declarations": ["nixos/modules/hardware/sata.nix"], "default": {"_type": "literalExpression", "text": "\"path\""}, "description": {"_type": "mdDoc", "text": "The method to identify the drive."}, "loc": ["hardware", "sata", "timeout", "drives", "*", "idBy"], "readOnly": false, "type": "one of \"path\", \"wwn\""}, "hardware.sata.timeout.drives.*.name": {"declarations": ["nixos/modules/hardware/sata.nix"], "description": {"_type": "mdDoc", "text": "Drive name without the full path."}, "loc": ["hardware", "sata", "timeout", "drives", "*", "name"], "readOnly": false, "type": "string"}, "hardware.sata.timeout.enable": {"declarations": ["nixos/modules/hardware/sata.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SATA drive timeouts."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "sata", "timeout", "enable"], "readOnly": false, "type": "boolean"}, "hardware.sensor.hddtemp.dbEntries": {"declarations": ["nixos/modules/hardware/sensor/hddtemp.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional DB entries"}, "loc": ["hardware", "sensor", "hddtemp", "dbEntries"], "readOnly": false, "type": "list of string"}, "hardware.sensor.hddtemp.drives": {"declarations": ["nixos/modules/hardware/sensor/hddtemp.nix"], "description": {"_type": "mdDoc", "text": "List of drives to monitor. If you pass /dev/disk/by-path/* entries the symlinks will be resolved as hddtemp doesn't like names with colons."}, "loc": ["hardware", "sensor", "hddtemp", "drives"], "readOnly": false, "type": "list of string"}, "hardware.sensor.hddtemp.enable": {"declarations": ["nixos/modules/hardware/sensor/hddtemp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable this option to support HDD/SSD temperature sensors.\n"}, "loc": ["hardware", "sensor", "hddtemp", "enable"], "readOnly": false, "type": "boolean"}, "hardware.sensor.hddtemp.extraArgs": {"declarations": ["nixos/modules/hardware/sensor/hddtemp.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional arguments passed to the daemon."}, "loc": ["hardware", "sensor", "hddtemp", "extraArgs"], "readOnly": false, "type": "list of string"}, "hardware.sensor.hddtemp.unit": {"declarations": ["nixos/modules/hardware/sensor/hddtemp.nix"], "default": {"_type": "literalExpression", "text": "\"C\""}, "description": {"_type": "mdDoc", "text": "Celsius or Fahrenheit"}, "loc": ["hardware", "sensor", "hddtemp", "unit"], "readOnly": false, "type": "one of \"C\", \"F\""}, "hardware.sensor.iio.enable": {"declarations": ["nixos/modules/hardware/sensor/iio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable this option to support IIO sensors with iio-sensor-proxy.\n\nIIO sensors are used for orientation and ambient light\nsensors on some mobile devices.\n"}, "loc": ["hardware", "sensor", "iio", "enable"], "readOnly": false, "type": "boolean"}, "hardware.spacenavd.enable": {"declarations": ["nixos/modules/services/hardware/spacenavd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable spacenavd to support 3DConnexion devices."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "spacenavd", "enable"], "readOnly": false, "type": "boolean"}, "hardware.steam-hardware.enable": {"declarations": ["nixos/modules/hardware/steam-hardware.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable udev rules for Steam hardware such as the Steam Controller, other supported controllers and the HTC Vive"}, "loc": ["hardware", "steam-hardware", "enable"], "readOnly": false, "type": "boolean"}, "hardware.system76.enableAll": {"declarations": ["nixos/modules/hardware/system-76.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable all recommended configuration for system76 systems."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "system76", "enableAll"], "readOnly": false, "type": "boolean"}, "hardware.system76.firmware-daemon.enable": {"declarations": ["nixos/modules/hardware/system-76.nix"], "default": {"_type": "literalExpression", "text": "config.hardware.system76.enableAll"}, "description": {"_type": "mdDoc", "text": "Whether to enable the system76 firmware daemon"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "system76", "firmware-daemon", "enable"], "readOnly": false, "type": "boolean"}, "hardware.system76.kernel-modules.enable": {"declarations": ["nixos/modules/hardware/system-76.nix"], "default": {"_type": "literalExpression", "text": "config.hardware.system76.enableAll"}, "description": {"_type": "mdDoc", "text": "Whether to make the system76 out-of-tree kernel modules available"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "system76", "kernel-modules", "enable"], "readOnly": false, "type": "boolean"}, "hardware.system76.power-daemon.enable": {"declarations": ["nixos/modules/hardware/system-76.nix"], "default": {"_type": "literalExpression", "text": "config.hardware.system76.enableAll"}, "description": {"_type": "mdDoc", "text": "Whether to enable the system76 power daemon"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "system76", "power-daemon", "enable"], "readOnly": false, "type": "boolean"}, "hardware.trackpoint.device": {"declarations": ["nixos/modules/tasks/trackpoint.nix"], "default": {"_type": "literalExpression", "text": "\"TPPS/2 IBM TrackPoint\""}, "description": {"_type": "mdDoc", "text": "The device name of the trackpoint. You can check with xinput.\nSome newer devices (example x1c6) use \"TPPS/2 Elan TrackPoint\".\n"}, "loc": ["hardware", "trackpoint", "device"], "readOnly": false, "type": "string"}, "hardware.trackpoint.emulateWheel": {"declarations": ["nixos/modules/tasks/trackpoint.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable scrolling while holding the middle mouse button.\n"}, "loc": ["hardware", "trackpoint", "emulateWheel"], "readOnly": false, "type": "boolean"}, "hardware.trackpoint.enable": {"declarations": ["nixos/modules/tasks/trackpoint.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable sensitivity and speed configuration for trackpoints.\n"}, "loc": ["hardware", "trackpoint", "enable"], "readOnly": false, "type": "boolean"}, "hardware.trackpoint.fakeButtons": {"declarations": ["nixos/modules/tasks/trackpoint.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Switch to \"bare\" PS/2 mouse support in case Trackpoint buttons are not recognized\nproperly. This can happen for example on models like the L430, T450, T450s, on\nwhich the Trackpoint buttons are actually a part of the Synaptics touchpad.\n"}, "loc": ["hardware", "trackpoint", "fakeButtons"], "readOnly": false, "type": "boolean"}, "hardware.trackpoint.sensitivity": {"declarations": ["nixos/modules/tasks/trackpoint.nix"], "default": {"_type": "literalExpression", "text": "128"}, "description": {"_type": "mdDoc", "text": "Configure the trackpoint sensitivity. By default, the kernel\nconfigures 128.\n"}, "example": {"_type": "literalExpression", "text": "255"}, "loc": ["hardware", "trackpoint", "sensitivity"], "readOnly": false, "type": "signed integer"}, "hardware.trackpoint.speed": {"declarations": ["nixos/modules/tasks/trackpoint.nix"], "default": {"_type": "literalExpression", "text": "97"}, "description": {"_type": "mdDoc", "text": "Configure the trackpoint speed. By default, the kernel\nconfigures 97.\n"}, "example": {"_type": "literalExpression", "text": "255"}, "loc": ["hardware", "trackpoint", "speed"], "readOnly": false, "type": "signed integer"}, "hardware.tuxedo-keyboard.enable": {"declarations": ["nixos/modules/hardware/tuxedo-keyboard.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Enables the tuxedo-keyboard driver.\n\nTo configure the driver, pass the options to the {option}`boot.kernelParams` configuration.\nThere are several parameters you can change. It's best to check at the source code description which options are supported.\nYou can find all the supported parameters at: <https://github.com/tuxedocomputers/tuxedo-keyboard#kernelparam>\n\nIn order to use the `custom` lighting with the maximumg brightness and a color of `0xff0a0a` one would put pass {option}`boot.kernelParams` like this:\n\n```\nboot.kernelParams = [\n \"tuxedo_keyboard.mode=0\"\n \"tuxedo_keyboard.brightness=255\"\n \"tuxedo_keyboard.color_left=0xff0a0a\"\n];\n```\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "tuxedo-keyboard", "enable"], "readOnly": false, "type": "boolean"}, "hardware.ubertooth.enable": {"declarations": ["nixos/modules/hardware/ubertooth.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ubertooth software and its udev rules."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "ubertooth", "enable"], "readOnly": false, "type": "boolean"}, "hardware.ubertooth.group": {"declarations": ["nixos/modules/hardware/ubertooth.nix"], "default": {"_type": "literalExpression", "text": "\"ubertooth\""}, "description": {"_type": "mdDoc", "text": "Group for Ubertooth's udev rules."}, "example": {"_type": "literalExpression", "text": "\"wheel\""}, "loc": ["hardware", "ubertooth", "group"], "readOnly": false, "type": "string"}, "hardware.uinput.enable": {"declarations": ["nixos/modules/hardware/uinput.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable uinput support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "uinput", "enable"], "readOnly": false, "type": "boolean"}, "hardware.usbStorage.manageStartStop": {"declarations": ["nixos/modules/hardware/usb-storage.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable this option to gracefully spin-down external storage during shutdown.\nIf you suspect improper head parking after poweroff, install `smartmontools` and check\nfor the `Power-Off_Retract_Count` field for an increment.\n"}, "loc": ["hardware", "usbStorage", "manageStartStop"], "readOnly": false, "type": "boolean"}, "hardware.usbWwan.enable": {"declarations": ["nixos/modules/hardware/usb-wwan.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable this option to support USB WWAN adapters.\n"}, "loc": ["hardware", "usbWwan", "enable"], "readOnly": false, "type": "boolean"}, "hardware.wirelessRegulatoryDatabase": {"declarations": ["nixos/modules/hardware/all-firmware.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Load the wireless regulatory database at boot.\n"}, "loc": ["hardware", "wirelessRegulatoryDatabase"], "readOnly": false, "type": "boolean"}, "hardware.wooting.enable": {"declarations": ["nixos/modules/hardware/wooting.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable support for Wooting keyboards."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "wooting", "enable"], "readOnly": false, "type": "boolean"}, "hardware.xone.enable": {"declarations": ["nixos/modules/hardware/xone.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the xone driver for Xbox One and Xbobx Series X|S accessories."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "xone", "enable"], "readOnly": false, "type": "boolean"}, "hardware.xpadneo.enable": {"declarations": ["nixos/modules/hardware/xpadneo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the xpadneo driver for Xbox One wireless controllers."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["hardware", "xpadneo", "enable"], "readOnly": false, "type": "boolean"}, "i18n.defaultLocale": {"declarations": ["nixos/modules/config/i18n.nix"], "default": {"_type": "literalExpression", "text": "\"en_US.UTF-8\""}, "description": {"_type": "mdDoc", "text": "The default locale.  It determines the language for program\nmessages, the format for dates and times, sort order, and so on.\nIt also determines the character set, such as UTF-8.\n"}, "example": {"_type": "literalExpression", "text": "\"nl_NL.UTF-8\""}, "loc": ["i18n", "defaultLocale"], "readOnly": false, "type": "string"}, "i18n.extraLocaleSettings": {"declarations": ["nixos/modules/config/i18n.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of additional system-wide locale settings other than\n`LANG` which can be configured with\n{option}`i18n.defaultLocale`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  LC_MESSAGES = \"en_US.UTF-8\";\n  LC_TIME = \"de_DE.UTF-8\";\n}"}, "loc": ["i18n", "extraLocaleSettings"], "readOnly": false, "type": "attribute set of string"}, "i18n.glibcLocales": {"declarations": ["nixos/modules/config/i18n.nix"], "default": {"_type": "literalExpression", "text": "pkgs.glibcLocales.override {\n  allLocales = any (x: x == \"all\") config.i18n.supportedLocales;\n  locales = config.i18n.supportedLocales;\n}\n"}, "description": {"_type": "mdDoc", "text": "Customized pkg.glibcLocales package.\n\nChanging this option can disable handling of i18n.defaultLocale\nand supportedLocale.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.glibcLocales"}, "loc": ["i18n", "glibcLocales"], "readOnly": false, "type": "path"}, "i18n.inputMethod.enabled": {"declarations": ["nixos/modules/i18n/input-method/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Select the enabled input method. Input methods is a software to input symbols that are not available on standard input devices.\n\nInput methods are specially used to input Chinese, Japanese and Korean characters.\n\nCurrently the following input methods are available in NixOS:\n\n- ibus: The intelligent input bus, extra input engines can be added using `i18n.inputMethod.ibus.engines`.\n- fcitx5: The next generation of fcitx, addons (including engines, dictionaries, skins) can be added using `i18n.inputMethod.fcitx5.addons`.\n- nabi: A Korean input method based on XIM. Nabi doesn't support Qt 5.\n- uim: The universal input method, is a library with a XIM bridge. uim mainly support Chinese, Japanese and Korean.\n- hime: An extremely easy-to-use input method framework.\n- kime: Koream IME.\n"}, "example": {"_type": "literalExpression", "text": "\"fcitx5\""}, "loc": ["i18n", "inputMethod", "enabled"], "readOnly": false, "type": "null or one of \"ibus\", \"fcitx5\", \"nabi\", \"uim\", \"hime\", \"kime\""}, "i18n.inputMethod.fcitx5.addons": {"declarations": ["nixos/modules/i18n/input-method/fcitx5.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Enabled Fcitx5 addons.\n"}, "example": {"_type": "literalExpression", "text": "with pkgs; [ fcitx5-rime ]"}, "loc": ["i18n", "inputMethod", "fcitx5", "addons"], "readOnly": false, "type": "list of package"}, "i18n.inputMethod.uim.toolbar": {"declarations": ["nixos/modules/i18n/input-method/uim.nix"], "default": {"_type": "literalExpression", "text": "\"gtk\""}, "description": {"_type": "mdDoc", "text": "selected UIM toolbar.\n"}, "example": {"_type": "literalExpression", "text": "\"gtk-systray\""}, "loc": ["i18n", "inputMethod", "uim", "toolbar"], "readOnly": false, "type": "one of \"gtk\", \"gtk3\", \"gtk-systray\", \"gtk3-systray\", \"qt4\""}, "i18n.supportedLocales": {"declarations": ["nixos/modules/config/i18n.nix"], "default": {"_type": "literalExpression", "text": "unique\n  (builtins.map (l: (replaceStrings [ \"utf8\" \"utf-8\" \"UTF8\" ] [ \"UTF-8\" \"UTF-8\" \"UTF-8\" ] l) + \"/UTF-8\") (\n    [\n      \"C.UTF-8\"\n      \"en_US.UTF-8\"\n      config.i18n.defaultLocale\n    ] ++ (attrValues (filterAttrs (n: v: n != \"LANGUAGE\") config.i18n.extraLocaleSettings))\n  ))\n"}, "description": {"_type": "mdDoc", "text": "List of locales that the system should support.  The value\n`\"all\"` means that all locales supported by\nGlibc will be installed.  A full list of supported locales\ncan be found at <https://sourceware.org/git/?p=glibc.git;a=blob;f=localedata/SUPPORTED>.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"en_US.UTF-8/UTF-8\"\n  \"nl_NL.UTF-8/UTF-8\"\n  \"nl_NL/ISO-8859-1\"\n]"}, "loc": ["i18n", "supportedLocales"], "readOnly": false, "type": "list of string"}, "krb5.appdefaults": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings used by some Kerberos V5 applications.\n"}, "example": {"_type": "literalExpression", "text": "{\n  pam = {\n    debug = false;\n    ticket_lifetime = 36000;\n    renew_lifetime = 36000;\n    max_timeout = 30;\n    timeout_shift = 2;\n    initial_timeout = 1;\n  };\n};\n"}, "loc": ["krb5", "appdefaults"], "readOnly": false, "type": "(attribute set) or strings concatenated with \"\\n\""}, "krb5.capaths": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Authentication paths for non-hierarchical cross-realm authentication.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"ATHENA.MIT.EDU\" = {\n    \"EXAMPLE.COM\" = \".\";\n  };\n  \"EXAMPLE.COM\" = {\n    \"ATHENA.MIT.EDU\" = \".\";\n  };\n};\n"}, "loc": ["krb5", "capaths"], "readOnly": false, "type": "(attribute set) or strings concatenated with \"\\n\""}, "krb5.config": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Verbatim `krb5.conf` configuration.  Note that this\nis mutually exclusive with configuration via\n`libdefaults`, `realms`,\n`domain_realm`, `capaths`,\n`appdefaults`, `plugins` and\n`extraConfig` configuration options.  Consult\n`man krb5.conf` for documentation.\n"}, "example": {"_type": "literalExpression", "text": "''\n  [libdefaults]\n    default_realm = EXAMPLE.COM\n  \n  [realms]\n    EXAMPLE.COM = {\n      admin_server = kerberos.example.com\n      kdc = kerberos.example.com\n      default_principal_flags = +preauth\n    }\n  \n  [domain_realm]\n    example.com  = EXAMPLE.COM\n    .example.com = EXAMPLE.COM\n  \n  [logging]\n    kdc          = SYSLOG:NOTICE\n    admin_server = SYSLOG:NOTICE\n    default      = SYSLOG:NOTICE\n''"}, "loc": ["krb5", "config"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "krb5.defaultRealm": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "DEPRECATED, please use\n`krb5.libdefaults.default_realm`.\n"}, "example": {"_type": "literalExpression", "text": "\"ATHENA.MIT.EDU\""}, "loc": ["krb5", "defaultRealm"], "readOnly": false, "type": "null or string"}, "krb5.domainRealm": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "DEPRECATED, please create a map of server hostnames to Kerberos realms\nin `krb5.domain_realm`.\n"}, "example": {"_type": "literalExpression", "text": "\"athena.mit.edu\""}, "loc": ["krb5", "domainRealm"], "readOnly": false, "type": "null or string"}, "krb5.domain_realm": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Map of server hostnames to Kerberos realms.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"example.com\" = \"EXAMPLE.COM\";\n  \".example.com\" = \"EXAMPLE.COM\";\n};\n"}, "loc": ["krb5", "domain_realm"], "readOnly": false, "type": "(attribute set) or strings concatenated with \"\\n\""}, "krb5.enable": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable building krb5.conf, configuration file for Kerberos V."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["krb5", "enable"], "readOnly": false, "type": "boolean"}, "krb5.extraConfig": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "These lines go to the end of `krb5.conf` verbatim.\n`krb5.conf` may include any of the relations that are\nvalid for `kdc.conf` (see `man kdc.conf`),\nbut it is not a recommended practice.\n"}, "example": {"_type": "literalExpression", "text": "''\n  [logging]\n    kdc          = SYSLOG:NOTICE\n    admin_server = SYSLOG:NOTICE\n    default      = SYSLOG:NOTICE\n''"}, "loc": ["krb5", "extraConfig"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "krb5.kdc": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "DEPRECATED, please pass a `kdc` attribute to a realm\nin `krb5.realms`.\n"}, "example": {"_type": "literalExpression", "text": "\"kerberos.mit.edu\""}, "loc": ["krb5", "kdc"], "readOnly": false, "type": "null or string"}, "krb5.kerberos": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.krb5"}, "description": {"_type": "mdDoc", "text": "The Kerberos implementation that will be present in\n`environment.systemPackages` after enabling this\nservice.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.heimdal"}, "loc": ["krb5", "kerberos"], "readOnly": false, "type": "package"}, "krb5.kerberosAdminServer": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "DEPRECATED, please pass an `admin_server` attribute\nto a realm in `krb5.realms`.\n"}, "example": {"_type": "literalExpression", "text": "\"kerberos.mit.edu\""}, "loc": ["krb5", "kerberosAdminServer"], "readOnly": false, "type": "null or string"}, "krb5.libdefaults": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings used by the Kerberos V5 library.\n"}, "example": {"_type": "literalExpression", "text": "{\n  default_realm = \"ATHENA.MIT.EDU\";\n};\n"}, "loc": ["krb5", "libdefaults"], "readOnly": false, "type": "(attribute set) or strings concatenated with \"\\n\""}, "krb5.plugins": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Controls plugin module registration.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ccselect = {\n    disable = \"k5identity\";\n  };\n};\n"}, "loc": ["krb5", "plugins"], "readOnly": false, "type": "(attribute set) or strings concatenated with \"\\n\""}, "krb5.realms": {"declarations": ["nixos/modules/config/krb5/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Realm-specific contact information and settings."}, "example": {"_type": "literalExpression", "text": "{\n  \"ATHENA.MIT.EDU\" = {\n    admin_server = \"athena.mit.edu\";\n    kdc = [\n      \"athena01.mit.edu\"\n      \"athena02.mit.edu\"\n    ];\n  };\n};\n"}, "loc": ["krb5", "realms"], "readOnly": false, "type": "(attribute set) or strings concatenated with \"\\n\""}, "lib": {"declarations": ["nixos/modules/misc/lib.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option allows modules to define helper functions, constants, etc.\n"}, "loc": ["lib"], "readOnly": false, "type": "attribute set of (attribute set)"}, "location.latitude": {"declarations": ["nixos/modules/config/locale.nix"], "description": {"_type": "mdDoc", "text": "Your current latitude, between\n`-90.0` and `90.0`. Must be provided\nalong with longitude.\n"}, "loc": ["location", "latitude"], "readOnly": false, "type": "floating point number"}, "location.longitude": {"declarations": ["nixos/modules/config/locale.nix"], "description": {"_type": "mdDoc", "text": "Your current longitude, between\nbetween `-180.0` and `180.0`. Must be\nprovided along with latitude.\n"}, "loc": ["location", "longitude"], "readOnly": false, "type": "floating point number"}, "location.provider": {"declarations": ["nixos/modules/config/locale.nix"], "default": {"_type": "literalExpression", "text": "\"manual\""}, "description": {"_type": "mdDoc", "text": "The location provider to use for determining your location. If set to\n`manual` you must also provide latitude/longitude.\n"}, "loc": ["location", "provider"], "readOnly": false, "type": "one of \"manual\", \"geoclue2\""}, "networking.bonds": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option allows you to define bond devices that aggregate multiple,\nunderlying networking interfaces together. The value of this option is\nan attribute set. Each attribute specifies a bond, with the attribute\nname specifying the name of the bond's network interface\n"}, "example": {"_type": "literalExpression", "text": "{\n  bond0 = {\n    interfaces = [ \"eth0\" \"wlan0\" ];\n    driverOptions = {\n  miimon = \"100\";\n  mode = \"active-backup\";\n}\n;\n  };\n  anotherBond.interfaces = [ \"enp4s0f0\" \"enp4s0f1\" \"enp5s0f0\" \"enp5s0f1\" ];\n}\n"}, "loc": ["networking", "bonds"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.bonds.<name>.driverOptions": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Options for the bonding driver.\nDocumentation can be found in\n<https://www.kernel.org/doc/Documentation/networking/bonding.txt>\n"}, "example": {"_type": "literalExpression", "text": "{\n  miimon = \"100\";\n  mode = \"active-backup\";\n}\n"}, "loc": ["networking", "bonds", "<name>", "driverOptions"], "readOnly": false, "type": "attribute set of string"}, "networking.bonds.<name>.interfaces": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "The interfaces to bond together"}, "example": {"_type": "literalExpression", "text": "[\n  \"enp4s0f0\"\n  \"enp4s0f1\"\n  \"wlan0\"\n]"}, "loc": ["networking", "bonds", "<name>", "interfaces"], "readOnly": false, "type": "list of string"}, "networking.bonds.<name>.lacp_rate": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "DEPRECATED, use `driverOptions`.\nOption specifying the rate in which we'll ask our link partner\nto transmit LACPDU packets in 802.3ad mode.\n"}, "example": {"_type": "literalExpression", "text": "\"fast\""}, "loc": ["networking", "bonds", "<name>", "lacp_rate"], "readOnly": false, "type": "null or string"}, "networking.bonds.<name>.miimon": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "DEPRECATED, use `driverOptions`.\nMiimon is the number of millisecond in between each round of polling\nby the device driver for failed links. By default polling is not\nenabled and the driver is trusted to properly detect and handle\nfailure scenarios.\n"}, "example": {"_type": "literalExpression", "text": "100"}, "loc": ["networking", "bonds", "<name>", "miimon"], "readOnly": false, "type": "null or signed integer"}, "networking.bonds.<name>.mode": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "DEPRECATED, use `driverOptions`.\nThe mode which the bond will be running. The default mode for\nthe bonding driver is balance-rr, optimizing for throughput.\nMore information about valid modes can be found at\nhttps://www.kernel.org/doc/Documentation/networking/bonding.txt\n"}, "example": {"_type": "literalExpression", "text": "\"active-backup\""}, "loc": ["networking", "bonds", "<name>", "mode"], "readOnly": false, "type": "null or string"}, "networking.bonds.<name>.xmit_hash_policy": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "DEPRECATED, use `driverOptions`.\nSelects the transmit hash policy to use for slave selection in\nbalance-xor, 802.3ad, and tlb modes.\n"}, "example": {"_type": "literalExpression", "text": "\"layer2+3\""}, "loc": ["networking", "bonds", "<name>", "xmit_hash_policy"], "readOnly": false, "type": "null or string"}, "networking.bridges": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option allows you to define Ethernet bridge devices\nthat connect physical networks together.  The value of this\noption is an attribute set.  Each attribute specifies a\nbridge, with the attribute name specifying the name of the\nbridge's network interface.\n"}, "example": {"_type": "literalExpression", "text": "{\n  br0 = {\n    interfaces = [\n      \"eth0\"\n      \"eth1\"\n    ];\n  };\n  br1 = {\n    interfaces = [\n      \"eth2\"\n      \"wlan0\"\n    ];\n  };\n}"}, "loc": ["networking", "bridges"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.bridges.<name>.interfaces": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "The physical network interfaces connected by the bridge."}, "example": {"_type": "literalExpression", "text": "[\n  \"eth0\"\n  \"eth1\"\n]"}, "loc": ["networking", "bridges", "<name>", "interfaces"], "readOnly": false, "type": "list of string"}, "networking.bridges.<name>.rstp": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the bridge interface should enable rstp."}, "loc": ["networking", "bridges", "<name>", "rstp"], "readOnly": false, "type": "boolean"}, "networking.defaultGateway": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The default gateway. It can be left empty if it is auto-detected through DHCP.\nIt can be specified as a string or an option set along with a network interface.\n"}, "example": {"_type": "literalExpression", "text": "{\n  address = \"131.211.84.1\";\n  interface = \"enp3s0\";\n}"}, "loc": ["networking", "defaultGateway"], "readOnly": false, "type": "null or ((submodule) or string convertible to it)"}, "networking.defaultGateway.address": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "The default gateway address."}, "loc": ["networking", "defaultGateway", "address"], "readOnly": false, "type": "string"}, "networking.defaultGateway.interface": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The default gateway interface."}, "example": {"_type": "literalExpression", "text": "\"enp0s3\""}, "loc": ["networking", "defaultGateway", "interface"], "readOnly": false, "type": "null or string"}, "networking.defaultGateway.metric": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The default gateway metric/preference."}, "example": {"_type": "literalExpression", "text": "42"}, "loc": ["networking", "defaultGateway", "metric"], "readOnly": false, "type": "null or signed integer"}, "networking.defaultGateway6": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The default ipv6 gateway. It can be left empty if it is auto-detected through DHCP.\nIt can be specified as a string or an option set along with a network interface.\n"}, "example": {"_type": "literalExpression", "text": "{\n  address = \"2001:4d0:1e04:895::1\";\n  interface = \"enp3s0\";\n}"}, "loc": ["networking", "defaultGateway6"], "readOnly": false, "type": "null or ((submodule) or string convertible to it)"}, "networking.defaultGateway6.address": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "The default gateway address."}, "loc": ["networking", "defaultGateway6", "address"], "readOnly": false, "type": "string"}, "networking.defaultGateway6.interface": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The default gateway interface."}, "example": {"_type": "literalExpression", "text": "\"enp0s3\""}, "loc": ["networking", "defaultGateway6", "interface"], "readOnly": false, "type": "null or string"}, "networking.defaultGateway6.metric": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The default gateway metric/preference."}, "example": {"_type": "literalExpression", "text": "42"}, "loc": ["networking", "defaultGateway6", "metric"], "readOnly": false, "type": "null or signed integer"}, "networking.defaultGatewayWindowSize": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The window size of the default gateway. It limits maximal data bursts that TCP peers\nare allowed to send to us.\n"}, "example": {"_type": "literalExpression", "text": "524288"}, "loc": ["networking", "defaultGatewayWindowSize"], "readOnly": false, "type": "null or signed integer"}, "networking.dhcpcd.IPv6rs": {"declarations": ["nixos/modules/services/networking/dhcpcd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Force enable or disable solicitation and receipt of IPv6 Router Advertisements.\nThis is required, for example, when using a static unique local IPv6 address (ULA)\nand global IPv6 address auto-configuration with SLAAC.\n"}, "loc": ["networking", "dhcpcd", "IPv6rs"], "readOnly": false, "type": "null or boolean"}, "networking.dhcpcd.allowInterfaces": {"declarations": ["nixos/modules/services/networking/dhcpcd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Enable the DHCP client for any interface whose name matches\nany of the shell glob patterns in this list. Any interface not\nexplicitly matched by this pattern will be denied. This pattern only\napplies when non-null.\n"}, "loc": ["networking", "dhcpcd", "allowInterfaces"], "readOnly": false, "type": "null or (list of string)"}, "networking.dhcpcd.denyInterfaces": {"declarations": ["nixos/modules/services/networking/dhcpcd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Disable the DHCP client for any interface whose name matches\nany of the shell glob patterns in this list. The purpose of\nthis option is to blacklist virtual interfaces such as those\ncreated by Xen, libvirt, LXC, etc.\n"}, "loc": ["networking", "dhcpcd", "denyInterfaces"], "readOnly": false, "type": "list of string"}, "networking.dhcpcd.enable": {"declarations": ["nixos/modules/services/networking/dhcpcd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable dhcpcd for device configuration. This is mainly to\nexplicitly disable dhcpcd (for example when using networkd).\n"}, "loc": ["networking", "dhcpcd", "enable"], "readOnly": false, "type": "boolean"}, "networking.dhcpcd.extraConfig": {"declarations": ["nixos/modules/services/networking/dhcpcd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Literal string to append to the config file generated for dhcpcd.\n"}, "loc": ["networking", "dhcpcd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.dhcpcd.persistent": {"declarations": ["nixos/modules/services/networking/dhcpcd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whenever to leave interfaces configured on dhcpcd daemon\nshutdown. Set to true if you have your root or store mounted\nover the network or this machine accepts SSH connections\nthrough DHCP interfaces and clients should be notified when\nit shuts down.\n"}, "loc": ["networking", "dhcpcd", "persistent"], "readOnly": false, "type": "boolean"}, "networking.dhcpcd.runHook": {"declarations": ["nixos/modules/services/networking/dhcpcd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell code that will be run after all other hooks. See\n`man dhcpcd-run-hooks` for details on what is possible.\n"}, "example": {"_type": "literalExpression", "text": "\"if [[ $reason =~ BOUND ]]; then echo $interface: Routers are $new_routers - were $old_routers; fi\""}, "loc": ["networking", "dhcpcd", "runHook"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.dhcpcd.wait": {"declarations": ["nixos/modules/services/networking/dhcpcd.nix"], "default": {"_type": "literalExpression", "text": "\"any\""}, "description": {"_type": "mdDoc", "text": "This option specifies when the dhcpcd service will fork to background.\nIf set to \"background\", dhcpcd will fork to background immediately.\nIf set to \"ipv4\" or \"ipv6\", dhcpcd will wait for the corresponding IP\naddress to be assigned. If set to \"any\", dhcpcd will wait for any type\n(IPv4 or IPv6) to be assigned. If set to \"both\", dhcpcd will wait for\nboth an IPv4 and an IPv6 address before forking.\nThe option \"if-carrier-up\" is equivalent to \"any\" if either ethernet\nis plugged nor WiFi is powered, and to \"background\" otherwise.\n"}, "loc": ["networking", "dhcpcd", "wait"], "readOnly": false, "type": "one of \"background\", \"any\", \"ipv4\", \"ipv6\", \"both\", \"if-carrier-up\""}, "networking.domain": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The domain.  It can be left empty if it is auto-detected through DHCP.\n"}, "example": {"_type": "literalExpression", "text": "\"home.arpa\""}, "loc": ["networking", "domain"], "readOnly": false, "type": "null or string"}, "networking.enableB43Firmware": {"declarations": ["nixos/modules/hardware/network/b43.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Turn on this option if you want firmware for the NICs supported by the b43 module.\n"}, "loc": ["networking", "enableB43Firmware"], "readOnly": false, "type": "boolean"}, "networking.enableIPv6": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable support for IPv6.\n"}, "loc": ["networking", "enableIPv6"], "readOnly": false, "type": "boolean"}, "networking.enableIntel2200BGFirmware": {"declarations": ["nixos/modules/hardware/network/intel-2200bg.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Turn on this option if you want firmware for the Intel\nPRO/Wireless 2200BG to be loaded automatically.  This is\nrequired if you want to use this device.\n"}, "loc": ["networking", "enableIntel2200BGFirmware"], "readOnly": false, "type": "boolean"}, "networking.extraHosts": {"declarations": ["nixos/modules/config/networking.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional verbatim entries to be appended to {file}`/etc/hosts`.\nFor adding hosts from derivation results, use {option}`networking.hostFiles` instead.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.0.1 lanlocalhost\""}, "loc": ["networking", "extraHosts"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.firewall.allowPing": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to respond to incoming ICMPv4 echo requests\n(\"pings\").  ICMPv6 pings are always allowed because the\nlarger address space of IPv6 makes network scanning much\nless effective.\n"}, "loc": ["networking", "firewall", "allowPing"], "readOnly": false, "type": "boolean"}, "networking.firewall.allowedTCPPortRanges": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A range of TCP ports on which incoming connections are\naccepted.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    from = 8999;\n    to = 9003;\n  }\n]"}, "loc": ["networking", "firewall", "allowedTCPPortRanges"], "readOnly": false, "type": "list of attribute set of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "networking.firewall.allowedTCPPorts": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of TCP ports on which incoming connections are\naccepted.\n"}, "example": {"_type": "literalExpression", "text": "[\n  22\n  80\n]"}, "loc": ["networking", "firewall", "allowedTCPPorts"], "readOnly": false, "type": "list of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "networking.firewall.allowedUDPPortRanges": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Range of open UDP ports.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    from = 60000;\n    to = 61000;\n  }\n]"}, "loc": ["networking", "firewall", "allowedUDPPortRanges"], "readOnly": false, "type": "list of attribute set of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "networking.firewall.allowedUDPPorts": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of open UDP ports.\n"}, "example": {"_type": "literalExpression", "text": "[\n  53\n]"}, "loc": ["networking", "firewall", "allowedUDPPorts"], "readOnly": false, "type": "list of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "networking.firewall.autoLoadConntrackHelpers": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to auto-load connection-tracking helpers.\nSee the description at networking.firewall.connectionTrackingModules\n\n(needs kernel 3.5+)\n"}, "loc": ["networking", "firewall", "autoLoadConntrackHelpers"], "readOnly": false, "type": "boolean"}, "networking.firewall.checkReversePath": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalMD", "text": "`true` except if the iptables based firewall is in use and the kernel lacks rpfilter support"}, "description": {"_type": "mdDoc", "text": "Performs a reverse path filter test on a packet.  If a reply\nto the packet would not be sent via the same interface that\nthe packet arrived on, it is refused.\n\nIf using asymmetric routing or other complicated routing, set\nthis option to loose mode or disable it and setup your own\ncounter-measures.\n\nThis option can be either true (or \"strict\"), \"loose\" (only\ndrop the packet if the source address is not reachable via any\ninterface) or false.\n"}, "example": {"_type": "literalExpression", "text": "\"loose\""}, "loc": ["networking", "firewall", "checkReversePath"], "readOnly": false, "type": "boolean or one of \"strict\", \"loose\""}, "networking.firewall.connectionTrackingModules": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of connection-tracking helpers that are auto-loaded.\nThe complete list of possible values is given in the example.\n\nAs helpers can pose as a security risk, it is advised to\nset this to an empty list and disable the setting\nnetworking.firewall.autoLoadConntrackHelpers unless you\nknow what you are doing. Connection tracking is disabled\nby default.\n\nLoading of helpers is recommended to be done through the\nCT target.  More info:\nhttps://home.regit.org/netfilter-en/secure-use-of-helpers/\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"ftp\"\n  \"irc\"\n  \"sane\"\n  \"sip\"\n  \"tftp\"\n  \"amanda\"\n  \"h323\"\n  \"netbios_sn\"\n  \"pptp\"\n  \"snmp\"\n]"}, "loc": ["networking", "firewall", "connectionTrackingModules"], "readOnly": false, "type": "list of string"}, "networking.firewall.enable": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the firewall.  This is a simple stateful\nfirewall that blocks connection attempts to unauthorised TCP\nor UDP ports on this machine.\n"}, "loc": ["networking", "firewall", "enable"], "readOnly": false, "type": "boolean"}, "networking.firewall.extraCommands": {"declarations": ["nixos/modules/services/networking/firewall-iptables.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional shell commands executed as part of the firewall\ninitialisation script.  These are executed just before the\nfinal \"reject\" firewall rule is added, so they can be used\nto allow packets that would otherwise be refused.\n\nThis option only works with the iptables based firewall.\n"}, "example": {"_type": "literalExpression", "text": "\"iptables -A INPUT -p icmp -j ACCEPT\""}, "loc": ["networking", "firewall", "extraCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.firewall.extraForwardRules": {"declarations": ["nixos/modules/services/networking/firewall-nftables.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional nftables rules to be appended to the forward-allow\nchain.\n\nThis option only works with the nftables based firewall.\n"}, "example": {"_type": "literalExpression", "text": "\"iifname wg0 accept\""}, "loc": ["networking", "firewall", "extraForwardRules"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.firewall.extraInputRules": {"declarations": ["nixos/modules/services/networking/firewall-nftables.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional nftables rules to be appended to the input-allow\nchain.\n\nThis option only works with the nftables based firewall.\n"}, "example": {"_type": "literalExpression", "text": "\"ip6 saddr { fc00::/7, fe80::/10 } tcp dport 24800 accept\""}, "loc": ["networking", "firewall", "extraInputRules"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.firewall.extraPackages": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional packages to be included in the environment of the system\nas well as the path of networking.firewall.extraCommands.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.ipset ]"}, "loc": ["networking", "firewall", "extraPackages"], "readOnly": false, "type": "list of package"}, "networking.firewall.extraStopCommands": {"declarations": ["nixos/modules/services/networking/firewall-iptables.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional shell commands executed as part of the firewall\nshutdown script.  These are executed just after the removal\nof the NixOS input rule, or if the service enters a failed\nstate.\n\nThis option only works with the iptables based firewall.\n"}, "example": {"_type": "literalExpression", "text": "\"iptables -P INPUT ACCEPT\""}, "loc": ["networking", "firewall", "extraStopCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.firewall.filterForward": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable filtering in IP forwarding.\n\nThis option only works with the nftables based firewall.\n"}, "loc": ["networking", "firewall", "filterForward"], "readOnly": false, "type": "boolean"}, "networking.firewall.interfaces": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Interface-specific open ports.\n"}, "loc": ["networking", "firewall", "interfaces"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.firewall.interfaces.<name>.allowedTCPPortRanges": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A range of TCP ports on which incoming connections are\naccepted.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    from = 8999;\n    to = 9003;\n  }\n]"}, "loc": ["networking", "firewall", "interfaces", "<name>", "allowedTCPPortRanges"], "readOnly": false, "type": "list of attribute set of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "networking.firewall.interfaces.<name>.allowedTCPPorts": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of TCP ports on which incoming connections are\naccepted.\n"}, "example": {"_type": "literalExpression", "text": "[\n  22\n  80\n]"}, "loc": ["networking", "firewall", "interfaces", "<name>", "allowedTCPPorts"], "readOnly": false, "type": "list of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "networking.firewall.interfaces.<name>.allowedUDPPortRanges": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Range of open UDP ports.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    from = 60000;\n    to = 61000;\n  }\n]"}, "loc": ["networking", "firewall", "interfaces", "<name>", "allowedUDPPortRanges"], "readOnly": false, "type": "list of attribute set of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "networking.firewall.interfaces.<name>.allowedUDPPorts": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of open UDP ports.\n"}, "example": {"_type": "literalExpression", "text": "[\n  53\n]"}, "loc": ["networking", "firewall", "interfaces", "<name>", "allowedUDPPorts"], "readOnly": false, "type": "list of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "networking.firewall.logRefusedConnections": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to log rejected or dropped incoming connections.\nNote: The logs are found in the kernel logs, i.e. dmesg\nor journalctl -k.\n"}, "loc": ["networking", "firewall", "logRefusedConnections"], "readOnly": false, "type": "boolean"}, "networking.firewall.logRefusedPackets": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to log all rejected or dropped incoming packets.\nThis tends to give a lot of log messages, so it's mostly\nuseful for debugging.\nNote: The logs are found in the kernel logs, i.e. dmesg\nor journalctl -k.\n"}, "loc": ["networking", "firewall", "logRefusedPackets"], "readOnly": false, "type": "boolean"}, "networking.firewall.logRefusedUnicastsOnly": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If {option}`networking.firewall.logRefusedPackets`\nand this option are enabled, then only log packets\nspecifically directed at this machine, i.e., not broadcasts\nor multicasts.\n"}, "loc": ["networking", "firewall", "logRefusedUnicastsOnly"], "readOnly": false, "type": "boolean"}, "networking.firewall.logReversePathDrops": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Logs dropped packets failing the reverse path filter test if\nthe option networking.firewall.checkReversePath is enabled.\n"}, "loc": ["networking", "firewall", "logReversePathDrops"], "readOnly": false, "type": "boolean"}, "networking.firewall.package": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "if config.networking.nftables.enable then \"pkgs.nftables\" else \"pkgs.iptables\""}, "description": {"_type": "mdDoc", "text": "The package to use for running the firewall service.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.iptables-legacy"}, "loc": ["networking", "firewall", "package"], "readOnly": false, "type": "package"}, "networking.firewall.pingLimit": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If pings are allowed, this allows setting rate limits on them.\n\nFor the iptables based firewall, it should be set like\n\"--limit 1/minute --limit-burst 5\".\n\nFor the nftables based firewall, it should be set like\n\"2/second\" or \"1/minute burst 5 packets\".\n"}, "example": {"_type": "literalExpression", "text": "\"--limit 1/minute --limit-burst 5\""}, "loc": ["networking", "firewall", "pingLimit"], "readOnly": false, "type": "null or strings concatenated with \" \""}, "networking.firewall.rejectPackets": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, refused packets are rejected rather than dropped\n(ignored).  This means that an ICMP \"port unreachable\" error\nmessage is sent back to the client (or a TCP RST packet in\ncase of an existing connection).  Rejecting packets makes\nport scanning somewhat easier.\n"}, "loc": ["networking", "firewall", "rejectPackets"], "readOnly": false, "type": "boolean"}, "networking.firewall.trustedInterfaces": {"declarations": ["nixos/modules/services/networking/firewall.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Traffic coming in from these interfaces will be accepted\nunconditionally.  Traffic from the loopback (lo) interface\nwill always be accepted.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"enp0s2\"\n]"}, "loc": ["networking", "firewall", "trustedInterfaces"], "readOnly": false, "type": "list of string"}, "networking.fooOverUDP": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option allows you to configure Foo Over UDP and Generic UDP Encapsulation\nendpoints. See {manpage}`ip-fou(8)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  backup = {\n    port = 9002;\n  };\n  primary = {\n    local = {\n      address = \"192.0.2.1\";\n      dev = \"eth0\";\n    };\n    port = 9001;\n  };\n}"}, "loc": ["networking", "fooOverUDP"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.fooOverUDP.<name>.local": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Local address (and optionally device) to bind to using the given port.\n"}, "example": {"_type": "literalExpression", "text": "{\n  address = \"203.0.113.22\";\n}"}, "loc": ["networking", "fooOverUDP", "<name>", "local"], "readOnly": false, "type": "null or (submodule)"}, "networking.fooOverUDP.<name>.local.address": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "Local address to bind to. The address must be available when the FOU\nendpoint is created, using the scripted network setup this can be achieved\neither by setting `dev` or adding dependency information to\n`systemd.services.<name>-fou-encap`; it isn't supported\nwhen using networkd.\n"}, "loc": ["networking", "fooOverUDP", "<name>", "local", "address"], "readOnly": false, "type": "string"}, "networking.fooOverUDP.<name>.local.dev": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Network device to bind to.\n"}, "example": {"_type": "literalExpression", "text": "\"eth0\""}, "loc": ["networking", "fooOverUDP", "<name>", "local", "dev"], "readOnly": false, "type": "null or string"}, "networking.fooOverUDP.<name>.port": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "Local port of the encapsulation UDP socket.\n"}, "loc": ["networking", "fooOverUDP", "<name>", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "networking.fooOverUDP.<name>.protocol": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Protocol number of the encapsulated packets. Specifying `null`\n(the default) creates a GUE endpoint, specifying a protocol number will create\na FOU endpoint.\n"}, "loc": ["networking", "fooOverUDP", "<name>", "protocol"], "readOnly": false, "type": "null or integer between 1 and 255 (both inclusive)"}, "networking.fqdn": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "\"${networking.hostName}.${networking.domain}\""}, "description": {"_type": "mdDoc", "text": "The fully qualified domain name (FQDN) of this host. It is the result\nof combining `networking.hostName` and `networking.domain.` Using this\noption will result in an evaluation error if the hostname is empty or\nno domain is specified.\n\nModules that accept a mere `networing.hostName` but prefer a fully qualified\ndomain name may use `networking.fqdnOrHostName` instead.\n"}, "loc": ["networking", "fqdn"], "readOnly": true, "type": "string"}, "networking.fqdnOrHostName": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "if cfg.domain == null then cfg.hostName else cfg.fqdn\n"}, "description": {"_type": "mdDoc", "text": "Either the fully qualified domain name (FQDN), or just the host name if\nit does not exists.\n\nThis is a convenience option for modules to read instead of `fqdn` when\na mere `hostName` is also an acceptable value; this option does not\nthrow an error when `domain` is unset.\n"}, "loc": ["networking", "fqdnOrHostName"], "readOnly": true, "type": "string"}, "networking.greTunnels": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option allows you to define Generic Routing Encapsulation (GRE) tunnels.\n"}, "example": {"_type": "literalExpression", "text": "{\n  greBridge = {\n    remote = \"10.0.0.1\";\n    local = \"10.0.0.22\";\n    dev = \"enp4s0f0\";\n    type = \"tap\";\n    ttl = 255;\n  };\n  gre6Tunnel = {\n    remote = \"fd7a:5634::1\";\n    local = \"fd7a:5634::2\";\n    dev = \"enp4s0f0\";\n    type = \"tun6\";\n    ttl = 255;\n  };\n}\n"}, "loc": ["networking", "greTunnels"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.greTunnels.<name>.dev": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The underlying network device on which the tunnel resides.\n"}, "example": {"_type": "literalExpression", "text": "\"enp4s0f0\""}, "loc": ["networking", "greTunnels", "<name>", "dev"], "readOnly": false, "type": "null or string"}, "networking.greTunnels.<name>.local": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The address of the local endpoint which the remote\nside should send packets to.\n"}, "example": {"_type": "literalExpression", "text": "\"10.0.0.22\""}, "loc": ["networking", "greTunnels", "<name>", "local"], "readOnly": false, "type": "null or string"}, "networking.greTunnels.<name>.remote": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The address of the remote endpoint to forward traffic over.\n"}, "example": {"_type": "literalExpression", "text": "\"10.0.0.1\""}, "loc": ["networking", "greTunnels", "<name>", "remote"], "readOnly": false, "type": "null or string"}, "networking.greTunnels.<name>.ttl": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The time-to-live/hoplimit of the connection to the remote tunnel endpoint.\n"}, "example": {"_type": "literalExpression", "text": "255"}, "loc": ["networking", "greTunnels", "<name>", "ttl"], "readOnly": false, "type": "null or signed integer"}, "networking.greTunnels.<name>.type": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "\"tap\""}, "description": {"_type": "mdDoc", "text": "Whether the tunnel routes layer 2 (tap) or layer 3 (tun) traffic.\n"}, "example": {"_type": "literalExpression", "text": "\"tap\""}, "loc": ["networking", "greTunnels", "<name>", "type"], "readOnly": false, "type": "one of \"tun\", \"tap\", \"tun6\", \"tap6\""}, "networking.hostFiles": {"declarations": ["nixos/modules/config/networking.nix"], "default": {"_type": "literalMD", "text": "Hosts from {option}`networking.hosts` and {option}`networking.extraHosts`"}, "description": {"_type": "mdDoc", "text": "Files that should be concatenated together to form {file}`/etc/hosts`.\n"}, "example": {"_type": "literalExpression", "text": "[ \"${pkgs.my-blocklist-package}/share/my-blocklist/hosts\" ]"}, "loc": ["networking", "hostFiles"], "readOnly": false, "type": "list of path"}, "networking.hostId": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The 32-bit host ID of the machine, formatted as 8 hexadecimal characters.\n\nYou should try to make this ID unique among your machines. You can\ngenerate a random 32-bit ID using the following commands:\n\n`head -c 8 /etc/machine-id`\n\n(this derives it from the machine-id that systemd generates) or\n\n`head -c4 /dev/urandom | od -A none -t x4`\n\nThe primary use case is to ensure when using ZFS that a pool isn't imported\naccidentally on a wrong machine.\n"}, "example": {"_type": "literalExpression", "text": "\"4e98920d\""}, "loc": ["networking", "hostId"], "readOnly": false, "type": "null or string"}, "networking.hostName": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "config.system.nixos.distroId"}, "description": {"_type": "mdDoc", "text": "The name of the machine. Leave it empty if you want to obtain it from a\nDHCP server (if using DHCP). The hostname must be a valid DNS label (see\nRFC 1035 section 2.3.1: \"Preferred name syntax\", RFC 1123 section 2.1:\n\"Host Names and Numbers\") and as such must not contain the domain part.\nThis means that the hostname must start with a letter or digit,\nend with a letter or digit, and have as interior characters only\nletters, digits, and hyphen. The maximum length is 63 characters.\nAdditionally it is recommended to only use lower-case characters.\nIf (e.g. for legacy reasons) a FQDN is required as the Linux kernel\nnetwork node hostname (uname --nodename) the option\nboot.kernel.sysctl.\"kernel.hostname\" can be used as a workaround (but\nthe 64 character limit still applies).\n\nWARNING: Do not use underscores (_) or you may run into unexpected issues.\n"}, "loc": ["networking", "hostName"], "readOnly": false, "type": "string matching the pattern ^$|^[[:alnum:]]([[:alnum:]_-]{0,61}[[:alnum:]])?$"}, "networking.hosts": {"declarations": ["nixos/modules/config/networking.nix"], "description": {"_type": "mdDoc", "text": "Locally defined maps of hostnames to IP addresses.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"127.0.0.1\" = [ \"foo.bar.baz\" ];\n  \"192.168.0.2\" = [ \"fileserver.local\" \"nameserver.local\" ];\n};\n"}, "loc": ["networking", "hosts"], "readOnly": false, "type": "attribute set of list of string"}, "networking.interfaces": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The configuration for each network interface.  If\n{option}`networking.useDHCP` is true, then every\ninterface not listed here will be configured using DHCP.\n\nPlease note that {option}`systemd.network.netdevs` has more features\nand is better maintained. When building new things, it is advised to\nuse that instead.\n"}, "example": {"_type": "literalExpression", "text": "{\n  eth0 = {\n    ipv4 = {\n      addresses = [\n        {\n          address = \"131.211.84.78\";\n          prefixLength = 25;\n        }\n      ];\n    };\n  };\n}"}, "loc": ["networking", "interfaces"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.interfaces.<name>.ipv4.addresses": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of IPv4 addresses that will be statically assigned to the interface.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    address = \"10.0.0.1\";\n    prefixLength = 16;\n  }\n  {\n    address = \"192.168.1.1\";\n    prefixLength = 24;\n  }\n]"}, "loc": ["networking", "interfaces", "<name>", "ipv4", "addresses"], "readOnly": false, "type": "list of (submodule)"}, "networking.interfaces.<name>.ipv4.addresses.*.address": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "IPv4 address of the interface. Leave empty to configure the\ninterface using DHCP.\n"}, "loc": ["networking", "interfaces", "<name>", "ipv4", "addresses", "*", "address"], "readOnly": false, "type": "string"}, "networking.interfaces.<name>.ipv4.addresses.*.prefixLength": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "Subnet mask of the interface, specified as the number of\nbits in the prefix (`24`).\n"}, "loc": ["networking", "interfaces", "<name>", "ipv4", "addresses", "*", "prefixLength"], "readOnly": false, "type": "signed integer"}, "networking.interfaces.<name>.ipv4.routes": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of extra IPv4 static routes that will be assigned to the interface.\n\n::: {.warning}\nIf the route type is the default `unicast`, then the scope\nis set differently depending on the value of {option}`networking.useNetworkd`:\nthe script-based backend sets it to `link`, while networkd sets\nit to `global`.\n:::\n\nIf you want consistency between the two implementations,\nset the scope of the route manually with\n`networking.interfaces.eth0.ipv4.routes = [{ options.scope = \"global\"; }]`\nfor example.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    address = \"10.0.0.0\";\n    prefixLength = 16;\n  }\n  {\n    address = \"192.168.2.0\";\n    prefixLength = 24;\n    via = \"192.168.1.1\";\n  }\n]"}, "loc": ["networking", "interfaces", "<name>", "ipv4", "routes"], "readOnly": false, "type": "list of (submodule)"}, "networking.interfaces.<name>.ipv4.routes.*.address": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "IPv4 address of the network."}, "loc": ["networking", "interfaces", "<name>", "ipv4", "routes", "*", "address"], "readOnly": false, "type": "string"}, "networking.interfaces.<name>.ipv4.routes.*.options": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Other route options. See the symbol `OPTIONS`\nin the `ip-route(8)` manual page for the details.\nYou may also specify `metric`,\n`src`, `protocol`,\n`scope`, `from`\nand `table`, which are technically\nnot route options, in the sense used in the manual.\n"}, "example": {"_type": "literalExpression", "text": "{\n  mtu = \"1492\";\n  window = \"524288\";\n}"}, "loc": ["networking", "interfaces", "<name>", "ipv4", "routes", "*", "options"], "readOnly": false, "type": "attribute set of string"}, "networking.interfaces.<name>.ipv4.routes.*.prefixLength": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "Subnet mask of the network, specified as the number of\nbits in the prefix (`24`).\n"}, "loc": ["networking", "interfaces", "<name>", "ipv4", "routes", "*", "prefixLength"], "readOnly": false, "type": "signed integer"}, "networking.interfaces.<name>.ipv4.routes.*.type": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Type of the route.  See the `Route types` section\nin the `ip-route(8)` manual page for the details.\n\nNote that `prohibit`, `blackhole`,\n`unreachable`, and `throw` cannot\nbe configured per device, so they are not available here. Similarly,\n`nat` hasn't been supported since kernel 2.6.\n"}, "loc": ["networking", "interfaces", "<name>", "ipv4", "routes", "*", "type"], "readOnly": false, "type": "null or one of \"unicast\", \"local\", \"broadcast\", \"multicast\""}, "networking.interfaces.<name>.ipv4.routes.*.via": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IPv4 address of the next hop."}, "loc": ["networking", "interfaces", "<name>", "ipv4", "routes", "*", "via"], "readOnly": false, "type": "null or string"}, "networking.interfaces.<name>.ipv6.addresses": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of IPv6 addresses that will be statically assigned to the interface.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    address = \"fdfd:b3f0:482::1\";\n    prefixLength = 48;\n  }\n  {\n    address = \"2001:1470:fffd:2098::e006\";\n    prefixLength = 64;\n  }\n]"}, "loc": ["networking", "interfaces", "<name>", "ipv6", "addresses"], "readOnly": false, "type": "list of (submodule)"}, "networking.interfaces.<name>.ipv6.addresses.*.address": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "IPv6 address of the interface. Leave empty to configure the\ninterface using DHCP.\n"}, "loc": ["networking", "interfaces", "<name>", "ipv6", "addresses", "*", "address"], "readOnly": false, "type": "string"}, "networking.interfaces.<name>.ipv6.addresses.*.prefixLength": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "Subnet mask of the interface, specified as the number of\nbits in the prefix (`64`).\n"}, "loc": ["networking", "interfaces", "<name>", "ipv6", "addresses", "*", "prefixLength"], "readOnly": false, "type": "signed integer"}, "networking.interfaces.<name>.ipv6.routes": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of extra IPv6 static routes that will be assigned to the interface.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    address = \"fdfd:b3f0::\";\n    prefixLength = 48;\n  }\n  {\n    address = \"2001:1470:fffd:2098::\";\n    prefixLength = 64;\n    via = \"fdfd:b3f0::1\";\n  }\n]"}, "loc": ["networking", "interfaces", "<name>", "ipv6", "routes"], "readOnly": false, "type": "list of (submodule)"}, "networking.interfaces.<name>.ipv6.routes.*.address": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "IPv6 address of the network."}, "loc": ["networking", "interfaces", "<name>", "ipv6", "routes", "*", "address"], "readOnly": false, "type": "string"}, "networking.interfaces.<name>.ipv6.routes.*.options": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Other route options. See the symbol `OPTIONS`\nin the `ip-route(8)` manual page for the details.\nYou may also specify `metric`,\n`src`, `protocol`,\n`scope`, `from`\nand `table`, which are technically\nnot route options, in the sense used in the manual.\n"}, "example": {"_type": "literalExpression", "text": "{\n  mtu = \"1492\";\n  window = \"524288\";\n}"}, "loc": ["networking", "interfaces", "<name>", "ipv6", "routes", "*", "options"], "readOnly": false, "type": "attribute set of string"}, "networking.interfaces.<name>.ipv6.routes.*.prefixLength": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "Subnet mask of the network, specified as the number of\nbits in the prefix (`64`).\n"}, "loc": ["networking", "interfaces", "<name>", "ipv6", "routes", "*", "prefixLength"], "readOnly": false, "type": "signed integer"}, "networking.interfaces.<name>.ipv6.routes.*.type": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Type of the route.  See the `Route types` section\nin the `ip-route(8)` manual page for the details.\n\nNote that `prohibit`, `blackhole`,\n`unreachable`, and `throw` cannot\nbe configured per device, so they are not available here. Similarly,\n`nat` hasn't been supported since kernel 2.6.\n"}, "loc": ["networking", "interfaces", "<name>", "ipv6", "routes", "*", "type"], "readOnly": false, "type": "null or one of \"unicast\", \"local\", \"broadcast\", \"multicast\""}, "networking.interfaces.<name>.ipv6.routes.*.via": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IPv6 address of the next hop."}, "loc": ["networking", "interfaces", "<name>", "ipv6", "routes", "*", "via"], "readOnly": false, "type": "null or string"}, "networking.interfaces.<name>.macAddress": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "MAC address of the interface. Leave empty to use the default.\n"}, "example": {"_type": "literalExpression", "text": "\"00:11:22:33:44:55\""}, "loc": ["networking", "interfaces", "<name>", "macAddress"], "readOnly": false, "type": "null or string"}, "networking.interfaces.<name>.mtu": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "MTU size for packets leaving the interface. Leave empty to use the default.\n"}, "example": {"_type": "literalExpression", "text": "9000"}, "loc": ["networking", "interfaces", "<name>", "mtu"], "readOnly": false, "type": "null or signed integer"}, "networking.interfaces.<name>.name": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "Name of the interface."}, "example": {"_type": "literalExpression", "text": "\"eth0\""}, "loc": ["networking", "interfaces", "<name>", "name"], "readOnly": false, "type": "string"}, "networking.interfaces.<name>.proxyARP": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Turn on proxy_arp for this device.\nThis is mainly useful for creating pseudo-bridges between a real\ninterface and a virtual network such as VPN or a virtual machine for\ninterfaces that don't support real bridging (most wlan interfaces).\nAs ARP proxying acts slightly above the link-layer, below-ip traffic\nisn't bridged, so things like DHCP won't work. The advantage above\nusing NAT lies in the fact that no IP addresses are shared, so all\nhosts are reachable/routeable.\n\nWARNING: turns on ip-routing, so if you have multiple interfaces, you\nshould think of the consequence and setup firewall rules to limit this.\n"}, "loc": ["networking", "interfaces", "<name>", "proxyARP"], "readOnly": false, "type": "boolean"}, "networking.interfaces.<name>.tempAddress": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "config.networking.tempAddresses"}, "description": {"_type": "mdDoc", "text": "When IPv6 is enabled with SLAAC, this option controls the use of\ntemporary address (aka privacy extensions) on this\ninterface. This is used to reduce tracking.\n\nSee also the global option\n[](#opt-networking.tempAddresses), which\napplies to all interfaces where this is not set.\n\nPossible values are:\n- `\"default\"` to generate IPv6 temporary addresses and use these as source addresses in routing;\n- `\"disabled\"` to completely disable IPv6 temporary addresses;\n- `\"enabled\"` to generate IPv6 temporary addresses but still use EUI-64 addresses as source addresses;\n"}, "loc": ["networking", "interfaces", "<name>", "tempAddress"], "readOnly": false, "type": "one of \"default\", \"disabled\", \"enabled\""}, "networking.interfaces.<name>.useDHCP": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether this interface should be configured with dhcp.\nNull implies the old behavior which depends on whether ip addresses\nare specified or not.\n"}, "loc": ["networking", "interfaces", "<name>", "useDHCP"], "readOnly": false, "type": "null or boolean"}, "networking.interfaces.<name>.virtual": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether this interface is virtual and should be created by tunctl.\nThis is mainly useful for creating bridges between a host and a virtual\nnetwork such as VPN or a virtual machine.\n"}, "loc": ["networking", "interfaces", "<name>", "virtual"], "readOnly": false, "type": "boolean"}, "networking.interfaces.<name>.virtualOwner": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "In case of a virtual device, the user who owns it.\n"}, "loc": ["networking", "interfaces", "<name>", "virtualOwner"], "readOnly": false, "type": "string"}, "networking.interfaces.<name>.virtualType": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "if hasPrefix \"tun\" name then \"tun\" else \"tap\""}, "description": {"_type": "mdDoc", "text": "The type of interface to create.\nThe default is TUN for an interface name starting\nwith \"tun\", otherwise TAP.\n"}, "loc": ["networking", "interfaces", "<name>", "virtualType"], "readOnly": false, "type": "one of \"tun\", \"tap\""}, "networking.interfaces.<name>.wakeOnLan.enable": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable wol on this interface."}, "loc": ["networking", "interfaces", "<name>", "wakeOnLan", "enable"], "readOnly": false, "type": "boolean"}, "networking.iproute2.enable": {"declarations": ["nixos/modules/config/iproute2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable copy IP route configuration files."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["networking", "iproute2", "enable"], "readOnly": false, "type": "boolean"}, "networking.iproute2.rttablesExtraConfig": {"declarations": ["nixos/modules/config/iproute2.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim lines to add to /etc/iproute2/rt_tables\n"}, "loc": ["networking", "iproute2", "rttablesExtraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.localCommands": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to be executed at the end of the\n`network-setup` systemd service.  Note that if\nyou are using DHCP to obtain the network configuration,\ninterfaces may not be fully configured yet.\n"}, "example": {"_type": "literalExpression", "text": "\"text=anything; echo You can put $text here.\""}, "loc": ["networking", "localCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.macvlans": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option allows you to define macvlan interfaces which should\nbe automatically created.\n"}, "example": {"_type": "literalExpression", "text": "{\n  wan = {\n    interface = \"enp2s0\";\n    mode = \"vepa\";\n  };\n}\n"}, "loc": ["networking", "macvlans"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.macvlans.<name>.interface": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "The interface the macvlan will transmit packets through."}, "example": {"_type": "literalExpression", "text": "\"enp4s0\""}, "loc": ["networking", "macvlans", "<name>", "interface"], "readOnly": false, "type": "string"}, "networking.macvlans.<name>.mode": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The mode of the macvlan device."}, "example": {"_type": "literalExpression", "text": "\"vepa\""}, "loc": ["networking", "macvlans", "<name>", "mode"], "readOnly": false, "type": "null or string"}, "networking.nameservers": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The list of nameservers.  It can be left empty if it is auto-detected through DHCP.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"130.161.158.4\"\n  \"130.161.33.17\"\n]"}, "loc": ["networking", "nameservers"], "readOnly": false, "type": "list of string"}, "networking.nat.dmzHost": {"declarations": ["nixos/modules/services/networking/nat.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The local IP address to which all traffic that does not match any\nforwarding rule is forwarded.\n"}, "example": {"_type": "literalExpression", "text": "\"10.0.0.1\""}, "loc": ["networking", "nat", "dmzHost"], "readOnly": false, "type": "null or string"}, "networking.nat.enable": {"declarations": ["nixos/modules/services/networking/nat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Network Address Translation (NAT).\n"}, "loc": ["networking", "nat", "enable"], "readOnly": false, "type": "boolean"}, "networking.nat.enableIPv6": {"declarations": ["nixos/modules/services/networking/nat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable IPv6 NAT.\n"}, "loc": ["networking", "nat", "enableIPv6"], "readOnly": false, "type": "boolean"}, "networking.nat.externalIP": {"declarations": ["nixos/modules/services/networking/nat.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The public IP address to which packets from the local\nnetwork are to be rewritten.  If this is left empty, the\nIP address associated with the external interface will be\nused.\n"}, "example": {"_type": "literalExpression", "text": "\"203.0.113.123\""}, "loc": ["networking", "nat", "externalIP"], "readOnly": false, "type": "null or string"}, "networking.nat.externalIPv6": {"declarations": ["nixos/modules/services/networking/nat.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The public IPv6 address to which packets from the local\nnetwork are to be rewritten.  If this is left empty, the\nIP address associated with the external interface will be\nused.\n"}, "example": {"_type": "literalExpression", "text": "\"2001:dc0:2001:11::175\""}, "loc": ["networking", "nat", "externalIPv6"], "readOnly": false, "type": "null or string"}, "networking.nat.externalInterface": {"declarations": ["nixos/modules/services/networking/nat.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the external network interface.\n"}, "example": {"_type": "literalExpression", "text": "\"eth1\""}, "loc": ["networking", "nat", "externalInterface"], "readOnly": false, "type": "null or string"}, "networking.nat.extraCommands": {"declarations": ["nixos/modules/services/networking/nat-iptables.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional shell commands executed as part of the nat\ninitialisation script.\n\nThis option is incompatible with the nftables based nat module.\n"}, "example": {"_type": "literalExpression", "text": "\"iptables -A INPUT -p icmp -j ACCEPT\""}, "loc": ["networking", "nat", "extraCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.nat.extraStopCommands": {"declarations": ["nixos/modules/services/networking/nat-iptables.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional shell commands executed as part of the nat\nteardown script.\n\nThis option is incompatible with the nftables based nat module.\n"}, "example": {"_type": "literalExpression", "text": "\"iptables -D INPUT -p icmp -j ACCEPT || true\""}, "loc": ["networking", "nat", "extraStopCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.nat.forwardPorts": {"declarations": ["nixos/modules/services/networking/nat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of forwarded ports from the external interface to\ninternal destinations by using DNAT. Destination can be\nIPv6 if IPv6 NAT is enabled.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    destination = \"10.0.0.1:80\";\n    proto = \"tcp\";\n    sourcePort = 8080;\n  }\n  {\n    destination = \"[fc00::2]:80\";\n    proto = \"tcp\";\n    sourcePort = 8080;\n  }\n]"}, "loc": ["networking", "nat", "forwardPorts"], "readOnly": false, "type": "list of (submodule)"}, "networking.nat.forwardPorts.*.destination": {"declarations": ["nixos/modules/services/networking/nat.nix"], "description": {"_type": "mdDoc", "text": "Forward connection to destination ip:port (or [ipv6]:port); to specify a port range, use ip:start-end"}, "example": {"_type": "literalExpression", "text": "\"10.0.0.1:80\""}, "loc": ["networking", "nat", "forwardPorts", "*", "destination"], "readOnly": false, "type": "string"}, "networking.nat.forwardPorts.*.loopbackIPs": {"declarations": ["nixos/modules/services/networking/nat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Public IPs for NAT reflection; for connections to `loopbackip:sourcePort` from the host itself and from other hosts behind NAT"}, "example": {"_type": "literalExpression", "text": "[ \"55.1.2.3\" ]"}, "loc": ["networking", "nat", "forwardPorts", "*", "loopbackIPs"], "readOnly": false, "type": "list of string"}, "networking.nat.forwardPorts.*.proto": {"declarations": ["nixos/modules/services/networking/nat.nix"], "default": {"_type": "literalExpression", "text": "\"tcp\""}, "description": {"_type": "mdDoc", "text": "Protocol of forwarded connection"}, "example": {"_type": "literalExpression", "text": "\"udp\""}, "loc": ["networking", "nat", "forwardPorts", "*", "proto"], "readOnly": false, "type": "string"}, "networking.nat.forwardPorts.*.sourcePort": {"declarations": ["nixos/modules/services/networking/nat.nix"], "description": {"_type": "mdDoc", "text": "Source port of the external interface; to specify a port range, use a string with a colon (e.g. \"60000:61000\")"}, "example": {"_type": "literalExpression", "text": "8080"}, "loc": ["networking", "nat", "forwardPorts", "*", "sourcePort"], "readOnly": false, "type": "signed integer or string matching the pattern [[:digit:]]+:[[:digit:]]+"}, "networking.nat.internalIPs": {"declarations": ["nixos/modules/services/networking/nat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The IP address ranges for which to perform NAT.  Packets\ncoming from these addresses (on any interface) and destined\nfor the external interface will be rewritten.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168.1.0/24\"\n]"}, "loc": ["networking", "nat", "internalIPs"], "readOnly": false, "type": "list of string"}, "networking.nat.internalIPv6s": {"declarations": ["nixos/modules/services/networking/nat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The IPv6 address ranges for which to perform NAT.  Packets\ncoming from these addresses (on any interface) and destined\nfor the external interface will be rewritten.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"fc00::/64\"\n]"}, "loc": ["networking", "nat", "internalIPv6s"], "readOnly": false, "type": "list of string"}, "networking.nat.internalInterfaces": {"declarations": ["nixos/modules/services/networking/nat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The interfaces for which to perform NAT. Packets coming from\nthese interface and destined for the external interface will\nbe rewritten.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"eth0\"\n]"}, "loc": ["networking", "nat", "internalInterfaces"], "readOnly": false, "type": "list of string"}, "networking.networkmanager.appendNameservers": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of name servers that should be appended\nto the ones configured in NetworkManager or received by DHCP.\n"}, "loc": ["networking", "networkmanager", "appendNameservers"], "readOnly": false, "type": "list of string"}, "networking.networkmanager.connectionConfig": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for the [connection] section of NetworkManager.conf.\nRefer to\n[\n  https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html#id-1.2.3.11\n](https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html)\nor\n{manpage}`NetworkManager.conf(5)`\nfor more information.\n"}, "loc": ["networking", "networkmanager", "connectionConfig"], "readOnly": false, "type": "attribute set of (null or boolean or signed integer or string)"}, "networking.networkmanager.dhcp": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "\"internal\""}, "description": {"_type": "mdDoc", "text": "Which program (or internal library) should be used for DHCP.\n"}, "loc": ["networking", "networkmanager", "dhcp"], "readOnly": false, "type": "one of \"dhcpcd\", \"internal\""}, "networking.networkmanager.dispatcherScripts": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of scripts which will be executed in response to  network  events.\n"}, "example": {"_type": "literalExpression", "text": "[ {\n      source = pkgs.writeText \"upHook\" ''\n\n        if [ \"$2\" != \"up\" ]; then\n            logger \"exit: event $2 != up\"\n            exit\n        fi\n\n        # coreutils and iproute are in PATH too\n        logger \"Device $DEVICE_IFACE coming up\"\n    '';\n    type = \"basic\";\n} ]"}, "loc": ["networking", "networkmanager", "dispatcherScripts"], "readOnly": false, "type": "list of (submodule)"}, "networking.networkmanager.dispatcherScripts.*.source": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "description": {"_type": "mdDoc", "text": "Path to the hook script.\n"}, "loc": ["networking", "networkmanager", "dispatcherScripts", "*", "source"], "readOnly": false, "type": "path"}, "networking.networkmanager.dispatcherScripts.*.type": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "\"basic\""}, "description": {"_type": "mdDoc", "text": "Dispatcher hook type. Look up the hooks described at\n[https://developer.gnome.org/NetworkManager/stable/NetworkManager.html](https://developer.gnome.org/NetworkManager/stable/NetworkManager.html)\nand choose the type depending on the output folder.\nYou should then filter the event type (e.g., \"up\"/\"down\") from within your script.\n"}, "loc": ["networking", "networkmanager", "dispatcherScripts", "*", "type"], "readOnly": false, "type": "one of \"basic\", \"pre-down\", \"pre-up\""}, "networking.networkmanager.dns": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "\"default\""}, "description": {"_type": "mdDoc", "text": "Set the DNS (`resolv.conf`) processing mode.\n\nA description of these modes can be found in the main section of\n[\n  https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html\n](https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html)\nor in\n{manpage}`NetworkManager.conf(5)`.\n"}, "loc": ["networking", "networkmanager", "dns"], "readOnly": false, "type": "one of \"default\", \"dnsmasq\", \"unbound\", \"systemd-resolved\", \"none\""}, "networking.networkmanager.enable": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use NetworkManager to obtain an IP address and other\nconfiguration for all network interfaces that are not manually\nconfigured. If enabled, a group `networkmanager`\nwill be created. Add all users that should have permission\nto change network settings to this group.\n"}, "loc": ["networking", "networkmanager", "enable"], "readOnly": false, "type": "boolean"}, "networking.networkmanager.enableFccUnlock": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable FCC unlock procedures. Since release 1.18.4, the ModemManager daemon no longer\nautomatically performs the FCC unlock procedure by default. See\n[the docs](https://modemmanager.org/docs/modemmanager/fcc-unlock/)\nfor more details.\n"}, "loc": ["networking", "networkmanager", "enableFccUnlock"], "readOnly": false, "type": "boolean"}, "networking.networkmanager.enableStrongSwan": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the StrongSwan plugin.\n\nIf you enable this option the\n`networkmanager_strongswan` plugin will be added to\nthe {option}`networking.networkmanager.plugins` option\nso you don't need to do that yourself.\n"}, "loc": ["networking", "networkmanager", "enableStrongSwan"], "readOnly": false, "type": "boolean"}, "networking.networkmanager.ethernet.macAddress": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "\"preserve\""}, "description": {"_type": "mdDoc", "text": "Set the MAC address of the interface.\n\n- `\"XX:XX:XX:XX:XX:XX\"`: MAC address of the interface\n- `\"permanent\"`: Use the permanent MAC address of the device\n- `\"preserve\"`: Don\u2019t change the MAC address of the device upon activation\n- `\"random\"`: Generate a randomized value upon each connect\n- `\"stable\"`: Generate a stable, hashed MAC address\n"}, "example": {"_type": "literalExpression", "text": "\"00:11:22:33:44:55\""}, "loc": ["networking", "networkmanager", "ethernet", "macAddress"], "readOnly": false, "type": "string or one of \"permanent\", \"preserve\", \"random\", \"stable\""}, "networking.networkmanager.extraConfig": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration appended to the generated NetworkManager.conf.\nRefer to\n[\n  https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html\n](https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html)\nor\n{manpage}`NetworkManager.conf(5)`\nfor more information.\n"}, "loc": ["networking", "networkmanager", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.networkmanager.firewallBackend": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "\"iptables\""}, "description": {"_type": "mdDoc", "text": "Which firewall backend should be used for configuring masquerading with shared mode.\nIf set to none, NetworkManager doesn't manage the configuration at all.\n"}, "loc": ["networking", "networkmanager", "firewallBackend"], "readOnly": false, "type": "one of \"iptables\", \"nftables\", \"none\""}, "networking.networkmanager.insertNameservers": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of name servers that should be inserted before\nthe ones configured in NetworkManager or received by DHCP.\n"}, "loc": ["networking", "networkmanager", "insertNameservers"], "readOnly": false, "type": "list of string"}, "networking.networkmanager.logLevel": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "\"WARN\""}, "description": {"_type": "mdDoc", "text": "Set the default logging verbosity level.\n"}, "loc": ["networking", "networkmanager", "logLevel"], "readOnly": false, "type": "one of \"OFF\", \"ERR\", \"WARN\", \"INFO\", \"DEBUG\", \"TRACE\""}, "networking.networkmanager.plugins": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of NetworkManager plug-ins to enable.\nSome plug-ins are enabled by the NetworkManager module by default.\n"}, "loc": ["networking", "networkmanager", "plugins"], "readOnly": false, "type": "list of NetworkManager plug-in"}, "networking.networkmanager.unmanaged": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of interfaces that will not be managed by NetworkManager.\nInterface name can be specified here, but if you need more fidelity,\nrefer to\n[\n  https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html#device-spec\n](https://developer.gnome.org/NetworkManager/stable/NetworkManager.conf.html#device-spec)\nor the \"Device List Format\" Appendix of\n{manpage}`NetworkManager.conf(5)`.\n"}, "loc": ["networking", "networkmanager", "unmanaged"], "readOnly": false, "type": "list of string"}, "networking.networkmanager.wifi.backend": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "\"wpa_supplicant\""}, "description": {"_type": "mdDoc", "text": "Specify the Wi-Fi backend used for the device.\nCurrently supported are {option}`wpa_supplicant` or {option}`iwd` (experimental).\n"}, "loc": ["networking", "networkmanager", "wifi", "backend"], "readOnly": false, "type": "one of \"wpa_supplicant\", \"iwd\""}, "networking.networkmanager.wifi.macAddress": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "\"preserve\""}, "description": {"_type": "mdDoc", "text": "Set the MAC address of the interface.\n\n- `\"XX:XX:XX:XX:XX:XX\"`: MAC address of the interface\n- `\"permanent\"`: Use the permanent MAC address of the device\n- `\"preserve\"`: Don\u2019t change the MAC address of the device upon activation\n- `\"random\"`: Generate a randomized value upon each connect\n- `\"stable\"`: Generate a stable, hashed MAC address\n"}, "example": {"_type": "literalExpression", "text": "\"00:11:22:33:44:55\""}, "loc": ["networking", "networkmanager", "wifi", "macAddress"], "readOnly": false, "type": "string or one of \"permanent\", \"preserve\", \"random\", \"stable\""}, "networking.networkmanager.wifi.powersave": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to enable Wi-Fi power saving.\n"}, "loc": ["networking", "networkmanager", "wifi", "powersave"], "readOnly": false, "type": "null or boolean"}, "networking.networkmanager.wifi.scanRandMacAddress": {"declarations": ["nixos/modules/services/networking/networkmanager.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable MAC address randomization of a Wi-Fi device\nduring scanning.\n"}, "loc": ["networking", "networkmanager", "wifi", "scanRandMacAddress"], "readOnly": false, "type": "boolean"}, "networking.nftables.checkRuleset": {"declarations": ["nixos/modules/services/networking/nftables.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Run `nft check` on the ruleset to spot syntax errors during build.\nBecause this is executed in a sandbox, the check might fail if it requires\naccess to any environmental factors or paths outside the Nix store.\nTo circumvent this, the ruleset file can be edited using the preCheckRuleset\noption to work in the sandbox environment.\n"}, "loc": ["networking", "nftables", "checkRuleset"], "readOnly": false, "type": "boolean"}, "networking.nftables.enable": {"declarations": ["nixos/modules/services/networking/nftables.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nftables and use nftables based firewall if enabled.\nnftables is a Linux-based packet filtering framework intended to\nreplace frameworks like iptables.\n\nNote that if you have Docker enabled you will not be able to use\nnftables without intervention. Docker uses iptables internally to\nsetup NAT for containers. This module disables the ip_tables kernel\nmodule, however Docker automatically loads the module. Please see\n<https://github.com/NixOS/nixpkgs/issues/24318#issuecomment-289216273>\nfor more information.\n\nThere are other programs that use iptables internally too, such as\nlibvirt. For information on how the two firewalls interact, see\n<https://wiki.nftables.org/wiki-nftables/index.php/Troubleshooting#Question_4._How_do_nftables_and_iptables_interact_when_used_on_the_same_system.3F>.\n"}, "loc": ["networking", "nftables", "enable"], "readOnly": false, "type": "boolean"}, "networking.nftables.preCheckRuleset": {"declarations": ["nixos/modules/services/networking/nftables.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "This script gets run before the ruleset is checked. It can be used to\ncreate additional files needed for the ruleset check to work, or modify\nthe ruleset for cases the build environment cannot cover.\n"}, "example": {"_type": "literalExpression", "text": "sed 's/skgid meadow/skgid nogroup/g' -i ruleset.conf\n"}, "loc": ["networking", "nftables", "preCheckRuleset"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.nftables.ruleset": {"declarations": ["nixos/modules/services/networking/nftables.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The ruleset to be used with nftables.  Should be in a format that\ncan be loaded using \"/bin/nft -f\".  The ruleset is updated atomically.\nThis option conflicts with rulesetFile.\n"}, "example": {"_type": "literalExpression", "text": "''\n  # Check out https://wiki.nftables.org/ for better documentation.\n  # Table for both IPv4 and IPv6.\n  table inet filter {\n    # Block all incoming connections traffic except SSH and \"ping\".\n    chain input {\n      type filter hook input priority 0;\n  \n      # accept any localhost traffic\n      iifname lo accept\n  \n      # accept traffic originated from us\n      ct state {established, related} accept\n  \n      # ICMP\n      # routers may also want: mld-listener-query, nd-router-solicit\n      ip6 nexthdr icmpv6 icmpv6 type { destination-unreachable, packet-too-big, time-exceeded, parameter-problem, nd-router-advert, nd-neighbor-solicit, nd-neighbor-advert } accept\n      ip protocol icmp icmp type { destination-unreachable, router-advertisement, time-exceeded, parameter-problem } accept\n  \n      # allow \"ping\"\n      ip6 nexthdr icmpv6 icmpv6 type echo-request accept\n      ip protocol icmp icmp type echo-request accept\n  \n      # accept SSH connections (required for a server)\n      tcp dport 22 accept\n  \n      # count and drop any other traffic\n      counter drop\n    }\n  \n    # Allow all outgoing connections.\n    chain output {\n      type filter hook output priority 0;\n      accept\n    }\n  \n    chain forward {\n      type filter hook forward priority 0;\n      accept\n    }\n  }\n''"}, "loc": ["networking", "nftables", "ruleset"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.nftables.rulesetFile": {"declarations": ["nixos/modules/services/networking/nftables.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The ruleset file to be used with nftables.  Should be in a format that\ncan be loaded using \"nft -f\".  The ruleset is updated atomically.\nThis option conflicts with ruleset and nftables based firewall.\n"}, "loc": ["networking", "nftables", "rulesetFile"], "readOnly": false, "type": "null or path"}, "networking.openconnect.interfaces": {"declarations": ["nixos/modules/services/networking/openconnect.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "OpenConnect interfaces."}, "example": {"_type": "literalExpression", "text": "{\n  openconnect0 = {\n    gateway = \"gateway.example.com\";\n    passwordFile = \"/var/lib/secrets/openconnect-passwd\";\n    protocol = \"anyconnect\";\n    user = \"example-user\";\n  };\n}"}, "loc": ["networking", "openconnect", "interfaces"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.openconnect.interfaces.<name>.autoStart": {"declarations": ["nixos/modules/services/networking/openconnect.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether this VPN connection should be started automatically."}, "loc": ["networking", "openconnect", "interfaces", "<name>", "autoStart"], "readOnly": false, "type": "boolean"}, "networking.openconnect.interfaces.<name>.certificate": {"declarations": ["nixos/modules/services/networking/openconnect.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate to authenticate with."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/secrets/openconnect_certificate.pem\""}, "loc": ["networking", "openconnect", "interfaces", "<name>", "certificate"], "readOnly": false, "type": "null or path or PKCS#11 URI"}, "networking.openconnect.interfaces.<name>.extraOptions": {"declarations": ["nixos/modules/services/networking/openconnect.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra config to be appended to the interface config. It should\ncontain long-format options as would be accepted on the command\nline by `openconnect`\n(see https://www.infradead.org/openconnect/manual.html).\nNon-key-value options like `deflate` can be used by\ndeclaring them as booleans, i. e. `deflate = true;`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  compression = \"stateless\";\n  no-dtls = true;\n  no-http-keepalive = true;\n}"}, "loc": ["networking", "openconnect", "interfaces", "<name>", "extraOptions"], "readOnly": false, "type": "attribute set of (string or boolean)"}, "networking.openconnect.interfaces.<name>.gateway": {"declarations": ["nixos/modules/services/networking/openconnect.nix"], "description": {"_type": "mdDoc", "text": "Gateway server to connect to."}, "example": {"_type": "literalExpression", "text": "\"gateway.example.com\""}, "loc": ["networking", "openconnect", "interfaces", "<name>", "gateway"], "readOnly": false, "type": "string"}, "networking.openconnect.interfaces.<name>.passwordFile": {"declarations": ["nixos/modules/services/networking/openconnect.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing the password to authenticate with. This\nis passed to `openconnect` via the\n`--passwd-on-stdin` option.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/secrets/openconnect-passwd\""}, "loc": ["networking", "openconnect", "interfaces", "<name>", "passwordFile"], "readOnly": false, "type": "null or path"}, "networking.openconnect.interfaces.<name>.privateKey": {"declarations": ["nixos/modules/services/networking/openconnect.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Private key to authenticate with."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/secrets/openconnect_private_key.pem\""}, "loc": ["networking", "openconnect", "interfaces", "<name>", "privateKey"], "readOnly": false, "type": "null or path or PKCS#11 URI"}, "networking.openconnect.interfaces.<name>.protocol": {"declarations": ["nixos/modules/services/networking/openconnect.nix"], "description": {"_type": "mdDoc", "text": "Protocol to use."}, "example": {"_type": "literalExpression", "text": "\"anyconnect\""}, "loc": ["networking", "openconnect", "interfaces", "<name>", "protocol"], "readOnly": false, "type": "one of \"anyconnect\", \"array\", \"nc\", \"pulse\", \"gp\", \"f5\", \"fortinet\""}, "networking.openconnect.interfaces.<name>.user": {"declarations": ["nixos/modules/services/networking/openconnect.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Username to authenticate with."}, "example": {"_type": "literalExpression", "text": "\"example-user\""}, "loc": ["networking", "openconnect", "interfaces", "<name>", "user"], "readOnly": false, "type": "null or string"}, "networking.openconnect.package": {"declarations": ["nixos/modules/services/networking/openconnect.nix"], "default": {"_type": "literalExpression", "text": "pkgs.openconnect"}, "description": {"_type": "mdDoc", "text": "The openconnect package to use."}, "loc": ["networking", "openconnect", "package"], "readOnly": false, "type": "package"}, "networking.proxy.allProxy": {"declarations": ["nixos/modules/config/networking.nix"], "default": {"_type": "literalExpression", "text": "config.networking.proxy.default"}, "description": {"_type": "mdDoc", "text": "This option specifies the all_proxy environment variable.\n"}, "example": {"_type": "literalExpression", "text": "\"http://127.0.0.1:3128\""}, "loc": ["networking", "proxy", "allProxy"], "readOnly": false, "type": "null or string"}, "networking.proxy.default": {"declarations": ["nixos/modules/config/networking.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This option specifies the default value for httpProxy, httpsProxy, ftpProxy and rsyncProxy.\n"}, "example": {"_type": "literalExpression", "text": "\"http://127.0.0.1:3128\""}, "loc": ["networking", "proxy", "default"], "readOnly": false, "type": "null or string"}, "networking.proxy.ftpProxy": {"declarations": ["nixos/modules/config/networking.nix"], "default": {"_type": "literalExpression", "text": "config.networking.proxy.default"}, "description": {"_type": "mdDoc", "text": "This option specifies the ftp_proxy environment variable.\n"}, "example": {"_type": "literalExpression", "text": "\"http://127.0.0.1:3128\""}, "loc": ["networking", "proxy", "ftpProxy"], "readOnly": false, "type": "null or string"}, "networking.proxy.httpProxy": {"declarations": ["nixos/modules/config/networking.nix"], "default": {"_type": "literalExpression", "text": "config.networking.proxy.default"}, "description": {"_type": "mdDoc", "text": "This option specifies the http_proxy environment variable.\n"}, "example": {"_type": "literalExpression", "text": "\"http://127.0.0.1:3128\""}, "loc": ["networking", "proxy", "httpProxy"], "readOnly": false, "type": "null or string"}, "networking.proxy.httpsProxy": {"declarations": ["nixos/modules/config/networking.nix"], "default": {"_type": "literalExpression", "text": "config.networking.proxy.default"}, "description": {"_type": "mdDoc", "text": "This option specifies the https_proxy environment variable.\n"}, "example": {"_type": "literalExpression", "text": "\"http://127.0.0.1:3128\""}, "loc": ["networking", "proxy", "httpsProxy"], "readOnly": false, "type": "null or string"}, "networking.proxy.noProxy": {"declarations": ["nixos/modules/config/networking.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This option specifies the no_proxy environment variable.\nIf a default proxy is used and noProxy is null,\nthen noProxy will be set to 127.0.0.1,localhost.\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1,localhost,.localdomain\""}, "loc": ["networking", "proxy", "noProxy"], "readOnly": false, "type": "null or string"}, "networking.proxy.rsyncProxy": {"declarations": ["nixos/modules/config/networking.nix"], "default": {"_type": "literalExpression", "text": "config.networking.proxy.default"}, "description": {"_type": "mdDoc", "text": "This option specifies the rsync_proxy environment variable.\n"}, "example": {"_type": "literalExpression", "text": "\"http://127.0.0.1:3128\""}, "loc": ["networking", "proxy", "rsyncProxy"], "readOnly": false, "type": "null or string"}, "networking.resolvconf.dnsExtensionMechanism": {"declarations": ["nixos/modules/config/resolvconf.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable the `edns0` option in {file}`resolv.conf`. With\nthat option set, `glibc` supports use of the extension mechanisms for\nDNS (EDNS) specified in RFC 2671. The most popular user of that feature is DNSSEC,\nwhich does not work without it.\n"}, "loc": ["networking", "resolvconf", "dnsExtensionMechanism"], "readOnly": false, "type": "boolean"}, "networking.resolvconf.dnsSingleRequest": {"declarations": ["nixos/modules/config/resolvconf.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Recent versions of glibc will issue both ipv4 (A) and ipv6 (AAAA)\naddress queries at the same time, from the same port. Sometimes upstream\nrouters will systemically drop the ipv4 queries. The symptom of this problem is\nthat 'getent hosts example.com' only returns ipv6 (or perhaps only ipv4) addresses. The\nworkaround for this is to specify the option 'single-request' in\n/etc/resolv.conf. This option enables that.\n"}, "loc": ["networking", "resolvconf", "dnsSingleRequest"], "readOnly": false, "type": "boolean"}, "networking.resolvconf.enable": {"declarations": ["nixos/modules/config/resolvconf.nix"], "default": {"_type": "literalExpression", "text": "!(config.environment.etc ? \"resolv.conf\")"}, "description": {"_type": "mdDoc", "text": "Whether DNS configuration is managed by resolvconf.\n"}, "loc": ["networking", "resolvconf", "enable"], "readOnly": false, "type": "boolean"}, "networking.resolvconf.extraConfig": {"declarations": ["nixos/modules/config/resolvconf.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to append to {file}`resolvconf.conf`.\n"}, "example": {"_type": "literalExpression", "text": "\"libc=NO\""}, "loc": ["networking", "resolvconf", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.resolvconf.extraOptions": {"declarations": ["nixos/modules/config/resolvconf.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Set the options in {file}`/etc/resolv.conf`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"ndots:1\"\n  \"rotate\"\n]"}, "loc": ["networking", "resolvconf", "extraOptions"], "readOnly": false, "type": "list of string"}, "networking.resolvconf.package": {"declarations": ["nixos/modules/config/resolvconf.nix"], "default": {"_type": "literalExpression", "text": "pkgs.openresolv"}, "description": {"_type": "mdDoc", "text": "The package that provides the system-wide resolvconf command. Defaults to `openresolv`\nif this module is enabled. Otherwise, can be used by other modules (for example {option}`services.resolved`) to\nprovide a compatibility layer.\n\nThis option generally shouldn't be set by the user.\n"}, "loc": ["networking", "resolvconf", "package"], "readOnly": false, "type": "package"}, "networking.resolvconf.useLocalResolver": {"declarations": ["nixos/modules/config/resolvconf.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use local DNS server for resolving.\n"}, "loc": ["networking", "resolvconf", "useLocalResolver"], "readOnly": false, "type": "boolean"}, "networking.rxe.enable": {"declarations": ["nixos/modules/services/networking/rxe.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable RDMA over converged ethernet."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["networking", "rxe", "enable"], "readOnly": false, "type": "boolean"}, "networking.rxe.interfaces": {"declarations": ["nixos/modules/services/networking/rxe.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Enable RDMA on the listed interfaces. The corresponding virtual\nRDMA interfaces will be named rxe_\\<interface\\>.\nUDP port 4791 must be open on the respective ethernet interfaces.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"eth0\"\n]"}, "loc": ["networking", "rxe", "interfaces"], "readOnly": false, "type": "list of string"}, "networking.search": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The list of search paths used when resolving domain names.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"example.com\"\n  \"home.arpa\"\n]"}, "loc": ["networking", "search"], "readOnly": false, "type": "list of string"}, "networking.sits": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option allows you to define 6-to-4 interfaces which should be automatically created.\n"}, "example": {"_type": "literalExpression", "text": "{\n  hurricane = {\n    remote = \"10.0.0.1\";\n    local = \"10.0.0.22\";\n    ttl = 255;\n  };\n  msipv6 = {\n    remote = \"192.168.0.1\";\n    dev = \"enp3s0\";\n    ttl = 127;\n  };\n}\n"}, "loc": ["networking", "sits"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.sits.<name>.dev": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The underlying network device on which the tunnel resides.\n"}, "example": {"_type": "literalExpression", "text": "\"enp4s0f0\""}, "loc": ["networking", "sits", "<name>", "dev"], "readOnly": false, "type": "null or string"}, "networking.sits.<name>.encapsulation": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configures encapsulation in UDP packets.\n"}, "example": {"_type": "literalExpression", "text": "{\n  port = 9001;\n  type = \"fou\";\n}"}, "loc": ["networking", "sits", "<name>", "encapsulation"], "readOnly": false, "type": "null or (submodule)"}, "networking.sits.<name>.encapsulation.port": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "Destination port for encapsulated packets.\n"}, "example": {"_type": "literalExpression", "text": "9001"}, "loc": ["networking", "sits", "<name>", "encapsulation", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "networking.sits.<name>.encapsulation.sourcePort": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Source port for encapsulated packets. Will be chosen automatically by\nthe kernel if unset.\n"}, "example": {"_type": "literalExpression", "text": "9002"}, "loc": ["networking", "sits", "<name>", "encapsulation", "sourcePort"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "networking.sits.<name>.encapsulation.type": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "Selects encapsulation type. See\n{manpage}`ip-link(8)` for details.\n"}, "loc": ["networking", "sits", "<name>", "encapsulation", "type"], "readOnly": false, "type": "one of \"fou\", \"gue\""}, "networking.sits.<name>.local": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The address of the local endpoint which the remote\nside should send packets to.\n"}, "example": {"_type": "literalExpression", "text": "\"10.0.0.22\""}, "loc": ["networking", "sits", "<name>", "local"], "readOnly": false, "type": "null or string"}, "networking.sits.<name>.remote": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The address of the remote endpoint to forward traffic over.\n"}, "example": {"_type": "literalExpression", "text": "\"10.0.0.1\""}, "loc": ["networking", "sits", "<name>", "remote"], "readOnly": false, "type": "null or string"}, "networking.sits.<name>.ttl": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The time-to-live of the connection to the remote tunnel endpoint.\n"}, "example": {"_type": "literalExpression", "text": "255"}, "loc": ["networking", "sits", "<name>", "ttl"], "readOnly": false, "type": "null or signed integer"}, "networking.stevenblack.block": {"declarations": ["nixos/modules/config/stevenblack.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional blocklist extensions."}, "loc": ["networking", "stevenblack", "block"], "readOnly": false, "type": "list of (one of \"fakenews\", \"gambling\", \"porn\", \"social\")"}, "networking.stevenblack.enable": {"declarations": ["nixos/modules/config/stevenblack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Enable the stevenblack hosts file blocklist."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["networking", "stevenblack", "enable"], "readOnly": false, "type": "boolean"}, "networking.supplicant": {"declarations": ["nixos/modules/services/networking/supplicant.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Interfaces for which to start {command}`wpa_supplicant`.\nThe supplicant is used to scan for and associate with wireless networks,\nor to authenticate with 802.1x capable network switches.\n\nThe value of this option is an attribute set. Each attribute configures a\n{command}`wpa_supplicant` service, where the attribute name specifies\nthe name of the interface that {command}`wpa_supplicant` operates on.\nThe attribute name can be a space separated list of interfaces.\nThe attribute names `WLAN`, `LAN` and `DBUS`\nhave a special meaning. `WLAN` and `LAN` are\nconfigurations for universal {command}`wpa_supplicant` service that is\nstarted for each WLAN interface or for each LAN interface, respectively.\n`DBUS` defines a device-unrelated {command}`wpa_supplicant`\nservice that can be accessed through `D-Bus`.\n"}, "example": {"_type": "literalExpression", "text": "{ \"wlan0 wlan1\" = {\n    configFile.path = \"/etc/wpa_supplicant.conf\";\n    userControlled.group = \"network\";\n    extraConf = ''\n      ap_scan=1\n      p2p_disabled=1\n    '';\n    extraCmdArgs = \"-u -W\";\n    bridge = \"br0\";\n  };\n}\n"}, "loc": ["networking", "supplicant"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.supplicant.<name>.bridge": {"declarations": ["nixos/modules/services/networking/supplicant.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Name of the bridge interface that wpa_supplicant should listen at."}, "loc": ["networking", "supplicant", "<name>", "bridge"], "readOnly": false, "type": "string"}, "networking.supplicant.<name>.configFile.path": {"declarations": ["nixos/modules/services/networking/supplicant.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "External `wpa_supplicant.conf` configuration file.\nThe configuration options defined declaratively within `networking.supplicant` have\nprecedence over options defined in `configFile`.\n"}, "example": {"_type": "literalExpression", "text": "/etc/wpa_supplicant.conf"}, "loc": ["networking", "supplicant", "<name>", "configFile", "path"], "readOnly": false, "type": "null or path"}, "networking.supplicant.<name>.configFile.writable": {"declarations": ["nixos/modules/services/networking/supplicant.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the configuration file at `configFile.path` should be written to by\n`wpa_supplicant`.\n"}, "loc": ["networking", "supplicant", "<name>", "configFile", "writable"], "readOnly": false, "type": "boolean"}, "networking.supplicant.<name>.driver": {"declarations": ["nixos/modules/services/networking/supplicant.nix"], "default": {"_type": "literalExpression", "text": "\"nl80211,wext\""}, "description": {"_type": "mdDoc", "text": "Force a specific wpa_supplicant driver."}, "loc": ["networking", "supplicant", "<name>", "driver"], "readOnly": false, "type": "null or string"}, "networking.supplicant.<name>.extraCmdArgs": {"declarations": ["nixos/modules/services/networking/supplicant.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Command line arguments to add when executing `wpa_supplicant`."}, "example": {"_type": "literalExpression", "text": "\"-e/run/wpa_supplicant/entropy.bin\""}, "loc": ["networking", "supplicant", "<name>", "extraCmdArgs"], "readOnly": false, "type": "string"}, "networking.supplicant.<name>.extraConf": {"declarations": ["nixos/modules/services/networking/supplicant.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration options for `wpa_supplicant.conf`.\nOptions defined here have precedence over options in `configFile`.\nNOTE: Do not write sensitive data into `extraConf` as it will\nbe world-readable in the `nix-store`. For sensitive information\nuse the `configFile` instead.\n"}, "example": {"_type": "literalExpression", "text": "''\n  ap_scan=1\n  device_name=My-NixOS-Device\n  device_type=1-0050F204-1\n  driver_param=use_p2p_group_interface=1\n  disable_scan_offload=1\n  p2p_listen_reg_class=81\n  p2p_listen_channel=1\n  p2p_oper_reg_class=81\n  p2p_oper_channel=1\n  manufacturer=NixOS\n  model_name=NixOS_Unstable\n  model_number=2015\n''"}, "loc": ["networking", "supplicant", "<name>", "extraConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.supplicant.<name>.userControlled.enable": {"declarations": ["nixos/modules/services/networking/supplicant.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli.\nThis is useful for laptop users that switch networks a lot and don't want\nto depend on a large package such as NetworkManager just to pick nearby\naccess points.\n"}, "loc": ["networking", "supplicant", "<name>", "userControlled", "enable"], "readOnly": false, "type": "boolean"}, "networking.supplicant.<name>.userControlled.group": {"declarations": ["nixos/modules/services/networking/supplicant.nix"], "default": {"_type": "literalExpression", "text": "\"wheel\""}, "description": {"_type": "mdDoc", "text": "Members of this group can control wpa_supplicant."}, "example": {"_type": "literalExpression", "text": "\"network\""}, "loc": ["networking", "supplicant", "<name>", "userControlled", "group"], "readOnly": false, "type": "string"}, "networking.supplicant.<name>.userControlled.socketDir": {"declarations": ["nixos/modules/services/networking/supplicant.nix"], "default": {"_type": "literalExpression", "text": "\"/run/wpa_supplicant\""}, "description": {"_type": "mdDoc", "text": "Directory of sockets for controlling wpa_supplicant."}, "loc": ["networking", "supplicant", "<name>", "userControlled", "socketDir"], "readOnly": false, "type": "string"}, "networking.tcpcrypt.enable": {"declarations": ["nixos/modules/services/networking/tcpcrypt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable opportunistic TCP encryption. If the other end\nspeaks Tcpcrypt, then your traffic will be encrypted; otherwise\nit will be sent in clear text. Thus, Tcpcrypt alone provides no\nguarantees -- it is best effort. If, however, a Tcpcrypt\nconnection is successful and any attackers that exist are\npassive, then Tcpcrypt guarantees privacy.\n"}, "loc": ["networking", "tcpcrypt", "enable"], "readOnly": false, "type": "boolean"}, "networking.tempAddresses": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "if ${config.networking.enableIPv6} then \"default\" else \"disabled\"\n"}, "description": {"_type": "mdDoc", "text": "Whether to enable IPv6 Privacy Extensions for interfaces not\nconfigured explicitly in\n[](#opt-networking.interfaces._name_.tempAddress).\n\nThis sets the ipv6.conf.*.use_tempaddr sysctl for all\ninterfaces. Possible values are:\n\n- `\"default\"` to generate IPv6 temporary addresses and use these as source addresses in routing;\n- `\"disabled\"` to completely disable IPv6 temporary addresses;\n- `\"enabled\"` to generate IPv6 temporary addresses but still use EUI-64 addresses as source addresses;\n"}, "loc": ["networking", "tempAddresses"], "readOnly": false, "type": "one of \"default\", \"disabled\", \"enabled\""}, "networking.timeServers": {"declarations": ["nixos/modules/config/networking.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"0.nixos.pool.ntp.org\"\n  \"1.nixos.pool.ntp.org\"\n  \"2.nixos.pool.ntp.org\"\n  \"3.nixos.pool.ntp.org\"\n]"}, "description": {"_type": "mdDoc", "text": "The set of NTP servers from which to synchronise.\n"}, "loc": ["networking", "timeServers"], "readOnly": false, "type": "list of string"}, "networking.ucarp.addr": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "description": {"_type": "mdDoc", "text": "Virtual shared IP address."}, "loc": ["networking", "ucarp", "addr"], "readOnly": false, "type": "string"}, "networking.ucarp.advBase": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Advertisement frequency in seconds."}, "loc": ["networking", "ucarp", "advBase"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "networking.ucarp.advSkew": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Advertisement skew in seconds."}, "loc": ["networking", "ucarp", "advSkew"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "networking.ucarp.deadratio": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Ratio to consider a host as dead."}, "loc": ["networking", "ucarp", "deadratio"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "networking.ucarp.downscript": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "description": {"_type": "mdDoc", "text": "Command to run after become backup, the interface name, virtual address\nand optional extra parameters are passed as arguments.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.writeScript \"downscript\" ''\n  #!/bin/sh\n  ${pkgs.iproute2}/bin/ip addr del \"$2\"/24 dev \"$1\"\n'';\n"}, "loc": ["networking", "ucarp", "downscript"], "readOnly": false, "type": "path"}, "networking.ucarp.enable": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ucarp, userspace implementation of CARP."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["networking", "ucarp", "enable"], "readOnly": false, "type": "boolean"}, "networking.ucarp.extraParam": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Extra parameter to pass to the up/down scripts."}, "loc": ["networking", "ucarp", "extraParam"], "readOnly": false, "type": "null or string"}, "networking.ucarp.ignoreIfState": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Ignore interface state, e.g., down or no carrier."}, "loc": ["networking", "ucarp", "ignoreIfState"], "readOnly": false, "type": "boolean"}, "networking.ucarp.interface": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "description": {"_type": "mdDoc", "text": "Network interface to bind to."}, "example": {"_type": "literalExpression", "text": "\"eth0\""}, "loc": ["networking", "ucarp", "interface"], "readOnly": false, "type": "string"}, "networking.ucarp.neutral": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Do not run downscript at start if the host is the backup."}, "loc": ["networking", "ucarp", "neutral"], "readOnly": false, "type": "boolean"}, "networking.ucarp.noMcast": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use broadcast instead of multicast advertisements."}, "loc": ["networking", "ucarp", "noMcast"], "readOnly": false, "type": "boolean"}, "networking.ucarp.package": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ucarp"}, "description": {"_type": "mdDoc", "text": "Package that should be used for ucarp.\n\nPlease note that the default package, pkgs.ucarp, has not received any\nupstream updates for a long time and can be considered as unmaintained.\n"}, "loc": ["networking", "ucarp", "package"], "readOnly": false, "type": "package"}, "networking.ucarp.passwordFile": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "description": {"_type": "mdDoc", "text": "File containing shared password between CARP hosts."}, "example": {"_type": "literalExpression", "text": "\"/run/keys/ucarp-password\""}, "loc": ["networking", "ucarp", "passwordFile"], "readOnly": false, "type": "string"}, "networking.ucarp.preempt": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable preemptive failover.\nThus, this host becomes the CARP master as soon as possible.\n"}, "loc": ["networking", "ucarp", "preempt"], "readOnly": false, "type": "boolean"}, "networking.ucarp.shutdown": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Call downscript at exit."}, "loc": ["networking", "ucarp", "shutdown"], "readOnly": false, "type": "boolean"}, "networking.ucarp.srcIp": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "description": {"_type": "mdDoc", "text": "Source (real) IP address of this host."}, "loc": ["networking", "ucarp", "srcIp"], "readOnly": false, "type": "string"}, "networking.ucarp.upscript": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "description": {"_type": "mdDoc", "text": "Command to run after become master, the interface name, virtual address\nand optional extra parameters are passed as arguments.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.writeScript \"upscript\" ''\n  #!/bin/sh\n  ${pkgs.iproute2}/bin/ip addr add \"$2\"/24 dev \"$1\"\n'';\n"}, "loc": ["networking", "ucarp", "upscript"], "readOnly": false, "type": "path"}, "networking.ucarp.vhId": {"declarations": ["nixos/modules/services/networking/ucarp.nix"], "description": {"_type": "mdDoc", "text": "Virtual IP identifier shared between CARP hosts."}, "example": {"_type": "literalExpression", "text": "1"}, "loc": ["networking", "ucarp", "vhId"], "readOnly": false, "type": "integer between 1 and 255 (both inclusive)"}, "networking.useDHCP": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to use DHCP to obtain an IP address and other\nconfiguration for all network interfaces that are not manually\nconfigured.\n"}, "loc": ["networking", "useDHCP"], "readOnly": false, "type": "boolean"}, "networking.useHostResolvConf": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "In containers, whether to use the\n{file}`resolv.conf` supplied by the host.\n"}, "loc": ["networking", "useHostResolvConf"], "readOnly": false, "type": "boolean"}, "networking.useNetworkd": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether we should use networkd as the network configuration backend or\nthe legacy script based system. Note that this option is experimental,\nenable at your own risk.\n"}, "loc": ["networking", "useNetworkd"], "readOnly": false, "type": "boolean"}, "networking.usePredictableInterfaceNames": {"declarations": ["nixos/modules/services/hardware/udev.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to assign [predictable names to network interfaces](http://www.freedesktop.org/wiki/Software/systemd/PredictableNetworkInterfaceNames).\nIf enabled, interfaces\nare assigned names that contain topology information\n(e.g. `wlp3s0`) and thus should be stable\nacross reboots.  If disabled, names depend on the order in\nwhich interfaces are discovered by the kernel, which may\nchange randomly across reboots; for instance, you may find\n`eth0` and `eth1` flipping\nunpredictably.\n"}, "loc": ["networking", "usePredictableInterfaceNames"], "readOnly": false, "type": "boolean"}, "networking.vlans": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option allows you to define vlan devices that tag packets\non top of a physical interface. The value of this option is an\nattribute set. Each attribute specifies a vlan, with the name\nspecifying the name of the vlan interface.\n"}, "example": {"_type": "literalExpression", "text": "{\n  vlan0 = {\n    id = 3;\n    interface = \"enp3s0\";\n  };\n  vlan1 = {\n    id = 1;\n    interface = \"wlan0\";\n  };\n}\n"}, "loc": ["networking", "vlans"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.vlans.<name>.id": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "The vlan identifier"}, "example": {"_type": "literalExpression", "text": "1"}, "loc": ["networking", "vlans", "<name>", "id"], "readOnly": false, "type": "signed integer"}, "networking.vlans.<name>.interface": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "The interface the vlan will transmit packets through."}, "example": {"_type": "literalExpression", "text": "\"enp4s0\""}, "loc": ["networking", "vlans", "<name>", "interface"], "readOnly": false, "type": "string"}, "networking.vswitches": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option allows you to define Open vSwitches that connect\nphysical networks together. The value of this option is an\nattribute set. Each attribute specifies a vswitch, with the\nattribute name specifying the name of the vswitch's network\ninterface.\n"}, "example": {"_type": "literalExpression", "text": "{\n  vs0 = {\n    interfaces = {\n      eth0 = { };\n      lo1 = {\n        type = \"internal\";\n      };\n    };\n  };\n  vs1 = {\n    interfaces = [\n      {\n        name = \"eth2\";\n      }\n      {\n        name = \"lo2\";\n        type = \"internal\";\n      }\n    ];\n  };\n}"}, "loc": ["networking", "vswitches"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.vswitches.<name>.controllers": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Specify the controller targets. For the allowed options see `man 8 ovs-vsctl`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"ptcp:6653:[::1]\"\n]"}, "loc": ["networking", "vswitches", "<name>", "controllers"], "readOnly": false, "type": "list of string"}, "networking.vswitches.<name>.extraOvsctlCmds": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Commands to manipulate the Open vSwitch database. Every line executed with `ovs-vsctl`.\nAll commands are bundled together with the operations for adding the interfaces\ninto one atomic operation.\n"}, "example": {"_type": "literalExpression", "text": "''\n  set-fail-mode <switch_name> secure\n  set Bridge <switch_name> stp_enable=true\n''"}, "loc": ["networking", "vswitches", "<name>", "extraOvsctlCmds"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.vswitches.<name>.interfaces": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "The physical network interfaces connected by the vSwitch."}, "loc": ["networking", "vswitches", "<name>", "interfaces"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.vswitches.<name>.interfaces.<name>.name": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "Name of the interface"}, "example": {"_type": "literalExpression", "text": "\"eth0\""}, "loc": ["networking", "vswitches", "<name>", "interfaces", "<name>", "name"], "readOnly": false, "type": "string"}, "networking.vswitches.<name>.interfaces.<name>.type": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Openvswitch type to assign to interface"}, "example": {"_type": "literalExpression", "text": "\"internal\""}, "loc": ["networking", "vswitches", "<name>", "interfaces", "<name>", "type"], "readOnly": false, "type": "null or string"}, "networking.vswitches.<name>.interfaces.<name>.vlan": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Vlan tag to apply to interface"}, "example": {"_type": "literalExpression", "text": "10"}, "loc": ["networking", "vswitches", "<name>", "interfaces", "<name>", "vlan"], "readOnly": false, "type": "null or signed integer"}, "networking.vswitches.<name>.openFlowRules": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "OpenFlow rules to insert into the Open vSwitch. All `openFlowRules` are\nloaded with `ovs-ofctl` within one atomic operation.\n"}, "example": {"_type": "literalExpression", "text": "''\n  actions=normal\n''"}, "loc": ["networking", "vswitches", "<name>", "openFlowRules"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "networking.vswitches.<name>.openFlowVersion": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "\"OpenFlow13\""}, "description": {"_type": "mdDoc", "text": "Version of OpenFlow protocol to use when communicating with the switch internally (e.g. with `openFlowRules`).\n"}, "loc": ["networking", "vswitches", "<name>", "openFlowVersion"], "readOnly": false, "type": "string"}, "networking.vswitches.<name>.supportedOpenFlowVersions": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"OpenFlow13\"\n]"}, "description": {"_type": "mdDoc", "text": "Supported versions to enable on this switch.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"OpenFlow10\"\n  \"OpenFlow13\"\n  \"OpenFlow14\"\n]"}, "loc": ["networking", "vswitches", "<name>", "supportedOpenFlowVersions"], "readOnly": false, "type": "list of string"}, "networking.wg-quick.interfaces": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Wireguard interfaces."}, "example": {"_type": "literalExpression", "text": "{\n  wg0 = {\n    address = [\n      \"192.168.20.4/24\"\n    ];\n    peers = [\n      {\n        allowedIPs = [\n          \"192.168.20.1/32\"\n        ];\n        endpoint = \"demo.wireguard.io:12913\";\n        publicKey = \"xTIBA5rboUvnH4htodjb6e697QjLERt1NAB4mZqp8Dg=\";\n      }\n    ];\n    privateKey = \"yAnz5TF+lXXJte14tji3zlMNq+hd2rYUIgJBgB3fBmk=\";\n  };\n}"}, "loc": ["networking", "wg-quick", "interfaces"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.wg-quick.interfaces.<name>.address": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The IP addresses of the interface."}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168.2.1/24\"\n]"}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "address"], "readOnly": false, "type": "list of string"}, "networking.wg-quick.interfaces.<name>.autostart": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to bring up this interface automatically during boot."}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "autostart"], "readOnly": false, "type": "boolean"}, "networking.wg-quick.interfaces.<name>.configFile": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "wg-quick .conf file, describing the interface.\nThis overrides any other configuration interface configuration options.\nSee wg-quick manpage for more details.\n"}, "example": {"_type": "literalExpression", "text": "\"/secret/wg0.conf\""}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "configFile"], "readOnly": false, "type": "null or string"}, "networking.wg-quick.interfaces.<name>.dns": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The IP addresses of DNS servers to configure."}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168.2.2\"\n]"}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "dns"], "readOnly": false, "type": "list of string"}, "networking.wg-quick.interfaces.<name>.listenPort": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "16-bit port for listening. Optional; if not specified,\nautomatically generated based on interface name.\n"}, "example": {"_type": "literalExpression", "text": "51820"}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "listenPort"], "readOnly": false, "type": "null or signed integer"}, "networking.wg-quick.interfaces.<name>.mtu": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If not specified, the MTU is automatically determined\nfrom the endpoint addresses or the system default route, which is usually\na sane choice. However, to manually specify an MTU to override this\nautomatic discovery, this value may be specified explicitly.\n"}, "example": {"_type": "literalExpression", "text": "1248"}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "mtu"], "readOnly": false, "type": "null or signed integer"}, "networking.wg-quick.interfaces.<name>.peers": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Peers linked to the interface."}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "peers"], "readOnly": false, "type": "list of (submodule)"}, "networking.wg-quick.interfaces.<name>.peers.*.allowedIPs": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "description": {"_type": "mdDoc", "text": "List of IP (v4 or v6) addresses with CIDR masks from\n        which this peer is allowed to send incoming traffic and to which\n        outgoing traffic for this peer is directed. The catch-all 0.0.0.0/0 may\n        be specified for matching all IPv4 addresses, and ::/0 may be specified\n        for matching all IPv6 addresses."}, "example": {"_type": "literalExpression", "text": "[\n  \"10.192.122.3/32\"\n  \"10.192.124.1/24\"\n]"}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "peers", "*", "allowedIPs"], "readOnly": false, "type": "list of string"}, "networking.wg-quick.interfaces.<name>.peers.*.endpoint": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Endpoint IP or hostname of the peer, followed by a colon,\n        and then a port number of the peer."}, "example": {"_type": "literalExpression", "text": "\"demo.wireguard.io:12913\""}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "peers", "*", "endpoint"], "readOnly": false, "type": "null or string"}, "networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This is optional and is by default off, because most\n        users will not need it. It represents, in seconds, between 1 and 65535\n        inclusive, how often to send an authenticated empty packet to the peer,\n        for the purpose of keeping a stateful firewall or NAT mapping valid\n        persistently. For example, if the interface very rarely sends traffic,\n        but it might at anytime receive traffic from a peer, and it is behind\n        NAT, the interface might benefit from having a persistent keepalive\n        interval of 25 seconds; however, most users will not need this."}, "example": {"_type": "literalExpression", "text": "25"}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "peers", "*", "persistentKeepalive"], "readOnly": false, "type": "null or signed integer"}, "networking.wg-quick.interfaces.<name>.peers.*.presharedKey": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Base64 preshared key generated by {command}`wg genpsk`.\nOptional, and may be omitted. This option adds an additional layer of\nsymmetric-key cryptography to be mixed into the already existing\npublic-key cryptography, for post-quantum resistance.\n\nWarning: Consider using presharedKeyFile instead if you do not\nwant to store the key in the world-readable Nix store.\n"}, "example": {"_type": "literalExpression", "text": "\"rVXs/Ni9tu3oDBLS4hOyAUAa1qTWVA3loR8eL20os3I=\""}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "peers", "*", "presharedKey"], "readOnly": false, "type": "null or string"}, "networking.wg-quick.interfaces.<name>.peers.*.presharedKeyFile": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File pointing to preshared key as generated by {command}`wg genpsk`.\nOptional, and may be omitted. This option adds an additional layer of\nsymmetric-key cryptography to be mixed into the already existing\npublic-key cryptography, for post-quantum resistance.\n"}, "example": {"_type": "literalExpression", "text": "\"/private/wireguard_psk\""}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "peers", "*", "presharedKeyFile"], "readOnly": false, "type": "null or string"}, "networking.wg-quick.interfaces.<name>.peers.*.publicKey": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "description": {"_type": "mdDoc", "text": "The base64 public key to the peer."}, "example": {"_type": "literalExpression", "text": "\"xTIBA5rboUvnH4htodjb6e697QjLERt1NAB4mZqp8Dg=\""}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "peers", "*", "publicKey"], "readOnly": false, "type": "string"}, "networking.wg-quick.interfaces.<name>.postDown": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Command called after the interface is taken down.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.iproute2}/bin/ip netns del foo\""}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "postDown"], "readOnly": false, "type": "strings concatenated with \"\\n\" or (list of string) convertible to it"}, "networking.wg-quick.interfaces.<name>.postUp": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Commands called after the interface setup.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.iproute2}/bin/ip netns add foo\""}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "postUp"], "readOnly": false, "type": "strings concatenated with \"\\n\" or (list of string) convertible to it"}, "networking.wg-quick.interfaces.<name>.preDown": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Command called before the interface is taken down.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.iproute2}/bin/ip netns del foo\""}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "preDown"], "readOnly": false, "type": "strings concatenated with \"\\n\" or (list of string) convertible to it"}, "networking.wg-quick.interfaces.<name>.preUp": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Commands called at the start of the interface setup.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.iproute2}/bin/ip netns add foo\""}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "preUp"], "readOnly": false, "type": "strings concatenated with \"\\n\" or (list of string) convertible to it"}, "networking.wg-quick.interfaces.<name>.privateKey": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Base64 private key generated by {command}`wg genkey`.\n\nWarning: Consider using privateKeyFile instead if you do not\nwant to store the key in the world-readable Nix store.\n"}, "example": {"_type": "literalExpression", "text": "\"yAnz5TF+lXXJte14tji3zlMNq+hd2rYUIgJBgB3fBmk=\""}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "privateKey"], "readOnly": false, "type": "null or string"}, "networking.wg-quick.interfaces.<name>.privateKeyFile": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Private key file as generated by {command}`wg genkey`.\n"}, "example": {"_type": "literalExpression", "text": "\"/private/wireguard_key\""}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "privateKeyFile"], "readOnly": false, "type": "null or string"}, "networking.wg-quick.interfaces.<name>.table": {"declarations": ["nixos/modules/services/networking/wg-quick.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The kernel routing table to add this interface's\nassociated routes to. Setting this is useful for e.g. policy routing\n(\"ip rule\") or virtual routing and forwarding (\"ip vrf\"). Both\nnumeric table IDs and table names (/etc/rt_tables) can be used.\nDefaults to \"main\".\n"}, "example": {"_type": "literalExpression", "text": "\"main\""}, "loc": ["networking", "wg-quick", "interfaces", "<name>", "table"], "readOnly": false, "type": "null or string"}, "networking.wireguard.enable": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "config.networking.wireguard.interfaces != { }"}, "description": {"_type": "mdDoc", "text": "Whether to enable WireGuard.\n\nPlease note that {option}`systemd.network.netdevs` has more features\nand is better maintained. When building new things, it is advised to\nuse that instead.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["networking", "wireguard", "enable"], "readOnly": false, "type": "boolean"}, "networking.wireguard.interfaces": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "WireGuard interfaces.\n\nPlease note that {option}`systemd.network.netdevs` has more features\nand is better maintained. When building new things, it is advised to\nuse that instead.\n"}, "example": {"_type": "literalExpression", "text": "{\n  wg0 = {\n    ips = [\n      \"192.168.20.4/24\"\n    ];\n    peers = [\n      {\n        allowedIPs = [\n          \"192.168.20.1/32\"\n        ];\n        endpoint = \"demo.wireguard.io:12913\";\n        publicKey = \"xTIBA5rboUvnH4htodjb6e697QjLERt1NAB4mZqp8Dg=\";\n      }\n    ];\n    privateKey = \"yAnz5TF+lXXJte14tji3zlMNq+hd2rYUIgJBgB3fBmk=\";\n  };\n}"}, "loc": ["networking", "wireguard", "interfaces"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.wireguard.interfaces.<name>.allowedIPsAsRoutes": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Determines whether to add allowed IPs as routes or not.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["networking", "wireguard", "interfaces", "<name>", "allowedIPsAsRoutes"], "readOnly": false, "type": "boolean"}, "networking.wireguard.interfaces.<name>.fwMark": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Mark all wireguard packets originating from\nthis interface with the given firewall mark. The firewall mark can be\nused in firewalls or policy routing to filter the wireguard packets.\nThis can be useful for setup where all traffic goes through the\nwireguard tunnel, because the wireguard packets need to be routed\ndifferently.\n"}, "example": {"_type": "literalExpression", "text": "\"0x6e6978\""}, "loc": ["networking", "wireguard", "interfaces", "<name>", "fwMark"], "readOnly": false, "type": "null or string"}, "networking.wireguard.interfaces.<name>.generatePrivateKeyFile": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically generate a private key with\n{command}`wg genkey`, at the privateKeyFile location.\n"}, "loc": ["networking", "wireguard", "interfaces", "<name>", "generatePrivateKeyFile"], "readOnly": false, "type": "boolean"}, "networking.wireguard.interfaces.<name>.interfaceNamespace": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The pre-existing network namespace the WireGuard\n        interface is moved to. The special value `init` means\n        the init namespace. When `null`, the interface is not\n        moved.\n        See [documentation](https://www.wireguard.com/netns/).\n"}, "example": {"_type": "literalExpression", "text": "\"init\""}, "loc": ["networking", "wireguard", "interfaces", "<name>", "interfaceNamespace"], "readOnly": false, "type": "null or string"}, "networking.wireguard.interfaces.<name>.ips": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The IP addresses of the interface."}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168.2.1/24\"\n]"}, "loc": ["networking", "wireguard", "interfaces", "<name>", "ips"], "readOnly": false, "type": "list of string"}, "networking.wireguard.interfaces.<name>.listenPort": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "16-bit port for listening. Optional; if not specified,\nautomatically generated based on interface name.\n"}, "example": {"_type": "literalExpression", "text": "51820"}, "loc": ["networking", "wireguard", "interfaces", "<name>", "listenPort"], "readOnly": false, "type": "null or signed integer"}, "networking.wireguard.interfaces.<name>.metric": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the metric of routes related to this Wireguard interface.\n"}, "example": {"_type": "literalExpression", "text": "700"}, "loc": ["networking", "wireguard", "interfaces", "<name>", "metric"], "readOnly": false, "type": "null or signed integer"}, "networking.wireguard.interfaces.<name>.mtu": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the maximum transmission unit in bytes for the wireguard\ninterface. Beware that the wireguard packets have a header that may\nadd up to 80 bytes to the mtu. By default, the MTU is (1500 - 80) =\n1420. However, if the MTU of the upstream network is lower, the MTU\nof the wireguard network has to be adjusted as well.\n"}, "example": {"_type": "literalExpression", "text": "1280"}, "loc": ["networking", "wireguard", "interfaces", "<name>", "mtu"], "readOnly": false, "type": "null or signed integer"}, "networking.wireguard.interfaces.<name>.peers": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Peers linked to the interface."}, "loc": ["networking", "wireguard", "interfaces", "<name>", "peers"], "readOnly": false, "type": "list of (submodule)"}, "networking.wireguard.interfaces.<name>.peers.*.allowedIPs": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "description": {"_type": "mdDoc", "text": "List of IP (v4 or v6) addresses with CIDR masks from\n        which this peer is allowed to send incoming traffic and to which\n        outgoing traffic for this peer is directed. The catch-all 0.0.0.0/0 may\n        be specified for matching all IPv4 addresses, and ::/0 may be specified\n        for matching all IPv6 addresses."}, "example": {"_type": "literalExpression", "text": "[\n  \"10.192.122.3/32\"\n  \"10.192.124.1/24\"\n]"}, "loc": ["networking", "wireguard", "interfaces", "<name>", "peers", "*", "allowedIPs"], "readOnly": false, "type": "list of string"}, "networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshRestartSeconds": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "When the dynamic endpoint refresh that is configured via\ndynamicEndpointRefreshSeconds exits (likely due to a failure),\nrestart that service after this many seconds.\n\nIf set to `null` the value of\n{option}`networking.wireguard.dynamicEndpointRefreshSeconds`\nwill be used as the default.\n"}, "example": {"_type": "literalExpression", "text": "5"}, "loc": ["networking", "wireguard", "interfaces", "<name>", "peers", "*", "dynamicEndpointRefreshRestartSeconds"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshSeconds": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Periodically re-execute the `wg` utility every\nthis many seconds in order to let WireGuard notice DNS / hostname\nchanges.\n\nSetting this to `0` disables periodic reexecution.\n"}, "example": {"_type": "literalExpression", "text": "5"}, "loc": ["networking", "wireguard", "interfaces", "<name>", "peers", "*", "dynamicEndpointRefreshSeconds"], "readOnly": false, "type": "signed integer"}, "networking.wireguard.interfaces.<name>.peers.*.endpoint": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Endpoint IP or hostname of the peer, followed by a colon,\nand then a port number of the peer.\n\nWarning for endpoints with changing IPs:\nThe WireGuard kernel side cannot perform DNS resolution.\nThus DNS resolution is done once by the `wg` userspace\nutility, when setting up WireGuard. Consequently, if the IP address\nbehind the name changes, WireGuard will not notice.\nThis is especially common for dynamic-DNS setups, but also applies to\nany other DNS-based setup.\nIf you do not use IP endpoints, you likely want to set\n{option}`networking.wireguard.dynamicEndpointRefreshSeconds`\nto refresh the IPs periodically.\n"}, "example": {"_type": "literalExpression", "text": "\"demo.wireguard.io:12913\""}, "loc": ["networking", "wireguard", "interfaces", "<name>", "peers", "*", "endpoint"], "readOnly": false, "type": "null or string"}, "networking.wireguard.interfaces.<name>.peers.*.name": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "publicKey"}, "description": {"_type": "mdDoc", "text": "Name used to derive peer unit name."}, "example": {"_type": "literalExpression", "text": "\"bernd\""}, "loc": ["networking", "wireguard", "interfaces", "<name>", "peers", "*", "name"], "readOnly": false, "type": "string"}, "networking.wireguard.interfaces.<name>.peers.*.persistentKeepalive": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This is optional and is by default off, because most\n        users will not need it. It represents, in seconds, between 1 and 65535\n        inclusive, how often to send an authenticated empty packet to the peer,\n        for the purpose of keeping a stateful firewall or NAT mapping valid\n        persistently. For example, if the interface very rarely sends traffic,\n        but it might at anytime receive traffic from a peer, and it is behind\n        NAT, the interface might benefit from having a persistent keepalive\n        interval of 25 seconds; however, most users will not need this."}, "example": {"_type": "literalExpression", "text": "25"}, "loc": ["networking", "wireguard", "interfaces", "<name>", "peers", "*", "persistentKeepalive"], "readOnly": false, "type": "null or signed integer"}, "networking.wireguard.interfaces.<name>.peers.*.presharedKey": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Base64 preshared key generated by {command}`wg genpsk`.\nOptional, and may be omitted. This option adds an additional layer of\nsymmetric-key cryptography to be mixed into the already existing\npublic-key cryptography, for post-quantum resistance.\n\nWarning: Consider using presharedKeyFile instead if you do not\nwant to store the key in the world-readable Nix store.\n"}, "example": {"_type": "literalExpression", "text": "\"rVXs/Ni9tu3oDBLS4hOyAUAa1qTWVA3loR8eL20os3I=\""}, "loc": ["networking", "wireguard", "interfaces", "<name>", "peers", "*", "presharedKey"], "readOnly": false, "type": "null or string"}, "networking.wireguard.interfaces.<name>.peers.*.presharedKeyFile": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File pointing to preshared key as generated by {command}`wg genpsk`.\nOptional, and may be omitted. This option adds an additional layer of\nsymmetric-key cryptography to be mixed into the already existing\npublic-key cryptography, for post-quantum resistance.\n"}, "example": {"_type": "literalExpression", "text": "\"/private/wireguard_psk\""}, "loc": ["networking", "wireguard", "interfaces", "<name>", "peers", "*", "presharedKeyFile"], "readOnly": false, "type": "null or string"}, "networking.wireguard.interfaces.<name>.peers.*.publicKey": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "description": {"_type": "mdDoc", "text": "The base64 public key of the peer."}, "example": {"_type": "literalExpression", "text": "\"xTIBA5rboUvnH4htodjb6e697QjLERt1NAB4mZqp8Dg=\""}, "loc": ["networking", "wireguard", "interfaces", "<name>", "peers", "*", "publicKey"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "networking.wireguard.interfaces.<name>.postSetup": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Commands called at the end of the interface setup."}, "example": {"_type": "literalExpression", "text": "''printf \"nameserver 10.200.100.1\" | ${pkgs.openresolv}/bin/resolvconf -a wg0 -m 0''\n"}, "loc": ["networking", "wireguard", "interfaces", "<name>", "postSetup"], "readOnly": false, "type": "strings concatenated with \"\\n\" or (list of string) convertible to it"}, "networking.wireguard.interfaces.<name>.postShutdown": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Commands called after shutting down the interface."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.openresolv}/bin/resolvconf -d wg0\""}, "loc": ["networking", "wireguard", "interfaces", "<name>", "postShutdown"], "readOnly": false, "type": "strings concatenated with \"\\n\" or (list of string) convertible to it"}, "networking.wireguard.interfaces.<name>.preSetup": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Commands called at the start of the interface setup.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.iproute2}/bin/ip netns add foo\""}, "loc": ["networking", "wireguard", "interfaces", "<name>", "preSetup"], "readOnly": false, "type": "strings concatenated with \"\\n\" or (list of string) convertible to it"}, "networking.wireguard.interfaces.<name>.privateKey": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Base64 private key generated by {command}`wg genkey`.\n\nWarning: Consider using privateKeyFile instead if you do not\nwant to store the key in the world-readable Nix store.\n"}, "example": {"_type": "literalExpression", "text": "\"yAnz5TF+lXXJte14tji3zlMNq+hd2rYUIgJBgB3fBmk=\""}, "loc": ["networking", "wireguard", "interfaces", "<name>", "privateKey"], "readOnly": false, "type": "null or string"}, "networking.wireguard.interfaces.<name>.privateKeyFile": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Private key file as generated by {command}`wg genkey`.\n"}, "example": {"_type": "literalExpression", "text": "\"/private/wireguard_key\""}, "loc": ["networking", "wireguard", "interfaces", "<name>", "privateKeyFile"], "readOnly": false, "type": "null or string"}, "networking.wireguard.interfaces.<name>.socketNamespace": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The pre-existing network namespace in which the\n        WireGuard interface is created, and which retains the socket even if the\n        interface is moved via {option}`interfaceNamespace`. When\n        `null`, the interface is created in the init namespace.\n        See [documentation](https://www.wireguard.com/netns/).\n"}, "example": {"_type": "literalExpression", "text": "\"container\""}, "loc": ["networking", "wireguard", "interfaces", "<name>", "socketNamespace"], "readOnly": false, "type": "null or string"}, "networking.wireguard.interfaces.<name>.table": {"declarations": ["nixos/modules/services/networking/wireguard.nix"], "default": {"_type": "literalExpression", "text": "\"main\""}, "description": {"_type": "mdDoc", "text": "The kernel routing table to add this interface's\nassociated routes to. Setting this is useful for e.g. policy routing\n(\"ip rule\") or virtual routing and forwarding (\"ip vrf\"). Both\nnumeric table IDs and table names (/etc/rt_tables) can be used.\nDefaults to \"main\".\n"}, "loc": ["networking", "wireguard", "interfaces", "<name>", "table"], "readOnly": false, "type": "string"}, "networking.wireless.allowAuxiliaryImperativeNetworks": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow configuring networks \"imperatively\" (e.g. via\n`wpa_supplicant_gui`) and declaratively via\n[](#opt-networking.wireless.networks).\n\nPlease note that this adds a custom patch to `wpa_supplicant`.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["networking", "wireless", "allowAuxiliaryImperativeNetworks"], "readOnly": false, "type": "boolean"}, "networking.wireless.athUserRegulatoryDomain": {"declarations": ["nixos/modules/hardware/network/ath-user-regd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, sets the ATH_USER_REGD kernel config switch to true to\ndisable the enforcement of EEPROM regulatory restrictions for ath\ndrivers. Requires at least Linux 5.8.\n"}, "loc": ["networking", "wireless", "athUserRegulatoryDomain"], "readOnly": false, "type": "boolean"}, "networking.wireless.dbusControlled": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "length config.networking.wireless.interfaces < 2"}, "description": {"_type": "mdDoc", "text": "Whether to enable the DBus control interface.\nThis is only needed when using NetworkManager or connman.\n"}, "loc": ["networking", "wireless", "dbusControlled"], "readOnly": false, "type": "boolean"}, "networking.wireless.driver": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "\"nl80211,wext\""}, "description": {"_type": "mdDoc", "text": "Force a specific wpa_supplicant driver."}, "loc": ["networking", "wireless", "driver"], "readOnly": false, "type": "string"}, "networking.wireless.enable": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable wpa_supplicant."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["networking", "wireless", "enable"], "readOnly": false, "type": "boolean"}, "networking.wireless.environmentFile": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File consisting of lines of the form `varname=value`\nto define variables for the wireless configuration.\n\nSee section \"EnvironmentFile=\" in {manpage}`systemd.exec(5)` for a syntax reference.\n\nSecrets (PSKs, passwords, etc.) can be provided without adding them to\nthe world-readable Nix store by defining them in the environment file and\nreferring to them in option {option}`networking.wireless.networks`\nwith the syntax `@varname@`. Example:\n\n```\n# content of /run/secrets/wireless.env\nPSK_HOME=mypassword\nPASS_WORK=myworkpassword\n```\n\n```\n# wireless-related configuration\nnetworking.wireless.environmentFile = \"/run/secrets/wireless.env\";\nnetworking.wireless.networks = {\n  home.psk = \"@PSK_HOME@\";\n  work.auth = ''\n    eap=PEAP\n    identity=\"my-user@example.com\"\n    password=\"@PASS_WORK@\"\n  '';\n};\n```\n"}, "example": {"_type": "literalExpression", "text": "\"/run/secrets/wireless.env\""}, "loc": ["networking", "wireless", "environmentFile"], "readOnly": false, "type": "null or path"}, "networking.wireless.extraConfig": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines appended to the configuration file.\nSee\n{manpage}`wpa_supplicant.conf(5)`\nfor available options.\n"}, "example": {"_type": "literalExpression", "text": "''\n  p2p_disabled=1\n''"}, "loc": ["networking", "wireless", "extraConfig"], "readOnly": false, "type": "string"}, "networking.wireless.fallbackToWPA2": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to fall back to WPA2 authentication protocols if WPA3 failed.\nThis allows old wireless cards (that lack recent features required by\nWPA3) to connect to mixed WPA2/WPA3 access points.\n\nTo avoid possible downgrade attacks, disable this options.\n"}, "loc": ["networking", "wireless", "fallbackToWPA2"], "readOnly": false, "type": "boolean"}, "networking.wireless.interfaces": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The interfaces {command}`wpa_supplicant` will use. If empty, it will\nautomatically use all wireless interfaces.\n\n::: {.note}\nA separate wpa_supplicant instance will be started for each interface.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"wlan0\"\n  \"wlan1\"\n]"}, "loc": ["networking", "wireless", "interfaces"], "readOnly": false, "type": "list of string"}, "networking.wireless.iwd.enable": {"declarations": ["nixos/modules/services/networking/iwd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable iwd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["networking", "wireless", "iwd", "enable"], "readOnly": false, "type": "boolean"}, "networking.wireless.iwd.package": {"declarations": ["nixos/modules/services/networking/iwd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.iwd"}, "description": {"_type": "mdDoc", "text": "The iwd package to use.\n"}, "loc": ["networking", "wireless", "iwd", "package"], "readOnly": false, "type": "package"}, "networking.wireless.iwd.settings": {"declarations": ["nixos/modules/services/networking/iwd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Options passed to iwd.\nSee [here](https://iwd.wiki.kernel.org/networkconfigurationsettings) for supported options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Network = {\n    EnableIPv6 = true;\n    RoutePriorityOffset = 300;\n  };\n  Settings = {\n    AutoConnect = true;\n  };\n}"}, "loc": ["networking", "wireless", "iwd", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "networking.wireless.networks": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The network definitions to automatically connect to when\n {command}`wpa_supplicant` is running. If this\n parameter is left empty wpa_supplicant will use\n/etc/wpa_supplicant.conf as the configuration file.\n"}, "example": {"_type": "literalExpression", "text": "{ echelon = {                   # SSID with no spaces or special characters\n    psk = \"abcdefgh\";           # (password will be written to /nix/store!)\n  };\n\n  echelon = {                   # safe version of the above: read PSK from the\n    psk = \"@PSK_ECHELON@\";      # variable PSK_ECHELON, defined in environmentFile,\n  };                            # this won't leak into /nix/store\n\n  \"echelon's AP\" = {            # SSID with spaces and/or special characters\n     psk = \"ijklmnop\";          # (password will be written to /nix/store!)\n  };\n\n  \"free.wifi\" = {};             # Public wireless network\n}\n"}, "loc": ["networking", "wireless", "networks"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.wireless.networks.<name>.auth": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use this option to configure advanced authentication methods like EAP.\nSee\n{manpage}`wpa_supplicant.conf(5)`\nfor example configurations.\n\n::: {.warning}\nBe aware that this will be written to the nix store\nin plaintext! Use an environment variable for secrets.\n:::\n\n::: {.note}\nMutually exclusive with {var}`psk` and\n{var}`pskRaw`.\n:::\n"}, "example": {"_type": "literalExpression", "text": "''\n  eap=PEAP\n  identity=\"user@example.com\"\n  password=\"@EXAMPLE_PASSWORD@\"\n''"}, "loc": ["networking", "wireless", "networks", "<name>", "auth"], "readOnly": false, "type": "null or string"}, "networking.wireless.networks.<name>.authProtocols": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"WPA-PSK\"\n  \"WPA-EAP\"\n  \"SAE\"\n  \"FT-PSK\"\n  \"FT-EAP\"\n  \"FT-SAE\"\n]"}, "description": {"_type": "mdDoc", "text": "The list of authentication protocols accepted by this network.\nThis corresponds to the `key_mgmt` option in wpa_supplicant.\n"}, "loc": ["networking", "wireless", "networks", "<name>", "authProtocols"], "readOnly": false, "type": "list of (one of \"WPA-PSK\", \"WPA-EAP\", \"IEEE8021X\", \"NONE\", \"WPA-NONE\", \"FT-PSK\", \"FT-EAP\", \"FT-EAP-SHA384\", \"WPA-PSK-SHA256\", \"WPA-EAP-SHA256\", \"SAE\", \"FT-SAE\", \"WPA-EAP-SUITE-B\", \"WPA-EAP-SUITE-B-192\", \"OSEN\", \"FILS-SHA256\", \"FILS-SHA384\", \"FT-FILS-SHA256\", \"FT-FILS-SHA384\", \"OWE\", \"DPP\")"}, "networking.wireless.networks.<name>.extraConfig": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration lines appended to the network block.\nSee\n{manpage}`wpa_supplicant.conf(5)`\nfor available options.\n"}, "example": {"_type": "literalExpression", "text": "''\n  bssid_blacklist=02:11:22:33:44:55 02:22:aa:44:55:66\n''"}, "loc": ["networking", "wireless", "networks", "<name>", "extraConfig"], "readOnly": false, "type": "string"}, "networking.wireless.networks.<name>.hidden": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set this to `true` if the SSID of the network is hidden.\n"}, "example": {"_type": "literalExpression", "text": "{ echelon = {\n    hidden = true;\n    psk = \"abcdefgh\";\n  };\n}\n"}, "loc": ["networking", "wireless", "networks", "<name>", "hidden"], "readOnly": false, "type": "boolean"}, "networking.wireless.networks.<name>.priority": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "By default, all networks will get same priority group (0). If some of the\nnetworks are more desirable, this field can be used to change the order in\nwhich wpa_supplicant goes through the networks when selecting a BSS. The\npriority groups will be iterated in decreasing priority (i.e., the larger the\npriority value, the sooner the network is matched against the scan results).\nWithin each priority group, networks will be selected based on security\npolicy, signal strength, etc.\n"}, "loc": ["networking", "wireless", "networks", "<name>", "priority"], "readOnly": false, "type": "null or signed integer"}, "networking.wireless.networks.<name>.psk": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The network's pre-shared key in plaintext defaulting\nto being a network without any authentication.\n\n::: {.warning}\nBe aware that this will be written to the nix store\nin plaintext! Use an environment variable instead.\n:::\n\n::: {.note}\nMutually exclusive with {var}`pskRaw`.\n:::\n"}, "loc": ["networking", "wireless", "networks", "<name>", "psk"], "readOnly": false, "type": "null or string"}, "networking.wireless.networks.<name>.pskRaw": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The network's pre-shared key in hex defaulting\nto being a network without any authentication.\n\n::: {.warning}\nBe aware that this will be written to the nix store\nin plaintext! Use an environment variable instead.\n:::\n\n::: {.note}\nMutually exclusive with {var}`psk`.\n:::\n"}, "loc": ["networking", "wireless", "networks", "<name>", "pskRaw"], "readOnly": false, "type": "null or string"}, "networking.wireless.scanOnLowSignal": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to periodically scan for (better) networks when the signal of\nthe current one is low. This will make roaming between access points\nfaster, but will consume more power.\n"}, "loc": ["networking", "wireless", "scanOnLowSignal"], "readOnly": false, "type": "boolean"}, "networking.wireless.userControlled.enable": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli.\nThis is useful for laptop users that switch networks a lot and don't want\nto depend on a large package such as NetworkManager just to pick nearby\naccess points.\n\nWhen using a declarative network specification you cannot persist any\nsettings via wpa_gui or wpa_cli.\n"}, "loc": ["networking", "wireless", "userControlled", "enable"], "readOnly": false, "type": "boolean"}, "networking.wireless.userControlled.group": {"declarations": ["nixos/modules/services/networking/wpa_supplicant.nix"], "default": {"_type": "literalExpression", "text": "\"wheel\""}, "description": {"_type": "mdDoc", "text": "Members of this group can control wpa_supplicant."}, "example": {"_type": "literalExpression", "text": "\"network\""}, "loc": ["networking", "wireless", "userControlled", "group"], "readOnly": false, "type": "string"}, "networking.wlanInterfaces": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Creating multiple WLAN interfaces on top of one physical WLAN device (NIC).\n\nThe name of the WLAN interface corresponds to the name of the attribute.\nA NIC is referenced by the persistent device name of the WLAN interface that\n`udev` assigns to a NIC by default.\nIf a NIC supports multiple WLAN interfaces, then the one NIC can be used as\n`device` for multiple WLAN interfaces.\nIf a NIC is used for creating WLAN interfaces, then the default WLAN interface\nwith a persistent device name form `udev` is not created.\nA WLAN interface with the persistent name assigned from `udev`\nwould have to be created explicitly.\n"}, "example": {"_type": "literalExpression", "text": "{\n  wlan-station0 = {\n      device = \"wlp6s0\";\n  };\n  wlan-adhoc0 = {\n      type = \"ibss\";\n      device = \"wlp6s0\";\n      mac = \"02:00:00:00:00:01\";\n  };\n  wlan-p2p0 = {\n      device = \"wlp6s0\";\n      mac = \"02:00:00:00:00:02\";\n  };\n  wlan-ap0 = {\n      device = \"wlp6s0\";\n      mac = \"02:00:00:00:00:03\";\n  };\n}\n"}, "loc": ["networking", "wlanInterfaces"], "readOnly": false, "type": "attribute set of (submodule)"}, "networking.wlanInterfaces.<name>.device": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "description": {"_type": "mdDoc", "text": "The name of the underlying hardware WLAN device as assigned by `udev`."}, "example": {"_type": "literalExpression", "text": "\"wlp6s0\""}, "loc": ["networking", "wlanInterfaces", "<name>", "device"], "readOnly": false, "type": "string"}, "networking.wlanInterfaces.<name>.flags": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Flags for interface of type `monitor`.\n"}, "example": {"_type": "literalExpression", "text": "\"control\""}, "loc": ["networking", "wlanInterfaces", "<name>", "flags"], "readOnly": false, "type": "null or one of \"none\", \"fcsfail\", \"control\", \"otherbss\", \"cook\", \"active\""}, "networking.wlanInterfaces.<name>.fourAddr": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to enable `4-address mode` with type `managed`."}, "loc": ["networking", "wlanInterfaces", "<name>", "fourAddr"], "readOnly": false, "type": "null or boolean"}, "networking.wlanInterfaces.<name>.mac": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "MAC address to use for the device. If `null`, then the MAC of the\nunderlying hardware WLAN device is used.\n\nINFO: Locally administered MAC addresses are of the form:\n- x2:xx:xx:xx:xx:xx\n- x6:xx:xx:xx:xx:xx\n- xA:xx:xx:xx:xx:xx\n- xE:xx:xx:xx:xx:xx\n"}, "example": {"_type": "literalExpression", "text": "\"02:00:00:00:00:01\""}, "loc": ["networking", "wlanInterfaces", "<name>", "mac"], "readOnly": false, "type": "null or string"}, "networking.wlanInterfaces.<name>.meshID": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "MeshID of interface with type `mesh`."}, "loc": ["networking", "wlanInterfaces", "<name>", "meshID"], "readOnly": false, "type": "null or string"}, "networking.wlanInterfaces.<name>.type": {"declarations": ["nixos/modules/tasks/network-interfaces.nix"], "default": {"_type": "literalExpression", "text": "\"managed\""}, "description": {"_type": "mdDoc", "text": "The type of the WLAN interface.\nThe type has to be supported by the underlying hardware of the device.\n"}, "example": {"_type": "literalExpression", "text": "\"ibss\""}, "loc": ["networking", "wlanInterfaces", "<name>", "type"], "readOnly": false, "type": "one of \"managed\", \"ibss\", \"monitor\", \"mesh\", \"wds\""}, "nix.buildMachines": {"declarations": ["nixos/modules/config/nix-remote-build.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option lists the machines to be used if distributed builds are\nenabled (see {option}`nix.distributedBuilds`).\nNix will perform derivations on those machines via SSH by copying the\ninputs to the Nix store on the remote machine, starting the build,\nthen copying the output back to the local Nix store.\n"}, "loc": ["nix", "buildMachines"], "readOnly": false, "type": "list of (submodule)"}, "nix.buildMachines.*.hostName": {"declarations": ["nixos/modules/config/nix-remote-build.nix"], "description": {"_type": "mdDoc", "text": "The hostname of the build machine.\n"}, "example": {"_type": "literalExpression", "text": "\"nixbuilder.example.org\""}, "loc": ["nix", "buildMachines", "*", "hostName"], "readOnly": false, "type": "string"}, "nix.buildMachines.*.mandatoryFeatures": {"declarations": ["nixos/modules/config/nix-remote-build.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of features mandatory for this builder. The builder will\nbe ignored for derivations that don't require all features in\nthis list. All mandatory features are automatically included in\n{var}`supportedFeatures`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"big-parallel\"\n]"}, "loc": ["nix", "buildMachines", "*", "mandatoryFeatures"], "readOnly": false, "type": "list of string"}, "nix.buildMachines.*.maxJobs": {"declarations": ["nixos/modules/config/nix-remote-build.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "The number of concurrent jobs the build machine supports. The\nbuild machine will enforce its own limits, but this allows hydra\nto schedule better since there is no work-stealing between build\nmachines.\n"}, "loc": ["nix", "buildMachines", "*", "maxJobs"], "readOnly": false, "type": "signed integer"}, "nix.buildMachines.*.protocol": {"declarations": ["nixos/modules/config/nix-remote-build.nix"], "default": {"_type": "literalExpression", "text": "\"ssh\""}, "description": {"_type": "mdDoc", "text": "The protocol used for communicating with the build machine.\nUse `ssh-ng` if your remote builder and your\nlocal Nix version support that improved protocol.\n\nUse `null` when trying to change the special localhost builder\nwithout a protocol which is for example used by hydra.\n"}, "example": {"_type": "literalExpression", "text": "\"ssh-ng\""}, "loc": ["nix", "buildMachines", "*", "protocol"], "readOnly": false, "type": "one of <null>, \"ssh\", \"ssh-ng\""}, "nix.buildMachines.*.publicHostKey": {"declarations": ["nixos/modules/config/nix-remote-build.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The (base64-encoded) public host key of this builder. The field\nis calculated via {command}`base64 -w0 /etc/ssh/ssh_host_type_key.pub`.\nIf null, SSH will use its regular known-hosts file when connecting.\n"}, "loc": ["nix", "buildMachines", "*", "publicHostKey"], "readOnly": false, "type": "null or string"}, "nix.buildMachines.*.speedFactor": {"declarations": ["nixos/modules/config/nix-remote-build.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "The relative speed of this builder. This is an arbitrary integer\nthat indicates the speed of this builder, relative to other\nbuilders. Higher is faster.\n"}, "loc": ["nix", "buildMachines", "*", "speedFactor"], "readOnly": false, "type": "signed integer"}, "nix.buildMachines.*.sshKey": {"declarations": ["nixos/modules/config/nix-remote-build.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the SSH private key with which to authenticate on\nthe build machine. The private key must not have a passphrase.\nIf null, the building user (root on NixOS machines) must have an\nappropriate ssh configuration to log in non-interactively.\n\nNote that for security reasons, this path must point to a file\nin the local filesystem, *not* to the nix store.\n"}, "example": {"_type": "literalExpression", "text": "\"/root/.ssh/id_buildhost_builduser\""}, "loc": ["nix", "buildMachines", "*", "sshKey"], "readOnly": false, "type": "null or string"}, "nix.buildMachines.*.sshUser": {"declarations": ["nixos/modules/config/nix-remote-build.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The username to log in as on the remote host. This user must be\nable to log in and run nix commands non-interactively. It must\nalso be privileged to build derivations, so must be included in\n{option}`nix.settings.trusted-users`.\n"}, "example": {"_type": "literalExpression", "text": "\"builder\""}, "loc": ["nix", "buildMachines", "*", "sshUser"], "readOnly": false, "type": "null or string"}, "nix.buildMachines.*.supportedFeatures": {"declarations": ["nixos/modules/config/nix-remote-build.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of features supported by this builder. The builder will\nbe ignored for derivations that require features not in this\nlist.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"kvm\"\n  \"big-parallel\"\n]"}, "loc": ["nix", "buildMachines", "*", "supportedFeatures"], "readOnly": false, "type": "list of string"}, "nix.buildMachines.*.system": {"declarations": ["nixos/modules/config/nix-remote-build.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The system type the build machine can execute derivations on.\nEither this attribute or {var}`systems` must be\npresent, where {var}`system` takes precedence if\nboth are set.\n"}, "example": {"_type": "literalExpression", "text": "\"x86_64-linux\""}, "loc": ["nix", "buildMachines", "*", "system"], "readOnly": false, "type": "null or string"}, "nix.buildMachines.*.systems": {"declarations": ["nixos/modules/config/nix-remote-build.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The system types the build machine can execute derivations on.\nEither this attribute or {var}`system` must be\npresent, where {var}`system` takes precedence if\nboth are set.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"x86_64-linux\"\n  \"aarch64-linux\"\n]"}, "loc": ["nix", "buildMachines", "*", "systems"], "readOnly": false, "type": "list of string"}, "nix.channel.enable": {"declarations": ["nixos/modules/config/nix-channel.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the `nix-channel` command and state files are made available on the machine.\n\nThe following files are initialized when enabled:\n  - `/nix/var/nix/profiles/per-user/root/channels`\n  - `/root/.nix-channels`\n  - `$HOME/.nix-defexpr/channels` (on login)\n\nDisabling this option will not remove the state files from the system.\n"}, "loc": ["nix", "channel", "enable"], "readOnly": false, "type": "boolean"}, "nix.checkAllErrors": {"declarations": ["nixos/modules/config/nix.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If enabled, checks the nix.conf parsing for any kind of error. When disabled, checks only for unknown settings.\n"}, "loc": ["nix", "checkAllErrors"], "readOnly": false, "type": "boolean"}, "nix.checkConfig": {"declarations": ["nixos/modules/config/nix.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If enabled, checks that Nix can parse the generated nix.conf.\n"}, "loc": ["nix", "checkConfig"], "readOnly": false, "type": "boolean"}, "nix.daemonCPUSchedPolicy": {"declarations": ["nixos/modules/services/system/nix-daemon.nix"], "default": {"_type": "literalExpression", "text": "\"other\""}, "description": {"_type": "mdDoc", "text": "Nix daemon process CPU scheduling policy. This policy propagates to\nbuild processes. `other` is the default scheduling\npolicy for regular tasks. The `batch` policy is\nsimilar to `other`, but optimised for\nnon-interactive tasks. `idle` is for extremely\nlow-priority tasks that should only be run when no other task\nrequires CPU time.\n\nPlease note that while using the `idle` policy may\ngreatly improve responsiveness of a system performing expensive\nbuilds, it may also slow down and potentially starve crucial\nconfiguration updates during load.\n\n`idle` may therefore be a sensible policy for\nsystems that experience only intermittent phases of high CPU load,\nsuch as desktop or portable computers used interactively. Other\nsystems should use the `other` or\n`batch` policy instead.\n\nFor more fine-grained resource control, please refer to\n{manpage}`systemd.resource-control(5)` and adjust\n{option}`systemd.services.nix-daemon` directly.\n"}, "example": {"_type": "literalExpression", "text": "\"batch\""}, "loc": ["nix", "daemonCPUSchedPolicy"], "readOnly": false, "type": "one of \"other\", \"batch\", \"idle\""}, "nix.daemonIOSchedClass": {"declarations": ["nixos/modules/services/system/nix-daemon.nix"], "default": {"_type": "literalExpression", "text": "\"best-effort\""}, "description": {"_type": "mdDoc", "text": "Nix daemon process I/O scheduling class. This class propagates to\nbuild processes. `best-effort` is the default\nclass for regular tasks. The `idle` class is for\nextremely low-priority tasks that should only perform I/O when no\nother task does.\n\nPlease note that while using the `idle` scheduling\nclass can improve responsiveness of a system performing expensive\nbuilds, it might also slow down or starve crucial configuration\nupdates during load.\n\n`idle` may therefore be a sensible class for\nsystems that experience only intermittent phases of high I/O load,\nsuch as desktop or portable computers used interactively. Other\nsystems should use the `best-effort` class.\n"}, "example": {"_type": "literalExpression", "text": "\"idle\""}, "loc": ["nix", "daemonIOSchedClass"], "readOnly": false, "type": "one of \"best-effort\", \"idle\""}, "nix.daemonIOSchedPriority": {"declarations": ["nixos/modules/services/system/nix-daemon.nix"], "default": {"_type": "literalExpression", "text": "4"}, "description": {"_type": "mdDoc", "text": "Nix daemon process I/O scheduling priority. This priority propagates\nto build processes. The supported priorities depend on the\nscheduling policy: With idle, priorities are not used in scheduling\ndecisions. best-effort supports values in the range 0 (high) to 7\n(low).\n"}, "example": {"_type": "literalExpression", "text": "1"}, "loc": ["nix", "daemonIOSchedPriority"], "readOnly": false, "type": "signed integer"}, "nix.distributedBuilds": {"declarations": ["nixos/modules/config/nix-remote-build.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to distribute builds to the machines listed in\n{option}`nix.buildMachines`.\n"}, "loc": ["nix", "distributedBuilds"], "readOnly": false, "type": "boolean"}, "nix.enable": {"declarations": ["nixos/modules/services/system/nix-daemon.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable Nix.\nDisabling Nix makes the system hard to modify and the Nix programs and configuration will not be made available by NixOS itself.\n"}, "loc": ["nix", "enable"], "readOnly": false, "type": "boolean"}, "nix.extraOptions": {"declarations": ["nixos/modules/config/nix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional text appended to {file}`nix.conf`."}, "example": {"_type": "literalExpression", "text": "''\n  keep-outputs = true\n  keep-derivations = true\n''"}, "loc": ["nix", "extraOptions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "nix.gc.automatic": {"declarations": ["nixos/modules/services/misc/nix-gc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically run the garbage collector at a specific time."}, "loc": ["nix", "gc", "automatic"], "readOnly": false, "type": "boolean"}, "nix.gc.dates": {"declarations": ["nixos/modules/services/misc/nix-gc.nix"], "default": {"_type": "literalExpression", "text": "\"03:15\""}, "description": {"_type": "mdDoc", "text": "How often or when garbage collection is performed. For most desktop and server systems\na sufficient garbage collection is once a week.\n\nThe format is described in\n{manpage}`systemd.time(7)`.\n"}, "example": {"_type": "literalExpression", "text": "\"weekly\""}, "loc": ["nix", "gc", "dates"], "readOnly": false, "type": "string"}, "nix.gc.options": {"declarations": ["nixos/modules/services/misc/nix-gc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Options given to {file}`nix-collect-garbage` when the\ngarbage collector is run automatically.\n"}, "example": {"_type": "literalExpression", "text": "\"--max-freed $((64 * 1024**3))\""}, "loc": ["nix", "gc", "options"], "readOnly": false, "type": "string"}, "nix.gc.persistent": {"declarations": ["nixos/modules/services/misc/nix-gc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Takes a boolean argument. If true, the time when the service\nunit was last triggered is stored on disk. When the timer is\nactivated, the service unit is triggered immediately if it\nwould have been triggered at least once during the time when\nthe timer was inactive. Such triggering is nonetheless\nsubject to the delay imposed by RandomizedDelaySec=. This is\nuseful to catch up on missed runs of the service when the\nsystem was powered down.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["nix", "gc", "persistent"], "readOnly": false, "type": "boolean"}, "nix.gc.randomizedDelaySec": {"declarations": ["nixos/modules/services/misc/nix-gc.nix"], "default": {"_type": "literalExpression", "text": "\"0\""}, "description": {"_type": "mdDoc", "text": "Add a randomized delay before each garbage collection.\nThe delay will be chosen between zero and this value.\nThis value must be a time span in the format specified by\n{manpage}`systemd.time(7)`\n"}, "example": {"_type": "literalExpression", "text": "\"45min\""}, "loc": ["nix", "gc", "randomizedDelaySec"], "readOnly": false, "type": "string"}, "nix.nixPath": {"declarations": ["nixos/modules/config/nix-channel.nix"], "default": {"_type": "literalExpression", "text": "''\n  if nix.channel.enable\n  then [\n    \"nixpkgs=/nix/var/nix/profiles/per-user/root/channels/nixos\"\n    \"nixos-config=/etc/nixos/configuration.nix\"\n    \"/nix/var/nix/profiles/per-user/root/channels\"\n  ]\n  else [];\n''"}, "description": {"_type": "mdDoc", "text": "The default Nix expression search path, used by the Nix\nevaluator to look up paths enclosed in angle brackets\n(e.g. `<nixpkgs>`).\n"}, "loc": ["nix", "nixPath"], "readOnly": false, "type": "list of string"}, "nix.nrBuildUsers": {"declarations": ["nixos/modules/services/system/nix-daemon.nix"], "description": {"_type": "mdDoc", "text": "Number of `nixbld` user accounts created to\nperform secure concurrent builds.  If you receive an error\nmessage saying that \u201call build users are currently in use\u201d,\nyou should increase this value.\n"}, "loc": ["nix", "nrBuildUsers"], "readOnly": false, "type": "signed integer"}, "nix.optimise.automatic": {"declarations": ["nixos/modules/services/misc/nix-optimise.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically run the nix store optimiser at a specific time."}, "loc": ["nix", "optimise", "automatic"], "readOnly": false, "type": "boolean"}, "nix.optimise.dates": {"declarations": ["nixos/modules/services/misc/nix-optimise.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"03:45\"\n]"}, "description": {"_type": "mdDoc", "text": "Specification (in the format described by\n{manpage}`systemd.time(7)`) of the time at\nwhich the optimiser will run.\n"}, "loc": ["nix", "optimise", "dates"], "readOnly": false, "type": "list of string"}, "nix.package": {"declarations": ["nixos/modules/services/system/nix-daemon.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nix"}, "description": {"_type": "mdDoc", "text": "This option specifies the Nix package instance to use throughout the system.\n"}, "loc": ["nix", "package"], "readOnly": false, "type": "package"}, "nix.registry": {"declarations": ["nixos/modules/config/nix-flakes.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A system-wide flake registry.\n"}, "loc": ["nix", "registry"], "readOnly": false, "type": "attribute set of (submodule)"}, "nix.registry.<name>.exact": {"declarations": ["nixos/modules/config/nix-flakes.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the {option}`from` reference needs to match exactly. If set,\na {option}`from` reference like `nixpkgs` does not\nmatch with a reference like `nixpkgs/nixos-20.03`.\n"}, "loc": ["nix", "registry", "<name>", "exact"], "readOnly": false, "type": "boolean"}, "nix.registry.<name>.flake": {"declarations": ["nixos/modules/config/nix-flakes.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The flake input {option}`from` is rewritten to.\n"}, "example": {"_type": "literalExpression", "text": "nixpkgs"}, "loc": ["nix", "registry", "<name>", "flake"], "readOnly": false, "type": "null or (attribute set)"}, "nix.registry.<name>.from": {"declarations": ["nixos/modules/config/nix-flakes.nix"], "description": {"_type": "mdDoc", "text": "The flake reference to be rewritten."}, "example": {"_type": "literalExpression", "text": "{\n  id = \"nixpkgs\";\n  type = \"indirect\";\n}"}, "loc": ["nix", "registry", "<name>", "from"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean or path or package)"}, "nix.registry.<name>.to": {"declarations": ["nixos/modules/config/nix-flakes.nix"], "description": {"_type": "mdDoc", "text": "The flake reference {option}`from` is rewritten to."}, "example": {"_type": "literalExpression", "text": "{\n  owner = \"my-org\";\n  repo = \"my-nixpkgs\";\n  type = \"github\";\n}"}, "loc": ["nix", "registry", "<name>", "to"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean or path or package)"}, "nix.settings": {"declarations": ["nixos/modules/config/nix.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for Nix, see\n<https://nixos.org/manual/nix/stable/command-ref/conf-file.html> or\n{manpage}`nix.conf(5)` for available options.\nThe value declared here will be translated directly to the key-value pairs Nix expects.\n\nYou can use {command}`nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.nix.settings`\nto view the current value. By default it is empty.\n\nNix configurations defined under {option}`nix.*` will be translated and applied to this\noption. In addition, configuration specified in {option}`nix.extraOptions` will be appended\nverbatim to the resulting config file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  use-sandbox = true;\n  show-trace = true;\n\n  system-features = [ \"big-parallel\" \"kvm\" \"recursive-nix\" ];\n  sandbox-paths = { \"/bin/sh\" = \"${pkgs.busybox-sandbox-shell.out}/bin/busybox\"; };\n}\n"}, "loc": ["nix", "settings"], "readOnly": false, "type": "attribute set of (Nix config atom (null, bool, int, float, str, path or package) or list of (Nix config atom (null, bool, int, float, str, path or package)))"}, "nix.settings.allowed-users": {"declarations": ["nixos/modules/config/nix.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*\"\n]"}, "description": {"_type": "mdDoc", "text": "A list of names of users (separated by whitespace) that are\nallowed to connect to the Nix daemon. As with\n{option}`nix.settings.trusted-users`, you can specify groups by\nprefixing them with `@`. Also, you can\nallow all users by specifying `*`. The\ndefault is `*`. Note that trusted users are\nalways allowed to connect.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"@wheel\"\n  \"@builders\"\n  \"alice\"\n  \"bob\"\n]"}, "loc": ["nix", "settings", "allowed-users"], "readOnly": false, "type": "list of string"}, "nix.settings.auto-optimise-store": {"declarations": ["nixos/modules/config/nix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set to true, Nix automatically detects files in the store that have\nidentical contents, and replaces them with hard links to a single copy.\nThis saves disk space. If set to false (the default), you can still run\nnix-store --optimise to get rid of duplicate files.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["nix", "settings", "auto-optimise-store"], "readOnly": false, "type": "boolean"}, "nix.settings.cores": {"declarations": ["nixos/modules/config/nix.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "This option defines the maximum number of concurrent tasks during\none build. It affects, e.g., -j option for make.\nThe special value 0 means that the builder should use all\navailable CPU cores in the system. Some builds may become\nnon-deterministic with this option; use with care! Packages will\nonly be affected if enableParallelBuilding is set for them.\n"}, "example": {"_type": "literalExpression", "text": "64"}, "loc": ["nix", "settings", "cores"], "readOnly": false, "type": "signed integer"}, "nix.settings.extra-sandbox-paths": {"declarations": ["nixos/modules/config/nix.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Directories from the host filesystem to be included\nin the sandbox.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/dev\"\n  \"/proc\"\n]"}, "loc": ["nix", "settings", "extra-sandbox-paths"], "readOnly": false, "type": "list of string"}, "nix.settings.max-jobs": {"declarations": ["nixos/modules/config/nix.nix"], "default": {"_type": "literalExpression", "text": "\"auto\""}, "description": {"_type": "mdDoc", "text": "This option defines the maximum number of jobs that Nix will try to\nbuild in parallel. The default is auto, which means it will use all\navailable logical cores. It is recommend to set it to the total\nnumber of logical cores in your system (e.g., 16 for two CPUs with 4\ncores each and hyper-threading).\n"}, "example": {"_type": "literalExpression", "text": "64"}, "loc": ["nix", "settings", "max-jobs"], "readOnly": false, "type": "signed integer or value \"auto\" (singular enum)"}, "nix.settings.require-sigs": {"declarations": ["nixos/modules/config/nix.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If enabled (the default), Nix will only download binaries from binary caches if\nthey are cryptographically signed with any of the keys listed in\n{option}`nix.settings.trusted-public-keys`. If disabled, signatures are neither\nrequired nor checked, so it's strongly recommended that you use only\ntrustworthy caches and https to prevent man-in-the-middle attacks.\n"}, "loc": ["nix", "settings", "require-sigs"], "readOnly": false, "type": "boolean"}, "nix.settings.sandbox": {"declarations": ["nixos/modules/config/nix.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set, Nix will perform builds in a sandboxed environment that it\nwill set up automatically for each build. This prevents impurities\nin builds by disallowing access to dependencies outside of the Nix\nstore by using network and mount namespaces in a chroot environment.\n\nThis is enabled by default even though it has a possible performance\nimpact due to the initial setup time of a sandbox for each build. It\ndoesn't affect derivation hashes, so changing this option will not\ntrigger a rebuild of packages.\n\nWhen set to \"relaxed\", this option permits derivations that set\n`__noChroot = true;` to run outside of the sandboxed environment.\nExercise caution when using this mode of operation! It is intended to\nbe a quick hack when building with packages that are not easily setup\nto be built reproducibly.\n"}, "loc": ["nix", "settings", "sandbox"], "readOnly": false, "type": "boolean or value \"relaxed\" (singular enum)"}, "nix.settings.substituters": {"declarations": ["nixos/modules/config/nix.nix"], "description": {"_type": "mdDoc", "text": "List of binary cache URLs used to obtain pre-built binaries\nof Nix packages.\n\nBy default https://cache.nixos.org/ is added.\n"}, "loc": ["nix", "settings", "substituters"], "readOnly": false, "type": "list of string"}, "nix.settings.system-features": {"declarations": ["nixos/modules/config/nix.nix"], "description": {"_type": "mdDoc", "text": "The set of features supported by the machine. Derivations\ncan express dependencies on system features through the\n`requiredSystemFeatures` attribute.\n\nBy default, pseudo-features `nixos-test`, `benchmark`,\nand `big-parallel` used in Nixpkgs are set, `kvm`\nis also included if it is available.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"kvm\"\n  \"big-parallel\"\n  \"gccarch-skylake\"\n]"}, "loc": ["nix", "settings", "system-features"], "readOnly": false, "type": "list of string"}, "nix.settings.trusted-public-keys": {"declarations": ["nixos/modules/config/nix.nix"], "description": {"_type": "mdDoc", "text": "List of public keys used to sign binary caches. If\n{option}`nix.settings.trusted-public-keys` is enabled,\nthen Nix will use a binary from a binary cache if and only\nif it is signed by *any* of the keys\nlisted here. By default, only the key for\n`cache.nixos.org` is included.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"hydra.nixos.org-1:CNHJZBh9K4tP3EKF6FkkgeVYsS3ohTl+oS0Qa8bezVs=\"\n]"}, "loc": ["nix", "settings", "trusted-public-keys"], "readOnly": false, "type": "list of string"}, "nix.settings.trusted-substituters": {"declarations": ["nixos/modules/config/nix.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of binary cache URLs that non-root users can use (in\naddition to those specified using\n{option}`nix.settings.substituters`) by passing\n`--option binary-caches` to Nix commands.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"https://hydra.nixos.org/\"\n]"}, "loc": ["nix", "settings", "trusted-substituters"], "readOnly": false, "type": "list of string"}, "nix.settings.trusted-users": {"declarations": ["nixos/modules/config/nix.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"root\"\n]"}, "description": {"_type": "mdDoc", "text": "A list of names of users that have additional rights when\nconnecting to the Nix daemon, such as the ability to specify\nadditional binary caches, or to import unsigned NARs. You\ncan also specify groups by prefixing them with\n`@`; for instance,\n`@wheel` means all users in the wheel\ngroup.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"root\"\n  \"alice\"\n  \"@wheel\"\n]"}, "loc": ["nix", "settings", "trusted-users"], "readOnly": false, "type": "list of string"}, "nix.sshServe.enable": {"declarations": ["nixos/modules/services/misc/nix-ssh-serve.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable serving the Nix store as a remote store via SSH."}, "loc": ["nix", "sshServe", "enable"], "readOnly": false, "type": "boolean"}, "nix.sshServe.keys": {"declarations": ["nixos/modules/services/misc/nix-ssh-serve.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of SSH public keys allowed to access the binary cache via SSH."}, "example": {"_type": "literalExpression", "text": "[\n  \"ssh-dss AAAAB3NzaC1k... alice@example.org\"\n]"}, "loc": ["nix", "sshServe", "keys"], "readOnly": false, "type": "list of string"}, "nix.sshServe.protocol": {"declarations": ["nixos/modules/services/misc/nix-ssh-serve.nix"], "default": {"_type": "literalExpression", "text": "\"ssh\""}, "description": {"_type": "mdDoc", "text": "The specific Nix-over-SSH protocol to use."}, "loc": ["nix", "sshServe", "protocol"], "readOnly": false, "type": "one of \"ssh\", \"ssh-ng\""}, "nix.sshServe.write": {"declarations": ["nixos/modules/services/misc/nix-ssh-serve.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable writing to the Nix store as a remote store via SSH. Note: the sshServe user is named nix-ssh and is not a trusted-user. nix-ssh should be added to the {option}`nix.settings.trusted-users` option in most use cases, such as allowing remote building of derivations."}, "loc": ["nix", "sshServe", "write"], "readOnly": false, "type": "boolean"}, "nixops.enableDeprecatedAutoLuks": {"declarations": ["nixos/modules/misc/nixops-autoluks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Enable the deprecated NixOps AutoLuks module."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["nixops", "enableDeprecatedAutoLuks"], "readOnly": false, "type": "boolean"}, "openstack.zfs.datasets": {"declarations": ["nixos/modules/virtualisation/openstack-options.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Datasets to create under the `tank` and `boot` zpools.\n\n**NOTE:** This option is used only at image creation time, and\ndoes not attempt to declaratively create or manage datasets\non an existing system.\n"}, "loc": ["openstack", "zfs", "datasets"], "readOnly": false, "type": "attribute set of (submodule)"}, "openstack.zfs.datasets.<name>.mount": {"declarations": ["nixos/modules/virtualisation/openstack-options.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Where to mount this dataset."}, "loc": ["openstack", "zfs", "datasets", "<name>", "mount"], "readOnly": false, "type": "null or string"}, "openstack.zfs.datasets.<name>.properties": {"declarations": ["nixos/modules/virtualisation/openstack-options.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Properties to set on this dataset."}, "loc": ["openstack", "zfs", "datasets", "<name>", "properties"], "readOnly": false, "type": "attribute set of string"}, "power.ups.enable": {"declarations": ["nixos/modules/services/monitoring/ups.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables support for Power Devices, such as Uninterruptible Power\nSupplies, Power Distribution Units and Solar Controllers.\n"}, "loc": ["power", "ups", "enable"], "readOnly": false, "type": "boolean"}, "power.ups.maxStartDelay": {"declarations": ["nixos/modules/services/monitoring/ups.nix"], "default": {"_type": "literalExpression", "text": "45"}, "description": {"_type": "mdDoc", "text": "This can be set as a global variable above your first UPS\ndefinition and it can also be set in a UPS section.  This value\ncontrols how long upsdrvctl will wait for the driver to finish\nstarting.  This keeps your system from getting stuck due to a\nbroken driver or UPS.\n"}, "loc": ["power", "ups", "maxStartDelay"], "readOnly": false, "type": "signed integer"}, "power.ups.mode": {"declarations": ["nixos/modules/services/monitoring/ups.nix"], "default": {"_type": "literalExpression", "text": "\"standalone\""}, "description": {"_type": "mdDoc", "text": "The MODE determines which part of the NUT is to be started, and\nwhich configuration files must be modified.\n\nThe values of MODE can be:\n\n- none: NUT is not configured, or use the Integrated Power\n  Management, or use some external system to startup NUT\n  components. So nothing is to be started.\n\n- standalone: This mode address a local only configuration, with 1\n  UPS protecting the local system. This implies to start the 3 NUT\n  layers (driver, upsd and upsmon) and the matching configuration\n  files. This mode can also address UPS redundancy.\n\n- netserver: same as for the standalone configuration, but also\n  need some more ACLs and possibly a specific LISTEN directive in\n  upsd.conf.  Since this MODE is opened to the network, a special\n  care should be applied to security concerns.\n\n- netclient: this mode only requires upsmon.\n"}, "loc": ["power", "ups", "mode"], "readOnly": false, "type": "string"}, "power.ups.schedulerRules": {"declarations": ["nixos/modules/services/monitoring/ups.nix"], "description": {"_type": "mdDoc", "text": "File which contains the rules to handle UPS events.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/nixos/upssched.conf\""}, "loc": ["power", "ups", "schedulerRules"], "readOnly": false, "type": "string"}, "power.ups.ups": {"declarations": ["nixos/modules/services/monitoring/ups.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This is where you configure all the UPSes that this system will be\nmonitoring directly.  These are usually attached to serial ports,\nbut USB devices are also supported.\n"}, "loc": ["power", "ups", "ups"], "readOnly": false, "type": "attribute set of (submodule)"}, "power.ups.ups.<name>.description": {"declarations": ["nixos/modules/services/monitoring/ups.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of the UPS.\n"}, "loc": ["power", "ups", "ups", "<name>", "description"], "readOnly": false, "type": "string"}, "power.ups.ups.<name>.directives": {"declarations": ["nixos/modules/services/monitoring/ups.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of configuration directives for this UPS.\n"}, "loc": ["power", "ups", "ups", "<name>", "directives"], "readOnly": false, "type": "list of string"}, "power.ups.ups.<name>.driver": {"declarations": ["nixos/modules/services/monitoring/ups.nix"], "description": {"_type": "mdDoc", "text": "Specify the program to run to talk to this UPS.  apcsmart,\nbestups, and sec are some examples.\n"}, "loc": ["power", "ups", "ups", "<name>", "driver"], "readOnly": false, "type": "string"}, "power.ups.ups.<name>.maxStartDelay": {"declarations": ["nixos/modules/services/monitoring/ups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This can be set as a global variable above your first UPS\ndefinition and it can also be set in a UPS section.  This value\ncontrols how long upsdrvctl will wait for the driver to finish\nstarting.  This keeps your system from getting stuck due to a\nbroken driver or UPS.\n"}, "loc": ["power", "ups", "ups", "<name>", "maxStartDelay"], "readOnly": false, "type": "null or signed integer"}, "power.ups.ups.<name>.port": {"declarations": ["nixos/modules/services/monitoring/ups.nix"], "description": {"_type": "mdDoc", "text": "The serial port to which your UPS is connected.  /dev/ttyS0 is\nusually the first port on Linux boxes, for example.\n"}, "loc": ["power", "ups", "ups", "<name>", "port"], "readOnly": false, "type": "string"}, "power.ups.ups.<name>.shutdownOrder": {"declarations": ["nixos/modules/services/monitoring/ups.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "When you have multiple UPSes on your system, you usually need to\nturn them off in a certain order.  upsdrvctl shuts down all the\n0s, then the 1s, 2s, and so on.  To exclude a UPS from the\nshutdown sequence, set this to -1.\n"}, "loc": ["power", "ups", "ups", "<name>", "shutdownOrder"], "readOnly": false, "type": "signed integer"}, "power.ups.ups.<name>.summary": {"declarations": ["nixos/modules/services/monitoring/ups.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Lines which would be added inside ups.conf for handling this UPS.\n"}, "loc": ["power", "ups", "ups", "<name>", "summary"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "powerManagement.cpuFreqGovernor": {"declarations": ["nixos/modules/tasks/cpu-freq.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the governor used to regulate the frequency of the\navailable CPUs. By default, the kernel configures the\nperformance governor, although this may be overwritten in your\nhardware-configuration.nix file.\n\nOften used values: \"ondemand\", \"powersave\", \"performance\"\n"}, "example": {"_type": "literalExpression", "text": "\"ondemand\""}, "loc": ["powerManagement", "cpuFreqGovernor"], "readOnly": false, "type": "null or string"}, "powerManagement.cpufreq.max": {"declarations": ["nixos/modules/tasks/cpu-freq.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The maximum frequency the CPU will use.  Defaults to the maximum possible.\n"}, "example": {"_type": "literalExpression", "text": "2200000"}, "loc": ["powerManagement", "cpufreq", "max"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "powerManagement.cpufreq.min": {"declarations": ["nixos/modules/tasks/cpu-freq.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The minimum frequency the CPU will use.\n"}, "example": {"_type": "literalExpression", "text": "800000"}, "loc": ["powerManagement", "cpufreq", "min"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "powerManagement.enable": {"declarations": ["nixos/modules/config/power-management.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable power management.  This includes support\nfor suspend-to-RAM and powersave features on laptops.\n"}, "loc": ["powerManagement", "enable"], "readOnly": false, "type": "boolean"}, "powerManagement.powerDownCommands": {"declarations": ["nixos/modules/config/power-management.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Commands executed when the machine powers down.  That is,\nthey're executed both when the system shuts down and when\nit goes to suspend or hibernation.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.hdparm}/sbin/hdparm -B 255 /dev/sda\"\n"}, "loc": ["powerManagement", "powerDownCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "powerManagement.powerUpCommands": {"declarations": ["nixos/modules/config/power-management.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Commands executed when the machine powers up.  That is,\nthey're executed both when the system first boots and when\nit resumes from suspend or hibernation.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.hdparm}/sbin/hdparm -B 255 /dev/sda\"\n"}, "loc": ["powerManagement", "powerUpCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "powerManagement.powertop.enable": {"declarations": ["nixos/modules/tasks/powertop.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable powertop auto tuning on startup."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["powerManagement", "powertop", "enable"], "readOnly": false, "type": "boolean"}, "powerManagement.resumeCommands": {"declarations": ["nixos/modules/config/power-management.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Commands executed after the system resumes from suspend-to-RAM."}, "loc": ["powerManagement", "resumeCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "powerManagement.scsiLinkPolicy": {"declarations": ["nixos/modules/tasks/scsi-link-power-management.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SCSI link power management policy. The kernel default is\n\"max_performance\".\n\n\"med_power_with_dipm\" is supported by kernel versions\n4.15 and newer.\n"}, "loc": ["powerManagement", "scsiLinkPolicy"], "readOnly": false, "type": "null or one of \"min_power\", \"max_performance\", \"medium_power\", \"med_power_with_dipm\""}, "programs._1password-gui.enable": {"declarations": ["nixos/modules/programs/_1password-gui.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the 1Password GUI application."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "_1password-gui", "enable"], "readOnly": false, "type": "boolean"}, "programs._1password-gui.package": {"declarations": ["nixos/modules/programs/_1password-gui.nix"], "default": {"_type": "literalExpression", "text": "pkgs._1password-gui"}, "description": {"_type": "mdDoc", "text": "The 1Password GUI package to use."}, "loc": ["programs", "_1password-gui", "package"], "readOnly": false, "type": "package"}, "programs._1password-gui.polkitPolicyOwners": {"declarations": ["nixos/modules/programs/_1password-gui.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of users who should be able to integrate 1Password with polkit-based authentication mechanisms.\n"}, "example": {"_type": "literalExpression", "text": "[\"user1\" \"user2\" \"user3\"]"}, "loc": ["programs", "_1password-gui", "polkitPolicyOwners"], "readOnly": false, "type": "list of string"}, "programs._1password.enable": {"declarations": ["nixos/modules/programs/_1password.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the 1Password CLI tool."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "_1password", "enable"], "readOnly": false, "type": "boolean"}, "programs._1password.package": {"declarations": ["nixos/modules/programs/_1password.nix"], "default": {"_type": "literalExpression", "text": "pkgs._1password"}, "description": {"_type": "mdDoc", "text": "The 1Password CLI package to use."}, "loc": ["programs", "_1password", "package"], "readOnly": false, "type": "package"}, "programs.adb.enable": {"declarations": ["nixos/modules/programs/adb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to configure system to use Android Debug Bridge (adb).\nTo grant access to a user, it must be part of adbusers group:\n`users.users.alice.extraGroups = [\"adbusers\"];`\n"}, "loc": ["programs", "adb", "enable"], "readOnly": false, "type": "boolean"}, "programs.appgate-sdp.enable": {"declarations": ["nixos/modules/programs/appgate-sdp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable AppGate SDP VPN client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "appgate-sdp", "enable"], "readOnly": false, "type": "boolean"}, "programs.atop.atopRotateTimer.enable": {"declarations": ["nixos/modules/programs/atop.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the atop-rotate timer, which restarts the atop service\ndaily to make sure the data files are rotate.\n"}, "loc": ["programs", "atop", "atopRotateTimer", "enable"], "readOnly": false, "type": "boolean"}, "programs.atop.atopService.enable": {"declarations": ["nixos/modules/programs/atop.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the atop service responsible for storing statistics for\nlong-term analysis.\n"}, "loc": ["programs", "atop", "atopService", "enable"], "readOnly": false, "type": "boolean"}, "programs.atop.atopacctService.enable": {"declarations": ["nixos/modules/programs/atop.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the atopacct service which manages process accounting.\nThis allows Atop to gather data about processes that disappeared in between\ntwo refresh intervals.\n"}, "loc": ["programs", "atop", "atopacctService", "enable"], "readOnly": false, "type": "boolean"}, "programs.atop.atopgpu.enable": {"declarations": ["nixos/modules/programs/atop.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install and enable the atopgpud daemon to get information about\nNVIDIA gpus.\n"}, "loc": ["programs", "atop", "atopgpu", "enable"], "readOnly": false, "type": "boolean"}, "programs.atop.enable": {"declarations": ["nixos/modules/programs/atop.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Atop."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "atop", "enable"], "readOnly": false, "type": "boolean"}, "programs.atop.netatop.enable": {"declarations": ["nixos/modules/programs/atop.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install and enable the netatop kernel module.\nNote: this sets the kernel taint flag \"O\" for loading out-of-tree modules.\n"}, "loc": ["programs", "atop", "netatop", "enable"], "readOnly": false, "type": "boolean"}, "programs.atop.netatop.package": {"declarations": ["nixos/modules/programs/atop.nix"], "default": {"_type": "literalExpression", "text": "config.boot.kernelPackages.netatop"}, "description": {"_type": "mdDoc", "text": "Which package to use for netatop.\n"}, "loc": ["programs", "atop", "netatop", "package"], "readOnly": false, "type": "package"}, "programs.atop.package": {"declarations": ["nixos/modules/programs/atop.nix"], "default": {"_type": "literalExpression", "text": "pkgs.atop"}, "description": {"_type": "mdDoc", "text": "Which package to use for Atop.\n"}, "loc": ["programs", "atop", "package"], "readOnly": false, "type": "package"}, "programs.atop.settings": {"declarations": ["nixos/modules/programs/atop.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Parameters to be written to {file}`/etc/atoprc`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  flags = \"a1f\";\n  interval = 5;\n}"}, "loc": ["programs", "atop", "settings"], "readOnly": false, "type": "attribute set"}, "programs.atop.setuidWrapper.enable": {"declarations": ["nixos/modules/programs/atop.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install a setuid wrapper for Atop. This is required to use some of\nthe features as non-root user (e.g.: ipc information, netatop, atopgpu).\nAtop tries to drop the root privileges shortly after starting.\n"}, "loc": ["programs", "atop", "setuidWrapper", "enable"], "readOnly": false, "type": "boolean"}, "programs.ausweisapp.enable": {"declarations": ["nixos/modules/programs/ausweisapp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable AusweisApp2."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "ausweisapp", "enable"], "readOnly": false, "type": "boolean"}, "programs.ausweisapp.openFirewall": {"declarations": ["nixos/modules/programs/ausweisapp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the required firewall ports for the Smartphone as Card Reader (SaC) functionality of AusweisApp2.\n"}, "loc": ["programs", "ausweisapp", "openFirewall"], "readOnly": false, "type": "boolean"}, "programs.autojump.enable": {"declarations": ["nixos/modules/programs/autojump.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable autojump.\n"}, "loc": ["programs", "autojump", "enable"], "readOnly": false, "type": "boolean"}, "programs.bandwhich.enable": {"declarations": ["nixos/modules/programs/bandwhich.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add bandwhich to the global environment and configure a\nsetcap wrapper for it.\n"}, "loc": ["programs", "bandwhich", "enable"], "readOnly": false, "type": "boolean"}, "programs.bash-my-aws.enable": {"declarations": ["nixos/modules/programs/bash-my-aws.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable bash-my-aws."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "bash-my-aws", "enable"], "readOnly": false, "type": "boolean"}, "programs.bash.blesh.enable": {"declarations": ["nixos/modules/programs/bash/blesh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable blesh."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "bash", "blesh", "enable"], "readOnly": false, "type": "boolean"}, "programs.bash.enableCompletion": {"declarations": ["nixos/modules/programs/bash/bash-completion.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable Bash completion for all interactive bash shells."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "bash", "enableCompletion"], "readOnly": false, "type": "boolean"}, "programs.bash.enableLsColors": {"declarations": ["nixos/modules/programs/bash/ls-colors.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable extra colors in directory listings."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "bash", "enableLsColors"], "readOnly": false, "type": "boolean"}, "programs.bash.interactiveShellInit": {"declarations": ["nixos/modules/programs/bash/bash.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code called during interactive bash shell initialisation.\n"}, "loc": ["programs", "bash", "interactiveShellInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.bash.loginShellInit": {"declarations": ["nixos/modules/programs/bash/bash.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code called during login bash shell initialisation.\n"}, "loc": ["programs", "bash", "loginShellInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.bash.promptInit": {"declarations": ["nixos/modules/programs/bash/bash.nix"], "default": {"_type": "literalExpression", "text": "''\n  # Provide a nice prompt if the terminal supports it.\n  if [ \"$TERM\" != \"dumb\" ] || [ -n \"$INSIDE_EMACS\" ]; then\n    PROMPT_COLOR=\"1;31m\"\n    ((UID)) && PROMPT_COLOR=\"1;32m\"\n    if [ -n \"$INSIDE_EMACS\" ] || [ \"$TERM\" = \"eterm\" ] || [ \"$TERM\" = \"eterm-color\" ]; then\n      # Emacs term mode doesn't support xterm title escape sequence (\\e]0;)\n      PS1=\"\\n\\[\\033[$PROMPT_COLOR\\][\\u@\\h:\\w]\\\\$\\[\\033[0m\\] \"\n    else\n      PS1=\"\\n\\[\\033[$PROMPT_COLOR\\][\\[\\e]0;\\u@\\h: \\w\\a\\]\\u@\\h:\\w]\\\\$\\[\\033[0m\\] \"\n    fi\n    if test \"$TERM\" = \"xterm\"; then\n      PS1=\"\\[\\033]2;\\h:\\u:\\w\\007\\]$PS1\"\n    fi\n  fi\n''"}, "description": {"_type": "mdDoc", "text": "Shell script code used to initialise the bash prompt.\n"}, "loc": ["programs", "bash", "promptInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.bash.shellAliases": {"declarations": ["nixos/modules/programs/bash/bash.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of aliases for bash shell, which overrides {option}`environment.shellAliases`.\nSee {option}`environment.shellAliases` for an option format description.\n"}, "loc": ["programs", "bash", "shellAliases"], "readOnly": false, "type": "attribute set of (null or string or path)"}, "programs.bash.shellInit": {"declarations": ["nixos/modules/programs/bash/bash.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code called during bash shell initialisation.\n"}, "loc": ["programs", "bash", "shellInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.bash.undistractMe.enable": {"declarations": ["nixos/modules/programs/bash/undistract-me.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable notifications when long-running terminal commands complete."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "bash", "undistractMe", "enable"], "readOnly": false, "type": "boolean"}, "programs.bash.undistractMe.playSound": {"declarations": ["nixos/modules/programs/bash/undistract-me.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable notification sounds when long-running terminal commands complete."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "bash", "undistractMe", "playSound"], "readOnly": false, "type": "boolean"}, "programs.bash.undistractMe.timeout": {"declarations": ["nixos/modules/programs/bash/undistract-me.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Number of seconds it would take for a command to be considered long-running.\n"}, "loc": ["programs", "bash", "undistractMe", "timeout"], "readOnly": false, "type": "signed integer"}, "programs.bash.vteIntegration": {"declarations": ["nixos/modules/config/vte.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Bash integration for VTE terminals.\nThis allows it to preserve the current directory of the shell\nacross terminals.\n"}, "loc": ["programs", "bash", "vteIntegration"], "readOnly": false, "type": "boolean"}, "programs.bcc.enable": {"declarations": ["nixos/modules/programs/bcc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable bcc."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "bcc", "enable"], "readOnly": false, "type": "boolean"}, "programs.browserpass.enable": {"declarations": ["nixos/modules/programs/browserpass.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Browserpass native messaging host."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "browserpass", "enable"], "readOnly": false, "type": "boolean"}, "programs.calls.enable": {"declarations": ["nixos/modules/programs/calls.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Whether to enable GNOME calls: a phone dialer and call handler.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "calls", "enable"], "readOnly": false, "type": "boolean"}, "programs.captive-browser.bindInterface": {"declarations": ["nixos/modules/programs/captive-browser.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Binds `captive-browser` to the network interface declared in\n`cfg.interface`. This can be used to avoid collisions\nwith private subnets.\n"}, "loc": ["programs", "captive-browser", "bindInterface"], "readOnly": false, "type": "boolean"}, "programs.captive-browser.browser": {"declarations": ["nixos/modules/programs/captive-browser.nix"], "default": {"_type": "literalExpression", "text": "env XDG_CONFIG_HOME=\"$PREV_CONFIG_HOME\" ${pkgs.chromium}/bin/chromium --user-data-dir=${XDG_DATA_HOME:-$HOME/.local/share}/chromium-captive --proxy-server=\"socks5://$PROXY\" --host-resolver-rules=\"MAP * ~NOTFOUND , EXCLUDE localhost\" --no-first-run --new-window --incognito -no-default-browser-check http://cache.nixos.org/"}, "description": {"_type": "mdDoc", "text": "The shell (/bin/sh) command executed once the proxy starts.\nWhen browser exits, the proxy exits. An extra env var PROXY is available.\n\nHere, we use a separate Chrome instance in Incognito mode, so that\nit can run (and be waited for) alongside the default one, and that\nit maintains no state across runs. To configure this browser open a\nnormal window in it, settings will be preserved.\n\n@volth: chromium is to open a plain HTTP (not HTTPS nor redirect to HTTPS!) website.\n        upstream uses http://example.com but I have seen captive portals whose DNS server resolves \"example.com\" to 127.0.0.1\n"}, "loc": ["programs", "captive-browser", "browser"], "readOnly": false, "type": "string"}, "programs.captive-browser.dhcp-dns": {"declarations": ["nixos/modules/programs/captive-browser.nix"], "description": {"_type": "mdDoc", "text": "The shell (/bin/sh) command executed to obtain the DHCP\nDNS server address. The first match of an IPv4 regex is used.\nIPv4 only, because let's be real, it's a captive portal.\n"}, "loc": ["programs", "captive-browser", "dhcp-dns"], "readOnly": false, "type": "string"}, "programs.captive-browser.enable": {"declarations": ["nixos/modules/programs/captive-browser.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable captive browser."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "captive-browser", "enable"], "readOnly": false, "type": "boolean"}, "programs.captive-browser.interface": {"declarations": ["nixos/modules/programs/captive-browser.nix"], "description": {"_type": "mdDoc", "text": "your public network interface (wlp3s0, wlan0, eth0, ...)"}, "loc": ["programs", "captive-browser", "interface"], "readOnly": false, "type": "string"}, "programs.captive-browser.package": {"declarations": ["nixos/modules/programs/captive-browser.nix"], "default": {"_type": "literalExpression", "text": "pkgs.captive-browser"}, "description": {"_type": "mdDoc", "text": "Which package to use for captive-browser"}, "loc": ["programs", "captive-browser", "package"], "readOnly": false, "type": "package"}, "programs.captive-browser.socks5-addr": {"declarations": ["nixos/modules/programs/captive-browser.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:1666\""}, "description": {"_type": "mdDoc", "text": "the listen address for the SOCKS5 proxy server"}, "loc": ["programs", "captive-browser", "socks5-addr"], "readOnly": false, "type": "string"}, "programs.ccache.cacheDir": {"declarations": ["nixos/modules/programs/ccache.nix"], "default": {"_type": "literalExpression", "text": "\"/var/cache/ccache\""}, "description": {"_type": "mdDoc", "text": "CCache directory"}, "loc": ["programs", "ccache", "cacheDir"], "readOnly": false, "type": "path"}, "programs.ccache.enable": {"declarations": ["nixos/modules/programs/ccache.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable CCache."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "ccache", "enable"], "readOnly": false, "type": "boolean"}, "programs.ccache.packageNames": {"declarations": ["nixos/modules/programs/ccache.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Nix top-level packages to be compiled using CCache"}, "example": {"_type": "literalExpression", "text": "[\n  \"wxGTK32\"\n  \"ffmpeg\"\n  \"libav_all\"\n]"}, "loc": ["programs", "ccache", "packageNames"], "readOnly": false, "type": "list of string"}, "programs.cdemu.enable": {"declarations": ["nixos/modules/programs/cdemu.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "{command}`cdemu` for members of\n{option}`programs.cdemu.group`.\n"}, "loc": ["programs", "cdemu", "enable"], "readOnly": false, "type": "boolean"}, "programs.cdemu.group": {"declarations": ["nixos/modules/programs/cdemu.nix"], "default": {"_type": "literalExpression", "text": "\"cdrom\""}, "description": {"_type": "mdDoc", "text": "Group that users must be in to use {command}`cdemu`.\n"}, "loc": ["programs", "cdemu", "group"], "readOnly": false, "type": "string"}, "programs.cdemu.gui": {"declarations": ["nixos/modules/programs/cdemu.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install the {command}`cdemu` GUI (gCDEmu).\n"}, "loc": ["programs", "cdemu", "gui"], "readOnly": false, "type": "boolean"}, "programs.cdemu.image-analyzer": {"declarations": ["nixos/modules/programs/cdemu.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install the image analyzer.\n"}, "loc": ["programs", "cdemu", "image-analyzer"], "readOnly": false, "type": "boolean"}, "programs.cfs-zen-tweaks.enable": {"declarations": ["nixos/modules/programs/cfs-zen-tweaks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable CFS Zen Tweaks."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "cfs-zen-tweaks", "enable"], "readOnly": false, "type": "boolean"}, "programs.chromium.defaultSearchProviderEnabled": {"declarations": ["nixos/modules/programs/chromium.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Enable the default search provider."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "chromium", "defaultSearchProviderEnabled"], "readOnly": false, "type": "null or boolean"}, "programs.chromium.defaultSearchProviderSearchURL": {"declarations": ["nixos/modules/programs/chromium.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Chromium default search provider url."}, "example": {"_type": "literalExpression", "text": "\"https://encrypted.google.com/search?q={searchTerms}&{google:RLZ}{google:originalQueryForSuggestion}{google:assistedQueryStats}{google:searchFieldtrialParameter}{google:searchClient}{google:sourceId}{google:instantExtendedEnabledParameter}ie={inputEncoding}\""}, "loc": ["programs", "chromium", "defaultSearchProviderSearchURL"], "readOnly": false, "type": "null or string"}, "programs.chromium.defaultSearchProviderSuggestURL": {"declarations": ["nixos/modules/programs/chromium.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Chromium default search provider url for suggestions."}, "example": {"_type": "literalExpression", "text": "\"https://encrypted.google.com/complete/search?output=chrome&q={searchTerms}\""}, "loc": ["programs", "chromium", "defaultSearchProviderSuggestURL"], "readOnly": false, "type": "null or string"}, "programs.chromium.enable": {"declarations": ["nixos/modules/programs/chromium.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable {command}`chromium` policies."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "chromium", "enable"], "readOnly": false, "type": "boolean"}, "programs.chromium.extensions": {"declarations": ["nixos/modules/programs/chromium.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of chromium extensions to install.\nFor list of plugins ids see id in url of extensions on\n[chrome web store](https://chrome.google.com/webstore/category/extensions)\npage. To install a chromium extension not included in the chrome web\nstore, append to the extension id a semicolon \";\" followed by a URL\npointing to an Update Manifest XML file. See\n[ExtensionInstallForcelist](https://cloud.google.com/docs/chrome-enterprise/policies/?policy=ExtensionInstallForcelist)\nfor additional details.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"chlffgpmiacpedhhbkiomidkjlcfhogd\" # pushbullet\n  \"mbniclmhobmnbdlbpiphghaielnnpgdp\" # lightshot\n  \"gcbommkclmclpchllfjekcdonpmejbdp\" # https everywhere\n  \"cjpalhdlnbpafiamejdnhcphjbkeiagm\" # ublock origin\n]\n"}, "loc": ["programs", "chromium", "extensions"], "readOnly": false, "type": "list of string"}, "programs.chromium.extraOpts": {"declarations": ["nixos/modules/programs/chromium.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra chromium policy options. A list of available policies\ncan be found in the Chrome Enterprise documentation:\n<https://cloud.google.com/docs/chrome-enterprise/policies/>\nMake sure the selected policy is supported on Linux and your browser version.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"BrowserSignin\" = 0;\n  \"SyncDisabled\" = true;\n  \"PasswordManagerEnabled\" = false;\n  \"SpellcheckEnabled\" = true;\n  \"SpellcheckLanguage\" = [\n                           \"de\"\n                           \"en-US\"\n                         ];\n}\n"}, "loc": ["programs", "chromium", "extraOpts"], "readOnly": false, "type": "attribute set"}, "programs.chromium.homepageLocation": {"declarations": ["nixos/modules/programs/chromium.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Chromium default homepage"}, "example": {"_type": "literalExpression", "text": "\"https://nixos.org\""}, "loc": ["programs", "chromium", "homepageLocation"], "readOnly": false, "type": "null or string"}, "programs.clash-verge.autoStart": {"declarations": ["nixos/modules/programs/clash-verge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Clash Verge Auto Launch.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "clash-verge", "autoStart"], "readOnly": false, "type": "boolean"}, "programs.clash-verge.enable": {"declarations": ["nixos/modules/programs/clash-verge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Clash Verge.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "clash-verge", "enable"], "readOnly": false, "type": "boolean"}, "programs.clash-verge.tunMode": {"declarations": ["nixos/modules/programs/clash-verge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Clash Verge Tun Mode.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "clash-verge", "tunMode"], "readOnly": false, "type": "boolean"}, "programs.cnping.enable": {"declarations": ["nixos/modules/programs/cnping.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Whether to install a setcap wrapper for cnping."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "cnping", "enable"], "readOnly": false, "type": "boolean"}, "programs.command-not-found.dbPath": {"declarations": ["nixos/modules/programs/command-not-found/command-not-found.nix"], "default": {"_type": "literalExpression", "text": "\"/nix/var/nix/profiles/per-user/root/channels/nixos/programs.sqlite\""}, "description": {"_type": "mdDoc", "text": "Absolute path to programs.sqlite.\n\nBy default this file will be provided by your channel\n(nixexprs.tar.xz).\n"}, "loc": ["programs", "command-not-found", "dbPath"], "readOnly": false, "type": "path"}, "programs.command-not-found.enable": {"declarations": ["nixos/modules/programs/command-not-found/command-not-found.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether interactive shells should show which Nix package (if\nany) provides a missing command.\n"}, "loc": ["programs", "command-not-found", "enable"], "readOnly": false, "type": "boolean"}, "programs.corectrl.enable": {"declarations": ["nixos/modules/hardware/corectrl.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable A tool to overclock amd graphics cards and processors.\nAdd your user to the corectrl group to run corectrl without needing to enter your password\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "corectrl", "enable"], "readOnly": false, "type": "boolean"}, "programs.corectrl.gpuOverclock.enable": {"declarations": ["nixos/modules/hardware/corectrl.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable true\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "corectrl", "gpuOverclock", "enable"], "readOnly": false, "type": "boolean"}, "programs.corectrl.gpuOverclock.ppfeaturemask": {"declarations": ["nixos/modules/hardware/corectrl.nix"], "default": {"_type": "literalExpression", "text": "\"0xfffd7fff\""}, "description": {"_type": "mdDoc", "text": "Sets the `amdgpu.ppfeaturemask` kernel option.\nIn particular, it is used here to set the overdrive bit.\nDefault is `0xfffd7fff` as it is less likely to cause flicker issues.\nSetting it to `0xffffffff` enables all features.\n"}, "example": {"_type": "literalExpression", "text": "\"0xffffffff\""}, "loc": ["programs", "corectrl", "gpuOverclock", "ppfeaturemask"], "readOnly": false, "type": "string"}, "programs.criu.enable": {"declarations": ["nixos/modules/programs/criu.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Install {command}`criu` along with necessary kernel options.\n"}, "loc": ["programs", "criu", "enable"], "readOnly": false, "type": "boolean"}, "programs.darling.enable": {"declarations": ["nixos/modules/programs/darling.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Darling, a Darwin/macOS compatibility layer for Linux."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "darling", "enable"], "readOnly": false, "type": "boolean"}, "programs.darling.package": {"declarations": ["nixos/modules/programs/darling.nix"], "default": {"_type": "literalExpression", "text": "pkgs.darling"}, "description": {"_type": "mdDoc", "text": "The darling package to use."}, "loc": ["programs", "darling", "package"], "readOnly": false, "type": "package"}, "programs.dconf.enable": {"declarations": ["nixos/modules/programs/dconf.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable dconf."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "dconf", "enable"], "readOnly": false, "type": "boolean"}, "programs.dconf.packages": {"declarations": ["nixos/modules/programs/dconf.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of packages which provide dconf profiles and databases in {file}`/etc/dconf`."}, "loc": ["programs", "dconf", "packages"], "readOnly": false, "type": "list of package"}, "programs.digitalbitbox.enable": {"declarations": ["nixos/modules/programs/digitalbitbox/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Installs the Digital Bitbox application and enables the complementary hardware module.\n"}, "loc": ["programs", "digitalbitbox", "enable"], "readOnly": false, "type": "boolean"}, "programs.digitalbitbox.package": {"declarations": ["nixos/modules/programs/digitalbitbox/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.digitalbitbox"}, "description": {"_type": "mdDoc", "text": "The Digital Bitbox package to use. This can be used to install a package with udev rules that differ from the defaults."}, "loc": ["programs", "digitalbitbox", "package"], "readOnly": false, "type": "package"}, "programs.direnv.direnvrcExtra": {"declarations": ["nixos/modules/programs/direnv.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to append to the sourced direnvrc\n"}, "example": {"_type": "literalExpression", "text": "''\n  export FOO=\"foo\"\n  echo \"loaded direnv!\"\n''"}, "loc": ["programs", "direnv", "direnvrcExtra"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.direnv.enable": {"declarations": ["nixos/modules/programs/direnv.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable direnv integration. Takes care of both installation and\nsetting up the sourcing of the shell. Additionally enables nix-direnv\nintegration. Note that you need to logout and login for this change to apply.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "direnv", "enable"], "readOnly": false, "type": "boolean"}, "programs.direnv.loadInNixShell": {"declarations": ["nixos/modules/programs/direnv.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable loading direnv in `nix-shell` `nix shell` or `nix develop`\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "direnv", "loadInNixShell"], "readOnly": false, "type": "boolean"}, "programs.direnv.nix-direnv.enable": {"declarations": ["nixos/modules/programs/direnv.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable a faster, persistent implementation of use_nix and use_flake, to replace the built-in one\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "direnv", "nix-direnv", "enable"], "readOnly": false, "type": "boolean"}, "programs.direnv.nix-direnv.package": {"declarations": ["nixos/modules/programs/direnv.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nix-direnv"}, "description": {"_type": "mdDoc", "text": "The nix-direnv package to use."}, "loc": ["programs", "direnv", "nix-direnv", "package"], "readOnly": false, "type": "package"}, "programs.direnv.package": {"declarations": ["nixos/modules/programs/direnv.nix"], "default": {"_type": "literalExpression", "text": "pkgs.direnv"}, "description": {"_type": "mdDoc", "text": "The direnv package to use."}, "loc": ["programs", "direnv", "package"], "readOnly": false, "type": "package"}, "programs.direnv.persistDerivations": {"declarations": ["nixos/modules/programs/direnv.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable setting keep-derivations and keep-outputs to true\nto prevent shells from getting garbage collected\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "direnv", "persistDerivations"], "readOnly": false, "type": "boolean"}, "programs.direnv.silent": {"declarations": ["nixos/modules/programs/direnv.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the hiding of direnv logging\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "direnv", "silent"], "readOnly": false, "type": "boolean"}, "programs.dmrconfig.enable": {"declarations": ["nixos/modules/programs/dmrconfig.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to configure system to enable use of dmrconfig. This\nenables the required udev rules and installs the program.\n"}, "loc": ["programs", "dmrconfig", "enable"], "readOnly": false, "relatedPackages": "- [`pkgs.dmrconfig`](\n    https://search.nixos.org/packages?show=dmrconfig&sort=relevance&query=dmrconfig\n  )\n", "type": "boolean"}, "programs.dmrconfig.package": {"declarations": ["nixos/modules/programs/dmrconfig.nix"], "default": {"_type": "literalExpression", "text": "pkgs.dmrconfig"}, "description": {"_type": "mdDoc", "text": "dmrconfig derivation to use"}, "loc": ["programs", "dmrconfig", "package"], "readOnly": false, "type": "package"}, "programs.droidcam.enable": {"declarations": ["nixos/modules/programs/droidcam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable DroidCam client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "droidcam", "enable"], "readOnly": false, "type": "boolean"}, "programs.evince.enable": {"declarations": ["nixos/modules/programs/evince.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Evince, the GNOME document viewer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "evince", "enable"], "readOnly": false, "type": "boolean"}, "programs.evince.package": {"declarations": ["nixos/modules/programs/evince.nix"], "default": {"_type": "literalExpression", "text": "pkgs.evince"}, "description": {"_type": "mdDoc", "text": "Evince derivation to use."}, "loc": ["programs", "evince", "package"], "readOnly": false, "type": "package"}, "programs.evolution.enable": {"declarations": ["nixos/modules/services/desktops/gnome/evolution-data-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Evolution, a Personal information management application that provides integrated mail, calendaring and address book functionality."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "evolution", "enable"], "readOnly": false, "type": "boolean"}, "programs.evolution.plugins": {"declarations": ["nixos/modules/services/desktops/gnome/evolution-data-server.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Plugins for Evolution."}, "example": {"_type": "literalExpression", "text": "[ pkgs.evolution-ews ]"}, "loc": ["programs", "evolution", "plugins"], "readOnly": false, "type": "list of package"}, "programs.extra-container.enable": {"declarations": ["nixos/modules/programs/extra-container.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable extra-container, a tool for running declarative NixOS containers\nwithout host system rebuilds\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "extra-container", "enable"], "readOnly": false, "type": "boolean"}, "programs.feedbackd.enable": {"declarations": ["nixos/modules/programs/feedbackd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Whether to enable the feedbackd D-BUS service and udev rules.\n\nYour user needs to be in the `feedbackd` group to trigger effects.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "feedbackd", "enable"], "readOnly": false, "type": "boolean"}, "programs.feedbackd.package": {"declarations": ["nixos/modules/programs/feedbackd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.feedbackd"}, "description": {"_type": "mdDoc", "text": "Which feedbackd package to use.\n"}, "loc": ["programs", "feedbackd", "package"], "readOnly": false, "type": "package"}, "programs.file-roller.enable": {"declarations": ["nixos/modules/programs/file-roller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable File Roller, an archive manager for GNOME."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "file-roller", "enable"], "readOnly": false, "type": "boolean"}, "programs.file-roller.package": {"declarations": ["nixos/modules/programs/file-roller.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gnome.file-roller"}, "description": {"_type": "mdDoc", "text": "File Roller derivation to use."}, "loc": ["programs", "file-roller", "package"], "readOnly": false, "type": "package"}, "programs.firefox.autoConfig": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "AutoConfig files can be used to set and lock preferences that are not covered\nby the policies.json for Mac and Linux. This method can be used to automatically\nchange user preferences or prevent the end user from modifiying specific\npreferences by locking them. More info can be found in https://support.mozilla.org/en-US/kb/customizing-firefox-using-autoconfig.\n"}, "loc": ["programs", "firefox", "autoConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.firefox.enable": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Firefox web browser."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "firefox", "enable"], "readOnly": false, "type": "boolean"}, "programs.firefox.languagePacks": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The language packs to install.\n"}, "loc": ["programs", "firefox", "languagePacks"], "readOnly": false, "type": "list of (one of \"ach\", \"af\", \"an\", \"ar\", \"ast\", \"az\", \"be\", \"bg\", \"bn\", \"br\", \"bs\", \"ca-valencia\", \"ca\", \"cak\", \"cs\", \"cy\", \"da\", \"de\", \"dsb\", \"el\", \"en-CA\", \"en-GB\", \"en-US\", \"eo\", \"es-AR\", \"es-CL\", \"es-ES\", \"es-MX\", \"et\", \"eu\", \"fa\", \"ff\", \"fi\", \"fr\", \"fy-NL\", \"ga-IE\", \"gd\", \"gl\", \"gn\", \"gu-IN\", \"he\", \"hi-IN\", \"hr\", \"hsb\", \"hu\", \"hy-AM\", \"ia\", \"id\", \"is\", \"it\", \"ja\", \"ka\", \"kab\", \"kk\", \"km\", \"kn\", \"ko\", \"lij\", \"lt\", \"lv\", \"mk\", \"mr\", \"ms\", \"my\", \"nb-NO\", \"ne-NP\", \"nl\", \"nn-NO\", \"oc\", \"pa-IN\", \"pl\", \"pt-BR\", \"pt-PT\", \"rm\", \"ro\", \"ru\", \"sco\", \"si\", \"sk\", \"sl\", \"son\", \"sq\", \"sr\", \"sv-SE\", \"szl\", \"ta\", \"te\", \"th\", \"tl\", \"tr\", \"trs\", \"uk\", \"ur\", \"uz\", \"vi\", \"xh\", \"zh-CN\", \"zh-TW\")"}, "programs.firefox.nativeMessagingHosts.browserpass": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Browserpass support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "firefox", "nativeMessagingHosts", "browserpass"], "readOnly": false, "type": "boolean"}, "programs.firefox.nativeMessagingHosts.bukubrow": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Bukubrow support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "firefox", "nativeMessagingHosts", "bukubrow"], "readOnly": false, "type": "boolean"}, "programs.firefox.nativeMessagingHosts.euwebid": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Web eID support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "firefox", "nativeMessagingHosts", "euwebid"], "readOnly": false, "type": "boolean"}, "programs.firefox.nativeMessagingHosts.ff2mpv": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ff2mpv support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "firefox", "nativeMessagingHosts", "ff2mpv"], "readOnly": false, "type": "boolean"}, "programs.firefox.nativeMessagingHosts.fxCast": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable fx_cast support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "firefox", "nativeMessagingHosts", "fxCast"], "readOnly": false, "type": "boolean"}, "programs.firefox.nativeMessagingHosts.gsconnect": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GSConnect support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "firefox", "nativeMessagingHosts", "gsconnect"], "readOnly": false, "type": "boolean"}, "programs.firefox.nativeMessagingHosts.jabref": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable JabRef support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "firefox", "nativeMessagingHosts", "jabref"], "readOnly": false, "type": "boolean"}, "programs.firefox.nativeMessagingHosts.passff": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PassFF support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "firefox", "nativeMessagingHosts", "passff"], "readOnly": false, "type": "boolean"}, "programs.firefox.nativeMessagingHosts.tridactyl": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Tridactyl support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "firefox", "nativeMessagingHosts", "tridactyl"], "readOnly": false, "type": "boolean"}, "programs.firefox.nativeMessagingHosts.ugetIntegrator": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Uget Integrator support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "firefox", "nativeMessagingHosts", "ugetIntegrator"], "readOnly": false, "type": "boolean"}, "programs.firefox.package": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "pkgs.firefox"}, "description": {"_type": "mdDoc", "text": "Firefox package to use."}, "loc": ["programs", "firefox", "package"], "readOnly": false, "relatedPackages": "- [`pkgs.firefox`](\n    https://search.nixos.org/packages?show=firefox&sort=relevance&query=firefox\n  )\n- [`pkgs.firefox-beta-bin`](\n    https://search.nixos.org/packages?show=firefox-beta-bin&sort=relevance&query=firefox-beta-bin\n  )\n- [`pkgs.firefox-bin`](\n    https://search.nixos.org/packages?show=firefox-bin&sort=relevance&query=firefox-bin\n  )\n- [`pkgs.firefox-devedition-bin`](\n    https://search.nixos.org/packages?show=firefox-devedition-bin&sort=relevance&query=firefox-devedition-bin\n  )\n- [`pkgs.firefox-esr`](\n    https://search.nixos.org/packages?show=firefox-esr&sort=relevance&query=firefox-esr\n  )\n", "type": "package"}, "programs.firefox.policies": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Group policies to install.\n\nSee [Mozilla's documentation](https://github.com/mozilla/policy-templates/blob/master/README.md)\nfor a list of available options.\n\nThis can be used to install extensions declaratively! Check out the\ndocumentation of the `ExtensionSettings` policy for details.\n\nWhen this option is in use, Firefox will inform you that \"your browser\nis managed by your organisation\". That message appears because NixOS\ninstalls what you have declared here such that it cannot be overridden\nthrough the user interface. It does not mean that someone else has been\ngiven control of your browser, unless of course they also control your\nNixOS configuration.\n\n"}, "loc": ["programs", "firefox", "policies"], "readOnly": false, "type": "JSON value"}, "programs.firefox.preferences": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Preferences to set from `about:config`.\n\nSome of these might be able to be configured more ergonomically\nusing policies.\n\nWhen this option is in use, Firefox will inform you that \"your browser\nis managed by your organisation\". That message appears because NixOS\ninstalls what you have declared here such that it cannot be overridden\nthrough the user interface. It does not mean that someone else has been\ngiven control of your browser, unless of course they also control your\nNixOS configuration.\n\n"}, "loc": ["programs", "firefox", "preferences"], "readOnly": false, "type": "attribute set of (boolean or signed integer or Concatenated string)"}, "programs.firefox.preferencesStatus": {"declarations": ["nixos/modules/programs/firefox.nix"], "default": {"_type": "literalExpression", "text": "\"locked\""}, "description": {"_type": "mdDoc", "text": "The status of `firefox.preferences`.\n\n`status` can assume the following values:\n- `\"default\"`: Preferences appear as default.\n- `\"locked\"`: Preferences appear as default and can't be changed.\n- `\"user\"`: Preferences appear as changed.\n- `\"clear\"`: Value has no effect. Resets to factory defaults on each startup.\n"}, "loc": ["programs", "firefox", "preferencesStatus"], "readOnly": false, "type": "one of \"default\", \"locked\", \"user\", \"clear\""}, "programs.firejail.enable": {"declarations": ["nixos/modules/programs/firejail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable firejail."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "firejail", "enable"], "readOnly": false, "type": "boolean"}, "programs.firejail.wrappedBinaries": {"declarations": ["nixos/modules/programs/firejail.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Wrap the binaries in firejail and place them in the global path.\n"}, "example": {"_type": "literalExpression", "text": "{\n  firefox = {\n    executable = \"${lib.getBin pkgs.firefox}/bin/firefox\";\n    profile = \"${pkgs.firejail}/etc/firejail/firefox.profile\";\n  };\n  mpv = {\n    executable = \"${lib.getBin pkgs.mpv}/bin/mpv\";\n    profile = \"${pkgs.firejail}/etc/firejail/mpv.profile\";\n  };\n}\n"}, "loc": ["programs", "firejail", "wrappedBinaries"], "readOnly": false, "type": "attribute set of (path or (submodule))"}, "programs.fish.enable": {"declarations": ["nixos/modules/programs/fish.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to configure fish as an interactive shell.\n"}, "loc": ["programs", "fish", "enable"], "readOnly": false, "type": "boolean"}, "programs.fish.interactiveShellInit": {"declarations": ["nixos/modules/programs/fish.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code called during interactive fish shell initialisation.\n"}, "loc": ["programs", "fish", "interactiveShellInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.fish.loginShellInit": {"declarations": ["nixos/modules/programs/fish.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code called during fish login shell initialisation.\n"}, "loc": ["programs", "fish", "loginShellInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.fish.promptInit": {"declarations": ["nixos/modules/programs/fish.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code used to initialise fish prompt.\n"}, "loc": ["programs", "fish", "promptInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.fish.shellAbbrs": {"declarations": ["nixos/modules/programs/fish.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of fish abbreviations.\n"}, "example": {"_type": "literalExpression", "text": "{\n  gco = \"git checkout\";\n  npu = \"nix-prefetch-url\";\n}"}, "loc": ["programs", "fish", "shellAbbrs"], "readOnly": false, "type": "attribute set of string"}, "programs.fish.shellAliases": {"declarations": ["nixos/modules/programs/fish.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of aliases for fish shell, which overrides {option}`environment.shellAliases`.\nSee {option}`environment.shellAliases` for an option format description.\n"}, "loc": ["programs", "fish", "shellAliases"], "readOnly": false, "type": "attribute set of (null or string or path)"}, "programs.fish.shellInit": {"declarations": ["nixos/modules/programs/fish.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code called during fish shell initialisation.\n"}, "loc": ["programs", "fish", "shellInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.fish.useBabelfish": {"declarations": ["nixos/modules/programs/fish.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, the configured environment will be translated to native fish using [babelfish](https://github.com/bouk/babelfish).\nOtherwise, [foreign-env](https://github.com/oh-my-fish/plugin-foreign-env) will be used.\n"}, "loc": ["programs", "fish", "useBabelfish"], "readOnly": false, "type": "boolean"}, "programs.fish.vendor.completions.enable": {"declarations": ["nixos/modules/programs/fish.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether fish should use completion files provided by other packages.\n"}, "loc": ["programs", "fish", "vendor", "completions", "enable"], "readOnly": false, "type": "boolean"}, "programs.fish.vendor.config.enable": {"declarations": ["nixos/modules/programs/fish.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether fish should source configuration snippets provided by other packages.\n"}, "loc": ["programs", "fish", "vendor", "config", "enable"], "readOnly": false, "type": "boolean"}, "programs.fish.vendor.functions.enable": {"declarations": ["nixos/modules/programs/fish.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether fish should autoload fish functions provided by other packages.\n"}, "loc": ["programs", "fish", "vendor", "functions", "enable"], "readOnly": false, "type": "boolean"}, "programs.flashrom.enable": {"declarations": ["nixos/modules/programs/flashrom.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Installs flashrom and configures udev rules for programmers\nused by flashrom. Grants access to users in the \"flashrom\"\ngroup.\n"}, "loc": ["programs", "flashrom", "enable"], "readOnly": false, "type": "boolean"}, "programs.flashrom.package": {"declarations": ["nixos/modules/programs/flashrom.nix"], "default": {"_type": "literalExpression", "text": "pkgs.flashrom"}, "description": {"_type": "mdDoc", "text": "The flashrom package to use."}, "loc": ["programs", "flashrom", "package"], "readOnly": false, "type": "package"}, "programs.flexoptix-app.enable": {"declarations": ["nixos/modules/programs/flexoptix-app.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable FLEXOPTIX app + udev rules."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "flexoptix-app", "enable"], "readOnly": false, "type": "boolean"}, "programs.flexoptix-app.package": {"declarations": ["nixos/modules/programs/flexoptix-app.nix"], "default": {"_type": "literalExpression", "text": "pkgs.flexoptix-app"}, "description": {"_type": "mdDoc", "text": "FLEXOPTIX app package to use"}, "loc": ["programs", "flexoptix-app", "package"], "readOnly": false, "type": "package"}, "programs.fuse.mountMax": {"declarations": ["nixos/modules/programs/fuse.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Set the maximum number of FUSE mounts allowed to non-root users.\n"}, "loc": ["programs", "fuse", "mountMax"], "readOnly": false, "type": "integer between 0 and 32767 (both inclusive)"}, "programs.fuse.userAllowOther": {"declarations": ["nixos/modules/programs/fuse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow non-root users to specify the allow_other or allow_root mount\noptions, see mount.fuse3(8).\n"}, "loc": ["programs", "fuse", "userAllowOther"], "readOnly": false, "type": "boolean"}, "programs.fzf.fuzzyCompletion": {"declarations": ["nixos/modules/programs/fzf.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable fuzzy completion with fzf."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "fzf", "fuzzyCompletion"], "readOnly": false, "type": "boolean"}, "programs.fzf.keybindings": {"declarations": ["nixos/modules/programs/fzf.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable fzf keybindings."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "fzf", "keybindings"], "readOnly": false, "type": "boolean"}, "programs.gamemode.enable": {"declarations": ["nixos/modules/programs/gamemode.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GameMode to optimise system performance on demand."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "gamemode", "enable"], "readOnly": false, "type": "boolean"}, "programs.gamemode.enableRenice": {"declarations": ["nixos/modules/programs/gamemode.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable CAP_SYS_NICE on gamemoded to support lowering process niceness."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "gamemode", "enableRenice"], "readOnly": false, "type": "boolean"}, "programs.gamemode.settings": {"declarations": ["nixos/modules/programs/gamemode.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "System-wide configuration for GameMode (/etc/gamemode.ini).\nSee gamemoded(8) man page for available settings.\n"}, "example": {"_type": "literalExpression", "text": "{\n  general = {\n    renice = 10;\n  };\n\n  # Warning: GPU optimisations have the potential to damage hardware\n  gpu = {\n    apply_gpu_optimisations = \"accept-responsibility\";\n    gpu_device = 0;\n    amd_performance_level = \"high\";\n  };\n\n  custom = {\n    start = \"${pkgs.libnotify}/bin/notify-send 'GameMode started'\";\n    end = \"${pkgs.libnotify}/bin/notify-send 'GameMode ended'\";\n  };\n}\n"}, "loc": ["programs", "gamemode", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "programs.gamescope.args": {"declarations": ["nixos/modules/programs/gamescope.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Arguments passed to GameScope on startup.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--rt\"\n  \"--prefer-vk-device 8086:9bc4\"\n]"}, "loc": ["programs", "gamescope", "args"], "readOnly": false, "type": "list of Concatenated string"}, "programs.gamescope.capSysNice": {"declarations": ["nixos/modules/programs/gamescope.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Add cap_sys_nice capability to the GameScope\nbinary so that it may renice itself.\n"}, "loc": ["programs", "gamescope", "capSysNice"], "readOnly": false, "type": "boolean"}, "programs.gamescope.enable": {"declarations": ["nixos/modules/programs/gamescope.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable gamescope."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "gamescope", "enable"], "readOnly": false, "type": "boolean"}, "programs.gamescope.env": {"declarations": ["nixos/modules/programs/gamescope.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Default environment variables available to the GameScope process, overridable at runtime.\n"}, "example": {"_type": "literalExpression", "text": "# for Prime render offload on Nvidia laptops.\n# Also requires `hardware.nvidia.prime.offload.enable`.\n{\n  __NV_PRIME_RENDER_OFFLOAD = \"1\";\n  __VK_LAYER_NV_optimus = \"NVIDIA_only\";\n  __GLX_VENDOR_LIBRARY_NAME = \"nvidia\";\n}\n"}, "loc": ["programs", "gamescope", "env"], "readOnly": false, "type": "attribute set of Concatenated string"}, "programs.gamescope.package": {"declarations": ["nixos/modules/programs/gamescope.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gamescope"}, "description": {"_type": "mdDoc", "text": "The GameScope package to use.\n"}, "loc": ["programs", "gamescope", "package"], "readOnly": false, "type": "package"}, "programs.geary.enable": {"declarations": ["nixos/modules/programs/geary.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Geary, a Mail client for GNOME 3."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "geary", "enable"], "readOnly": false, "type": "boolean"}, "programs.git.config": {"declarations": ["nixos/modules/programs/git.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Configuration to write to /etc/gitconfig. A list can also be\nspecified to keep the configuration in order. For example, setting\n`config` to `[ { foo.x = 42; } { bar.y = 42; }]` will put the `foo`\nsection before the `bar` section unlike the default alphabetical\norder, which can be helpful for sections such as `include` and\n`includeIf`. See the CONFIGURATION FILE section of git-config(1) for\nmore information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  init = {\n    defaultBranch = \"main\";\n  };\n  url = {\n    \"https://github.com/\" = {\n      insteadOf = [\n        \"gh:\"\n        \"github:\"\n      ];\n    };\n  };\n}"}, "loc": ["programs", "git", "config"], "readOnly": false, "type": "(attribute set of attribute set of anything) or list of attribute set of attribute set of anything"}, "programs.git.enable": {"declarations": ["nixos/modules/programs/git.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable git."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "git", "enable"], "readOnly": false, "type": "boolean"}, "programs.git.lfs.enable": {"declarations": ["nixos/modules/programs/git.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable git-lfs."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "git", "lfs", "enable"], "readOnly": false, "type": "boolean"}, "programs.git.lfs.package": {"declarations": ["nixos/modules/programs/git.nix"], "default": {"_type": "literalExpression", "text": "pkgs.git-lfs"}, "description": {"_type": "mdDoc", "text": "The git-lfs package to use"}, "loc": ["programs", "git", "lfs", "package"], "readOnly": false, "type": "package"}, "programs.git.package": {"declarations": ["nixos/modules/programs/git.nix"], "default": {"_type": "literalExpression", "text": "pkgs.git"}, "description": {"_type": "mdDoc", "text": "The git package to use"}, "example": {"_type": "literalExpression", "text": "pkgs.gitFull"}, "loc": ["programs", "git", "package"], "readOnly": false, "type": "package"}, "programs.gnome-disks.enable": {"declarations": ["nixos/modules/programs/gnome-disks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GNOME Disks daemon, a program designed to\nbe a UDisks2 graphical front-end.\n"}, "loc": ["programs", "gnome-disks", "enable"], "readOnly": false, "type": "boolean"}, "programs.gnome-terminal.enable": {"declarations": ["nixos/modules/programs/gnome-terminal.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GNOME Terminal."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "gnome-terminal", "enable"], "readOnly": false, "type": "boolean"}, "programs.gpaste.enable": {"declarations": ["nixos/modules/programs/gpaste.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GPaste, a clipboard manager.\n"}, "loc": ["programs", "gpaste", "enable"], "readOnly": false, "type": "boolean"}, "programs.gphoto2.enable": {"declarations": ["nixos/modules/programs/gphoto2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to configure system to use gphoto2.\nTo grant digital camera access to a user, the user must\nbe part of the camera group:\n`users.users.alice.extraGroups = [\"camera\"];`\n"}, "loc": ["programs", "gphoto2", "enable"], "readOnly": false, "type": "boolean"}, "programs.haguichi.enable": {"declarations": ["nixos/modules/programs/haguichi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Haguichi, a Linux GUI frontend to the proprietary LogMeIn Hamachi."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "haguichi", "enable"], "readOnly": false, "type": "boolean"}, "programs.hamster.enable": {"declarations": ["nixos/modules/programs/hamster.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable hamster, a time tracking program."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "hamster", "enable"], "readOnly": false, "type": "boolean"}, "programs.htop.enable": {"declarations": ["nixos/modules/programs/htop.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable htop process monitor."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "htop", "enable"], "readOnly": false, "type": "boolean"}, "programs.htop.package": {"declarations": ["nixos/modules/programs/htop.nix"], "default": {"_type": "literalExpression", "text": "pkgs.htop"}, "description": {"_type": "mdDoc", "text": "The htop package that should be used.\n"}, "loc": ["programs", "htop", "package"], "readOnly": false, "type": "package"}, "programs.htop.settings": {"declarations": ["nixos/modules/programs/htop.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra global default configuration for htop\nwhich is read on first startup only.\nHtop subsequently uses ~/.config/htop/htoprc\nas configuration source.\n"}, "example": {"_type": "literalExpression", "text": "{\n  hide_kernel_threads = true;\n  hide_userland_threads = true;\n}"}, "loc": ["programs", "htop", "settings"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean or list of (string or signed integer or boolean))"}, "programs.hyprland.enable": {"declarations": ["nixos/modules/programs/hyprland.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Hyprland, the dynamic tiling Wayland compositor that doesn't sacrifice on its looks.\n\nYou can manually launch Hyprland by executing {command}`Hyprland` on a TTY.\n\nA configuration file will be generated in {file}`~/.config/hypr/hyprland.conf`.\nSee <https://wiki.hyprland.org> for more information.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "hyprland", "enable"], "readOnly": false, "type": "boolean"}, "programs.hyprland.nvidiaPatches": {"declarations": ["nixos/modules/programs/hyprland.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable patching wlroots for better Nvidia support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "hyprland", "nvidiaPatches"], "readOnly": false, "type": "boolean"}, "programs.hyprland.package": {"declarations": ["nixos/modules/programs/hyprland.nix"], "default": {"_type": "literalExpression", "text": "pkgs.hyprland.override {\n  enableXWayland = config.programs.hyprland.xwayland.enable;\n  hidpiXWayland = config.programs.hyprland.xwayland.hidpi;\n  nvidiaPatches = config.programs.hyprland.nvidiaPatches;\n}\n"}, "description": {"_type": "mdDoc", "text": "The Hyprland package to use.\nSetting this option will make {option}`programs.hyprland.xwayland` and\n{option}`programs.hyprland.nvidiaPatches` not work.\n"}, "example": {"_type": "literalExpression", "text": "<Hyprland flake>.packages.<system>.default"}, "loc": ["programs", "hyprland", "package"], "readOnly": false, "type": "path"}, "programs.hyprland.xwayland.enable": {"declarations": ["nixos/modules/programs/hyprland.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable XWayland."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "hyprland", "xwayland", "enable"], "readOnly": false, "type": "boolean"}, "programs.hyprland.xwayland.hidpi": {"declarations": ["nixos/modules/programs/hyprland.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable HiDPI XWayland, based on [XWayland MR 733](https://gitlab.freedesktop.org/xorg/xserver/-/merge_requests/733).\nSee <https://wiki.hyprland.org/Nix/Options-Overrides/#xwayland-hidpi> for more info.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "hyprland", "xwayland", "hidpi"], "readOnly": false, "type": "boolean"}, "programs.i3lock.enable": {"declarations": ["nixos/modules/programs/i3lock.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable i3lock."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "i3lock", "enable"], "readOnly": false, "type": "boolean"}, "programs.i3lock.package": {"declarations": ["nixos/modules/programs/i3lock.nix"], "default": {"_type": "literalExpression", "text": "pkgs.i3lock"}, "description": {"_type": "mdDoc", "text": "Specify which package to use for the i3lock program,\nThe i3lock package must include a i3lock file or link in its out directory in order for the u2fSupport option to work correctly.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.i3lock-color\n"}, "loc": ["programs", "i3lock", "package"], "readOnly": false, "type": "package"}, "programs.i3lock.u2fSupport": {"declarations": ["nixos/modules/programs/i3lock.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable U2F support in the i3lock program.\nU2F enables authentication using a hardware device, such as a security key.\nWhen U2F support is enabled, the i3lock program will set the setuid bit on the i3lock binary and enable the pam u2fAuth service,\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "i3lock", "u2fSupport"], "readOnly": false, "type": "boolean"}, "programs.iay.enable": {"declarations": ["nixos/modules/programs/iay.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable iay."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "iay", "enable"], "readOnly": false, "type": "boolean"}, "programs.iay.minimalPrompt": {"declarations": ["nixos/modules/programs/iay.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use minimal one-liner prompt."}, "loc": ["programs", "iay", "minimalPrompt"], "readOnly": false, "type": "boolean"}, "programs.iay.package": {"declarations": ["nixos/modules/programs/iay.nix"], "default": {"_type": "literalExpression", "text": "pkgs.iay"}, "description": {"_type": "mdDoc", "text": "The iay package to use."}, "loc": ["programs", "iay", "package"], "readOnly": false, "type": "package"}, "programs.iftop.enable": {"declarations": ["nixos/modules/programs/iftop.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable iftop + setcap wrapper."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "iftop", "enable"], "readOnly": false, "type": "boolean"}, "programs.iotop.enable": {"declarations": ["nixos/modules/programs/iotop.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable iotop + setcap wrapper."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "iotop", "enable"], "readOnly": false, "type": "boolean"}, "programs.java.binfmt": {"declarations": ["nixos/modules/programs/java.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable binfmt to execute java jar's and classes."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "java", "binfmt"], "readOnly": false, "type": "boolean"}, "programs.java.enable": {"declarations": ["nixos/modules/programs/java.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Install and setup the Java development kit.\n\n::: {.note}\nThis adds JAVA_HOME to the global environment, by sourcing the\njdk's setup-hook on shell init. It is equivalent to starting a shell\nthrough 'nix-shell -p jdk', or roughly the following system-wide\nconfiguration:\n\n    environment.variables.JAVA_HOME = ${pkgs.jdk.home}/lib/openjdk;\n    environment.systemPackages = [ pkgs.jdk ];\n:::\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "java", "enable"], "readOnly": false, "type": "boolean"}, "programs.java.package": {"declarations": ["nixos/modules/programs/java.nix"], "default": {"_type": "literalExpression", "text": "pkgs.jdk"}, "description": {"_type": "mdDoc", "text": "Java package to install. Typical values are pkgs.jdk or pkgs.jre.\n"}, "loc": ["programs", "java", "package"], "readOnly": false, "type": "package"}, "programs.k3b.enable": {"declarations": ["nixos/modules/programs/k3b.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable k3b, the KDE disk burning application.\n\nAdditionally to installing `k3b` enabling this will\nadd `setuid` wrappers in `/run/wrappers/bin`\nfor both `cdrdao` and `cdrecord`. On first\nrun you must manually configure the path of `cdrdae` and\n`cdrecord` to correspond to the appropriate paths under\n`/run/wrappers/bin` in the \"Setup External Programs\" menu.\n"}, "loc": ["programs", "k3b", "enable"], "readOnly": false, "type": "boolean"}, "programs.k40-whisperer.enable": {"declarations": ["nixos/modules/programs/k40-whisperer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable K40-Whisperer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "k40-whisperer", "enable"], "readOnly": false, "type": "boolean"}, "programs.k40-whisperer.group": {"declarations": ["nixos/modules/programs/k40-whisperer.nix"], "default": {"_type": "literalExpression", "text": "\"k40\""}, "description": {"_type": "mdDoc", "text": "Group assigned to the device when connected.\n"}, "loc": ["programs", "k40-whisperer", "group"], "readOnly": false, "type": "string"}, "programs.k40-whisperer.package": {"declarations": ["nixos/modules/programs/k40-whisperer.nix"], "default": {"_type": "literalExpression", "text": "pkgs.k40-whisperer"}, "description": {"_type": "mdDoc", "text": "K40 Whisperer package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.k40-whisperer"}, "loc": ["programs", "k40-whisperer", "package"], "readOnly": false, "type": "package"}, "programs.kbdlight.enable": {"declarations": ["nixos/modules/programs/kbdlight.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kbdlight."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "kbdlight", "enable"], "readOnly": false, "type": "boolean"}, "programs.kclock.enable": {"declarations": ["nixos/modules/programs/kclock.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable KClock."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "kclock", "enable"], "readOnly": false, "type": "boolean"}, "programs.kdeconnect.enable": {"declarations": ["nixos/modules/programs/kdeconnect.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kdeconnect.\n\nNote that it will open the TCP and UDP port from\n1714 to 1764 as they are needed for it to function properly.\nYou can use the {option}`package` to use\n`gnomeExtensions.gsconnect` as an alternative\nimplementation if you use Gnome.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "kdeconnect", "enable"], "readOnly": false, "type": "boolean"}, "programs.kdeconnect.package": {"declarations": ["nixos/modules/programs/kdeconnect.nix"], "default": {"_type": "literalExpression", "text": "pkgs.plasma5Packages.kdeconnect-kde"}, "description": {"_type": "mdDoc", "text": "The package providing the implementation for kdeconnect.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.gnomeExtensions.gsconnect"}, "loc": ["programs", "kdeconnect", "package"], "readOnly": false, "type": "package"}, "programs.less.clearDefaultCommands": {"declarations": ["nixos/modules/programs/less.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Clear all default commands.\nYou should remember to set the quit key.\nOtherwise you will not be able to leave less without killing it.\n"}, "loc": ["programs", "less", "clearDefaultCommands"], "readOnly": false, "type": "boolean"}, "programs.less.commands": {"declarations": ["nixos/modules/programs/less.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Defines new command keys."}, "example": {"_type": "literalExpression", "text": "{\n  h = \"noaction 5\\\\e(\";\n  l = \"noaction 5\\\\e)\";\n}"}, "loc": ["programs", "less", "commands"], "readOnly": false, "type": "attribute set of string"}, "programs.less.configFile": {"declarations": ["nixos/modules/programs/less.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to lesskey configuration file.\n\n{option}`configFile` takes precedence over {option}`commands`,\n{option}`clearDefaultCommands`, {option}`lineEditingKeys`, and\n{option}`envVariables`.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.my-configs}/lesskey\""}, "loc": ["programs", "less", "configFile"], "readOnly": false, "type": "null or path"}, "programs.less.enable": {"declarations": ["nixos/modules/programs/less.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable less."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "less", "enable"], "readOnly": false, "type": "boolean"}, "programs.less.envVariables": {"declarations": ["nixos/modules/programs/less.nix"], "default": {"_type": "literalExpression", "text": "{\n  LESS = \"-R\";\n}"}, "description": {"_type": "mdDoc", "text": "Defines environment variables."}, "example": {"_type": "literalExpression", "text": "{\n  LESS = \"--quit-if-one-screen\";\n}"}, "loc": ["programs", "less", "envVariables"], "readOnly": false, "type": "attribute set of string"}, "programs.less.lessclose": {"declarations": ["nixos/modules/programs/less.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "When less closes a file opened in such a way, it will call another program, called the input postprocessor,\nwhich may perform any desired clean-up action (such as deleting the replacement file created by LESSOPEN).\n"}, "loc": ["programs", "less", "lessclose"], "readOnly": false, "type": "null or string"}, "programs.less.lessopen": {"declarations": ["nixos/modules/programs/less.nix"], "default": {"_type": "literalExpression", "text": "\"|${pkgs.lesspipe}/bin/lesspipe.sh %s\""}, "description": {"_type": "mdDoc", "text": "Before less opens a file, it first gives your input preprocessor a chance to modify the way the contents of the file are displayed.\n"}, "loc": ["programs", "less", "lessopen"], "readOnly": false, "type": "null or string"}, "programs.less.lineEditingKeys": {"declarations": ["nixos/modules/programs/less.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Defines new line-editing keys."}, "example": {"_type": "literalExpression", "text": "{\n  e = \"abort\";\n}"}, "loc": ["programs", "less", "lineEditingKeys"], "readOnly": false, "type": "attribute set of string"}, "programs.liboping.enable": {"declarations": ["nixos/modules/programs/liboping.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable liboping."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "liboping", "enable"], "readOnly": false, "type": "boolean"}, "programs.light.enable": {"declarations": ["nixos/modules/programs/light.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install Light backlight control command\nand udev rules granting access to members of the \"video\" group.\n"}, "loc": ["programs", "light", "enable"], "readOnly": false, "type": "boolean"}, "programs.mdevctl.enable": {"declarations": ["nixos/modules/programs/mdevctl.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Mediated Device Management."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "mdevctl", "enable"], "readOnly": false, "type": "boolean"}, "programs.mepo.enable": {"declarations": ["nixos/modules/programs/mepo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Mepo."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "mepo", "enable"], "readOnly": false, "type": "boolean"}, "programs.mepo.locationBackends.geoclue": {"declarations": ["nixos/modules/programs/mepo.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable location detection via geoclue"}, "loc": ["programs", "mepo", "locationBackends", "geoclue"], "readOnly": false, "type": "boolean"}, "programs.mepo.locationBackends.gpsd": {"declarations": ["nixos/modules/programs/mepo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable location detection via gpsd.\nThis may require additional configuration of gpsd, see [here](#opt-services.gpsd.enable)\n"}, "loc": ["programs", "mepo", "locationBackends", "gpsd"], "readOnly": false, "type": "boolean"}, "programs.mininet.enable": {"declarations": ["nixos/modules/programs/mininet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Mininet."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "mininet", "enable"], "readOnly": false, "type": "boolean"}, "programs.minipro.enable": {"declarations": ["nixos/modules/programs/minipro.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Installs minipro and its udev rules.\nUsers of the `plugdev` group can interact with connected MiniPRO chip programmers.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "minipro", "enable"], "readOnly": false, "type": "boolean"}, "programs.minipro.package": {"declarations": ["nixos/modules/programs/minipro.nix"], "default": {"_type": "literalExpression", "text": "pkgs.minipro"}, "description": {"_type": "mdDoc", "text": "The minipro package to use."}, "loc": ["programs", "minipro", "package"], "readOnly": false, "type": "package"}, "programs.miriway.config": {"declarations": ["nixos/modules/programs/miriway.nix"], "default": {"_type": "literalExpression", "text": "''\n  x11-window-title=Miriway (Mir-on-X)\n  idle-timeout=600\n  ctrl-alt=t:miriway-terminal # Default \"terminal emulator finder\"\n  \n  shell-component=dbus-update-activation-environment --systemd DISPLAY WAYLAND_DISPLAY\n  \n  meta=Left:@dock-left\n  meta=Right:@dock-right\n  meta=Space:@toggle-maximized\n  meta=Home:@workspace-begin\n  meta=End:@workspace-end\n  meta=Page_Up:@workspace-up\n  meta=Page_Down:@workspace-down\n  ctrl-alt=BackSpace:@exit\n''"}, "description": {"_type": "mdDoc", "text": "Miriway's config. This will be installed system-wide.\nThe default will install the miriway package's barebones example config.\n"}, "example": {"_type": "literalExpression", "text": "''\n  idle-timeout=300\n  ctrl-alt=t:weston-terminal\n  add-wayland-extensions=all\n  \n  shell-components=dbus-update-activation-environment --systemd DISPLAY WAYLAND_DISPLAY\n  \n  shell-component=waybar\n  shell-component=wbg Pictures/wallpaper\n  \n  shell-meta=a:synapse\n  \n  meta=Left:@dock-left\n  meta=Right:@dock-right\n  meta=Space:@toggle-maximized\n  meta=Home:@workspace-begin\n  meta=End:@workspace-end\n  meta=Page_Up:@workspace-up\n  meta=Page_Down:@workspace-down\n  ctrl-alt=BackSpace:@exit\n''"}, "loc": ["programs", "miriway", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.miriway.enable": {"declarations": ["nixos/modules/programs/miriway.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Miriway, a Mir based Wayland compositor. You can manually launch Miriway by\nexecuting \"exec miriway\" on a TTY, or launch it from a display manager. Copy\n/etc/xdg/xdg-miriway/miriway-shell.config to ~/.config/miriway-shell.config\nto modify the system-wide configuration on a per-user basis. See <https://github.com/Miriway/Miriway>,\nand \"miriway --help\" for more information."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "miriway", "enable"], "readOnly": false, "type": "boolean"}, "programs.mosh.enable": {"declarations": ["nixos/modules/programs/mosh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable mosh. Note, this will open ports in your firewall!\n"}, "loc": ["programs", "mosh", "enable"], "readOnly": false, "type": "boolean"}, "programs.mosh.withUtempter": {"declarations": ["nixos/modules/programs/mosh.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable libutempter for mosh.\nThis is required so that mosh can write to /var/run/utmp (which can be queried with `who` to display currently connected user sessions).\nNote, this will add a guid wrapper for the group utmp!\n"}, "loc": ["programs", "mosh", "withUtempter"], "readOnly": false, "type": "boolean"}, "programs.msmtp.accounts": {"declarations": ["nixos/modules/programs/msmtp.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Named accounts and their respective configurations.\nThe special name \"default\" allows a default account to be defined.\nSee msmtp(1) for the available options.\n\nUse `programs.msmtp.extraConfig` instead of this attribute set-based\noption if ordered account inheritance is needed.\n\nIt is advised to use the `passwordeval` setting to read the password\nfrom a secret file to avoid having it written in the world-readable\nnix store. The password file must end with a newline (`\\n`).\n"}, "example": {"_type": "literalExpression", "text": "{\n  default = {\n    auth = true;\n    host = \"smtp.example\";\n    passwordeval = \"cat /secrets/password.txt\";\n    user = \"someone\";\n  };\n}"}, "loc": ["programs", "msmtp", "accounts"], "readOnly": false, "type": "attribute set of (attribute set)"}, "programs.msmtp.defaults": {"declarations": ["nixos/modules/programs/msmtp.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Default values applied to all accounts.\nSee msmtp(1) for the available options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  aliases = \"/etc/aliases\";\n  port = 587;\n  tls = true;\n}"}, "loc": ["programs", "msmtp", "defaults"], "readOnly": false, "type": "attribute set"}, "programs.msmtp.enable": {"declarations": ["nixos/modules/programs/msmtp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable msmtp - an SMTP client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "msmtp", "enable"], "readOnly": false, "type": "boolean"}, "programs.msmtp.extraConfig": {"declarations": ["nixos/modules/programs/msmtp.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to add to the msmtp configuration verbatim.\nSee msmtp(1) for the syntax and available options.\n"}, "loc": ["programs", "msmtp", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.msmtp.setSendmail": {"declarations": ["nixos/modules/programs/msmtp.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to set the system sendmail to msmtp's.\n"}, "loc": ["programs", "msmtp", "setSendmail"], "readOnly": false, "type": "boolean"}, "programs.mtr.enable": {"declarations": ["nixos/modules/programs/mtr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add mtr to the global environment and configure a\nsetcap wrapper for it.\n"}, "loc": ["programs", "mtr", "enable"], "readOnly": false, "type": "boolean"}, "programs.mtr.package": {"declarations": ["nixos/modules/programs/mtr.nix"], "default": {"_type": "literalExpression", "text": "pkgs.mtr"}, "description": {"_type": "mdDoc", "text": "The package to use.\n"}, "loc": ["programs", "mtr", "package"], "readOnly": false, "type": "package"}, "programs.nano.nanorc": {"declarations": ["nixos/modules/programs/nano.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The system-wide nano configuration.\nSee {manpage}`nanorc(5)`.\n"}, "example": {"_type": "literalExpression", "text": "''\n  set nowrap\n  set tabstospaces\n  set tabsize 2\n''"}, "loc": ["programs", "nano", "nanorc"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.nano.syntaxHighlight": {"declarations": ["nixos/modules/programs/nano.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable syntax highlight for various languages."}, "loc": ["programs", "nano", "syntaxHighlight"], "readOnly": false, "type": "boolean"}, "programs.nbd.enable": {"declarations": ["nixos/modules/programs/nbd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Network Block Device (nbd) support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "nbd", "enable"], "readOnly": false, "type": "boolean"}, "programs.neovim.configure": {"declarations": ["nixos/modules/programs/neovim.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Generate your init file from your list of plugins and custom commands.\nNeovim will then be wrapped to load {command}`nvim -u /nix/store/\u00abhash\u00bb-vimrc`\n"}, "example": {"_type": "literalExpression", "text": "{\n  customRC = ''\n    \" here your custom configuration goes!\n  '';\n  packages.myVimPackage = with pkgs.vimPlugins; {\n    # loaded on launch\n    start = [ fugitive ];\n    # manually loadable by calling `:packadd $plugin-name`\n    opt = [ ];\n  };\n}\n"}, "loc": ["programs", "neovim", "configure"], "readOnly": false, "type": "attribute set"}, "programs.neovim.defaultEditor": {"declarations": ["nixos/modules/programs/neovim.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When enabled, installs neovim and configures neovim to be the default editor\nusing the EDITOR environment variable.\n"}, "loc": ["programs", "neovim", "defaultEditor"], "readOnly": false, "type": "boolean"}, "programs.neovim.enable": {"declarations": ["nixos/modules/programs/neovim.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Neovim.\n\nWhen enabled through this option, Neovim is wrapped to use a\nconfiguration managed by this module. The configuration file in the\nuser's home directory at {file}`~/.config/nvim/init.vim` is no longer\nloaded by default.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "neovim", "enable"], "readOnly": false, "type": "boolean"}, "programs.neovim.package": {"declarations": ["nixos/modules/programs/neovim.nix"], "default": {"_type": "literalExpression", "text": "pkgs.neovim-unwrapped"}, "description": {"_type": "mdDoc", "text": "The package to use for the neovim binary."}, "loc": ["programs", "neovim", "package"], "readOnly": false, "type": "package"}, "programs.neovim.runtime": {"declarations": ["nixos/modules/programs/neovim.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of files that have to be linked in {file}`runtime`.\n"}, "example": {"_type": "literalExpression", "text": "{ \"ftplugin/c.vim\".text = \"setlocal omnifunc=v:lua.vim.lsp.omnifunc\"; }\n"}, "loc": ["programs", "neovim", "runtime"], "readOnly": false, "type": "attribute set of (submodule)"}, "programs.neovim.runtime.<name>.enable": {"declarations": ["nixos/modules/programs/neovim.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether this runtime directory should be generated.  This\noption allows specific runtime files to be disabled.\n"}, "loc": ["programs", "neovim", "runtime", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "programs.neovim.runtime.<name>.source": {"declarations": ["nixos/modules/programs/neovim.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path of the source file."}, "loc": ["programs", "neovim", "runtime", "<name>", "source"], "readOnly": false, "type": "null or path"}, "programs.neovim.runtime.<name>.target": {"declarations": ["nixos/modules/programs/neovim.nix"], "description": {"_type": "mdDoc", "text": "Name of symlink.  Defaults to the attribute\nname.\n"}, "loc": ["programs", "neovim", "runtime", "<name>", "target"], "readOnly": false, "type": "string"}, "programs.neovim.runtime.<name>.text": {"declarations": ["nixos/modules/programs/neovim.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Text of the file."}, "loc": ["programs", "neovim", "runtime", "<name>", "text"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "programs.neovim.viAlias": {"declarations": ["nixos/modules/programs/neovim.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Symlink {command}`vi` to {command}`nvim` binary.\n"}, "loc": ["programs", "neovim", "viAlias"], "readOnly": false, "type": "boolean"}, "programs.neovim.vimAlias": {"declarations": ["nixos/modules/programs/neovim.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Symlink {command}`vim` to {command}`nvim` binary.\n"}, "loc": ["programs", "neovim", "vimAlias"], "readOnly": false, "type": "boolean"}, "programs.neovim.withNodeJs": {"declarations": ["nixos/modules/programs/neovim.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Node provider."}, "loc": ["programs", "neovim", "withNodeJs"], "readOnly": false, "type": "boolean"}, "programs.neovim.withPython3": {"declarations": ["nixos/modules/programs/neovim.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable Python 3 provider."}, "loc": ["programs", "neovim", "withPython3"], "readOnly": false, "type": "boolean"}, "programs.neovim.withRuby": {"declarations": ["nixos/modules/programs/neovim.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable Ruby provider."}, "loc": ["programs", "neovim", "withRuby"], "readOnly": false, "type": "boolean"}, "programs.nethoscope.enable": {"declarations": ["nixos/modules/programs/nethoscope.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add nethoscope to the global environment and configure a\nsetcap wrapper for it.\n"}, "loc": ["programs", "nethoscope", "enable"], "readOnly": false, "type": "boolean"}, "programs.nexttrace.enable": {"declarations": ["nixos/modules/programs/nexttrace.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Nexttrace to the global environment and configure a setcap wrapper for it."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "nexttrace", "enable"], "readOnly": false, "type": "boolean"}, "programs.nexttrace.package": {"declarations": ["nixos/modules/programs/nexttrace.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nexttrace"}, "description": {"_type": "mdDoc", "text": "The nexttrace package to use."}, "loc": ["programs", "nexttrace", "package"], "readOnly": false, "type": "package"}, "programs.nix-index.enable": {"declarations": ["nixos/modules/programs/nix-index.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nix-index, a file database for nixpkgs."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "nix-index", "enable"], "readOnly": false, "type": "boolean"}, "programs.nix-index.enableBashIntegration": {"declarations": ["nixos/modules/programs/nix-index.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable Bash integration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "nix-index", "enableBashIntegration"], "readOnly": false, "type": "boolean"}, "programs.nix-index.enableFishIntegration": {"declarations": ["nixos/modules/programs/nix-index.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable Fish integration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "nix-index", "enableFishIntegration"], "readOnly": false, "type": "boolean"}, "programs.nix-index.enableZshIntegration": {"declarations": ["nixos/modules/programs/nix-index.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable Zsh integration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "nix-index", "enableZshIntegration"], "readOnly": false, "type": "boolean"}, "programs.nix-index.package": {"declarations": ["nixos/modules/programs/nix-index.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nix-index"}, "description": {"_type": "mdDoc", "text": "Package providing the `nix-index` tool."}, "loc": ["programs", "nix-index", "package"], "readOnly": false, "type": "package"}, "programs.nix-ld.enable": {"declarations": ["nixos/modules/programs/nix-ld.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nix-ld, Documentation: <https://github.com/Mic92/nix-ld>."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "nix-ld", "enable"], "readOnly": false, "type": "boolean"}, "programs.nix-ld.libraries": {"declarations": ["nixos/modules/programs/nix-ld.nix"], "default": {"_type": "literalExpression", "text": "baseLibraries derived from systemd and nix dependencies."}, "description": {"_type": "mdDoc", "text": "Libraries that automatically become available to all programs. The default set includes common libraries."}, "loc": ["programs", "nix-ld", "libraries"], "readOnly": false, "type": "list of package"}, "programs.nix-ld.package": {"declarations": ["nixos/modules/programs/nix-ld.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nix-ld"}, "description": {"_type": "mdDoc", "text": "Which package to use for the nix-ld."}, "loc": ["programs", "nix-ld", "package"], "readOnly": false, "type": "package"}, "programs.nm-applet.enable": {"declarations": ["nixos/modules/programs/nm-applet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nm-applet."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "nm-applet", "enable"], "readOnly": false, "type": "boolean"}, "programs.nm-applet.indicator": {"declarations": ["nixos/modules/programs/nm-applet.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to use indicator instead of status icon.\nIt is needed for Appindicator environments, like Enlightenment.\n"}, "loc": ["programs", "nm-applet", "indicator"], "readOnly": false, "type": "boolean"}, "programs.nncp.enable": {"declarations": ["nixos/modules/programs/nncp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable NNCP (Node to Node copy) utilities and configuration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "nncp", "enable"], "readOnly": false, "type": "boolean"}, "programs.nncp.group": {"declarations": ["nixos/modules/programs/nncp.nix"], "default": {"_type": "literalExpression", "text": "\"uucp\""}, "description": {"_type": "mdDoc", "text": "The group under which NNCP files shall be owned.\nAny member of this group may access the secret keys\nof this NNCP node.\n"}, "loc": ["programs", "nncp", "group"], "readOnly": false, "type": "string"}, "programs.nncp.package": {"declarations": ["nixos/modules/programs/nncp.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nncp"}, "description": {"_type": "mdDoc", "text": "The NNCP package to use system-wide."}, "loc": ["programs", "nncp", "package"], "readOnly": false, "type": "package"}, "programs.nncp.secrets": {"declarations": ["nixos/modules/programs/nncp.nix"], "description": {"_type": "mdDoc", "text": "A list of paths to NNCP configuration files that should not be\nin the Nix store. These files are layered on top of the values at\n[](#opt-programs.nncp.settings).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/run/keys/nncp.hjson\"\n]"}, "loc": ["programs", "nncp", "secrets"], "readOnly": false, "type": "list of string"}, "programs.nncp.settings": {"declarations": ["nixos/modules/programs/nncp.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "NNCP configuration, see\n<http://www.nncpgo.org/Configuration.html>.\nAt runtime these settings will be overlayed by the contents of\n[](#opt-programs.nncp.secrets) into the file\n`/run/nncp.hjson`. Node keypairs go in\n`secrets`, do not specify them in\n`settings` as they will be leaked into\n`/nix/store`!\n"}, "loc": ["programs", "nncp", "settings"], "readOnly": false, "type": "JSON value"}, "programs.noisetorch.enable": {"declarations": ["nixos/modules/programs/noisetorch.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable noisetorch + setcap wrapper."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "noisetorch", "enable"], "readOnly": false, "type": "boolean"}, "programs.noisetorch.package": {"declarations": ["nixos/modules/programs/noisetorch.nix"], "default": {"_type": "literalExpression", "text": "pkgs.noisetorch"}, "description": {"_type": "mdDoc", "text": "The noisetorch package to use.\n"}, "loc": ["programs", "noisetorch", "package"], "readOnly": false, "type": "package"}, "programs.npm.enable": {"declarations": ["nixos/modules/programs/npm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable {command}`npm` global config."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "npm", "enable"], "readOnly": false, "type": "boolean"}, "programs.npm.npmrc": {"declarations": ["nixos/modules/programs/npm.nix"], "default": {"_type": "literalExpression", "text": "''\n  prefix = ''${HOME}/.npm\n''"}, "description": {"_type": "mdDoc", "text": "The system-wide npm configuration.\nSee <https://docs.npmjs.com/misc/config>.\n"}, "example": {"_type": "literalExpression", "text": "''\n  prefix = ''${HOME}/.npm\n  https-proxy=proxy.example.com\n  init-license=MIT\n  init-author-url=http://npmjs.org\n  color=true\n''"}, "loc": ["programs", "npm", "npmrc"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.npm.package": {"declarations": ["nixos/modules/programs/npm.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nodePackages.npm"}, "description": {"_type": "mdDoc", "text": "The npm package version / flavor to use"}, "example": {"_type": "literalExpression", "text": "pkgs.nodePackages_13_x.npm"}, "loc": ["programs", "npm", "package"], "readOnly": false, "type": "package"}, "programs.openvpn3.enable": {"declarations": ["nixos/modules/programs/openvpn3.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the openvpn3 client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "openvpn3", "enable"], "readOnly": false, "type": "boolean"}, "programs.pantheon-tweaks.enable": {"declarations": ["nixos/modules/programs/pantheon-tweaks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Pantheon Tweaks, an unofficial system settings panel for Pantheon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "pantheon-tweaks", "enable"], "readOnly": false, "type": "boolean"}, "programs.partition-manager.enable": {"declarations": ["nixos/modules/programs/partition-manager.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable KDE Partition Manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "partition-manager", "enable"], "readOnly": false, "type": "boolean"}, "programs.plotinus.enable": {"declarations": ["nixos/modules/programs/plotinus.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Plotinus GTK 3 plugin. Plotinus provides a\npopup (triggered by Ctrl-Shift-P) to search the menus of a\ncompatible application.\n"}, "loc": ["programs", "plotinus", "enable"], "readOnly": false, "type": "boolean"}, "programs.proxychains.chain.length": {"declarations": ["nixos/modules/programs/proxychains.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Chain length for random chain.\n"}, "loc": ["programs", "proxychains", "chain", "length"], "readOnly": false, "type": "null or signed integer"}, "programs.proxychains.chain.type": {"declarations": ["nixos/modules/programs/proxychains.nix"], "default": {"_type": "literalExpression", "text": "\"strict\""}, "description": {"_type": "mdDoc", "text": "`dynamic` - Each connection will be done via chained proxies\nall proxies chained in the order as they appear in the list\nat least one proxy must be online to play in chain\n(dead proxies are skipped)\notherwise `EINTR` is returned to the app.\n\n`strict` - Each connection will be done via chained proxies\nall proxies chained in the order as they appear in the list\nall proxies must be online to play in chain\notherwise `EINTR` is returned to the app.\n\n`random` - Each connection will be done via random proxy\n(or proxy chain, see {option}`programs.proxychains.chain.length`) from the list.\n"}, "loc": ["programs", "proxychains", "chain", "type"], "readOnly": false, "type": "one of \"dynamic\", \"strict\", \"random\""}, "programs.proxychains.enable": {"declarations": ["nixos/modules/programs/proxychains.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable installing proxychains configuration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "proxychains", "enable"], "readOnly": false, "type": "boolean"}, "programs.proxychains.localnet": {"declarations": ["nixos/modules/programs/proxychains.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.0/255.0.0.0\""}, "description": {"_type": "mdDoc", "text": "By default enable localnet for loopback address ranges."}, "loc": ["programs", "proxychains", "localnet"], "readOnly": false, "type": "string"}, "programs.proxychains.package": {"declarations": ["nixos/modules/programs/proxychains.nix"], "default": {"_type": "literalExpression", "text": "pkgs.proxychains"}, "description": {"_type": "mdDoc", "text": "The proxychains package to use."}, "example": {"_type": "literalExpression", "text": "pkgs.proxychains-ng"}, "loc": ["programs", "proxychains", "package"], "readOnly": false, "type": "package"}, "programs.proxychains.proxies": {"declarations": ["nixos/modules/programs/proxychains.nix"], "description": {"_type": "mdDoc", "text": "Proxies to be used by proxychains.\n"}, "example": {"_type": "literalExpression", "text": "{ myproxy =\n  { type = \"socks4\";\n    host = \"127.0.0.1\";\n    port = 1337;\n  };\n}\n"}, "loc": ["programs", "proxychains", "proxies"], "readOnly": false, "type": "attribute set of (submodule)"}, "programs.proxychains.proxies.<name>.enable": {"declarations": ["nixos/modules/programs/proxychains.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable this proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "proxychains", "proxies", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "programs.proxychains.proxies.<name>.host": {"declarations": ["nixos/modules/programs/proxychains.nix"], "description": {"_type": "mdDoc", "text": "Proxy host or IP address."}, "loc": ["programs", "proxychains", "proxies", "<name>", "host"], "readOnly": false, "type": "string"}, "programs.proxychains.proxies.<name>.port": {"declarations": ["nixos/modules/programs/proxychains.nix"], "description": {"_type": "mdDoc", "text": "Proxy port"}, "loc": ["programs", "proxychains", "proxies", "<name>", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "programs.proxychains.proxies.<name>.type": {"declarations": ["nixos/modules/programs/proxychains.nix"], "description": {"_type": "mdDoc", "text": "Proxy type."}, "loc": ["programs", "proxychains", "proxies", "<name>", "type"], "readOnly": false, "type": "one of \"http\", \"socks4\", \"socks5\""}, "programs.proxychains.proxyDNS": {"declarations": ["nixos/modules/programs/proxychains.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Proxy DNS requests - no leak for DNS data."}, "loc": ["programs", "proxychains", "proxyDNS"], "readOnly": false, "type": "boolean"}, "programs.proxychains.quietMode": {"declarations": ["nixos/modules/programs/proxychains.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Quiet mode (no output from the library)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "proxychains", "quietMode"], "readOnly": false, "type": "boolean"}, "programs.proxychains.remoteDNSSubnet": {"declarations": ["nixos/modules/programs/proxychains.nix"], "default": {"_type": "literalExpression", "text": "224"}, "description": {"_type": "mdDoc", "text": "Set the class A subnet number to use for the internal remote DNS mapping, uses the reserved 224.x.x.x range by default.\n"}, "loc": ["programs", "proxychains", "remoteDNSSubnet"], "readOnly": false, "type": "one of 10, 127, 224"}, "programs.proxychains.tcpConnectTimeOut": {"declarations": ["nixos/modules/programs/proxychains.nix"], "default": {"_type": "literalExpression", "text": "8000"}, "description": {"_type": "mdDoc", "text": "Connection time-out in milliseconds."}, "loc": ["programs", "proxychains", "tcpConnectTimeOut"], "readOnly": false, "type": "signed integer"}, "programs.proxychains.tcpReadTimeOut": {"declarations": ["nixos/modules/programs/proxychains.nix"], "default": {"_type": "literalExpression", "text": "15000"}, "description": {"_type": "mdDoc", "text": "Connection read time-out in milliseconds."}, "loc": ["programs", "proxychains", "tcpReadTimeOut"], "readOnly": false, "type": "signed integer"}, "programs.qdmr.enable": {"declarations": ["nixos/modules/programs/qdmr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable QDMR - a GUI application and command line tool for programming DMR radios."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "qdmr", "enable"], "readOnly": false, "type": "boolean"}, "programs.qdmr.package": {"declarations": ["nixos/modules/programs/qdmr.nix"], "default": {"_type": "literalExpression", "text": "pkgs.qdmr"}, "description": {"_type": "mdDoc", "text": "The qdmr package to use."}, "loc": ["programs", "qdmr", "package"], "readOnly": false, "type": "package"}, "programs.regreet.enable": {"declarations": ["nixos/modules/programs/regreet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable ReGreet, a clean and customizable greeter for greetd.\n\nTo use ReGreet, {option}`services.greetd` has to be enabled and\n{option}`services.greetd.settings.default_session` should contain the\nappropriate configuration to launch\n{option}`config.programs.regreet.package`. For examples, see the\n[ReGreet Readme](https://github.com/rharish101/ReGreet#set-as-default-session).\n\nA minimal configuration that launches ReGreet in {command}`cage` is\nenabled by this module by default.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "regreet", "enable"], "readOnly": false, "type": "boolean"}, "programs.regreet.extraCss": {"declarations": ["nixos/modules/programs/regreet.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra CSS rules to apply on top of the GTK theme. Refer to\n[GTK CSS Properties](https://docs.gtk.org/gtk4/css-properties.html) for\nmodifiable properties.\n"}, "loc": ["programs", "regreet", "extraCss"], "readOnly": false, "type": "path or strings concatenated with \"\\n\""}, "programs.regreet.package": {"declarations": ["nixos/modules/programs/regreet.nix"], "default": {"_type": "literalExpression", "text": "pkgs.greetd.regreet"}, "description": {"_type": "mdDoc", "text": "The regreet package to use."}, "loc": ["programs", "regreet", "package"], "readOnly": false, "type": "package"}, "programs.regreet.settings": {"declarations": ["nixos/modules/programs/regreet.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "ReGreet configuration file. Refer\n<https://github.com/rharish101/ReGreet/blob/main/regreet.sample.toml>\nfor options.\n"}, "loc": ["programs", "regreet", "settings"], "readOnly": false, "type": "path or TOML value"}, "programs.rog-control-center.autoStart": {"declarations": ["nixos/modules/programs/rog-control-center.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether rog-control-center should be started automatically."}, "loc": ["programs", "rog-control-center", "autoStart"], "readOnly": false, "type": "boolean"}, "programs.rog-control-center.enable": {"declarations": ["nixos/modules/programs/rog-control-center.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the rog-control-center application."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "rog-control-center", "enable"], "readOnly": false, "type": "boolean"}, "programs.rust-motd.enable": {"declarations": ["nixos/modules/programs/rust-motd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable rust-motd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "rust-motd", "enable"], "readOnly": false, "type": "boolean"}, "programs.rust-motd.enableMotdInSSHD": {"declarations": ["nixos/modules/programs/rust-motd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to let `openssh` print the\nresult when entering a new `ssh`-session.\nBy default either nothing or a static file defined via\n[](#opt-users.motd) is printed. Because of that,\nthe latter option is incompatible with this module.\n"}, "loc": ["programs", "rust-motd", "enableMotdInSSHD"], "readOnly": false, "type": "boolean"}, "programs.rust-motd.refreshInterval": {"declarations": ["nixos/modules/programs/rust-motd.nix"], "default": {"_type": "literalExpression", "text": "\"*:0/5\""}, "description": {"_type": "mdDoc", "text": "Interval in which the {manpage}`motd(5)` file is refreshed.\nFor possible formats, please refer to {manpage}`systemd.time(7)`.\n"}, "loc": ["programs", "rust-motd", "refreshInterval"], "readOnly": false, "type": "string"}, "programs.rust-motd.settings": {"declarations": ["nixos/modules/programs/rust-motd.nix"], "description": {"_type": "mdDoc", "text": "Settings on what to generate. Please read the\n[upstream documentation](https://github.com/rust-motd/rust-motd/blob/main/README.md#configuration)\nfor further information.\n"}, "loc": ["programs", "rust-motd", "settings"], "readOnly": false, "type": "TOML value"}, "programs.screen.screenrc": {"declarations": ["nixos/modules/programs/screen.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The contents of /etc/screenrc file.\n"}, "loc": ["programs", "screen", "screenrc"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.seahorse.enable": {"declarations": ["nixos/modules/programs/seahorse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Seahorse, a GNOME application for managing encryption keys and passwords in the GNOME Keyring."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "seahorse", "enable"], "readOnly": false, "type": "boolean"}, "programs.sedutil.enable": {"declarations": ["nixos/modules/programs/sedutil.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sedutil."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "sedutil", "enable"], "readOnly": false, "type": "boolean"}, "programs.sharing.enable": {"declarations": ["nixos/modules/programs/sharing.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sharing, a CLI tool for sharing files.\n\nNote that it will opens the 7478 port for TCP in the firewall, which is needed for it to function properly\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "sharing", "enable"], "readOnly": false, "type": "boolean"}, "programs.singularity.enable": {"declarations": ["nixos/modules/programs/singularity.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install Singularity/Apptainer with system-level overriding such as SUID support.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "singularity", "enable"], "readOnly": false, "type": "boolean"}, "programs.singularity.enableFakeroot": {"declarations": ["nixos/modules/programs/singularity.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the `--fakeroot` support of Singularity/Apptainer.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["programs", "singularity", "enableFakeroot"], "readOnly": false, "type": "boolean"}, "programs.singularity.enableSuid": {"declarations": ["nixos/modules/programs/singularity.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the SUID support of Singularity/Apptainer.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["programs", "singularity", "enableSuid"], "readOnly": false, "type": "boolean"}, "programs.singularity.package": {"declarations": ["nixos/modules/programs/singularity.nix"], "default": {"_type": "literalExpression", "text": "pkgs.singularity"}, "description": {"_type": "mdDoc", "text": "Singularity/Apptainer package to override and install.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.apptainer"}, "loc": ["programs", "singularity", "package"], "readOnly": false, "type": "package"}, "programs.singularity.packageOverriden": {"declarations": ["nixos/modules/programs/singularity.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This option provides access to the overridden result of `programs.singularity.package`.\n\nFor example, the following configuration makes all the Nixpkgs packages use the overridden `singularity`:\n```Nix\n{ config, lib, pkgs, ... }:\n{\n  nixpkgs.overlays = [\n    (final: prev: {\n      _singularity-orig = prev.singularity;\n      singularity = config.programs.singularity.packageOverriden;\n    })\n  ];\n  programs.singularity.enable = true;\n  programs.singularity.package = pkgs._singularity-orig;\n}\n```\n\nUse `lib.mkForce` to forcefully specify the overridden package.\n"}, "loc": ["programs", "singularity", "packageOverriden"], "readOnly": false, "type": "null or package"}, "programs.skim.fuzzyCompletion": {"declarations": ["nixos/modules/programs/skim.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable fuzzy completion with skim."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "skim", "fuzzyCompletion"], "readOnly": false, "type": "boolean"}, "programs.skim.keybindings": {"declarations": ["nixos/modules/programs/skim.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable skim keybindings."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "skim", "keybindings"], "readOnly": false, "type": "boolean"}, "programs.skim.package": {"declarations": ["nixos/modules/programs/skim.nix"], "default": {"_type": "literalExpression", "text": "pkgs.skim"}, "description": {"_type": "mdDoc", "text": "The skim package to use."}, "loc": ["programs", "skim", "package"], "readOnly": false, "type": "package"}, "programs.slock.enable": {"declarations": ["nixos/modules/programs/slock.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install slock screen locker with setuid wrapper.\n"}, "loc": ["programs", "slock", "enable"], "readOnly": false, "type": "boolean"}, "programs.sniffnet.enable": {"declarations": ["nixos/modules/programs/sniffnet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sniffnet."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "sniffnet", "enable"], "readOnly": false, "type": "boolean"}, "programs.spacefm.enable": {"declarations": ["nixos/modules/programs/spacefm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install SpaceFM and create {file}`/etc/spacefm/spacefm.conf`.\n"}, "loc": ["programs", "spacefm", "enable"], "readOnly": false, "type": "boolean"}, "programs.spacefm.settings": {"declarations": ["nixos/modules/programs/spacefm.nix"], "default": {"_type": "literalExpression", "text": "{\n  tmp_dir = \"/tmp\";\n  terminal_su = \"${pkgs.sudo}/bin/sudo\";\n}\n"}, "description": {"_type": "mdDoc", "text": "The system-wide spacefm configuration.\nParameters to be written to {file}`/etc/spacefm/spacefm.conf`.\nRefer to the [relevant entry](https://ignorantguru.github.io/spacefm/spacefm-manual-en.html#programfiles-etc) in the SpaceFM manual.\n"}, "loc": ["programs", "spacefm", "settings"], "readOnly": false, "type": "attribute set"}, "programs.ssh.agentPKCS11Whitelist": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A pattern-list of acceptable paths for PKCS#11 shared libraries\nthat may be used with the -s option to ssh-add.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.opensc}/lib/opensc-pkcs11.so\""}, "loc": ["programs", "ssh", "agentPKCS11Whitelist"], "readOnly": false, "type": "null or string"}, "programs.ssh.agentTimeout": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How long to keep the private keys in memory. Use null to keep them forever.\n"}, "example": {"_type": "literalExpression", "text": "\"1h\""}, "loc": ["programs", "ssh", "agentTimeout"], "readOnly": false, "type": "null or string"}, "programs.ssh.askPassword": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.x11_ssh_askpass}/libexec/x11-ssh-askpass\""}, "description": {"_type": "mdDoc", "text": "Program used by SSH to ask for passwords."}, "loc": ["programs", "ssh", "askPassword"], "readOnly": false, "type": "string"}, "programs.ssh.ciphers": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the ciphers allowed and their order of preference.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"chacha20-poly1305@openssh.com\"\n  \"aes256-gcm@openssh.com\"\n]"}, "loc": ["programs", "ssh", "ciphers"], "readOnly": false, "type": "null or (list of string)"}, "programs.ssh.enableAskPassword": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "config.services.xserver.enable"}, "description": {"_type": "mdDoc", "text": "Whether to configure SSH_ASKPASS in the environment."}, "loc": ["programs", "ssh", "enableAskPassword"], "readOnly": false, "type": "boolean"}, "programs.ssh.extraConfig": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration text prepended to {file}`ssh_config`. Other generated\noptions will be added after a `Host *` pattern.\nSee {manpage}`ssh_config(5)`\nfor help.\n"}, "loc": ["programs", "ssh", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.ssh.forwardX11": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to request X11 forwarding on outgoing connections by default.\nThis is useful for running graphical programs on the remote machine and have them display to your local X11 server.\nHistorically, this value has depended on the value used by the local sshd daemon, but there really isn't a relation between the two.\nNote: there are some security risks to forwarding an X11 connection.\nNixOS's X server is built with the SECURITY extension, which prevents some obvious attacks.\nTo enable or disable forwarding on a per-connection basis, see the -X and -x options to ssh.\nThe -Y option to ssh enables trusted forwarding, which bypasses the SECURITY extension.\n"}, "loc": ["programs", "ssh", "forwardX11"], "readOnly": false, "type": "boolean"}, "programs.ssh.hostKeyAlgorithms": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Specifies the host key algorithms that the client wants to use in order of preference.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"ssh-ed25519\"\n  \"ssh-rsa\"\n]"}, "loc": ["programs", "ssh", "hostKeyAlgorithms"], "readOnly": false, "type": "list of string"}, "programs.ssh.kexAlgorithms": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the available KEX (Key Exchange) algorithms.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"curve25519-sha256@libssh.org\"\n  \"diffie-hellman-group-exchange-sha256\"\n]"}, "loc": ["programs", "ssh", "kexAlgorithms"], "readOnly": false, "type": "null or (list of string)"}, "programs.ssh.knownHosts": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The set of system-wide known SSH hosts. To make simple setups more\nconvenient the name of an attribute in this set is used as a host name\nfor the entry. This behaviour can be disabled by setting\n`hostNames` explicitly. You can use\n`extraHostNames` to add additional host names without\ndisabling this default.\n"}, "example": {"_type": "literalExpression", "text": "{\n  myhost = {\n    extraHostNames = [ \"myhost.mydomain.com\" \"10.10.1.4\" ];\n    publicKeyFile = ./pubkeys/myhost_ssh_host_dsa_key.pub;\n  };\n  \"myhost2.net\".publicKey = \"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILIRuJ8p1Fi+m6WkHV0KWnRfpM1WxoW8XAS+XvsSKsTK\";\n  \"myhost2.net/dsa\" = {\n    hostNames = [ \"myhost2.net\" ];\n    publicKeyFile = ./pubkeys/myhost2_ssh_host_dsa_key.pub;\n  };\n}\n"}, "loc": ["programs", "ssh", "knownHosts"], "readOnly": false, "type": "attribute set of (submodule)"}, "programs.ssh.knownHosts.<name>.certAuthority": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This public key is an SSH certificate authority, rather than an\nindividual host's key.\n"}, "loc": ["programs", "ssh", "knownHosts", "<name>", "certAuthority"], "readOnly": false, "type": "boolean"}, "programs.ssh.knownHosts.<name>.extraHostNames": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of additional host names and/or IP numbers used for\naccessing the host's ssh service. This list is ignored if\n`hostNames` is set explicitly.\n"}, "loc": ["programs", "ssh", "knownHosts", "<name>", "extraHostNames"], "readOnly": false, "type": "list of string"}, "programs.ssh.knownHosts.<name>.hostNames": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "[ \u2039name\u203a ] ++ config.programs.ssh.knownHosts.<name>.extraHostNames"}, "description": {"_type": "mdDoc", "text": "A list of host names and/or IP numbers used for accessing\nthe host's ssh service. This list includes the name of the\ncontaining `knownHosts` attribute by default\nfor convenience. If you wish to configure multiple host keys\nfor the same host use multiple `knownHosts`\nentries with different attribute names and the same\n`hostNames` list.\n"}, "loc": ["programs", "ssh", "knownHosts", "<name>", "hostNames"], "readOnly": false, "type": "list of string"}, "programs.ssh.knownHosts.<name>.publicKey": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The public key data for the host. You can fetch a public key\nfrom a running SSH server with the {command}`ssh-keyscan`\ncommand. The public key should not include any host names, only\nthe key type and the key itself.\n"}, "example": {"_type": "literalExpression", "text": "\"ecdsa-sha2-nistp521 AAAAE2VjZHN...UEPg==\""}, "loc": ["programs", "ssh", "knownHosts", "<name>", "publicKey"], "readOnly": false, "type": "null or string"}, "programs.ssh.knownHosts.<name>.publicKeyFile": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the public key file for the host. The public\nkey file is read at build time and saved in the Nix store.\nYou can fetch a public key file from a running SSH server\nwith the {command}`ssh-keyscan` command. The content\nof the file should follow the same format as described for\nthe `publicKey` option. Only a single key\nis supported. If a host has multiple keys, use\n{option}`programs.ssh.knownHostsFiles` instead.\n"}, "loc": ["programs", "ssh", "knownHosts", "<name>", "publicKeyFile"], "readOnly": false, "type": "null or path"}, "programs.ssh.knownHostsFiles": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Files containing SSH host keys to set as global known hosts.\n`/etc/ssh/ssh_known_hosts` (which is\ngenerated by {option}`programs.ssh.knownHosts`) is\nalways included.\n"}, "example": {"_type": "literalExpression", "text": "[\n  ./known_hosts\n  (writeText \"github.keys\" ''\n    github.com ssh-rsa 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\n    github.com ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEmKSENjQEezOmxkZMy7opKgwFB9nkt5YRrYMjNuG5N87uRgg6CLrbo5wAdT/y6v0mKV0U2w0WZ2YB/++Tpockg=\n    github.com ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOMqqnkVzrm0SdG6UOoqKLsabgH5C9okWi0dh2l9GKJl\n  '')\n]\n"}, "loc": ["programs", "ssh", "knownHostsFiles"], "readOnly": false, "type": "list of path"}, "programs.ssh.macs": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the MAC (message authentication code) algorithms in order of preference. The MAC algorithm is used\nfor data integrity protection.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"hmac-sha2-512-etm@openssh.com\"\n  \"hmac-sha1\"\n]"}, "loc": ["programs", "ssh", "macs"], "readOnly": false, "type": "null or (list of string)"}, "programs.ssh.package": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "pkgs.openssh"}, "description": {"_type": "mdDoc", "text": "The package used for the openssh client and daemon.\n"}, "loc": ["programs", "ssh", "package"], "readOnly": false, "type": "package"}, "programs.ssh.pubkeyAcceptedKeyTypes": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Specifies the key types that will be used for public key authentication.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"ssh-ed25519\"\n  \"ssh-rsa\"\n]"}, "loc": ["programs", "ssh", "pubkeyAcceptedKeyTypes"], "readOnly": false, "type": "list of string"}, "programs.ssh.setXAuthLocation": {"declarations": ["nixos/modules/programs/ssh.nix"], "description": {"_type": "mdDoc", "text": "Whether to set the path to {command}`xauth` for X11-forwarded connections.\nThis causes a dependency on X11 packages.\n"}, "loc": ["programs", "ssh", "setXAuthLocation"], "readOnly": false, "type": "boolean"}, "programs.ssh.startAgent": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to start the OpenSSH agent when you log in.  The OpenSSH agent\nremembers private keys for you so that you don't have to type in\npassphrases every time you make an SSH connection.  Use\n{command}`ssh-add` to add a key to the agent.\n"}, "loc": ["programs", "ssh", "startAgent"], "readOnly": false, "type": "boolean"}, "programs.starship.enable": {"declarations": ["nixos/modules/programs/starship.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Starship shell prompt."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "starship", "enable"], "readOnly": false, "type": "boolean"}, "programs.starship.interactiveOnly": {"declarations": ["nixos/modules/programs/starship.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable starship only when the shell is interactive.\nSome plugins require this to be set to false to function correctly.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["programs", "starship", "interactiveOnly"], "readOnly": false, "type": "boolean"}, "programs.starship.settings": {"declarations": ["nixos/modules/programs/starship.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration included in `starship.toml`.\n\nSee https://starship.rs/config/#prompt for documentation.\n"}, "loc": ["programs", "starship", "settings"], "readOnly": false, "type": "TOML value"}, "programs.steam.dedicatedServer.openFirewall": {"declarations": ["nixos/modules/programs/steam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for Source Dedicated Server.\n"}, "loc": ["programs", "steam", "dedicatedServer", "openFirewall"], "readOnly": false, "type": "boolean"}, "programs.steam.enable": {"declarations": ["nixos/modules/programs/steam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable steam."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "steam", "enable"], "readOnly": false, "type": "boolean"}, "programs.steam.gamescopeSession": {"declarations": ["nixos/modules/programs/steam.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Run a GameScope driven Steam session from your display-manager"}, "loc": ["programs", "steam", "gamescopeSession"], "readOnly": false, "type": "submodule"}, "programs.steam.gamescopeSession.args": {"declarations": ["nixos/modules/programs/steam.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Arguments to be passed to GameScope for the session.\n"}, "loc": ["programs", "steam", "gamescopeSession", "args"], "readOnly": false, "type": "list of Concatenated string"}, "programs.steam.gamescopeSession.enable": {"declarations": ["nixos/modules/programs/steam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GameScope Session."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "steam", "gamescopeSession", "enable"], "readOnly": false, "type": "boolean"}, "programs.steam.gamescopeSession.env": {"declarations": ["nixos/modules/programs/steam.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environmental variables to be passed to GameScope for the session.\n"}, "loc": ["programs", "steam", "gamescopeSession", "env"], "readOnly": false, "type": "attribute set of Concatenated string"}, "programs.steam.package": {"declarations": ["nixos/modules/programs/steam.nix"], "default": {"_type": "literalExpression", "text": "pkgs.steam"}, "description": {"_type": "mdDoc", "text": "The Steam package to use. Additional libraries are added from the system\nconfiguration to ensure graphics work properly.\n\nUse this option to customise the Steam package rather than adding your\ncustom Steam to {option}`environment.systemPackages` yourself.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.steam-small.override {\n  extraEnv = {\n    MANGOHUD = true;\n    OBS_VKCAPTURE = true;\n    RADV_TEX_ANISO = 16;\n  };\n  extraLibraries = p: with p; [\n    atk\n  ];\n}\n"}, "loc": ["programs", "steam", "package"], "readOnly": false, "type": "package"}, "programs.steam.remotePlay.openFirewall": {"declarations": ["nixos/modules/programs/steam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for Steam Remote Play.\n"}, "loc": ["programs", "steam", "remotePlay", "openFirewall"], "readOnly": false, "type": "boolean"}, "programs.streamdeck-ui.autoStart": {"declarations": ["nixos/modules/programs/streamdeck-ui.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether streamdeck-ui should be started automatically."}, "loc": ["programs", "streamdeck-ui", "autoStart"], "readOnly": false, "type": "boolean"}, "programs.streamdeck-ui.enable": {"declarations": ["nixos/modules/programs/streamdeck-ui.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable streamdeck-ui."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "streamdeck-ui", "enable"], "readOnly": false, "type": "boolean"}, "programs.streamdeck-ui.package": {"declarations": ["nixos/modules/programs/streamdeck-ui.nix"], "default": {"_type": "literalExpression", "text": "pkgs.streamdeck-ui"}, "description": {"_type": "mdDoc", "text": "The streamdeck-ui package to use."}, "loc": ["programs", "streamdeck-ui", "package"], "readOnly": false, "type": "package"}, "programs.sway.enable": {"declarations": ["nixos/modules/programs/sway.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Sway, the i3-compatible tiling Wayland compositor. You can manually launch\nSway by executing \"exec sway\" on a TTY. Copy /etc/sway/config to\n~/.config/sway/config to modify the default configuration. See\n<https://github.com/swaywm/sway/wiki> and\n\"man 5 sway\" for more information."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "sway", "enable"], "readOnly": false, "type": "boolean"}, "programs.sway.extraOptions": {"declarations": ["nixos/modules/programs/sway.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Command line arguments passed to launch Sway. Please DO NOT report\nissues if you use an unsupported GPU (proprietary drivers).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--verbose\"\n  \"--debug\"\n  \"--unsupported-gpu\"\n]"}, "loc": ["programs", "sway", "extraOptions"], "readOnly": false, "type": "list of string"}, "programs.sway.extraPackages": {"declarations": ["nixos/modules/programs/sway.nix"], "default": {"_type": "literalExpression", "text": "with pkgs; [ swaylock swayidle foot dmenu ];\n"}, "description": {"_type": "mdDoc", "text": "Extra packages to be installed system wide. See\n<https://github.com/swaywm/sway/wiki/Useful-add-ons-for-sway> and\n<https://github.com/swaywm/sway/wiki/i3-Migration-Guide#common-x11-apps-used-on-i3-with-wayland-alternatives>\nfor a list of useful software.\n"}, "example": {"_type": "literalExpression", "text": "with pkgs; [\n  i3status i3status-rust\n  termite rofi light\n]\n"}, "loc": ["programs", "sway", "extraPackages"], "readOnly": false, "type": "list of package"}, "programs.sway.extraSessionCommands": {"declarations": ["nixos/modules/programs/sway.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed just before Sway is started. See\n<https://github.com/swaywm/sway/wiki/Running-programs-natively-under-wayland>\nand <https://github.com/swaywm/wlroots/blob/master/docs/env_vars.md>\nfor some useful environment variables.\n"}, "example": {"_type": "literalExpression", "text": "''\n  # SDL:\n  export SDL_VIDEODRIVER=wayland\n  # QT (needs qt5.qtwayland in systemPackages):\n  export QT_QPA_PLATFORM=wayland-egl\n  export QT_WAYLAND_DISABLE_WINDOWDECORATION=\"1\"\n  # Fix for some Java AWT applications (e.g. Android Studio),\n  # use this if they aren't displayed properly:\n  export _JAVA_AWT_WM_NONREPARENTING=1\n''"}, "loc": ["programs", "sway", "extraSessionCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.sway.package": {"declarations": ["nixos/modules/programs/sway.nix"], "default": {"_type": "literalExpression", "text": "pkgs.sway"}, "description": {"_type": "mdDoc", "text": "Sway package to use. Will override the options\n'wrapperFeatures', 'extraSessionCommands', and 'extraOptions'.\nSet to <code>null</code> to not add any Sway package to your\npath. This should be done if you want to use the Home Manager Sway\nmodule to install Sway.\n"}, "loc": ["programs", "sway", "package"], "readOnly": false, "type": "null or package"}, "programs.sway.wrapperFeatures": {"declarations": ["nixos/modules/programs/sway.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute set of features to enable in the wrapper.\n"}, "example": {"_type": "literalExpression", "text": "{\n  gtk = true;\n}"}, "loc": ["programs", "sway", "wrapperFeatures"], "readOnly": false, "type": "submodule"}, "programs.sway.wrapperFeatures.base": {"declarations": ["nixos/modules/programs/sway.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to make use of the base wrapper to execute extra session commands and prepend a\ndbus-run-session to the sway command.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["programs", "sway", "wrapperFeatures", "base"], "readOnly": false, "type": "boolean"}, "programs.sway.wrapperFeatures.gtk": {"declarations": ["nixos/modules/programs/sway.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to make use of the wrapGAppsHook wrapper to execute sway with required environment\nvariables for GTK applications.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "sway", "wrapperFeatures", "gtk"], "readOnly": false, "type": "boolean"}, "programs.sysdig.enable": {"declarations": ["nixos/modules/programs/sysdig.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sysdig."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "sysdig", "enable"], "readOnly": false, "type": "boolean"}, "programs.system-config-printer.enable": {"declarations": ["nixos/modules/programs/system-config-printer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable system-config-printer, a Graphical user interface for CUPS administration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "system-config-printer", "enable"], "readOnly": false, "type": "boolean"}, "programs.systemtap.enable": {"declarations": ["nixos/modules/programs/systemtap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Install {command}`systemtap` along with necessary kernel options.\n"}, "loc": ["programs", "systemtap", "enable"], "readOnly": false, "type": "boolean"}, "programs.thefuck.alias": {"declarations": ["nixos/modules/programs/thefuck.nix"], "default": {"_type": "literalExpression", "text": "\"fuck\""}, "description": {"_type": "mdDoc", "text": "`thefuck` needs an alias to be configured.\nThe default value is `fuck`, but you can use anything else as well.\n"}, "loc": ["programs", "thefuck", "alias"], "readOnly": false, "type": "string"}, "programs.thefuck.enable": {"declarations": ["nixos/modules/programs/thefuck.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable thefuck."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "thefuck", "enable"], "readOnly": false, "type": "boolean"}, "programs.thunar.enable": {"declarations": ["nixos/modules/programs/thunar.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Thunar, the Xfce file manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "thunar", "enable"], "readOnly": false, "type": "boolean"}, "programs.thunar.plugins": {"declarations": ["nixos/modules/programs/thunar.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of thunar plugins to install."}, "example": {"_type": "literalExpression", "text": "with pkgs.xfce; [ thunar-archive-plugin thunar-volman ]"}, "loc": ["programs", "thunar", "plugins"], "readOnly": false, "type": "list of package"}, "programs.tmux.aggressiveResize": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Resize the window to the size of the smallest session for which it is the current window.\n"}, "loc": ["programs", "tmux", "aggressiveResize"], "readOnly": false, "type": "boolean"}, "programs.tmux.baseIndex": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Base index for windows and panes."}, "example": {"_type": "literalExpression", "text": "1"}, "loc": ["programs", "tmux", "baseIndex"], "readOnly": false, "type": "signed integer"}, "programs.tmux.clock24": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use 24 hour clock."}, "loc": ["programs", "tmux", "clock24"], "readOnly": false, "type": "boolean"}, "programs.tmux.customPaneNavigationAndResize": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Override the hjkl and HJKL bindings for pane navigation and resizing in VI mode."}, "loc": ["programs", "tmux", "customPaneNavigationAndResize"], "readOnly": false, "type": "boolean"}, "programs.tmux.enable": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whenever to configure {command}`tmux` system-wide."}, "loc": ["programs", "tmux", "enable"], "readOnly": false, "relatedPackages": "- [`pkgs.tmux`](\n    https://search.nixos.org/packages?show=tmux&sort=relevance&query=tmux\n  )\n", "type": "boolean"}, "programs.tmux.escapeTime": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "500"}, "description": {"_type": "mdDoc", "text": "Time in milliseconds for which tmux waits after an escape is input."}, "example": {"_type": "literalExpression", "text": "0"}, "loc": ["programs", "tmux", "escapeTime"], "readOnly": false, "type": "signed integer"}, "programs.tmux.extraConfig": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional contents of /etc/tmux.conf, to be run after sourcing plugins.\n"}, "loc": ["programs", "tmux", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.tmux.extraConfigBeforePlugins": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional contents of /etc/tmux.conf, to be run before sourcing plugins.\n"}, "loc": ["programs", "tmux", "extraConfigBeforePlugins"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.tmux.historyLimit": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "2000"}, "description": {"_type": "mdDoc", "text": "Maximum number of lines held in window history."}, "example": {"_type": "literalExpression", "text": "5000"}, "loc": ["programs", "tmux", "historyLimit"], "readOnly": false, "type": "signed integer"}, "programs.tmux.keyMode": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "\"emacs\""}, "description": {"_type": "mdDoc", "text": "VI or Emacs style shortcuts."}, "example": {"_type": "literalExpression", "text": "\"vi\""}, "loc": ["programs", "tmux", "keyMode"], "readOnly": false, "type": "one of \"emacs\", \"vi\""}, "programs.tmux.newSession": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically spawn a session if trying to attach and none are running."}, "loc": ["programs", "tmux", "newSession"], "readOnly": false, "type": "boolean"}, "programs.tmux.plugins": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of plugins to install."}, "example": {"_type": "literalExpression", "text": "[ pkgs.tmuxPlugins.nord ]"}, "loc": ["programs", "tmux", "plugins"], "readOnly": false, "type": "list of package"}, "programs.tmux.resizeAmount": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Number of lines/columns when resizing."}, "example": {"_type": "literalExpression", "text": "10"}, "loc": ["programs", "tmux", "resizeAmount"], "readOnly": false, "type": "signed integer"}, "programs.tmux.reverseSplit": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Reverse the window split shortcuts."}, "loc": ["programs", "tmux", "reverseSplit"], "readOnly": false, "type": "boolean"}, "programs.tmux.secureSocket": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Store tmux socket under /run, which is more secure than /tmp, but as a\ndownside it doesn't survive user logout.\n"}, "loc": ["programs", "tmux", "secureSocket"], "readOnly": false, "type": "boolean"}, "programs.tmux.shortcut": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "\"b\""}, "description": {"_type": "mdDoc", "text": "Ctrl following by this key is used as the main shortcut."}, "example": {"_type": "literalExpression", "text": "\"a\""}, "loc": ["programs", "tmux", "shortcut"], "readOnly": false, "type": "string"}, "programs.tmux.terminal": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "\"screen\""}, "description": {"_type": "mdDoc", "text": "Set the $TERM variable. Use tmux-direct if italics or 24bit true color\nsupport is needed.\n"}, "example": {"_type": "literalExpression", "text": "\"screen-256color\""}, "loc": ["programs", "tmux", "terminal"], "readOnly": false, "type": "string"}, "programs.tmux.withUtempter": {"declarations": ["nixos/modules/programs/tmux.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable libutempter for tmux.\nThis is required so that tmux can write to /var/run/utmp (which can be queried with `who` to display currently connected user sessions).\nNote, this will add a guid wrapper for the group utmp!\n"}, "loc": ["programs", "tmux", "withUtempter"], "readOnly": false, "type": "boolean"}, "programs.traceroute.enable": {"declarations": ["nixos/modules/programs/traceroute.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to configure a setcap wrapper for traceroute.\n"}, "loc": ["programs", "traceroute", "enable"], "readOnly": false, "type": "boolean"}, "programs.trippy.enable": {"declarations": ["nixos/modules/programs/trippy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable trippy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "trippy", "enable"], "readOnly": false, "type": "boolean"}, "programs.tsmClient.defaultServername": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If multiple server stanzas are declared with\n{option}`programs.tsmClient.servers`,\nthis option may be used to name a default\nserver stanza that IBM TSM uses in the absence of\na user-defined {file}`dsm.opt` file.\nThis option translates to a\n`defaultserver` configuration line.\n"}, "example": {"_type": "literalExpression", "text": "\"mainTsmServer\""}, "loc": ["programs", "tsmClient", "defaultServername"], "readOnly": false, "type": "null or string matching the pattern .{1,64}"}, "programs.tsmClient.dsmSysText": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "description": {"_type": "mdDoc", "text": "This configuration key contains the effective text\nof the client system-options file \"dsm.sys\".\nIt should not be changed, but may be\nused to feed the configuration into other\nTSM-depending packages used on the system.\n"}, "loc": ["programs", "tsmClient", "dsmSysText"], "readOnly": true, "type": "strings concatenated with \"\\n\""}, "programs.tsmClient.enable": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable IBM Spectrum Protect (Tivoli Storage Manager, TSM)\nclient command line applications with a\nclient system-options file \"dsm.sys\"\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "tsmClient", "enable"], "readOnly": false, "type": "boolean"}, "programs.tsmClient.package": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "default": {"_type": "literalExpression", "text": "pkgs.tsm-client"}, "description": {"_type": "mdDoc", "text": "The TSM client derivation to be\nadded to the system environment.\nIt will be used with `.override`\nto add paths to the client system-options file.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.tsm-client-withGui"}, "loc": ["programs", "tsmClient", "package"], "readOnly": false, "type": "package"}, "programs.tsmClient.servers": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Server definitions (\"stanzas\")\nfor the client system-options file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  mainTsmServer = {\n    extraConfig = {\n      compression = \"yes\";\n    };\n    node = \"MY-TSM-NODE\";\n    server = \"tsmserver.company.com\";\n  };\n}"}, "loc": ["programs", "tsmClient", "servers"], "readOnly": false, "type": "attribute set of (submodule)"}, "programs.tsmClient.servers.<name>.extraConfig": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional key-value pairs for the server stanza.\nValues must be strings, or `null`\nfor the key not to be used in the stanza\n(e.g. to overrule values generated by other options).\n"}, "example": {"_type": "literalExpression", "text": "{\n  compression = \"yes\";\n  passwordaccess = null;\n}"}, "loc": ["programs", "tsmClient", "servers", "<name>", "extraConfig"], "readOnly": false, "type": "attribute set of (null or string)"}, "programs.tsmClient.servers.<name>.genPasswd": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic client password generation.\nThis option influences the\n`passwordaccess`\ndirective in {file}`dsm.sys`.\nThe password will be stored in the directory\ngiven by the option {option}`passwdDir`.\n*Caution*:\nIf this option is enabled and the server forces\nto renew the password (e.g. on first connection),\na random password will be generated and stored\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "tsmClient", "servers", "<name>", "genPasswd"], "readOnly": false, "type": "boolean"}, "programs.tsmClient.servers.<name>.includeExclude": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "`include.*` and\n`exclude.*` directives to be\nused when sending files to the IBM TSM server.\nThe lines will be written into a file that the\n`inclexcl`\ndirective in {file}`dsm.sys` points to.\n"}, "example": {"_type": "literalExpression", "text": "''\n  exclude.dir     /nix/store\n  include.encrypt /home/.../*\n''"}, "loc": ["programs", "tsmClient", "servers", "<name>", "includeExclude"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.tsmClient.servers.<name>.name": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "description": {"_type": "mdDoc", "text": "Local name of the IBM TSM server,\nmust be uncapitalized and no longer than 64 chars.\nThe value will be used for the\n`server`\ndirective in {file}`dsm.sys`.\n"}, "example": {"_type": "literalExpression", "text": "\"mainTsmServer\""}, "loc": ["programs", "tsmClient", "servers", "<name>", "name"], "readOnly": false, "type": "string matching the pattern .{1,64}"}, "programs.tsmClient.servers.<name>.node": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "description": {"_type": "mdDoc", "text": "Target node name on the IBM TSM server.\nThe value will be used for the\n`nodename`\ndirective in {file}`dsm.sys`.\n"}, "example": {"_type": "literalExpression", "text": "\"MY-TSM-NODE\""}, "loc": ["programs", "tsmClient", "servers", "<name>", "node"], "readOnly": false, "type": "non-empty string"}, "programs.tsmClient.servers.<name>.passwdDir": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "description": {"_type": "mdDoc", "text": "Directory that holds the TSM\nnode's password information.\nThe value will be used for the\n`passworddir`\ndirective in {file}`dsm.sys`.\n"}, "example": {"_type": "literalExpression", "text": "\"/home/alice/tsm-password\""}, "loc": ["programs", "tsmClient", "servers", "<name>", "passwdDir"], "readOnly": false, "type": "path"}, "programs.tsmClient.servers.<name>.port": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "default": {"_type": "literalExpression", "text": "1500"}, "description": {"_type": "mdDoc", "text": "TCP port of the IBM TSM server.\nThe value will be used for the\n`tcpport`\ndirective in {file}`dsm.sys`.\nTSM does not support ports above 32767.\n"}, "loc": ["programs", "tsmClient", "servers", "<name>", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "programs.tsmClient.servers.<name>.server": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "description": {"_type": "mdDoc", "text": "Host/domain name or IP address of the IBM TSM server.\nThe value will be used for the\n`tcpserveraddress`\ndirective in {file}`dsm.sys`.\n"}, "example": {"_type": "literalExpression", "text": "\"tsmserver.company.com\""}, "loc": ["programs", "tsmClient", "servers", "<name>", "server"], "readOnly": false, "type": "non-empty string"}, "programs.tsmClient.servers.<name>.text": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "description": {"_type": "mdDoc", "text": "Additional text lines for the server stanza.\nThis option can be used if certion configuration keys\nmust be used multiple times or ordered in a certain way\nas the {option}`extraConfig` option can't\ncontrol the order of lines in the resulting stanza.\nNote that the `server`\nline at the beginning of the stanza is\nnot part of this option's value.\n"}, "example": {"_type": "literalExpression", "text": "lib.modules.mkAfter \"compression no\""}, "loc": ["programs", "tsmClient", "servers", "<name>", "text"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.tsmClient.wrappedPackage": {"declarations": ["nixos/modules/programs/tsm-client.nix"], "description": {"_type": "mdDoc", "text": "The TSM client derivation, wrapped with the path\nto the client system-options file \"dsm.sys\".\nThis option is to provide the effective derivation\nfor other modules that want to call TSM executables.\n"}, "loc": ["programs", "tsmClient", "wrappedPackage"], "readOnly": true, "type": "package"}, "programs.turbovnc.ensureHeadlessSoftwareOpenGL": {"declarations": ["nixos/modules/programs/turbovnc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to set up NixOS such that TurboVNC's built-in software OpenGL\nimplementation works.\n\nThis will enable {option}`hardware.opengl.enable` so that OpenGL\nprograms can find Mesa's llvmpipe drivers.\n\nSetting this option to `false` does not mean that software\nOpenGL won't work; it may still work depending on your system\nconfiguration.\n\nThis option is also intended to generate warnings if you are using some\nconfiguration that's incompatible with using headless software OpenGL\nin TurboVNC.\n"}, "loc": ["programs", "turbovnc", "ensureHeadlessSoftwareOpenGL"], "readOnly": false, "type": "boolean"}, "programs.udevil.enable": {"declarations": ["nixos/modules/programs/udevil.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable udevil."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "udevil", "enable"], "readOnly": false, "type": "boolean"}, "programs.usbtop.enable": {"declarations": ["nixos/modules/programs/usbtop.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable usbtop and required kernel module."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "usbtop", "enable"], "readOnly": false, "type": "boolean"}, "programs.vim.defaultEditor": {"declarations": ["nixos/modules/programs/vim.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When enabled, installs vim and configures vim to be the default editor\nusing the EDITOR environment variable.\n"}, "loc": ["programs", "vim", "defaultEditor"], "readOnly": false, "type": "boolean"}, "programs.vim.package": {"declarations": ["nixos/modules/programs/vim.nix"], "default": {"_type": "literalExpression", "text": "pkgs.vim"}, "description": {"_type": "mdDoc", "text": "vim package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.vim-full"}, "loc": ["programs", "vim", "package"], "readOnly": false, "type": "package"}, "programs.wavemon.enable": {"declarations": ["nixos/modules/programs/wavemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add wavemon to the global environment and configure a\nsetcap wrapper for it.\n"}, "loc": ["programs", "wavemon", "enable"], "readOnly": false, "type": "boolean"}, "programs.waybar.enable": {"declarations": ["nixos/modules/programs/waybar.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable waybar."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "waybar", "enable"], "readOnly": false, "type": "boolean"}, "programs.waybar.package": {"declarations": ["nixos/modules/programs/waybar.nix"], "default": {"_type": "literalExpression", "text": "pkgs.waybar"}, "description": {"_type": "mdDoc", "text": "The waybar package to use."}, "loc": ["programs", "waybar", "package"], "readOnly": false, "type": "package"}, "programs.weylus.enable": {"declarations": ["nixos/modules/programs/weylus.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable weylus."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "weylus", "enable"], "readOnly": false, "type": "boolean"}, "programs.weylus.openFirewall": {"declarations": ["nixos/modules/programs/weylus.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports needed for the functionality of the program.\n"}, "loc": ["programs", "weylus", "openFirewall"], "readOnly": false, "type": "boolean"}, "programs.weylus.package": {"declarations": ["nixos/modules/programs/weylus.nix"], "default": {"_type": "literalExpression", "text": "pkgs.weylus"}, "description": {"_type": "mdDoc", "text": "Weylus package to install."}, "loc": ["programs", "weylus", "package"], "readOnly": false, "type": "package"}, "programs.weylus.users": {"declarations": ["nixos/modules/programs/weylus.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "To enable stylus and multi-touch support, the user you're going to use must be added to this list.\nThese users can synthesize input events system-wide, even when another user is logged in - untrusted users should not be added.\n"}, "loc": ["programs", "weylus", "users"], "readOnly": false, "type": "list of string"}, "programs.wireshark.enable": {"declarations": ["nixos/modules/programs/wireshark.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add Wireshark to the global environment and configure a\nsetcap wrapper for 'dumpcap' for users in the 'wireshark' group.\n"}, "loc": ["programs", "wireshark", "enable"], "readOnly": false, "type": "boolean"}, "programs.wireshark.package": {"declarations": ["nixos/modules/programs/wireshark.nix"], "default": {"_type": "literalExpression", "text": "pkgs.wireshark-cli"}, "description": {"_type": "mdDoc", "text": "Which Wireshark package to install in the global environment.\n"}, "loc": ["programs", "wireshark", "package"], "readOnly": false, "type": "package"}, "programs.wshowkeys.enable": {"declarations": ["nixos/modules/programs/wshowkeys.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable wshowkeys (displays keypresses on screen on supported Wayland\ncompositors). It requires root permissions to read input events, but\nthese permissions are dropped after startup."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "wshowkeys", "enable"], "readOnly": false, "type": "boolean"}, "programs.xastir.enable": {"declarations": ["nixos/modules/programs/xastir.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Xastir Graphical APRS client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "xastir", "enable"], "readOnly": false, "type": "boolean"}, "programs.xfconf.enable": {"declarations": ["nixos/modules/programs/xfconf.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Xfconf, the Xfce configuration storage system."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "xfconf", "enable"], "readOnly": false, "type": "boolean"}, "programs.xfs_quota.projects": {"declarations": ["nixos/modules/programs/xfs_quota.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Setup of xfs_quota projects. Make sure the filesystem is mounted with the pquota option."}, "example": {"_type": "literalExpression", "text": "{\n  projname = {\n    id = 50;\n    path = \"/xfsprojects/projname\";\n    sizeHardLimit = \"50g\";\n  };\n}"}, "loc": ["programs", "xfs_quota", "projects"], "readOnly": false, "type": "attribute set of (submodule)"}, "programs.xfs_quota.projects.<name>.fileSystem": {"declarations": ["nixos/modules/programs/xfs_quota.nix"], "default": {"_type": "literalExpression", "text": "\"/\""}, "description": {"_type": "mdDoc", "text": "XFS filesystem hosting the xfs_quota project."}, "loc": ["programs", "xfs_quota", "projects", "<name>", "fileSystem"], "readOnly": false, "type": "string"}, "programs.xfs_quota.projects.<name>.id": {"declarations": ["nixos/modules/programs/xfs_quota.nix"], "description": {"_type": "mdDoc", "text": "Project ID."}, "loc": ["programs", "xfs_quota", "projects", "<name>", "id"], "readOnly": false, "type": "signed integer"}, "programs.xfs_quota.projects.<name>.path": {"declarations": ["nixos/modules/programs/xfs_quota.nix"], "description": {"_type": "mdDoc", "text": "Project directory."}, "loc": ["programs", "xfs_quota", "projects", "<name>", "path"], "readOnly": false, "type": "string"}, "programs.xfs_quota.projects.<name>.sizeHardLimit": {"declarations": ["nixos/modules/programs/xfs_quota.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hard limit of the project size."}, "example": {"_type": "literalExpression", "text": "\"50g\""}, "loc": ["programs", "xfs_quota", "projects", "<name>", "sizeHardLimit"], "readOnly": false, "type": "null or string"}, "programs.xfs_quota.projects.<name>.sizeSoftLimit": {"declarations": ["nixos/modules/programs/xfs_quota.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Soft limit of the project size"}, "example": {"_type": "literalExpression", "text": "\"30g\""}, "loc": ["programs", "xfs_quota", "projects", "<name>", "sizeSoftLimit"], "readOnly": false, "type": "null or string"}, "programs.xonsh.config": {"declarations": ["nixos/modules/programs/xonsh.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Control file to customize your shell behavior."}, "loc": ["programs", "xonsh", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.xonsh.enable": {"declarations": ["nixos/modules/programs/xonsh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to configure xonsh as an interactive shell.\n"}, "loc": ["programs", "xonsh", "enable"], "readOnly": false, "type": "boolean"}, "programs.xonsh.package": {"declarations": ["nixos/modules/programs/xonsh.nix"], "default": {"_type": "literalExpression", "text": "pkgs.xonsh"}, "description": {"_type": "mdDoc", "text": "xonsh package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.xonsh.override { configFile = \"/path/to/xonshrc\"; }"}, "loc": ["programs", "xonsh", "package"], "readOnly": false, "type": "package"}, "programs.xss-lock.enable": {"declarations": ["nixos/modules/programs/xss-lock.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable xss-lock."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "xss-lock", "enable"], "readOnly": false, "type": "boolean"}, "programs.xss-lock.extraOptions": {"declarations": ["nixos/modules/programs/xss-lock.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command-line arguments to pass to\n{command}`xss-lock`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--ignore-sleep\"\n]"}, "loc": ["programs", "xss-lock", "extraOptions"], "readOnly": false, "type": "list of string"}, "programs.xss-lock.lockerCommand": {"declarations": ["nixos/modules/programs/xss-lock.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.i3lock}/bin/i3lock\""}, "description": {"_type": "mdDoc", "text": "Locker to be used with xsslock"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.i3lock-fancy}/bin/i3lock-fancy\""}, "loc": ["programs", "xss-lock", "lockerCommand"], "readOnly": false, "type": "strings concatenated with \" \""}, "programs.xwayland.defaultFontPath": {"declarations": ["nixos/modules/programs/xwayland.nix"], "default": {"_type": "literalExpression", "text": "optionalString config.fonts.fontDir.enable \"/run/current-system/sw/share/X11/fonts\"\n"}, "description": {"_type": "mdDoc", "text": "Default font path. Setting this option causes Xwayland to be rebuilt.\n"}, "loc": ["programs", "xwayland", "defaultFontPath"], "readOnly": false, "type": "string"}, "programs.xwayland.enable": {"declarations": ["nixos/modules/programs/xwayland.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Xwayland (an X server for interfacing X11 apps with the Wayland protocol)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "xwayland", "enable"], "readOnly": false, "type": "boolean"}, "programs.xwayland.package": {"declarations": ["nixos/modules/programs/xwayland.nix"], "default": {"_type": "literalExpression", "text": "pkgs.xwayland.override (oldArgs: {\n  inherit (config.programs.xwayland) defaultFontPath;\n})\n"}, "description": {"_type": "mdDoc", "text": "The Xwayland package to use."}, "loc": ["programs", "xwayland", "package"], "readOnly": false, "type": "path"}, "programs.yabar.bars": {"declarations": ["nixos/modules/programs/yabar.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "List of bars that should be rendered by yabar.\n"}, "loc": ["programs", "yabar", "bars"], "readOnly": false, "type": "attribute set of (submodule)"}, "programs.yabar.bars.<name>.extra": {"declarations": ["nixos/modules/programs/yabar.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "An attribute set which contains further attributes of a bar.\n"}, "loc": ["programs", "yabar", "bars", "<name>", "extra"], "readOnly": false, "type": "attribute set of string"}, "programs.yabar.bars.<name>.font": {"declarations": ["nixos/modules/programs/yabar.nix"], "default": {"_type": "literalExpression", "text": "\"sans bold 9\""}, "description": {"_type": "mdDoc", "text": "The font that will be used to draw the status bar.\n"}, "example": {"_type": "literalExpression", "text": "\"Droid Sans, FontAwesome Bold 9\""}, "loc": ["programs", "yabar", "bars", "<name>", "font"], "readOnly": false, "type": "string"}, "programs.yabar.bars.<name>.indicators": {"declarations": ["nixos/modules/programs/yabar.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Indicators that should be rendered by yabar.\n"}, "loc": ["programs", "yabar", "bars", "<name>", "indicators"], "readOnly": false, "type": "attribute set of (submodule)"}, "programs.yabar.bars.<name>.indicators.<name>.align": {"declarations": ["nixos/modules/programs/yabar.nix"], "default": {"_type": "literalExpression", "text": "\"left\""}, "description": {"_type": "mdDoc", "text": "Whether to align the indicator at the left or right of the bar.\n"}, "example": {"_type": "literalExpression", "text": "\"right\""}, "loc": ["programs", "yabar", "bars", "<name>", "indicators", "<name>", "align"], "readOnly": false, "type": "one of \"left\", \"center\", \"right\""}, "programs.yabar.bars.<name>.indicators.<name>.exec": {"declarations": ["nixos/modules/programs/yabar.nix"], "description": {"_type": "mdDoc", "text": "The type of the indicator to be executed.\n"}, "example": {"_type": "literalExpression", "text": "\"YABAR_DATE\""}, "loc": ["programs", "yabar", "bars", "<name>", "indicators", "<name>", "exec"], "readOnly": false, "type": "string"}, "programs.yabar.bars.<name>.indicators.<name>.extra": {"declarations": ["nixos/modules/programs/yabar.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "An attribute set which contains further attributes of a indicator.\n"}, "loc": ["programs", "yabar", "bars", "<name>", "indicators", "<name>", "extra"], "readOnly": false, "type": "attribute set of (string or signed integer)"}, "programs.yabar.bars.<name>.position": {"declarations": ["nixos/modules/programs/yabar.nix"], "default": {"_type": "literalExpression", "text": "\"top\""}, "description": {"_type": "mdDoc", "text": "The position where the bar will be rendered.\n"}, "example": {"_type": "literalExpression", "text": "\"bottom\""}, "loc": ["programs", "yabar", "bars", "<name>", "position"], "readOnly": false, "type": "one of \"top\", \"bottom\""}, "programs.yabar.enable": {"declarations": ["nixos/modules/programs/yabar.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable yabar."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "yabar", "enable"], "readOnly": false, "type": "boolean"}, "programs.yabar.package": {"declarations": ["nixos/modules/programs/yabar.nix"], "default": {"_type": "literalExpression", "text": "pkgs.yabar-unstable"}, "description": {"_type": "mdDoc", "text": "The package which contains the `yabar` binary.\n\nNixpkgs provides the `yabar` and `yabar-unstable`\nderivations since 18.03, so it's possible to choose.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.yabar"}, "loc": ["programs", "yabar", "package"], "readOnly": false, "type": "package"}, "programs.zmap.enable": {"declarations": ["nixos/modules/programs/zmap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ZMap."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "zmap", "enable"], "readOnly": false, "type": "boolean"}, "programs.zsh.autosuggestions.async": {"declarations": ["nixos/modules/programs/zsh/zsh-autosuggestions.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to fetch suggestions asynchronously"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["programs", "zsh", "autosuggestions", "async"], "readOnly": false, "type": "boolean"}, "programs.zsh.autosuggestions.enable": {"declarations": ["nixos/modules/programs/zsh/zsh-autosuggestions.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable zsh-autosuggestions."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "zsh", "autosuggestions", "enable"], "readOnly": false, "type": "boolean"}, "programs.zsh.autosuggestions.extraConfig": {"declarations": ["nixos/modules/programs/zsh/zsh-autosuggestions.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute set with additional configuration values"}, "example": {"_type": "literalExpression", "text": "{\n  \"ZSH_AUTOSUGGEST_BUFFER_MAX_SIZE\" = \"20\";\n}\n"}, "loc": ["programs", "zsh", "autosuggestions", "extraConfig"], "readOnly": false, "type": "attribute set of string"}, "programs.zsh.autosuggestions.highlightStyle": {"declarations": ["nixos/modules/programs/zsh/zsh-autosuggestions.nix"], "default": {"_type": "literalExpression", "text": "\"fg=8\""}, "description": {"_type": "mdDoc", "text": "Highlight style for suggestions ({fore,back}ground color)"}, "example": {"_type": "literalExpression", "text": "\"fg=cyan\""}, "loc": ["programs", "zsh", "autosuggestions", "highlightStyle"], "readOnly": false, "type": "string"}, "programs.zsh.autosuggestions.strategy": {"declarations": ["nixos/modules/programs/zsh/zsh-autosuggestions.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"history\"\n]"}, "description": {"_type": "mdDoc", "text": "`ZSH_AUTOSUGGEST_STRATEGY` is an array that specifies how suggestions should be generated.\nThe strategies in the array are tried successively until a suggestion is found.\nThere are currently three built-in strategies to choose from:\n\n- `history`: Chooses the most recent match from history.\n- `completion`: Chooses a suggestion based on what tab-completion would suggest. (requires `zpty` module)\n- `match_prev_cmd`: Like `history`, but chooses the most recent match whose preceding history item matches\n    the most recently executed command. Note that this strategy won't work as expected with ZSH options that\n    don't preserve the history order such as `HIST_IGNORE_ALL_DUPS` or `HIST_EXPIRE_DUPS_FIRST`.\n"}, "loc": ["programs", "zsh", "autosuggestions", "strategy"], "readOnly": false, "type": "list of (one of \"history\", \"completion\", \"match_prev_cmd\")"}, "programs.zsh.enable": {"declarations": ["nixos/modules/programs/zsh/zsh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to configure zsh as an interactive shell. To enable zsh for\na particular user, use the {option}`users.users.<name?>.shell`\noption for that user. To enable zsh system-wide use the\n{option}`users.defaultUserShell` option.\n"}, "loc": ["programs", "zsh", "enable"], "readOnly": false, "type": "boolean"}, "programs.zsh.enableBashCompletion": {"declarations": ["nixos/modules/programs/zsh/zsh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable compatibility with bash's programmable completion system.\n"}, "loc": ["programs", "zsh", "enableBashCompletion"], "readOnly": false, "type": "boolean"}, "programs.zsh.enableCompletion": {"declarations": ["nixos/modules/programs/zsh/zsh.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable zsh completion for all interactive zsh shells.\n"}, "loc": ["programs", "zsh", "enableCompletion"], "readOnly": false, "type": "boolean"}, "programs.zsh.enableGlobalCompInit": {"declarations": ["nixos/modules/programs/zsh/zsh.nix"], "default": {"_type": "literalExpression", "text": "config.programs.zsh.enableCompletion"}, "description": {"_type": "mdDoc", "text": "Enable execution of compinit call for all interactive zsh shells.\n\nThis option can be disabled if the user wants to extend its\n`fpath` and a custom `compinit`\ncall in the local config is required.\n"}, "loc": ["programs", "zsh", "enableGlobalCompInit"], "readOnly": false, "type": "boolean"}, "programs.zsh.histFile": {"declarations": ["nixos/modules/programs/zsh/zsh.nix"], "default": {"_type": "literalExpression", "text": "\"$HOME/.zsh_history\""}, "description": {"_type": "mdDoc", "text": "Change history file.\n"}, "loc": ["programs", "zsh", "histFile"], "readOnly": false, "type": "string"}, "programs.zsh.histSize": {"declarations": ["nixos/modules/programs/zsh/zsh.nix"], "default": {"_type": "literalExpression", "text": "2000"}, "description": {"_type": "mdDoc", "text": "Change history size.\n"}, "loc": ["programs", "zsh", "histSize"], "readOnly": false, "type": "signed integer"}, "programs.zsh.interactiveShellInit": {"declarations": ["nixos/modules/programs/zsh/zsh.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code called during interactive zsh shell initialisation.\n"}, "loc": ["programs", "zsh", "interactiveShellInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.zsh.loginShellInit": {"declarations": ["nixos/modules/programs/zsh/zsh.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code called during zsh login shell initialisation.\n"}, "loc": ["programs", "zsh", "loginShellInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.zsh.ohMyZsh.cacheDir": {"declarations": ["nixos/modules/programs/zsh/oh-my-zsh.nix"], "default": {"_type": "literalExpression", "text": "\"$HOME/.cache/oh-my-zsh\""}, "description": {"_type": "mdDoc", "text": "Cache directory to be used by `oh-my-zsh`.\nWithout this option it would default to the read-only nix store.\n"}, "loc": ["programs", "zsh", "ohMyZsh", "cacheDir"], "readOnly": false, "type": "string"}, "programs.zsh.ohMyZsh.custom": {"declarations": ["nixos/modules/programs/zsh/oh-my-zsh.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a custom oh-my-zsh package to override config of oh-my-zsh.\n(Can't be used along with `customPkgs`).\n"}, "loc": ["programs", "zsh", "ohMyZsh", "custom"], "readOnly": false, "type": "null or string"}, "programs.zsh.ohMyZsh.customPkgs": {"declarations": ["nixos/modules/programs/zsh/oh-my-zsh.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of custom packages that should be loaded into `oh-my-zsh`.\n"}, "loc": ["programs", "zsh", "ohMyZsh", "customPkgs"], "readOnly": false, "type": "list of package"}, "programs.zsh.ohMyZsh.enable": {"declarations": ["nixos/modules/programs/zsh/oh-my-zsh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable oh-my-zsh.\n"}, "loc": ["programs", "zsh", "ohMyZsh", "enable"], "readOnly": false, "type": "boolean"}, "programs.zsh.ohMyZsh.package": {"declarations": ["nixos/modules/programs/zsh/oh-my-zsh.nix"], "default": {"_type": "literalExpression", "text": "pkgs.oh-my-zsh"}, "description": {"_type": "mdDoc", "text": "Package to install for `oh-my-zsh` usage.\n"}, "loc": ["programs", "zsh", "ohMyZsh", "package"], "readOnly": false, "type": "package"}, "programs.zsh.ohMyZsh.plugins": {"declarations": ["nixos/modules/programs/zsh/oh-my-zsh.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of oh-my-zsh plugins\n"}, "loc": ["programs", "zsh", "ohMyZsh", "plugins"], "readOnly": false, "type": "list of string"}, "programs.zsh.ohMyZsh.theme": {"declarations": ["nixos/modules/programs/zsh/oh-my-zsh.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Name of the theme to be used by oh-my-zsh.\n"}, "loc": ["programs", "zsh", "ohMyZsh", "theme"], "readOnly": false, "type": "string"}, "programs.zsh.promptInit": {"declarations": ["nixos/modules/programs/zsh/zsh.nix"], "default": {"_type": "literalExpression", "text": "''\n  # Note that to manually override this in ~/.zshrc you should run `prompt off`\n  # before setting your PS1 and etc. Otherwise this will likely to interact with\n  # your ~/.zshrc configuration in unexpected ways as the default prompt sets\n  # a lot of different prompt variables.\n  autoload -U promptinit && promptinit && prompt suse && setopt prompt_sp\n''"}, "description": {"_type": "mdDoc", "text": "Shell script code used to initialise the zsh prompt.\n"}, "loc": ["programs", "zsh", "promptInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.zsh.setOptions": {"declarations": ["nixos/modules/programs/zsh/zsh.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"HIST_IGNORE_DUPS\"\n  \"SHARE_HISTORY\"\n  \"HIST_FCNTL_LOCK\"\n]"}, "description": {"_type": "mdDoc", "text": "Configure zsh options. See\n{manpage}`zshoptions(1)`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"EXTENDED_HISTORY\"\n  \"RM_STAR_WAIT\"\n]"}, "loc": ["programs", "zsh", "setOptions"], "readOnly": false, "type": "list of string"}, "programs.zsh.shellAliases": {"declarations": ["nixos/modules/programs/zsh/zsh.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of aliases for zsh shell, which overrides {option}`environment.shellAliases`.\nSee {option}`environment.shellAliases` for an option format description.\n"}, "loc": ["programs", "zsh", "shellAliases"], "readOnly": false, "type": "attribute set of (null or string or path)"}, "programs.zsh.shellInit": {"declarations": ["nixos/modules/programs/zsh/zsh.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell script code called during zsh shell initialisation.\n"}, "loc": ["programs", "zsh", "shellInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "programs.zsh.syntaxHighlighting.enable": {"declarations": ["nixos/modules/programs/zsh/zsh-syntax-highlighting.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable zsh-syntax-highlighting."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "zsh", "syntaxHighlighting", "enable"], "readOnly": false, "type": "boolean"}, "programs.zsh.syntaxHighlighting.highlighters": {"declarations": ["nixos/modules/programs/zsh/zsh-syntax-highlighting.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"main\"\n]"}, "description": {"_type": "mdDoc", "text": "Specifies the highlighters to be used by zsh-syntax-highlighting.\n\nThe following defined options can be found here:\nhttps://github.com/zsh-users/zsh-syntax-highlighting/blob/master/docs/highlighters.md\n"}, "loc": ["programs", "zsh", "syntaxHighlighting", "highlighters"], "readOnly": false, "type": "list of (one of \"main\", \"brackets\", \"pattern\", \"cursor\", \"regexp\", \"root\", \"line\")"}, "programs.zsh.syntaxHighlighting.patterns": {"declarations": ["nixos/modules/programs/zsh/zsh-syntax-highlighting.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specifies custom patterns to be highlighted by zsh-syntax-highlighting.\n\nPlease refer to the docs for more information about the usage:\nhttps://github.com/zsh-users/zsh-syntax-highlighting/blob/master/docs/highlighters/pattern.md\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"rm -rf *\" = \"fg=white,bold,bg=red\";\n}\n"}, "loc": ["programs", "zsh", "syntaxHighlighting", "patterns"], "readOnly": false, "type": "attribute set of string"}, "programs.zsh.syntaxHighlighting.styles": {"declarations": ["nixos/modules/programs/zsh/zsh-syntax-highlighting.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specifies custom styles to be highlighted by zsh-syntax-highlighting.\n\nPlease refer to the docs for more information about the usage:\nhttps://github.com/zsh-users/zsh-syntax-highlighting/blob/master/docs/highlighters/main.md\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"alias\" = \"fg=magenta,bold\";\n}\n"}, "loc": ["programs", "zsh", "syntaxHighlighting", "styles"], "readOnly": false, "type": "attribute set of string"}, "programs.zsh.vteIntegration": {"declarations": ["nixos/modules/config/vte.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Zsh integration for VTE terminals.\nThis allows it to preserve the current directory of the shell\nacross terminals.\n"}, "loc": ["programs", "zsh", "vteIntegration"], "readOnly": false, "type": "boolean"}, "programs.zsh.zsh-autoenv.enable": {"declarations": ["nixos/modules/programs/zsh/zsh-autoenv.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable zsh-autoenv."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["programs", "zsh", "zsh-autoenv", "enable"], "readOnly": false, "type": "boolean"}, "programs.zsh.zsh-autoenv.package": {"declarations": ["nixos/modules/programs/zsh/zsh-autoenv.nix"], "default": {"_type": "literalExpression", "text": "pkgs.zsh-autoenv"}, "description": {"_type": "mdDoc", "text": "Package to install for `zsh-autoenv` usage.\n"}, "loc": ["programs", "zsh", "zsh-autoenv", "package"], "readOnly": false, "type": "package"}, "qt.enable": {"declarations": ["nixos/modules/config/qt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Qt theming configuration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["qt", "enable"], "readOnly": false, "type": "boolean"}, "qt.platformTheme": {"declarations": ["nixos/modules/config/qt.nix"], "description": {"_type": "mdDoc", "text": "Selects the platform theme to use for Qt applications.\n\nThe options are\n- `gtk`: Use GTK theme with [qtstyleplugins](https://github.com/qt/qtstyleplugins)\n- `gnome`: Use GNOME theme with [qgnomeplatform](https://github.com/FedoraQt/QGnomePlatform)\n- `lxqt`: Use LXQt style set using the [lxqt-config-appearance](https://github.com/lxqt/lxqt-config)\n   application.\n- `qt5ct`: Use Qt style set using the [qt5ct](https://sourceforge.net/projects/qt5ct/)\n   application.\n- `kde`: Use Qt settings from Plasma.\n"}, "example": {"_type": "literalExpression", "text": "\"gnome\""}, "loc": ["qt", "platformTheme"], "readOnly": false, "relatedPackages": "- [`pkgs.qgnomeplatform`](\n    https://search.nixos.org/packages?show=qgnomeplatform&sort=relevance&query=qgnomeplatform\n  )\n- [`pkgs.qgnomeplatform-qt6`](\n    https://search.nixos.org/packages?show=qgnomeplatform-qt6&sort=relevance&query=qgnomeplatform-qt6\n  )\n- [`pkgs.libsForQt5.qtstyleplugins`](\n    https://search.nixos.org/packages?show=libsForQt5.qtstyleplugins&sort=relevance&query=libsForQt5.qtstyleplugins\n  )\n- [`pkgs.libsForQt5.qt5ct`](\n    https://search.nixos.org/packages?show=libsForQt5.qt5ct&sort=relevance&query=libsForQt5.qt5ct\n  )\n- [`pkgs.lxqt.lxqt-qtplugin`](\n    https://search.nixos.org/packages?show=lxqt.lxqt-qtplugin&sort=relevance&query=lxqt.lxqt-qtplugin\n  )\n- [`pkgs.libsForQt5.plasma-integration`](\n    https://search.nixos.org/packages?show=libsForQt5.plasma-integration&sort=relevance&query=libsForQt5.plasma-integration\n  )\n", "type": "one of \"gtk2\", \"gnome\", \"lxqt\", \"qt5ct\", \"kde\""}, "qt.style": {"declarations": ["nixos/modules/config/qt.nix"], "description": {"_type": "mdDoc", "text": "Selects the style to use for Qt applications.\n\nThe options are\n- `adwaita`, `adwaita-dark`: Use Adwaita Qt style with\n  [adwaita](https://github.com/FedoraQt/adwaita-qt)\n- `cleanlooks`, `gtk2`, `motif`, `plastique`: Use styles from\n  [qtstyleplugins](https://github.com/qt/qtstyleplugins)\n"}, "example": {"_type": "literalExpression", "text": "\"adwaita\""}, "loc": ["qt", "style"], "readOnly": false, "relatedPackages": "- [`pkgs.adwaita-qt`](\n    https://search.nixos.org/packages?show=adwaita-qt&sort=relevance&query=adwaita-qt\n  )\n- [`pkgs.adwaita-qt6`](\n    https://search.nixos.org/packages?show=adwaita-qt6&sort=relevance&query=adwaita-qt6\n  )\n- [`pkgs.libsForQt5.qtstyleplugins`](\n    https://search.nixos.org/packages?show=libsForQt5.qtstyleplugins&sort=relevance&query=libsForQt5.qtstyleplugins\n  )\n", "type": "one of \"adwaita\", \"adwaita-dark\", \"cleanlooks\", \"gtk2\", \"motif\", \"plastique\""}, "security.acme.acceptTerms": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Accept the CA's terms of service. The default provider is Let's Encrypt,\nyou can find their ToS at <https://letsencrypt.org/repository/>.\n"}, "loc": ["security", "acme", "acceptTerms"], "readOnly": false, "type": "boolean"}, "security.acme.certs": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute set of certificates to get signed and renewed. Creates\n`acme-${cert}.{service,timer}` systemd units for\neach certificate defined here. Other services can add dependencies\nto those units if they rely on the certificates being present,\nor trigger restarts of the service if certificates get renewed.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"example.com\" = {\n    webroot = \"/var/lib/acme/acme-challenge/\";\n    email = \"foo@example.com\";\n    extraDomainNames = [ \"www.example.com\" \"foo.example.com\" ];\n  };\n  \"bar.example.com\" = {\n    webroot = \"/var/lib/acme/acme-challenge/\";\n    email = \"bar@example.com\";\n  };\n}\n"}, "loc": ["security", "acme", "certs"], "readOnly": false, "type": "attribute set of (submodule)"}, "security.acme.certs.<name>.credentialsFile": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.credentialsFile"}, "description": {"_type": "mdDoc", "text": "Path to an EnvironmentFile for the cert's service containing any required and\noptional environment variables for your selected dnsProvider.\nTo find out what values you need to set, consult the documentation at\n<https://go-acme.github.io/lego/dns/> for the corresponding dnsProvider.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/src/secrets/example.org-route53-api-token\""}, "loc": ["security", "acme", "certs", "<name>", "credentialsFile"], "readOnly": false, "type": "null or path"}, "security.acme.certs.<name>.directory": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Directory where certificate and other state is stored."}, "loc": ["security", "acme", "certs", "<name>", "directory"], "readOnly": true, "type": "string"}, "security.acme.certs.<name>.dnsPropagationCheck": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.dnsPropagationCheck"}, "description": {"_type": "mdDoc", "text": "Toggles lego DNS propagation check, which is used alongside DNS-01\nchallenge to ensure the DNS entries required are available.\n"}, "loc": ["security", "acme", "certs", "<name>", "dnsPropagationCheck"], "readOnly": false, "type": "boolean"}, "security.acme.certs.<name>.dnsProvider": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.dnsProvider"}, "description": {"_type": "mdDoc", "text": "DNS Challenge provider. For a list of supported providers, see the \"code\"\nfield of the DNS providers listed at <https://go-acme.github.io/lego/dns/>.\n"}, "example": {"_type": "literalExpression", "text": "\"route53\""}, "loc": ["security", "acme", "certs", "<name>", "dnsProvider"], "readOnly": false, "type": "null or string"}, "security.acme.certs.<name>.dnsResolver": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.dnsResolver"}, "description": {"_type": "mdDoc", "text": "Set the resolver to use for performing recursive DNS queries. Supported:\nhost:port. The default is to use the system resolvers, or Google's DNS\nresolvers if the system's cannot be determined.\n"}, "example": {"_type": "literalExpression", "text": "\"1.1.1.1:53\""}, "loc": ["security", "acme", "certs", "<name>", "dnsResolver"], "readOnly": false, "type": "null or string"}, "security.acme.certs.<name>.domain": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Domain to fetch certificate for (defaults to the entry name)."}, "loc": ["security", "acme", "certs", "<name>", "domain"], "readOnly": false, "type": "string"}, "security.acme.certs.<name>.email": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.email"}, "description": {"_type": "mdDoc", "text": "Email address for account creation and correspondence from the CA.\nIt is recommended to use the same email for all certs to avoid account\ncreation limits.\n"}, "loc": ["security", "acme", "certs", "<name>", "email"], "readOnly": false, "type": "null or string"}, "security.acme.certs.<name>.enableDebugLogs": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.enableDebugLogs"}, "description": {"_type": "mdDoc", "text": "Whether to enable debug logging for this certificate."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "acme", "certs", "<name>", "enableDebugLogs"], "readOnly": false, "type": "boolean"}, "security.acme.certs.<name>.extraDomainNames": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of extra domain names, which are included in the one certificate to be issued.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"example.org\"\n  \"mydomain.org\"\n]\n"}, "loc": ["security", "acme", "certs", "<name>", "extraDomainNames"], "readOnly": false, "type": "list of string"}, "security.acme.certs.<name>.extraLegoFlags": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.extraLegoFlags"}, "description": {"_type": "mdDoc", "text": "Additional global flags to pass to all lego commands.\n"}, "loc": ["security", "acme", "certs", "<name>", "extraLegoFlags"], "readOnly": false, "type": "list of string"}, "security.acme.certs.<name>.extraLegoRenewFlags": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.extraLegoRenewFlags"}, "description": {"_type": "mdDoc", "text": "Additional flags to pass to lego renew.\n"}, "loc": ["security", "acme", "certs", "<name>", "extraLegoRenewFlags"], "readOnly": false, "type": "list of string"}, "security.acme.certs.<name>.extraLegoRunFlags": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.extraLegoRunFlags"}, "description": {"_type": "mdDoc", "text": "Additional flags to pass to lego run.\n"}, "loc": ["security", "acme", "certs", "<name>", "extraLegoRunFlags"], "readOnly": false, "type": "list of string"}, "security.acme.certs.<name>.group": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.group"}, "description": {"_type": "mdDoc", "text": "Group running the ACME client."}, "loc": ["security", "acme", "certs", "<name>", "group"], "readOnly": false, "type": "string"}, "security.acme.certs.<name>.inheritDefaults": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to inherit values set in `security.acme.defaults` or not."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "acme", "certs", "<name>", "inheritDefaults"], "readOnly": false, "type": "boolean"}, "security.acme.certs.<name>.keyType": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.keyType"}, "description": {"_type": "mdDoc", "text": "Key type to use for private keys.\nFor an up to date list of supported values check the --key-type option\nat <https://go-acme.github.io/lego/usage/cli/#usage>.\n"}, "loc": ["security", "acme", "certs", "<name>", "keyType"], "readOnly": false, "type": "string"}, "security.acme.certs.<name>.listenHTTP": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Interface and port to listen on to solve HTTP challenges\nin the form [INTERFACE]:PORT.\nIf you use a port other than 80, you must proxy port 80 to this port.\n"}, "example": {"_type": "literalExpression", "text": "\":1360\""}, "loc": ["security", "acme", "certs", "<name>", "listenHTTP"], "readOnly": false, "type": "null or string"}, "security.acme.certs.<name>.ocspMustStaple": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.ocspMustStaple"}, "description": {"_type": "mdDoc", "text": "Turns on the OCSP Must-Staple TLS extension.\nMake sure you know what you're doing! See:\n\n- <https://blog.apnic.net/2019/01/15/is-the-web-ready-for-ocsp-must-staple/>\n- <https://blog.hboeck.de/archives/886-The-Problem-with-OCSP-Stapling-and-Must-Staple-and-why-Certificate-Revocation-is-still-broken.html>\n"}, "loc": ["security", "acme", "certs", "<name>", "ocspMustStaple"], "readOnly": false, "type": "boolean"}, "security.acme.certs.<name>.postRun": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.postRun"}, "description": {"_type": "mdDoc", "text": "Commands to run after new certificates go live. Note that\nthese commands run as the root user.\n\nExecuted in the same directory with the new certificate.\n"}, "example": {"_type": "literalExpression", "text": "\"cp full.pem backup.pem\""}, "loc": ["security", "acme", "certs", "<name>", "postRun"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "security.acme.certs.<name>.reloadServices": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.reloadServices"}, "description": {"_type": "mdDoc", "text": "The list of systemd services to call `systemctl try-reload-or-restart`\non.\n"}, "loc": ["security", "acme", "certs", "<name>", "reloadServices"], "readOnly": false, "type": "list of string"}, "security.acme.certs.<name>.renewInterval": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.renewInterval"}, "description": {"_type": "mdDoc", "text": "Systemd calendar expression when to check for renewal. See\n{manpage}`systemd.time(7)`.\n"}, "loc": ["security", "acme", "certs", "<name>", "renewInterval"], "readOnly": false, "type": "string"}, "security.acme.certs.<name>.server": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.server"}, "description": {"_type": "mdDoc", "text": "ACME Directory Resource URI. Defaults to Let's Encrypt's\nproduction endpoint,\n<https://acme-v02.api.letsencrypt.org/directory>, if unset.\n"}, "loc": ["security", "acme", "certs", "<name>", "server"], "readOnly": false, "type": "null or string"}, "security.acme.certs.<name>.validMinDays": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.validMinDays"}, "description": {"_type": "mdDoc", "text": "Minimum remaining validity before renewal in days."}, "loc": ["security", "acme", "certs", "<name>", "validMinDays"], "readOnly": false, "type": "signed integer"}, "security.acme.certs.<name>.webroot": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "config.security.acme.defaults.webroot"}, "description": {"_type": "mdDoc", "text": "Where the webroot of the HTTP vhost is located.\n{file}`.well-known/acme-challenge/` directory\nwill be created below the webroot if it doesn't exist.\n`http://example.org/.well-known/acme-challenge/` must also\nbe available (notice unencrypted HTTP).\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "loc": ["security", "acme", "certs", "<name>", "webroot"], "readOnly": false, "type": "null or string"}, "security.acme.defaults": {"declarations": ["nixos/modules/security/acme"], "description": {"_type": "mdDoc", "text": "Default values inheritable by all configured certs. You can\nuse this to define options shared by all your certs. These defaults\ncan also be ignored on a per-cert basis using the\n{option}`security.acme.certs.${cert}.inheritDefaults` option.\n"}, "loc": ["security", "acme", "defaults"], "readOnly": false, "type": "submodule"}, "security.acme.defaults.credentialsFile": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to an EnvironmentFile for the cert's service containing any required and\noptional environment variables for your selected dnsProvider.\nTo find out what values you need to set, consult the documentation at\n<https://go-acme.github.io/lego/dns/> for the corresponding dnsProvider.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/src/secrets/example.org-route53-api-token\""}, "loc": ["security", "acme", "defaults", "credentialsFile"], "readOnly": false, "type": "null or path"}, "security.acme.defaults.dnsPropagationCheck": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Toggles lego DNS propagation check, which is used alongside DNS-01\nchallenge to ensure the DNS entries required are available.\n"}, "loc": ["security", "acme", "defaults", "dnsPropagationCheck"], "readOnly": false, "type": "boolean"}, "security.acme.defaults.dnsProvider": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "DNS Challenge provider. For a list of supported providers, see the \"code\"\nfield of the DNS providers listed at <https://go-acme.github.io/lego/dns/>.\n"}, "example": {"_type": "literalExpression", "text": "\"route53\""}, "loc": ["security", "acme", "defaults", "dnsProvider"], "readOnly": false, "type": "null or string"}, "security.acme.defaults.dnsResolver": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the resolver to use for performing recursive DNS queries. Supported:\nhost:port. The default is to use the system resolvers, or Google's DNS\nresolvers if the system's cannot be determined.\n"}, "example": {"_type": "literalExpression", "text": "\"1.1.1.1:53\""}, "loc": ["security", "acme", "defaults", "dnsResolver"], "readOnly": false, "type": "null or string"}, "security.acme.defaults.email": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Email address for account creation and correspondence from the CA.\nIt is recommended to use the same email for all certs to avoid account\ncreation limits.\n"}, "loc": ["security", "acme", "defaults", "email"], "readOnly": false, "type": "null or string"}, "security.acme.defaults.enableDebugLogs": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable debug logging for this certificate."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "acme", "defaults", "enableDebugLogs"], "readOnly": false, "type": "boolean"}, "security.acme.defaults.extraLegoFlags": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional global flags to pass to all lego commands.\n"}, "loc": ["security", "acme", "defaults", "extraLegoFlags"], "readOnly": false, "type": "list of string"}, "security.acme.defaults.extraLegoRenewFlags": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional flags to pass to lego renew.\n"}, "loc": ["security", "acme", "defaults", "extraLegoRenewFlags"], "readOnly": false, "type": "list of string"}, "security.acme.defaults.extraLegoRunFlags": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional flags to pass to lego run.\n"}, "loc": ["security", "acme", "defaults", "extraLegoRunFlags"], "readOnly": false, "type": "list of string"}, "security.acme.defaults.group": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "\"acme\""}, "description": {"_type": "mdDoc", "text": "Group running the ACME client."}, "loc": ["security", "acme", "defaults", "group"], "readOnly": false, "type": "string"}, "security.acme.defaults.keyType": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "\"ec256\""}, "description": {"_type": "mdDoc", "text": "Key type to use for private keys.\nFor an up to date list of supported values check the --key-type option\nat <https://go-acme.github.io/lego/usage/cli/#usage>.\n"}, "loc": ["security", "acme", "defaults", "keyType"], "readOnly": false, "type": "string"}, "security.acme.defaults.ocspMustStaple": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Turns on the OCSP Must-Staple TLS extension.\nMake sure you know what you're doing! See:\n\n- <https://blog.apnic.net/2019/01/15/is-the-web-ready-for-ocsp-must-staple/>\n- <https://blog.hboeck.de/archives/886-The-Problem-with-OCSP-Stapling-and-Must-Staple-and-why-Certificate-Revocation-is-still-broken.html>\n"}, "loc": ["security", "acme", "defaults", "ocspMustStaple"], "readOnly": false, "type": "boolean"}, "security.acme.defaults.postRun": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Commands to run after new certificates go live. Note that\nthese commands run as the root user.\n\nExecuted in the same directory with the new certificate.\n"}, "example": {"_type": "literalExpression", "text": "\"cp full.pem backup.pem\""}, "loc": ["security", "acme", "defaults", "postRun"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "security.acme.defaults.reloadServices": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The list of systemd services to call `systemctl try-reload-or-restart`\non.\n"}, "loc": ["security", "acme", "defaults", "reloadServices"], "readOnly": false, "type": "list of string"}, "security.acme.defaults.renewInterval": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "\"daily\""}, "description": {"_type": "mdDoc", "text": "Systemd calendar expression when to check for renewal. See\n{manpage}`systemd.time(7)`.\n"}, "loc": ["security", "acme", "defaults", "renewInterval"], "readOnly": false, "type": "string"}, "security.acme.defaults.server": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ACME Directory Resource URI. Defaults to Let's Encrypt's\nproduction endpoint,\n<https://acme-v02.api.letsencrypt.org/directory>, if unset.\n"}, "loc": ["security", "acme", "defaults", "server"], "readOnly": false, "type": "null or string"}, "security.acme.defaults.validMinDays": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "Minimum remaining validity before renewal in days."}, "loc": ["security", "acme", "defaults", "validMinDays"], "readOnly": false, "type": "signed integer"}, "security.acme.defaults.webroot": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Where the webroot of the HTTP vhost is located.\n{file}`.well-known/acme-challenge/` directory\nwill be created below the webroot if it doesn't exist.\n`http://example.org/.well-known/acme-challenge/` must also\nbe available (notice unencrypted HTTP).\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "loc": ["security", "acme", "defaults", "webroot"], "readOnly": false, "type": "null or string"}, "security.acme.preliminarySelfsigned": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether a preliminary self-signed certificate should be generated before\ndoing ACME requests. This can be useful when certificates are required in\na webserver, but ACME needs the webserver to make its requests.\n\nWith preliminary self-signed certificate the webserver can be started and\ncan later reload the correct ACME certificates.\n"}, "loc": ["security", "acme", "preliminarySelfsigned"], "readOnly": false, "type": "boolean"}, "security.acme.useRoot": {"declarations": ["nixos/modules/security/acme"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use the root user when generating certs. This is not recommended\nfor security + compatibility reasons. If a service requires root owned certificates\nconsider following the guide on \"Using ACME with services demanding root\nowned certificates\" in the NixOS manual, and only using this as a fallback\nor for testing.\n"}, "loc": ["security", "acme", "useRoot"], "readOnly": false, "type": "boolean"}, "security.allowSimultaneousMultithreading": {"declarations": ["nixos/modules/security/misc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to allow SMT/hyperthreading.  Disabling SMT means that only\nphysical CPU cores will be usable at runtime, potentially at\nsignificant performance cost.\n\nThe primary motivation for disabling SMT is to mitigate the risk of\nleaking data between threads running on the same CPU core (due to\ne.g., shared caches).  This attack vector is unproven.\n\nDisabling SMT is a supplement to the L1 data cache flushing mitigation\n(see [](#opt-security.virtualisation.flushL1DataCache))\nversus malicious VM guests (SMT could \"bring back\" previously flushed\ndata).\n"}, "loc": ["security", "allowSimultaneousMultithreading"], "readOnly": false, "type": "boolean"}, "security.allowUserNamespaces": {"declarations": ["nixos/modules/security/misc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to allow creation of user namespaces.\n\nThe motivation for disabling user namespaces is the potential\npresence of code paths where the kernel's permission checking\nlogic fails to account for namespacing, instead permitting a\nnamespaced process to act outside the namespace with the same\nprivileges as it would have inside it.  This is particularly\ndamaging in the common case of running as root within the namespace.\n\nWhen user namespace creation is disallowed, attempting to create a\nuser namespace fails with \"no space left on device\" (ENOSPC).\nroot may re-enable user namespace creation at runtime.\n"}, "loc": ["security", "allowUserNamespaces"], "readOnly": false, "type": "boolean"}, "security.apparmor.enable": {"declarations": ["nixos/modules/security/apparmor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the AppArmor Mandatory Access Control system.\n\nIf you're enabling this module on a running system,\nnote that a reboot will be required to activate AppArmor in the kernel.\n\nAlso, beware that enabling this module privileges stability over security\nby not trying to kill unconfined but newly confinable running processes by default,\nthough it would be needed because AppArmor can only confine new\nor already confined processes of an executable.\nThis killing would for instance be necessary when upgrading to a NixOS revision\nintroducing for the first time an AppArmor profile for the executable\nof a running process.\n\nEnable [](#opt-security.apparmor.killUnconfinedConfinables)\nif you want this service to do such killing\nby sending a `SIGTERM` to those running processes."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "apparmor", "enable"], "readOnly": false, "type": "boolean"}, "security.apparmor.enableCache": {"declarations": ["nixos/modules/security/apparmor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable caching of AppArmor policies\nin `/var/cache/apparmor/`.\n\nBeware that AppArmor policies almost always contain Nix store paths,\nand thus produce at each change of these paths\na new cached version accumulating in the cache."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "apparmor", "enableCache"], "readOnly": false, "type": "boolean"}, "security.apparmor.includes": {"declarations": ["nixos/modules/security/apparmor.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "List of paths to be added to AppArmor's searched paths\nwhen resolving `include` directives.\n"}, "loc": ["security", "apparmor", "includes"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "security.apparmor.killUnconfinedConfinables": {"declarations": ["nixos/modules/security/apparmor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable killing of processes which have an AppArmor profile enabled\n(in [](#opt-security.apparmor.policies))\nbut are not confined (because AppArmor can only confine new processes).\n\nThis is only sending a gracious `SIGTERM` signal to the processes,\nnot a `SIGKILL`.\n\nBeware that due to a current limitation of AppArmor,\nonly profiles with exact paths (and no name) can enable such kills."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "apparmor", "killUnconfinedConfinables"], "readOnly": false, "type": "boolean"}, "security.apparmor.packages": {"declarations": ["nixos/modules/security/apparmor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of packages to be added to AppArmor's include path"}, "loc": ["security", "apparmor", "packages"], "readOnly": false, "type": "list of package"}, "security.apparmor.policies": {"declarations": ["nixos/modules/security/apparmor.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "AppArmor policies.\n"}, "loc": ["security", "apparmor", "policies"], "readOnly": false, "type": "attribute set of (submodule)"}, "security.apparmor.policies.<name>.enable": {"declarations": ["nixos/modules/security/apparmor.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable loading of the profile into the kernel."}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["security", "apparmor", "policies", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "security.apparmor.policies.<name>.enforce": {"declarations": ["nixos/modules/security/apparmor.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable enforcing of the policy or only complain in the logs."}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["security", "apparmor", "policies", "<name>", "enforce"], "readOnly": false, "type": "boolean"}, "security.apparmor.policies.<name>.profile": {"declarations": ["nixos/modules/security/apparmor.nix"], "description": {"_type": "mdDoc", "text": "The policy of the profile."}, "loc": ["security", "apparmor", "policies", "<name>", "profile"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "security.audit.backlogLimit": {"declarations": ["nixos/modules/security/audit.nix"], "default": {"_type": "literalExpression", "text": "64"}, "description": {"_type": "mdDoc", "text": "The maximum number of outstanding audit buffers allowed; exceeding this is\nconsidered a failure and handled in a manner specified by failureMode.\n"}, "loc": ["security", "audit", "backlogLimit"], "readOnly": false, "type": "signed integer"}, "security.audit.enable": {"declarations": ["nixos/modules/security/audit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Linux audit system. The special `lock` value can be used to\nenable auditing and prevent disabling it until a restart. Be careful about locking\nthis, as it will prevent you from changing your audit configuration until you\nrestart. If possible, test your configuration using build-vm beforehand.\n"}, "loc": ["security", "audit", "enable"], "readOnly": false, "type": "one of false, true, \"lock\""}, "security.audit.failureMode": {"declarations": ["nixos/modules/security/audit.nix"], "default": {"_type": "literalExpression", "text": "\"printk\""}, "description": {"_type": "mdDoc", "text": "How to handle critical errors in the auditing system"}, "loc": ["security", "audit", "failureMode"], "readOnly": false, "type": "one of \"silent\", \"printk\", \"panic\""}, "security.audit.rateLimit": {"declarations": ["nixos/modules/security/audit.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "The maximum messages per second permitted before triggering a failure as\nspecified by failureMode. Setting it to zero disables the limit.\n"}, "loc": ["security", "audit", "rateLimit"], "readOnly": false, "type": "signed integer"}, "security.audit.rules": {"declarations": ["nixos/modules/security/audit.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The ordered audit rules, with each string appearing as one line of the audit.rules file.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-a exit,always -F arch=b64 -S execve\"\n]"}, "loc": ["security", "audit", "rules"], "readOnly": false, "type": "list of string"}, "security.auditd.enable": {"declarations": ["nixos/modules/security/auditd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Linux Audit daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "auditd", "enable"], "readOnly": false, "type": "boolean"}, "security.chromiumSuidSandbox.enable": {"declarations": ["nixos/modules/security/chromium-suid-sandbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install the Chromium SUID sandbox which is an executable that\nChromium may use in order to achieve sandboxing.\n\nIf you get the error \"The SUID sandbox helper binary was found, but is not\nconfigured correctly.\", turning this on might help.\n\nAlso, if the URL chrome://sandbox tells you that \"You are not adequately\nsandboxed!\", turning this on might resolve the issue.\n"}, "loc": ["security", "chromiumSuidSandbox", "enable"], "readOnly": false, "type": "boolean"}, "security.dhparams.defaultBitSize": {"declarations": ["nixos/modules/security/dhparams.nix"], "default": {"_type": "literalExpression", "text": "2048"}, "description": {"_type": "mdDoc", "text": "This allows to override the default bit size for all of the\nDiffie-Hellman parameters set in\n{option}`security.dhparams.params`.\n"}, "loc": ["security", "dhparams", "defaultBitSize"], "readOnly": false, "type": "integer of at least 16 bits"}, "security.dhparams.enable": {"declarations": ["nixos/modules/security/dhparams.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to generate new DH params and clean up old DH params.\n"}, "loc": ["security", "dhparams", "enable"], "readOnly": false, "type": "boolean"}, "security.dhparams.params": {"declarations": ["nixos/modules/security/dhparams.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Diffie-Hellman parameters to generate.\n\nThe value is the size (in bits) of the DH params to generate. The\ngenerated DH params path can be found in\n`config.security.dhparams.params.\u00abname\u00bb.path`.\n\n::: {.note}\nThe name of the DH params is taken as being the name of\nthe service it serves and the params will be generated before the\nsaid service is started.\n:::\n\n::: {.warning}\nIf you are removing all dhparams from this list, you\nhave to leave {option}`security.dhparams.enable` for at\nleast one activation in order to have them be cleaned up. This also\nmeans if you rollback to a version without any dhparams the\nexisting ones won't be cleaned up. Of course this only applies if\n{option}`security.dhparams.stateful` is\n`true`.\n:::\n\n::: {.note}\n**For module implementers:** It's recommended\nto not set a specific bit size here, so that users can easily\noverride this by setting\n{option}`security.dhparams.defaultBitSize`.\n:::\n"}, "example": {"_type": "literalExpression", "text": "{ nginx.bits = 3072; }"}, "loc": ["security", "dhparams", "params"], "readOnly": false, "type": "attribute set of ((submodule) or signed integer convertible to it)"}, "security.dhparams.params.<name>.bits": {"declarations": ["nixos/modules/security/dhparams.nix"], "default": {"_type": "literalExpression", "text": "config.security.dhparams.defaultBitSize"}, "description": {"_type": "mdDoc", "text": "The bit size for the prime that is used during a Diffie-Hellman\nkey exchange.\n"}, "loc": ["security", "dhparams", "params", "<name>", "bits"], "readOnly": false, "type": "integer of at least 16 bits"}, "security.dhparams.params.<name>.path": {"declarations": ["nixos/modules/security/dhparams.nix"], "description": {"_type": "mdDoc", "text": "The resulting path of the generated Diffie-Hellman parameters\nfile for other services to reference. This could be either a\nstore path or a file inside the directory specified by\n{option}`security.dhparams.path`.\n"}, "loc": ["security", "dhparams", "params", "<name>", "path"], "readOnly": true, "type": "path"}, "security.dhparams.path": {"declarations": ["nixos/modules/security/dhparams.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/dhparams\""}, "description": {"_type": "mdDoc", "text": "Path to the directory in which Diffie-Hellman parameters will be\nstored. This only is relevant if\n{option}`security.dhparams.stateful` is\n`true`.\n"}, "loc": ["security", "dhparams", "path"], "readOnly": false, "type": "string"}, "security.dhparams.stateful": {"declarations": ["nixos/modules/security/dhparams.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether generation of Diffie-Hellman parameters should be stateful or\nnot. If this is enabled, PEM-encoded files for Diffie-Hellman\nparameters are placed in the directory specified by\n{option}`security.dhparams.path`. Otherwise the files are\ncreated within the Nix store.\n\n::: {.note}\nIf this is `false` the resulting store\npath will be non-deterministic and will be rebuilt every time the\n`openssl` package changes.\n:::\n"}, "loc": ["security", "dhparams", "stateful"], "readOnly": false, "type": "boolean"}, "security.doas.enable": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the {command}`doas` command, which allows\nnon-root users to execute commands as root.\n"}, "loc": ["security", "doas", "enable"], "readOnly": false, "type": "boolean"}, "security.doas.extraConfig": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration text appended to {file}`doas.conf`. Be aware that\nthis option cannot be used to override the behaviour allowing\npasswordless operation for root.\n"}, "loc": ["security", "doas", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "security.doas.extraRules": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Define specific rules to be set in the\n{file}`/etc/doas.conf` file. More specific rules should\ncome after more general ones in order to yield the expected behavior.\nYou can use `mkBefore` and/or `mkAfter` to ensure\nthis is the case when configuration options are merged. Be aware that\nthis option cannot be used to override the behaviour allowing\npasswordless operation for root.\n"}, "example": {"_type": "literalExpression", "text": "[\n  # Allow execution of any command by any user in group doas, requiring\n  # a password and keeping any previously-defined environment variables.\n  { groups = [ \"doas\" ]; noPass = false; keepEnv = true; }\n\n  # Allow execution of \"/home/root/secret.sh\" by user `backup` OR user\n  # `database` OR any member of the group with GID `1006`, without a\n  # password.\n  { users = [ \"backup\" \"database\" ]; groups = [ 1006 ];\n    cmd = \"/home/root/secret.sh\"; noPass = true; }\n\n  # Allow any member of group `bar` to run `/home/baz/cmd1.sh` as user\n  # `foo` with argument `hello-doas`.\n  { groups = [ \"bar\" ]; runAs = \"foo\";\n    cmd = \"/home/baz/cmd1.sh\"; args = [ \"hello-doas\" ]; }\n\n  # Allow any member of group `bar` to run `/home/baz/cmd2.sh` as user\n  # `foo` with no arguments.\n  { groups = [ \"bar\" ]; runAs = \"foo\";\n    cmd = \"/home/baz/cmd2.sh\"; args = [ ]; }\n\n  # Allow user `abusers` to execute \"nano\" and unset the value of\n  # SSH_AUTH_SOCK, override the value of ALPHA to 1, and inherit the\n  # value of BETA from the current environment.\n  { users = [ \"abusers\" ]; cmd = \"nano\";\n    setEnv = [ \"-SSH_AUTH_SOCK\" \"ALPHA=1\" \"BETA\" ]; }\n]\n"}, "loc": ["security", "doas", "extraRules"], "readOnly": false, "type": "list of (submodule)"}, "security.doas.extraRules.*.args": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Arguments that must be provided to the command. When set to\n`[]`, the command must be run without any arguments.\n"}, "loc": ["security", "doas", "extraRules", "*", "args"], "readOnly": false, "type": "null or (list of string)"}, "security.doas.extraRules.*.cmd": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The command the user is allowed to run. When set to\n`null` (the default), all commands are allowed.\n\nNOTE: It is best practice to specify absolute paths. If a\nrelative path is specified, only a restricted PATH will be\nsearched.\n"}, "loc": ["security", "doas", "extraRules", "*", "cmd"], "readOnly": false, "type": "null or string"}, "security.doas.extraRules.*.groups": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The groups / GIDs this rule should apply for."}, "loc": ["security", "doas", "extraRules", "*", "groups"], "readOnly": false, "type": "list of (string or signed integer)"}, "security.doas.extraRules.*.keepEnv": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If `true`, environment variables other than those\nlisted in\n{manpage}`doas(1)`\nare kept when creating the environment for the new process.\n"}, "loc": ["security", "doas", "extraRules", "*", "keepEnv"], "readOnly": false, "type": "boolean"}, "security.doas.extraRules.*.noLog": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If `true`, successful executions will not be logged\nto\n{manpage}`syslogd(8)`.\n"}, "loc": ["security", "doas", "extraRules", "*", "noLog"], "readOnly": false, "type": "boolean"}, "security.doas.extraRules.*.noPass": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If `true`, the user is not required to enter a\npassword.\n"}, "loc": ["security", "doas", "extraRules", "*", "noPass"], "readOnly": false, "type": "boolean"}, "security.doas.extraRules.*.persist": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If `true`, do not ask for a password again for some\ntime after the user successfully authenticates.\n"}, "loc": ["security", "doas", "extraRules", "*", "persist"], "readOnly": false, "type": "boolean"}, "security.doas.extraRules.*.runAs": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Which user or group the specified command is allowed to run as.\nWhen set to `null` (the default), all users are\nallowed.\n\nA user can be specified using just the username:\n`\"foo\"`. It is also possible to only allow running as\na specific group with `\":bar\"`.\n"}, "loc": ["security", "doas", "extraRules", "*", "runAs"], "readOnly": false, "type": "null or string"}, "security.doas.extraRules.*.setEnv": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Keep or set the specified variables. Variables may also be\nremoved with a leading '-' or set using\n`variable=value`. If the first character of\n`value` is a '$', the value to be set is taken from\nthe existing environment variable of the indicated name. This\noption is processed after the default environment has been\ncreated.\n\nNOTE: All rules have `setenv { SSH_AUTH_SOCK }` by\ndefault. To prevent `SSH_AUTH_SOCK` from being\ninherited, add `\"-SSH_AUTH_SOCK\"` anywhere in this\nlist.\n"}, "loc": ["security", "doas", "extraRules", "*", "setEnv"], "readOnly": false, "type": "list of string"}, "security.doas.extraRules.*.users": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The usernames / UIDs this rule should apply for."}, "loc": ["security", "doas", "extraRules", "*", "users"], "readOnly": false, "type": "list of (string or signed integer)"}, "security.doas.wheelNeedsPassword": {"declarations": ["nixos/modules/security/doas.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether users of the `wheel` group must provide a password to\nrun commands as super user via {command}`doas`.\n"}, "loc": ["security", "doas", "wheelNeedsPassword"], "readOnly": false, "type": "boolean"}, "security.duosec.acceptEnvFactor": {"declarations": ["nixos/modules/security/duosec.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Look for factor selection or passcode in the\n`$DUO_PASSCODE` environment variable before\nprompting the user for input.\n\nWhen $DUO_PASSCODE is non-empty, it will override\nautopush. The SSH client will need SendEnv DUO_PASSCODE in\nits configuration, and the SSH server will similarly need\nAcceptEnv DUO_PASSCODE.\n"}, "loc": ["security", "duosec", "acceptEnvFactor"], "readOnly": false, "type": "boolean"}, "security.duosec.allowTcpForwarding": {"declarations": ["nixos/modules/security/duosec.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "By default, when SSH forwarding, enabling Duo Security will\ndisable TCP forwarding. By enabling this, you potentially\nundermine some of the SSH based login security. Note this is\nnot needed if you use PAM.\n"}, "loc": ["security", "duosec", "allowTcpForwarding"], "readOnly": false, "type": "boolean"}, "security.duosec.autopush": {"declarations": ["nixos/modules/security/duosec.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If `true`, Duo Unix will automatically send\na push login request to the user\u2019s phone, falling back on a\nphone call if push is unavailable. If\n`false`, the user will be prompted to\nchoose an authentication method. When configured with\n`autopush = yes`, we recommend setting\n`prompts = 1`.\n"}, "loc": ["security", "duosec", "autopush"], "readOnly": false, "type": "boolean"}, "security.duosec.failmode": {"declarations": ["nixos/modules/security/duosec.nix"], "default": {"_type": "literalExpression", "text": "\"safe\""}, "description": {"_type": "mdDoc", "text": "On service or configuration errors that prevent Duo\nauthentication, fail \"safe\" (allow access) or \"secure\" (deny\naccess). The default is \"safe\".\n"}, "loc": ["security", "duosec", "failmode"], "readOnly": false, "type": "one of \"safe\", \"secure\""}, "security.duosec.fallbackLocalIP": {"declarations": ["nixos/modules/security/duosec.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Duo Unix reports the IP address of the authorizing user, for\nthe purposes of authorization and whitelisting. If Duo Unix\ncannot detect the IP address of the client, setting\n`fallbackLocalIP = yes` will cause Duo Unix\nto send the IP address of the server it is running on.\n\nIf you are using IP whitelisting, enabling this option could\ncause unauthorized logins if the local IP is listed in the\nwhitelist.\n"}, "loc": ["security", "duosec", "fallbackLocalIP"], "readOnly": false, "type": "boolean"}, "security.duosec.groups": {"declarations": ["nixos/modules/security/duosec.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "If specified, Duo authentication is required only for users\nwhose primary group or supplementary group list matches one\nof the space-separated pattern lists. Refer to\n<https://duo.com/docs/duounix> for details.\n"}, "example": {"_type": "literalExpression", "text": "\"users,!wheel,!*admin guests\""}, "loc": ["security", "duosec", "groups"], "readOnly": false, "type": "string"}, "security.duosec.host": {"declarations": ["nixos/modules/security/duosec.nix"], "description": {"_type": "mdDoc", "text": "Duo API hostname."}, "loc": ["security", "duosec", "host"], "readOnly": false, "type": "string"}, "security.duosec.integrationKey": {"declarations": ["nixos/modules/security/duosec.nix"], "description": {"_type": "mdDoc", "text": "Integration key."}, "loc": ["security", "duosec", "integrationKey"], "readOnly": false, "type": "string"}, "security.duosec.motd": {"declarations": ["nixos/modules/security/duosec.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Print the contents of `/etc/motd` to screen\nafter a successful login.\n"}, "loc": ["security", "duosec", "motd"], "readOnly": false, "type": "boolean"}, "security.duosec.pam.enable": {"declarations": ["nixos/modules/security/duosec.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, protect logins with Duo Security using PAM support."}, "loc": ["security", "duosec", "pam", "enable"], "readOnly": false, "type": "boolean"}, "security.duosec.prompts": {"declarations": ["nixos/modules/security/duosec.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "If a user fails to authenticate with a second factor, Duo\nUnix will prompt the user to authenticate again. This option\nsets the maximum number of prompts that Duo Unix will\ndisplay before denying access. Must be 1, 2, or 3. Default\nis 3.\n\nFor example, when `prompts = 1`, the user\nwill have to successfully authenticate on the first prompt,\nwhereas if `prompts = 2`, if the user\nenters incorrect information at the initial prompt, he/she\nwill be prompted to authenticate again.\n\nWhen configured with `autopush = true`, we\nrecommend setting `prompts = 1`.\n"}, "loc": ["security", "duosec", "prompts"], "readOnly": false, "type": "one of 1, 2, 3"}, "security.duosec.pushinfo": {"declarations": ["nixos/modules/security/duosec.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Include information such as the command to be executed in\nthe Duo Push message.\n"}, "loc": ["security", "duosec", "pushinfo"], "readOnly": false, "type": "boolean"}, "security.duosec.secretKeyFile": {"declarations": ["nixos/modules/security/duosec.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing your secret key. The security of your Duo application is tied to the security of your secret key.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/duo-skey\""}, "loc": ["security", "duosec", "secretKeyFile"], "readOnly": false, "type": "null or path"}, "security.duosec.ssh.enable": {"declarations": ["nixos/modules/security/duosec.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, protect SSH logins with Duo Security."}, "loc": ["security", "duosec", "ssh", "enable"], "readOnly": false, "type": "boolean"}, "security.forcePageTableIsolation": {"declarations": ["nixos/modules/security/misc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to force-enable the Page Table Isolation (PTI) Linux kernel\nfeature even on CPU models that claim to be safe from Meltdown.\n\nThis hardening feature is most beneficial to systems that run untrusted\nworkloads that rely on address space isolation for security.\n"}, "loc": ["security", "forcePageTableIsolation"], "readOnly": false, "type": "boolean"}, "security.googleOsLogin.enable": {"declarations": ["nixos/modules/security/google_oslogin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Google OS Login.\n\nThe OS Login package enables the following components:\nAuthorizedKeysCommand to query valid SSH keys from the user's OS Login\nprofile during ssh authentication phase.\nNSS Module to provide user and group information\nPAM Module for the sshd service, providing authorization and\nauthentication support, allowing the system to use data stored in\nGoogle Cloud IAM permissions to control both, the ability to log into\nan instance, and to perform operations as root (sudo).\n"}, "loc": ["security", "googleOsLogin", "enable"], "readOnly": false, "type": "boolean"}, "security.ipa.basedn": {"declarations": ["nixos/modules/security/ipa.nix"], "description": {"_type": "mdDoc", "text": "Base DN to use when performing LDAP operations."}, "example": {"_type": "literalExpression", "text": "\"dc=example,dc=com\""}, "loc": ["security", "ipa", "basedn"], "readOnly": false, "type": "string"}, "security.ipa.cacheCredentials": {"declarations": ["nixos/modules/security/ipa.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to cache credentials."}, "loc": ["security", "ipa", "cacheCredentials"], "readOnly": false, "type": "boolean"}, "security.ipa.certificate": {"declarations": ["nixos/modules/security/ipa.nix"], "description": {"_type": "mdDoc", "text": "IPA server CA certificate.\n\nUse `nix-prefetch-url http://$server/ipa/config/ca.crt` to\nobtain the file and the hash.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.fetchurl {\n  url = http://ipa.example.com/ipa/config/ca.crt;\n  sha256 = \"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\";\n};\n"}, "loc": ["security", "ipa", "certificate"], "readOnly": false, "type": "package"}, "security.ipa.chromiumSupport": {"declarations": ["nixos/modules/security/ipa.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to whitelist the FreeIPA domain in Chromium."}, "loc": ["security", "ipa", "chromiumSupport"], "readOnly": false, "type": "boolean"}, "security.ipa.domain": {"declarations": ["nixos/modules/security/ipa.nix"], "description": {"_type": "mdDoc", "text": "Domain of the IPA server."}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["security", "ipa", "domain"], "readOnly": false, "type": "string"}, "security.ipa.dyndns.enable": {"declarations": ["nixos/modules/security/ipa.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable FreeIPA automatic hostname updates."}, "loc": ["security", "ipa", "dyndns", "enable"], "readOnly": false, "type": "boolean"}, "security.ipa.dyndns.interface": {"declarations": ["nixos/modules/security/ipa.nix"], "default": {"_type": "literalExpression", "text": "\"*\""}, "description": {"_type": "mdDoc", "text": "Network interface to perform hostname updates through."}, "example": {"_type": "literalExpression", "text": "\"eth0\""}, "loc": ["security", "ipa", "dyndns", "interface"], "readOnly": false, "type": "string"}, "security.ipa.enable": {"declarations": ["nixos/modules/security/ipa.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable FreeIPA domain integration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "ipa", "enable"], "readOnly": false, "type": "boolean"}, "security.ipa.ifpAllowedUids": {"declarations": ["nixos/modules/security/ipa.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"root\"\n]"}, "description": {"_type": "mdDoc", "text": "A list of users allowed to access the ifp dbus interface."}, "loc": ["security", "ipa", "ifpAllowedUids"], "readOnly": false, "type": "list of Concatenated string"}, "security.ipa.offlinePasswords": {"declarations": ["nixos/modules/security/ipa.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to store offline passwords when the server is down."}, "loc": ["security", "ipa", "offlinePasswords"], "readOnly": false, "type": "boolean"}, "security.ipa.realm": {"declarations": ["nixos/modules/security/ipa.nix"], "description": {"_type": "mdDoc", "text": "Kerberos realm."}, "example": {"_type": "literalExpression", "text": "\"EXAMPLE.COM\""}, "loc": ["security", "ipa", "realm"], "readOnly": false, "type": "string"}, "security.ipa.server": {"declarations": ["nixos/modules/security/ipa.nix"], "description": {"_type": "mdDoc", "text": "IPA Server hostname."}, "example": {"_type": "literalExpression", "text": "\"ipa.example.com\""}, "loc": ["security", "ipa", "server"], "readOnly": false, "type": "string"}, "security.lockKernelModules": {"declarations": ["nixos/modules/security/lock-kernel-modules.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable kernel module loading once the system is fully initialised.\nModule loading is disabled until the next reboot. Problems caused\nby delayed module loading can be fixed by adding the module(s) in\nquestion to {option}`boot.kernelModules`.\n"}, "loc": ["security", "lockKernelModules"], "readOnly": false, "type": "boolean"}, "security.pam.enableEcryptfs": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable eCryptfs PAM module (mounting ecryptfs home directory on login)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "pam", "enableEcryptfs"], "readOnly": false, "type": "boolean"}, "security.pam.enableFscrypt": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Enables fscrypt to automatically unlock directories with the user's login password.\n\nThis also enables a service at security.pam.services.fscrypt which is used by\nfscrypt to verify the user's password when setting up a new protector. If you\nuse something other than pam_unix to verify user passwords, please remember to\nadjust this PAM service.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "pam", "enableFscrypt"], "readOnly": false, "type": "boolean"}, "security.pam.enableOTPW": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the OTPW (one-time password) PAM module."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "pam", "enableOTPW"], "readOnly": false, "type": "boolean"}, "security.pam.enableSSHAgentAuth": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable sudo logins if the user's SSH agent provides a key\npresent in {file}`~/.ssh/authorized_keys`.\nThis allows machines to exclusively use SSH keys instead of\npasswords.\n"}, "loc": ["security", "pam", "enableSSHAgentAuth"], "readOnly": false, "type": "boolean"}, "security.pam.krb5.enable": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "config.krb5.enable"}, "description": {"_type": "mdDoc", "text": "Enables Kerberos PAM modules (`pam-krb5`,\n`pam-ccreds`).\n\nIf set, users can authenticate with their Kerberos password.\nThis requires a valid Kerberos configuration\n(`config.krb5.enable` should be set to\n`true`).\n\nNote that the Kerberos PAM modules are not necessary when using SSS\nto handle Kerberos authentication.\n"}, "loc": ["security", "pam", "krb5", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.loginLimits": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Define resource limits that should apply to users or groups.\nEach item in the list should be an attribute set with a\n{var}`domain`, {var}`type`,\n{var}`item`, and {var}`value`\nattribute.  The syntax and semantics of these attributes\nmust be that described in {manpage}`limits.conf(5)`.\n\nNote that these limits do not apply to systemd services,\nwhose limits can be changed via {option}`systemd.extraConfig`\ninstead.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    domain = \"ftp\";\n    item = \"nproc\";\n    type = \"hard\";\n    value = \"0\";\n  }\n  {\n    domain = \"@student\";\n    item = \"maxlogins\";\n    type = \"-\";\n    value = \"4\";\n  }\n]"}, "loc": ["security", "pam", "loginLimits"], "readOnly": false, "type": "list of (submodule)"}, "security.pam.loginLimits.*.domain": {"declarations": ["nixos/modules/security/pam.nix"], "description": {"_type": "mdDoc", "text": "Username, groupname, or wildcard this limit applies to"}, "example": {"_type": "literalExpression", "text": "\"@wheel\""}, "loc": ["security", "pam", "loginLimits", "*", "domain"], "readOnly": false, "type": "string"}, "security.pam.loginLimits.*.item": {"declarations": ["nixos/modules/security/pam.nix"], "description": {"_type": "mdDoc", "text": "Item this limit applies to"}, "loc": ["security", "pam", "loginLimits", "*", "item"], "readOnly": false, "type": "one of \"core\", \"data\", \"fsize\", \"memlock\", \"nofile\", \"rss\", \"stack\", \"cpu\", \"nproc\", \"as\", \"maxlogins\", \"maxsyslogins\", \"priority\", \"locks\", \"sigpending\", \"msgqueue\", \"nice\", \"rtprio\""}, "security.pam.loginLimits.*.type": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "\"-\""}, "description": {"_type": "mdDoc", "text": "Type of this limit"}, "loc": ["security", "pam", "loginLimits", "*", "type"], "readOnly": false, "type": "one of \"-\", \"hard\", \"soft\""}, "security.pam.loginLimits.*.value": {"declarations": ["nixos/modules/security/pam.nix"], "description": {"_type": "mdDoc", "text": "Value of this limit"}, "loc": ["security", "pam", "loginLimits", "*", "value"], "readOnly": false, "type": "string or signed integer"}, "security.pam.makeHomeDir.skelDirectory": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "\"/var/empty\""}, "description": {"_type": "mdDoc", "text": "Path to skeleton directory whose contents are copied to home\ndirectories newly created by `pam_mkhomedir`.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/skel\""}, "loc": ["security", "pam", "makeHomeDir", "skelDirectory"], "readOnly": false, "type": "string"}, "security.pam.mount.additionalSearchPaths": {"declarations": ["nixos/modules/security/pam_mount.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional programs to include in the search path of pam_mount.\nUseful for example if you want to use some FUSE filesystems like bindfs.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.bindfs ]"}, "loc": ["security", "pam", "mount", "additionalSearchPaths"], "readOnly": false, "type": "list of package"}, "security.pam.mount.createMountPoints": {"declarations": ["nixos/modules/security/pam_mount.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Create mountpoints for volumes if they do not exist.\n"}, "loc": ["security", "pam", "mount", "createMountPoints"], "readOnly": false, "type": "boolean"}, "security.pam.mount.cryptMountOptions": {"declarations": ["nixos/modules/security/pam_mount.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Global mount options that apply to every crypt volume.\nYou can define volume-specific options in the volume definitions.\n"}, "example": {"_type": "literalExpression", "text": "[ \"allow_discard\" ]\n"}, "loc": ["security", "pam", "mount", "cryptMountOptions"], "readOnly": false, "type": "list of string"}, "security.pam.mount.debugLevel": {"declarations": ["nixos/modules/security/pam_mount.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Sets the Debug-Level. 0 disables debugging, 1 enables pam_mount tracing,\nand 2 additionally enables tracing in mount.crypt. The default is 0.\nFor more information, visit <http://pam-mount.sourceforge.net/pam_mount.conf.5.html>.\n"}, "example": {"_type": "literalExpression", "text": "1"}, "loc": ["security", "pam", "mount", "debugLevel"], "readOnly": false, "type": "signed integer"}, "security.pam.mount.enable": {"declarations": ["nixos/modules/security/pam_mount.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable PAM mount system to mount filesystems on user login.\n"}, "loc": ["security", "pam", "mount", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.mount.extraVolumes": {"declarations": ["nixos/modules/security/pam_mount.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of volume definitions for pam_mount.\nFor more information, visit <http://pam-mount.sourceforge.net/pam_mount.conf.5.html>.\n"}, "loc": ["security", "pam", "mount", "extraVolumes"], "readOnly": false, "type": "list of string"}, "security.pam.mount.fuseMountOptions": {"declarations": ["nixos/modules/security/pam_mount.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Global mount options that apply to every FUSE volume.\nYou can define volume-specific options in the volume definitions.\n"}, "example": {"_type": "literalExpression", "text": "[ \"nodev\" \"nosuid\" \"force-user=%(USER)\" \"gid=%(USERGID)\" \"perms=0700\" \"chmod-deny\" \"chown-deny\" \"chgrp-deny\" ]\n"}, "loc": ["security", "pam", "mount", "fuseMountOptions"], "readOnly": false, "type": "list of string"}, "security.pam.mount.logoutHup": {"declarations": ["nixos/modules/security/pam_mount.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Kill remaining processes after logout by sending a SIGHUP.\n"}, "loc": ["security", "pam", "mount", "logoutHup"], "readOnly": false, "type": "boolean"}, "security.pam.mount.logoutKill": {"declarations": ["nixos/modules/security/pam_mount.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Kill remaining processes after logout by sending a SIGKILL.\n"}, "loc": ["security", "pam", "mount", "logoutKill"], "readOnly": false, "type": "boolean"}, "security.pam.mount.logoutTerm": {"declarations": ["nixos/modules/security/pam_mount.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Kill remaining processes after logout by sending a SIGTERM.\n"}, "loc": ["security", "pam", "mount", "logoutTerm"], "readOnly": false, "type": "boolean"}, "security.pam.mount.logoutWait": {"declarations": ["nixos/modules/security/pam_mount.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Amount of microseconds to wait until killing remaining processes after\nfinal logout.\nFor more information, visit <http://pam-mount.sourceforge.net/pam_mount.conf.5.html>.\n"}, "loc": ["security", "pam", "mount", "logoutWait"], "readOnly": false, "type": "signed integer"}, "security.pam.mount.removeCreatedMountPoints": {"declarations": ["nixos/modules/security/pam_mount.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Remove mountpoints created by pam_mount after logout. This\nonly affects mountpoints that have been created by pam_mount\nin the same session.\n"}, "loc": ["security", "pam", "mount", "removeCreatedMountPoints"], "readOnly": false, "type": "boolean"}, "security.pam.oath.digits": {"declarations": ["nixos/modules/security/oath.nix"], "default": {"_type": "literalExpression", "text": "6"}, "description": {"_type": "mdDoc", "text": "Specify the length of the one-time password in number of\ndigits.\n"}, "loc": ["security", "pam", "oath", "digits"], "readOnly": false, "type": "one of 6, 7, 8"}, "security.pam.oath.enable": {"declarations": ["nixos/modules/security/oath.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the OATH (one-time password) PAM module.\n"}, "loc": ["security", "pam", "oath", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.oath.usersFile": {"declarations": ["nixos/modules/security/oath.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/users.oath\""}, "description": {"_type": "mdDoc", "text": "Set the path to file where the user's credentials are\nstored. This file must not be world readable!\n"}, "loc": ["security", "pam", "oath", "usersFile"], "readOnly": false, "type": "path"}, "security.pam.oath.window": {"declarations": ["nixos/modules/security/oath.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Specify the number of one-time passwords to check in order\nto accommodate for situations where the system and the\nclient are slightly out of sync (iteration for HOTP or time\nsteps for TOTP).\n"}, "loc": ["security", "pam", "oath", "window"], "readOnly": false, "type": "signed integer"}, "security.pam.p11.control": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "\"sufficient\""}, "description": {"_type": "mdDoc", "text": "This option sets pam \"control\".\nIf you want to have multi factor authentication, use \"required\".\nIf you want to use the PKCS#11 device instead of the regular password,\nuse \"sufficient\".\n\nRead\n{manpage}`pam.conf(5)`\nfor better understanding of this option.\n"}, "loc": ["security", "pam", "p11", "control"], "readOnly": false, "type": "one of \"required\", \"requisite\", \"sufficient\", \"optional\""}, "security.pam.p11.enable": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables P11 PAM (`pam_p11`) module.\n\nIf set, users can log in with SSH keys and PKCS#11 tokens.\n\nMore information can be found [here](https://github.com/OpenSC/pam_p11).\n"}, "loc": ["security", "pam", "p11", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.services": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option defines the PAM services.  A service typically\ncorresponds to a program that uses PAM,\ne.g. {command}`login` or {command}`passwd`.\nEach attribute of this set defines a PAM service, with the attribute name\ndefining the name of the service.\n"}, "loc": ["security", "pam", "services"], "readOnly": false, "type": "attribute set of (submodule)"}, "security.pam.services.<name>.allowNullPassword": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow logging into accounts that have no password\nset (i.e., have an empty password field in\n{file}`/etc/passwd` or\n{file}`/etc/group`).  This does not enable\nlogging into disabled accounts (i.e., that have the password\nfield set to `!`).  Note that regardless of\nwhat the pam_unix documentation says, accounts with hashed\nempty passwords are always allowed to log in.\n"}, "loc": ["security", "pam", "services", "<name>", "allowNullPassword"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.duoSecurity.enable": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, use the Duo Security pam module\n`pam_duo` for authentication.  Requires\nconfiguration of {option}`security.duosec` options.\n"}, "loc": ["security", "pam", "services", "<name>", "duoSecurity", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.enableAppArmor": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable support for attaching AppArmor profiles at the\nuser/group level, e.g., as part of a role based access\ncontrol scheme.\n"}, "loc": ["security", "pam", "services", "<name>", "enableAppArmor"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.enableGnomeKeyring": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, pam_gnome_keyring will attempt to automatically unlock the\nuser's default Gnome keyring upon login. If the user login password does\nnot match their keyring password, Gnome Keyring will prompt separately\nafter login.\n"}, "loc": ["security", "pam", "services", "<name>", "enableGnomeKeyring"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.enableKwallet": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, pam_wallet will attempt to automatically unlock the\nuser's default KDE wallet upon login. If the user has no wallet named\n\"kdewallet\", or the login password does not match their wallet\npassword, KDE will prompt separately after login.\n"}, "loc": ["security", "pam", "services", "<name>", "enableKwallet"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.failDelay.delay": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "3000000"}, "description": {"_type": "mdDoc", "text": "The delay time (in microseconds) on failure."}, "example": {"_type": "literalExpression", "text": "1000000"}, "loc": ["security", "pam", "services", "<name>", "failDelay", "delay"], "readOnly": false, "type": "signed integer"}, "security.pam.services.<name>.failDelay.enable": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, this will replace the `FAIL_DELAY` setting from `login.defs`.\nChange the delay on failure per-application.\n"}, "loc": ["security", "pam", "services", "<name>", "failDelay", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.forwardXAuth": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether X authentication keys should be passed from the\ncalling user to the target user (e.g. for\n{command}`su`)\n"}, "loc": ["security", "pam", "services", "<name>", "forwardXAuth"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.fprintAuth": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "config.services.fprintd.enable"}, "description": {"_type": "mdDoc", "text": "If set, fingerprint reader will be used (if exists and\nyour fingerprints are enrolled).\n"}, "loc": ["security", "pam", "services", "<name>", "fprintAuth"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.gnupg.enable": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, pam_gnupg will attempt to automatically unlock the\nuser's GPG keys with the login password via\n{command}`gpg-agent`. The keygrips of all keys to be\nunlocked should be written to {file}`~/.pam-gnupg`,\nand can be queried with {command}`gpg -K --with-keygrip`.\nPresetting passphrases must be enabled by adding\n`allow-preset-passphrase` in\n{file}`~/.gnupg/gpg-agent.conf`.\n"}, "loc": ["security", "pam", "services", "<name>", "gnupg", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.gnupg.noAutostart": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Don't start {command}`gpg-agent` if it is not running.\nUseful in conjunction with starting {command}`gpg-agent` as\na systemd user service.\n"}, "loc": ["security", "pam", "services", "<name>", "gnupg", "noAutostart"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.gnupg.storeOnly": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Don't send the password immediately after login, but store for PAM\n`session`.\n"}, "loc": ["security", "pam", "services", "<name>", "gnupg", "storeOnly"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.googleAuthenticator.enable": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, users with enabled Google Authenticator (created\n{file}`~/.google_authenticator`) will be required\nto provide Google Authenticator token to log in.\n"}, "loc": ["security", "pam", "services", "<name>", "googleAuthenticator", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.googleOsLoginAccountVerification": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, will use the Google OS Login PAM modules\n(`pam_oslogin_login`,\n`pam_oslogin_admin`) to verify possible OS Login\nusers and set sudoers configuration accordingly.\nThis only makes sense to enable for the `sshd` PAM\nservice.\n"}, "loc": ["security", "pam", "services", "<name>", "googleOsLoginAccountVerification"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.googleOsLoginAuthentication": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, will use the `pam_oslogin_login`'s user\nauthentication methods to authenticate users using 2FA.\nThis only makes sense to enable for the `sshd` PAM\nservice.\n"}, "loc": ["security", "pam", "services", "<name>", "googleOsLoginAuthentication"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.limits": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Attribute set describing resource limits.  Defaults to the\nvalue of {option}`security.pam.loginLimits`.\nThe meaning of the values is explained in {manpage}`limits.conf(5)`.\n"}, "loc": ["security", "pam", "services", "<name>", "limits"], "readOnly": false, "type": "list of (submodule)"}, "security.pam.services.<name>.limits.*.domain": {"declarations": ["nixos/modules/security/pam.nix"], "description": {"_type": "mdDoc", "text": "Username, groupname, or wildcard this limit applies to"}, "example": {"_type": "literalExpression", "text": "\"@wheel\""}, "loc": ["security", "pam", "services", "<name>", "limits", "*", "domain"], "readOnly": false, "type": "string"}, "security.pam.services.<name>.limits.*.item": {"declarations": ["nixos/modules/security/pam.nix"], "description": {"_type": "mdDoc", "text": "Item this limit applies to"}, "loc": ["security", "pam", "services", "<name>", "limits", "*", "item"], "readOnly": false, "type": "one of \"core\", \"data\", \"fsize\", \"memlock\", \"nofile\", \"rss\", \"stack\", \"cpu\", \"nproc\", \"as\", \"maxlogins\", \"maxsyslogins\", \"priority\", \"locks\", \"sigpending\", \"msgqueue\", \"nice\", \"rtprio\""}, "security.pam.services.<name>.limits.*.type": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "\"-\""}, "description": {"_type": "mdDoc", "text": "Type of this limit"}, "loc": ["security", "pam", "services", "<name>", "limits", "*", "type"], "readOnly": false, "type": "one of \"-\", \"hard\", \"soft\""}, "security.pam.services.<name>.limits.*.value": {"declarations": ["nixos/modules/security/pam.nix"], "description": {"_type": "mdDoc", "text": "Value of this limit"}, "loc": ["security", "pam", "services", "<name>", "limits", "*", "value"], "readOnly": false, "type": "string or signed integer"}, "security.pam.services.<name>.logFailures": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to log authentication failures in {file}`/var/log/faillog`."}, "loc": ["security", "pam", "services", "<name>", "logFailures"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.makeHomeDir": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to try to create home directories for users\nwith `$HOME`s pointing to nonexistent\nlocations on session login.\n"}, "loc": ["security", "pam", "services", "<name>", "makeHomeDir"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.mysqlAuth": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "config.users.mysql.enable"}, "description": {"_type": "mdDoc", "text": "If set, the `pam_mysql` module will be used to\nauthenticate users against a MySQL/MariaDB database.\n"}, "loc": ["security", "pam", "services", "<name>", "mysqlAuth"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.name": {"declarations": ["nixos/modules/security/pam.nix"], "description": {"_type": "mdDoc", "text": "Name of the PAM service."}, "example": {"_type": "literalExpression", "text": "\"sshd\""}, "loc": ["security", "pam", "services", "<name>", "name"], "readOnly": false, "type": "string"}, "security.pam.services.<name>.nodelay": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the delay after typing a wrong password should be disabled.\n"}, "loc": ["security", "pam", "services", "<name>", "nodelay"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.oathAuth": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "config.security.pam.oath.enable"}, "description": {"_type": "mdDoc", "text": "If set, the OATH Toolkit will be used.\n"}, "loc": ["security", "pam", "services", "<name>", "oathAuth"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.otpwAuth": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "config.security.pam.enableOTPW"}, "description": {"_type": "mdDoc", "text": "If set, the OTPW system will be used (if\n{file}`~/.otpw` exists).\n"}, "loc": ["security", "pam", "services", "<name>", "otpwAuth"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.p11Auth": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "config.security.pam.p11.enable"}, "description": {"_type": "mdDoc", "text": "If set, keys listed in\n{file}`~/.ssh/authorized_keys` and\n{file}`~/.eid/authorized_certificates`\ncan be used to log in with the associated PKCS#11 tokens.\n"}, "loc": ["security", "pam", "services", "<name>", "p11Auth"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.pamMount": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "config.security.pam.mount.enable"}, "description": {"_type": "mdDoc", "text": "Enable PAM mount (pam_mount) system to mount filesystems on user login.\n"}, "loc": ["security", "pam", "services", "<name>", "pamMount"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.requireWheel": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to permit root access only to members of group wheel.\n"}, "loc": ["security", "pam", "services", "<name>", "requireWheel"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.rootOK": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, root doesn't need to authenticate (e.g. for the\n{command}`useradd` service).\n"}, "loc": ["security", "pam", "services", "<name>", "rootOK"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.setEnvironment": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the service should set the environment variables\nlisted in {option}`environment.sessionVariables`\nusing `pam_env.so`.\n"}, "loc": ["security", "pam", "services", "<name>", "setEnvironment"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.setLoginUid": {"declarations": ["nixos/modules/security/pam.nix"], "description": {"_type": "mdDoc", "text": "Set the login uid of the process\n({file}`/proc/self/loginuid`) for auditing\npurposes.  The login uid is only set by \u2018entry points\u2019 like\n{command}`login` and {command}`sshd`, not by\ncommands like {command}`sudo`.\n"}, "loc": ["security", "pam", "services", "<name>", "setLoginUid"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.showMotd": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to show the message of the day."}, "loc": ["security", "pam", "services", "<name>", "showMotd"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.sshAgentAuth": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, the calling user's SSH agent is used to authenticate\nagainst the keys in the calling user's\n{file}`~/.ssh/authorized_keys`.  This is useful\nfor {command}`sudo` on password-less remote systems.\n"}, "loc": ["security", "pam", "services", "<name>", "sshAgentAuth"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.sssdStrictAccess": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "enforce sssd access control"}, "loc": ["security", "pam", "services", "<name>", "sssdStrictAccess"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.startSession": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, the service will register a new session with\nsystemd's login manager.  For local sessions, this will give\nthe user access to audio devices, CD-ROM drives.  In the\ndefault PolicyKit configuration, it also allows the user to\nreboot the system.\n"}, "loc": ["security", "pam", "services", "<name>", "startSession"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.text": {"declarations": ["nixos/modules/security/pam.nix"], "description": {"_type": "mdDoc", "text": "Contents of the PAM service file."}, "loc": ["security", "pam", "services", "<name>", "text"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "security.pam.services.<name>.ttyAudit.disablePattern": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "For each user matching one of comma-separated\nglob patterns, disable TTY auditing\n"}, "loc": ["security", "pam", "services", "<name>", "ttyAudit", "disablePattern"], "readOnly": false, "type": "null or string"}, "security.pam.services.<name>.ttyAudit.enable": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable or disable TTY auditing for specified users\n"}, "loc": ["security", "pam", "services", "<name>", "ttyAudit", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.ttyAudit.enablePattern": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "For each user matching one of comma-separated\nglob patterns, enable TTY auditing\n"}, "loc": ["security", "pam", "services", "<name>", "ttyAudit", "enablePattern"], "readOnly": false, "type": "null or string"}, "security.pam.services.<name>.ttyAudit.openOnly": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set the TTY audit flag when opening the session,\nbut do not restore it when closing the session.\nUsing this option is necessary for some services\nthat don't fork() to run the authenticated session,\nsuch as sudo.\n"}, "loc": ["security", "pam", "services", "<name>", "ttyAudit", "openOnly"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.u2fAuth": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "config.security.pam.u2f.enable"}, "description": {"_type": "mdDoc", "text": "If set, users listed in\n{file}`$XDG_CONFIG_HOME/Yubico/u2f_keys` (or\n{file}`$HOME/.config/Yubico/u2f_keys` if XDG variable is\nnot set) are able to log in with the associated U2F key. Path can be\nchanged using {option}`security.pam.u2f.authFile` option.\n"}, "loc": ["security", "pam", "services", "<name>", "u2fAuth"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.unixAuth": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether users can log in with passwords defined in\n{file}`/etc/shadow`.\n"}, "loc": ["security", "pam", "services", "<name>", "unixAuth"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.updateWtmp": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to update {file}`/var/log/wtmp`."}, "loc": ["security", "pam", "services", "<name>", "updateWtmp"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.usbAuth": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "config.security.pam.usb.enable"}, "description": {"_type": "mdDoc", "text": "If set, users listed in\n{file}`/etc/pamusb.conf` are able to log in\nwith the associated USB key.\n"}, "loc": ["security", "pam", "services", "<name>", "usbAuth"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.usshAuth": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, users with an SSH certificate containing an authorized principal\nin their SSH agent are able to log in. Specific options are controlled\nusing the {option}`security.pam.ussh` options.\n\nNote that the  {option}`security.pam.ussh.enable` must also be\nset for this option to take effect.\n"}, "loc": ["security", "pam", "services", "<name>", "usshAuth"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.yubicoAuth": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "config.security.pam.yubico.enable"}, "description": {"_type": "mdDoc", "text": "If set, users listed in\n{file}`~/.yubico/authorized_yubikeys`\nare able to log in with the associated Yubikey tokens.\n"}, "loc": ["security", "pam", "services", "<name>", "yubicoAuth"], "readOnly": false, "type": "boolean"}, "security.pam.services.<name>.zfs": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "config.security.pam.zfs.enable"}, "description": {"_type": "mdDoc", "text": "Enable unlocking and mounting of encrypted ZFS home dataset at login.\n"}, "loc": ["security", "pam", "services", "<name>", "zfs"], "readOnly": false, "type": "boolean"}, "security.pam.u2f.appId": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "By default `pam-u2f` module sets the application\nID to `pam://$HOSTNAME`.\n\nWhen using {command}`pamu2fcfg`, you can specify your\napplication ID with the `-i` flag.\n\nMore information can be found [here](https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html)\n"}, "loc": ["security", "pam", "u2f", "appId"], "readOnly": false, "type": "null or string"}, "security.pam.u2f.authFile": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "By default `pam-u2f` module reads the keys from\n{file}`$XDG_CONFIG_HOME/Yubico/u2f_keys` (or\n{file}`$HOME/.config/Yubico/u2f_keys` if XDG variable is\nnot set).\n\nIf you want to change auth file locations or centralize database (for\nexample use {file}`/etc/u2f-mappings`) you can set this\noption.\n\nFile format is:\n`username:first_keyHandle,first_public_key: second_keyHandle,second_public_key`\nThis file can be generated using {command}`pamu2fcfg` command.\n\nMore information can be found [here](https://developers.yubico.com/pam-u2f/).\n"}, "loc": ["security", "pam", "u2f", "authFile"], "readOnly": false, "type": "null or path"}, "security.pam.u2f.control": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "\"sufficient\""}, "description": {"_type": "mdDoc", "text": "This option sets pam \"control\".\nIf you want to have multi factor authentication, use \"required\".\nIf you want to use U2F device instead of regular password, use \"sufficient\".\n\nRead\n{manpage}`pam.conf(5)`\nfor better understanding of this option.\n"}, "loc": ["security", "pam", "u2f", "control"], "readOnly": false, "type": "one of \"required\", \"requisite\", \"sufficient\", \"optional\""}, "security.pam.u2f.cue": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "By default `pam-u2f` module does not inform user\nthat he needs to use the u2f device, it just waits without a prompt.\n\nIf you set this option to `true`,\n`cue` option is added to `pam-u2f`\nmodule and reminder message will be displayed.\n"}, "loc": ["security", "pam", "u2f", "cue"], "readOnly": false, "type": "boolean"}, "security.pam.u2f.debug": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Debug output to stderr.\n"}, "loc": ["security", "pam", "u2f", "debug"], "readOnly": false, "type": "boolean"}, "security.pam.u2f.enable": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables U2F PAM (`pam-u2f`) module.\n\nIf set, users listed in\n{file}`$XDG_CONFIG_HOME/Yubico/u2f_keys` (or\n{file}`$HOME/.config/Yubico/u2f_keys` if XDG variable is\nnot set) are able to log in with the associated U2F key. The path can\nbe changed using {option}`security.pam.u2f.authFile` option.\n\nFile format is:\n`username:first_keyHandle,first_public_key: second_keyHandle,second_public_key`\nThis file can be generated using {command}`pamu2fcfg` command.\n\nMore information can be found [here](https://developers.yubico.com/pam-u2f/).\n"}, "loc": ["security", "pam", "u2f", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.u2f.interactive": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to prompt a message and wait before testing the presence of a U2F device.\nRecommended if your device doesn\u2019t have a tactile trigger.\n"}, "loc": ["security", "pam", "u2f", "interactive"], "readOnly": false, "type": "boolean"}, "security.pam.u2f.origin": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "By default `pam-u2f` module sets the origin\nto `pam://$HOSTNAME`.\nSetting origin to an host independent value will allow you to\nreuse credentials across machines\n\nWhen using {command}`pamu2fcfg`, you can specify your\napplication ID with the `-o` flag.\n\nMore information can be found [here](https://developers.yubico.com/pam-u2f/Manuals/pam_u2f.8.html)\n"}, "loc": ["security", "pam", "u2f", "origin"], "readOnly": false, "type": "null or string"}, "security.pam.usb.enable": {"declarations": ["nixos/modules/security/pam_usb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable USB login for all login systems that support it.  For\nmore information, visit <https://github.com/aluzzardi/pam_usb/wiki/Getting-Started#setting-up-devices-and-users>.\n"}, "loc": ["security", "pam", "usb", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.ussh.authorizedPrincipals": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Comma-separated list of authorized principals to permit; if the user\npresents a certificate with one of these principals, then they will be\nauthorized.\n\nNote that `pam-ussh` also requires that the certificate\ncontain a principal matching the user's username. The principals from\nthis list are in addition to those principals.\n\nMutually exclusive with `authorizedPrincipalsFile`.\n"}, "loc": ["security", "pam", "ussh", "authorizedPrincipals"], "readOnly": false, "type": "null or strings concatenated with \",\""}, "security.pam.ussh.authorizedPrincipalsFile": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a list of principals; if the user presents a certificate with\none of these principals, then they will be authorized.\n\nNote that `pam-ussh` also requires that the certificate\ncontain a principal matching the user's username. The principals from\nthis file are in addition to those principals.\n\nMutually exclusive with `authorizedPrincipals`.\n"}, "loc": ["security", "pam", "ussh", "authorizedPrincipalsFile"], "readOnly": false, "type": "null or path"}, "security.pam.ussh.caFile": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "By default `pam-ussh` reads the trusted user CA keys\nfrom {file}`/etc/ssh/trusted_user_ca`.\n\nThis should be set the same as your `TrustedUserCAKeys`\noption for sshd.\n"}, "loc": ["security", "pam", "ussh", "caFile"], "readOnly": false, "type": "null or path"}, "security.pam.ussh.control": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "\"sufficient\""}, "description": {"_type": "mdDoc", "text": "This option sets pam \"control\".\nIf you want to have multi factor authentication, use \"required\".\nIf you want to use the SSH certificate instead of the regular password,\nuse \"sufficient\".\n\nRead\n{manpage}`pam.conf(5)`\nfor better understanding of this option.\n"}, "loc": ["security", "pam", "ussh", "control"], "readOnly": false, "type": "one of \"required\", \"requisite\", \"sufficient\", \"optional\""}, "security.pam.ussh.enable": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables Uber's USSH PAM (`pam-ussh`) module.\n\nThis is similar to `pam-ssh-agent`, except that\nthe presence of a CA-signed SSH key with a valid principal is checked\ninstead.\n\nNote that this module must both be enabled using this option and on a\nper-PAM-service level as well (using `usshAuth`).\n\nMore information can be found [here](https://github.com/uber/pam-ussh).\n"}, "loc": ["security", "pam", "ussh", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.ussh.group": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, then the authenticating user must be a member of this group\nto use this module.\n"}, "loc": ["security", "pam", "ussh", "group"], "readOnly": false, "type": "null or string"}, "security.pam.yubico.challengeResponsePath": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If not null, set the path used by yubico pam module where the challenge expected response is stored.\n\nMore information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).\n"}, "loc": ["security", "pam", "yubico", "challengeResponsePath"], "readOnly": false, "type": "null or path"}, "security.pam.yubico.control": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "\"sufficient\""}, "description": {"_type": "mdDoc", "text": "This option sets pam \"control\".\nIf you want to have multi factor authentication, use \"required\".\nIf you want to use Yubikey instead of regular password, use \"sufficient\".\n\nRead\n{manpage}`pam.conf(5)`\nfor better understanding of this option.\n"}, "loc": ["security", "pam", "yubico", "control"], "readOnly": false, "type": "one of \"required\", \"requisite\", \"sufficient\", \"optional\""}, "security.pam.yubico.debug": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Debug output to stderr.\n"}, "loc": ["security", "pam", "yubico", "debug"], "readOnly": false, "type": "boolean"}, "security.pam.yubico.enable": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables Yubico PAM (`yubico-pam`) module.\n\nIf set, users listed in\n{file}`~/.yubico/authorized_yubikeys`\nare able to log in with the associated Yubikey tokens.\n\nThe file must have only one line:\n`username:yubikey_token_id1:yubikey_token_id2`\nMore information can be found [here](https://developers.yubico.com/yubico-pam/).\n"}, "loc": ["security", "pam", "yubico", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.yubico.id": {"declarations": ["nixos/modules/security/pam.nix"], "description": {"_type": "mdDoc", "text": "client id"}, "example": {"_type": "literalExpression", "text": "\"42\""}, "loc": ["security", "pam", "yubico", "id"], "readOnly": false, "type": "string"}, "security.pam.yubico.mode": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "\"client\""}, "description": {"_type": "mdDoc", "text": "Mode of operation.\n\nUse \"client\" for online validation with a YubiKey validation service such as\nthe YubiCloud.\n\nUse \"challenge-response\" for offline validation using YubiKeys with HMAC-SHA-1\nChallenge-Response configurations. See the man-page ykpamcfg(1) for further\ndetails on how to configure offline Challenge-Response validation.\n\nMore information can be found [here](https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html).\n"}, "loc": ["security", "pam", "yubico", "mode"], "readOnly": false, "type": "one of \"client\", \"challenge-response\""}, "security.pam.zfs.enable": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable unlocking and mounting of encrypted ZFS home dataset at login.\n"}, "loc": ["security", "pam", "zfs", "enable"], "readOnly": false, "type": "boolean"}, "security.pam.zfs.homes": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "\"rpool/home\""}, "description": {"_type": "mdDoc", "text": "Prefix of home datasets. This value will be concatenated with\n`\"/\" + <username>` in order to determine the home dataset to unlock.\n"}, "example": {"_type": "literalExpression", "text": "\"rpool/home\""}, "loc": ["security", "pam", "zfs", "homes"], "readOnly": false, "type": "string"}, "security.pam.zfs.noUnmount": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Do not unmount home dataset on logout.\n"}, "loc": ["security", "pam", "zfs", "noUnmount"], "readOnly": false, "type": "boolean"}, "security.pki.caCertificateBlacklist": {"declarations": ["nixos/modules/security/ca.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of blacklisted CA certificate names that won't be imported from\nthe Mozilla Trust Store into\n{file}`/etc/ssl/certs/ca-certificates.crt`. Use the\nnames from that file.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"WoSign\"\n  \"WoSign China\"\n  \"CA WoSign ECC Root\"\n  \"Certification Authority of WoSign G2\"\n]"}, "loc": ["security", "pki", "caCertificateBlacklist"], "readOnly": false, "type": "list of string"}, "security.pki.certificateFiles": {"declarations": ["nixos/modules/security/ca.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of files containing trusted root certificates in PEM\nformat. These are concatenated to form\n{file}`/etc/ssl/certs/ca-certificates.crt`, which is\nused by many programs that use OpenSSL, such as\n{command}`curl` and {command}`git`.\n"}, "example": {"_type": "literalExpression", "text": "[ \"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\" ]"}, "loc": ["security", "pki", "certificateFiles"], "readOnly": false, "type": "list of path"}, "security.pki.certificates": {"declarations": ["nixos/modules/security/ca.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of trusted root certificates in PEM format.\n"}, "example": {"_type": "literalExpression", "text": "[ ''\n    NixOS.org\n    =========\n    -----BEGIN CERTIFICATE-----\n    MIIGUDCCBTigAwIBAgIDD8KWMA0GCSqGSIb3DQEBBQUAMIGMMQswCQYDVQQGEwJJ\n    TDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0\n    ...\n    -----END CERTIFICATE-----\n  ''\n]\n"}, "loc": ["security", "pki", "certificates"], "readOnly": false, "type": "list of string"}, "security.please.enable": {"declarations": ["nixos/modules/security/please.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable please, a Sudo clone which allows a users to execute a command or edit a\nfile as another user\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "please", "enable"], "readOnly": false, "type": "boolean"}, "security.please.package": {"declarations": ["nixos/modules/security/please.nix"], "default": {"_type": "literalExpression", "text": "pkgs.please"}, "description": {"_type": "mdDoc", "text": "Which package to use for {command}`please`.\n"}, "loc": ["security", "please", "package"], "readOnly": false, "type": "package"}, "security.please.settings": {"declarations": ["nixos/modules/security/please.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Please configuration. Refer to\n<https://github.com/edneville/please/blob/master/please.ini.md> for\ndetails.\n"}, "example": {"_type": "literalExpression", "text": "{\n  jim_edit_etc_hosts_as_root = {\n    editmode = 644;\n    name = \"jim\";\n    require_pass = true;\n    rule = \"/etc/hosts\";\n    target = \"root\";\n    type = \"edit\";\n  };\n  jim_run_any_as_root = {\n    name = \"jim\";\n    require_pass = false;\n    rule = \".*\";\n    target = \"root\";\n    type = \"run\";\n  };\n}"}, "loc": ["security", "please", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "security.please.wheelNeedsPassword": {"declarations": ["nixos/modules/security/please.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether users of the `wheel` group must provide a password to run\ncommands or edit files with {command}`please` and\n{command}`pleaseedit` respectively.\n"}, "loc": ["security", "please", "wheelNeedsPassword"], "readOnly": false, "type": "boolean"}, "security.polkit.adminIdentities": {"declarations": ["nixos/modules/security/polkit.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"unix-group:wheel\"\n]"}, "description": {"_type": "mdDoc", "text": "Specifies which users are considered \u201cadministrators\u201d, for those\nactions that require the user to authenticate as an\nadministrator (i.e. have an `auth_admin`\nvalue).  By default, this is all users in the `wheel` group.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"unix-user:alice\"\n  \"unix-group:admin\"\n]"}, "loc": ["security", "polkit", "adminIdentities"], "readOnly": false, "type": "list of string"}, "security.polkit.debug": {"declarations": ["nixos/modules/security/polkit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable debug logs from polkit. This is required in order to see log messages from rule definitions."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "polkit", "debug"], "readOnly": false, "type": "boolean"}, "security.polkit.enable": {"declarations": ["nixos/modules/security/polkit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable polkit."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "polkit", "enable"], "readOnly": false, "type": "boolean"}, "security.polkit.extraConfig": {"declarations": ["nixos/modules/security/polkit.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Any polkit rules to be added to config (in JavaScript ;-). See:\nhttp://www.freedesktop.org/software/polkit/docs/latest/polkit.8.html#polkit-rules\n"}, "example": {"_type": "literalExpression", "text": "''\n  /* Log authorization checks. */\n  polkit.addRule(function(action, subject) {\n    // Make sure to set { security.polkit.debug = true; } in configuration.nix\n    polkit.log(\"user \" +  subject.user + \" is attempting action \" + action.id + \" from PID \" + subject.pid);\n  });\n  \n  /* Allow any local user to do anything (dangerous!). */\n  polkit.addRule(function(action, subject) {\n    if (subject.local) return \"yes\";\n  });\n''"}, "loc": ["security", "polkit", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "security.protectKernelImage": {"declarations": ["nixos/modules/security/misc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to prevent replacing the running kernel image.\n"}, "loc": ["security", "protectKernelImage"], "readOnly": false, "type": "boolean"}, "security.rtkit.enable": {"declarations": ["nixos/modules/security/rtkit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the RealtimeKit system service, which hands\nout realtime scheduling priority to user processes on\ndemand. For example, the PulseAudio server uses this to\nacquire realtime priority.\n"}, "loc": ["security", "rtkit", "enable"], "readOnly": false, "type": "boolean"}, "security.sudo.configFile": {"declarations": ["nixos/modules/security/sudo.nix"], "description": {"_type": "mdDoc", "text": "This string contains the contents of the\n{file}`sudoers` file.\n"}, "loc": ["security", "sudo", "configFile"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "security.sudo.enable": {"declarations": ["nixos/modules/security/sudo.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the {command}`sudo` command, which\nallows non-root users to execute commands as root.\n"}, "loc": ["security", "sudo", "enable"], "readOnly": false, "type": "boolean"}, "security.sudo.execWheelOnly": {"declarations": ["nixos/modules/security/sudo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Only allow members of the `wheel` group to execute sudo by\nsetting the executable's permissions accordingly.\nThis prevents users that are not members of `wheel` from\nexploiting vulnerabilities in sudo such as CVE-2021-3156.\n"}, "loc": ["security", "sudo", "execWheelOnly"], "readOnly": false, "type": "boolean"}, "security.sudo.extraConfig": {"declarations": ["nixos/modules/security/sudo.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration text appended to {file}`sudoers`.\n"}, "loc": ["security", "sudo", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "security.sudo.extraRules": {"declarations": ["nixos/modules/security/sudo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Define specific rules to be in the {file}`sudoers` file.\nMore specific rules should come after more general ones in order to\nyield the expected behavior. You can use mkBefore/mkAfter to ensure\nthis is the case when configuration options are merged.\n"}, "example": {"_type": "literalExpression", "text": "[\n  # Allow execution of any command by all users in group sudo,\n  # requiring a password.\n  { groups = [ \"sudo\" ]; commands = [ \"ALL\" ]; }\n\n  # Allow execution of \"/home/root/secret.sh\" by user `backup`, `database`\n  # and the group with GID `1006` without a password.\n  { users = [ \"backup\" \"database\" ]; groups = [ 1006 ];\n    commands = [ { command = \"/home/root/secret.sh\"; options = [ \"SETENV\" \"NOPASSWD\" ]; } ]; }\n\n  # Allow all users of group `bar` to run two executables as user `foo`\n  # with arguments being pre-set.\n  { groups = [ \"bar\" ]; runAs = \"foo\";\n    commands =\n      [ \"/home/baz/cmd1.sh hello-sudo\"\n          { command = ''/home/baz/cmd2.sh \"\"''; options = [ \"SETENV\" ]; } ]; }\n]\n"}, "loc": ["security", "sudo", "extraRules"], "readOnly": false, "type": "list of (submodule)"}, "security.sudo.extraRules.*.commands": {"declarations": ["nixos/modules/security/sudo.nix"], "description": {"_type": "mdDoc", "text": "The commands for which the rule should apply.\n"}, "loc": ["security", "sudo", "extraRules", "*", "commands"], "readOnly": false, "type": "list of (string or (submodule))"}, "security.sudo.extraRules.*.groups": {"declarations": ["nixos/modules/security/sudo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The groups / GIDs this rule should apply for.\n"}, "loc": ["security", "sudo", "extraRules", "*", "groups"], "readOnly": false, "type": "list of (string or signed integer)"}, "security.sudo.extraRules.*.host": {"declarations": ["nixos/modules/security/sudo.nix"], "default": {"_type": "literalExpression", "text": "\"ALL\""}, "description": {"_type": "mdDoc", "text": "For what host this rule should apply.\n"}, "loc": ["security", "sudo", "extraRules", "*", "host"], "readOnly": false, "type": "string"}, "security.sudo.extraRules.*.runAs": {"declarations": ["nixos/modules/security/sudo.nix"], "default": {"_type": "literalExpression", "text": "\"ALL:ALL\""}, "description": {"_type": "mdDoc", "text": "Under which user/group the specified command is allowed to run.\n\nA user can be specified using just the username: `\"foo\"`.\nIt is also possible to specify a user/group combination using `\"foo:bar\"`\nor to only allow running as a specific group with `\":bar\"`.\n"}, "loc": ["security", "sudo", "extraRules", "*", "runAs"], "readOnly": false, "type": "string"}, "security.sudo.extraRules.*.users": {"declarations": ["nixos/modules/security/sudo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The usernames / UIDs this rule should apply for.\n"}, "loc": ["security", "sudo", "extraRules", "*", "users"], "readOnly": false, "type": "list of (string or signed integer)"}, "security.sudo.package": {"declarations": ["nixos/modules/security/sudo.nix"], "default": {"_type": "literalExpression", "text": "pkgs.sudo"}, "description": {"_type": "mdDoc", "text": "Which package to use for `sudo`.\n"}, "loc": ["security", "sudo", "package"], "readOnly": false, "type": "package"}, "security.sudo.wheelNeedsPassword": {"declarations": ["nixos/modules/security/sudo.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether users of the `wheel` group must\nprovide a password to run commands as super user via {command}`sudo`.\n"}, "loc": ["security", "sudo", "wheelNeedsPassword"], "readOnly": false, "type": "boolean"}, "security.tpm2.abrmd.enable": {"declarations": ["nixos/modules/security/tpm2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Trusted Platform 2 userspace resource manager daemon\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "tpm2", "abrmd", "enable"], "readOnly": false, "type": "boolean"}, "security.tpm2.abrmd.package": {"declarations": ["nixos/modules/security/tpm2.nix"], "default": {"_type": "literalExpression", "text": "pkgs.tpm2-abrmd"}, "description": {"_type": "mdDoc", "text": "tpm2-abrmd package to use"}, "loc": ["security", "tpm2", "abrmd", "package"], "readOnly": false, "type": "package"}, "security.tpm2.applyUdevRules": {"declarations": ["nixos/modules/security/tpm2.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to make the /dev/tpm[0-9] devices accessible by the tssUser, or\nthe /dev/tpmrm[0-9] by tssGroup respectively\n"}, "loc": ["security", "tpm2", "applyUdevRules"], "readOnly": false, "type": "boolean"}, "security.tpm2.enable": {"declarations": ["nixos/modules/security/tpm2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Trusted Platform Module 2 support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "tpm2", "enable"], "readOnly": false, "type": "boolean"}, "security.tpm2.pkcs11.enable": {"declarations": ["nixos/modules/security/tpm2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable TPM2 PKCS#11 tool and shared library in system path\n(`/run/current-system/sw/lib/libtpm2_pkcs11.so`)\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["security", "tpm2", "pkcs11", "enable"], "readOnly": false, "type": "boolean"}, "security.tpm2.pkcs11.package": {"declarations": ["nixos/modules/security/tpm2.nix"], "default": {"_type": "literalExpression", "text": "pkgs.tpm2-pkcs11"}, "description": {"_type": "mdDoc", "text": "tpm2-pkcs11 package to use"}, "loc": ["security", "tpm2", "pkcs11", "package"], "readOnly": false, "type": "package"}, "security.tpm2.tctiEnvironment.deviceConf": {"declarations": ["nixos/modules/security/tpm2.nix"], "default": {"_type": "literalExpression", "text": "\"/dev/tpmrm0\""}, "description": {"_type": "mdDoc", "text": "Configuration part of the device TCTI, e.g. the path to the TPM device.\nApplies if interface is set to \"device\".\nThe format is specified in the\n[\ntpm2-tools repository](https://github.com/tpm2-software/tpm2-tools/blob/master/man/common/tcti.md#tcti-options).\n"}, "loc": ["security", "tpm2", "tctiEnvironment", "deviceConf"], "readOnly": false, "type": "string"}, "security.tpm2.tctiEnvironment.enable": {"declarations": ["nixos/modules/security/tpm2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set common TCTI environment variables to the specified value.\nThe variables are\n- `TPM2TOOLS_TCTI`\n- `TPM2_PKCS11_TCTI`\n"}, "loc": ["security", "tpm2", "tctiEnvironment", "enable"], "readOnly": false, "type": "boolean"}, "security.tpm2.tctiEnvironment.interface": {"declarations": ["nixos/modules/security/tpm2.nix"], "default": {"_type": "literalExpression", "text": "\"device\""}, "description": {"_type": "mdDoc", "text": "The name of the TPM command transmission interface (TCTI) library to\nuse.\n"}, "loc": ["security", "tpm2", "tctiEnvironment", "interface"], "readOnly": false, "type": "one of \"tabrmd\", \"device\""}, "security.tpm2.tctiEnvironment.tabrmdConf": {"declarations": ["nixos/modules/security/tpm2.nix"], "default": {"_type": "literalExpression", "text": "\"bus_name=com.intel.tss2.Tabrmd\""}, "description": {"_type": "mdDoc", "text": "Configuration part of the tabrmd TCTI, like the D-Bus bus name.\nApplies if interface is set to \"tabrmd\".\nThe format is specified in the\n[\ntpm2-tools repository](https://github.com/tpm2-software/tpm2-tools/blob/master/man/common/tcti.md#tcti-options).\n"}, "loc": ["security", "tpm2", "tctiEnvironment", "tabrmdConf"], "readOnly": false, "type": "string"}, "security.tpm2.tssGroup": {"declarations": ["nixos/modules/security/tpm2.nix"], "default": {"_type": "literalExpression", "text": "\"tss\""}, "description": {"_type": "mdDoc", "text": "Group of the tpm kernel resource manager (tpmrm) device-group, set if\napplyUdevRules is set.\n"}, "loc": ["security", "tpm2", "tssGroup"], "readOnly": false, "type": "null or string"}, "security.tpm2.tssUser": {"declarations": ["nixos/modules/security/tpm2.nix"], "default": {"_type": "literalExpression", "text": "if config.security.tpm2.abrmd.enable then \"tss\" else \"root\""}, "description": {"_type": "mdDoc", "text": "Name of the tpm device-owner and service user, set if applyUdevRules is\nset.\n"}, "loc": ["security", "tpm2", "tssUser"], "readOnly": false, "type": "null or string"}, "security.unprivilegedUsernsClone": {"declarations": ["nixos/modules/security/misc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When disabled, unprivileged users will not be able to create new namespaces.\nBy default unprivileged user namespaces are disabled.\nThis option only works in a hardened profile.\n"}, "loc": ["security", "unprivilegedUsernsClone"], "readOnly": false, "type": "boolean"}, "security.virtualisation.flushL1DataCache": {"declarations": ["nixos/modules/security/misc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether the hypervisor should flush the L1 data cache before\nentering guests.\nSee also [](#opt-security.allowSimultaneousMultithreading).\n\n- `null`: uses the kernel default\n- `\"never\"`: disables L1 data cache flushing entirely.\n  May be appropriate if all guests are trusted.\n- `\"cond\"`: flushes L1 data cache only for pre-determined\n  code paths.  May leak information about the host address space\n  layout.\n- `\"always\"`: flushes L1 data cache every time the hypervisor\n  enters the guest.  May incur significant performance cost.\n"}, "loc": ["security", "virtualisation", "flushL1DataCache"], "readOnly": false, "type": "null or one of \"never\", \"cond\", \"always\""}, "security.wrapperDirSize": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "default": {"_type": "literalExpression", "text": "\"50%\""}, "description": {"_type": "mdDoc", "text": "Size limit for the /run/wrappers tmpfs. Look at mount(8), tmpfs size option,\nfor the accepted syntax. WARNING: don't set to less than 64MB.\n"}, "example": {"_type": "literalExpression", "text": "\"10G\""}, "loc": ["security", "wrapperDirSize"], "readOnly": false, "type": "string"}, "security.wrappers": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option effectively allows adding setuid/setgid bits, capabilities,\nchanging file ownership and permissions of a program without directly\nmodifying it. This works by creating a wrapper program under the\n{option}`security.wrapperDir` directory, which is then added to\nthe shell `PATH`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  # a setuid root program\n  doas =\n    { setuid = true;\n      owner = \"root\";\n      group = \"root\";\n      source = \"${pkgs.doas}/bin/doas\";\n    };\n\n  # a setgid program\n  locate =\n    { setgid = true;\n      owner = \"root\";\n      group = \"mlocate\";\n      source = \"${pkgs.locate}/bin/locate\";\n    };\n\n  # a program with the CAP_NET_RAW capability\n  ping =\n    { owner = \"root\";\n      group = \"root\";\n      capabilities = \"cap_net_raw+ep\";\n      source = \"${pkgs.iputils.out}/bin/ping\";\n    };\n}\n"}, "loc": ["security", "wrappers"], "readOnly": false, "type": "attribute set of (submodule)"}, "security.wrappers.<name>.capabilities": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "A comma-separated list of capability clauses to be given to the\nwrapper program. The format for capability clauses is described in the\n\u201cTEXTUAL REPRESENTATION\u201d section of the {manpage}`cap_from_text(3)`\nmanual page. For a list of capabilities supported by the system, check\nthe {manpage}`capabilities(7)` manual page.\n\n::: {.note}\n`cap_setpcap`, which is required for the wrapper\nprogram to be able to raise caps into the Ambient set is NOT raised\nto the Ambient set so that the real program cannot modify its own\ncapabilities!! This may be too restrictive for cases in which the\nreal program needs cap_setpcap but it at least leans on the side\nsecurity paranoid vs. too relaxed.\n:::\n"}, "loc": ["security", "wrappers", "<name>", "capabilities"], "readOnly": false, "type": "strings concatenated with \",\""}, "security.wrappers.<name>.group": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "description": {"_type": "mdDoc", "text": "The group of the wrapper program."}, "loc": ["security", "wrappers", "<name>", "group"], "readOnly": false, "type": "string"}, "security.wrappers.<name>.owner": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "description": {"_type": "mdDoc", "text": "The owner of the wrapper program."}, "loc": ["security", "wrappers", "<name>", "owner"], "readOnly": false, "type": "string"}, "security.wrappers.<name>.permissions": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "default": {"_type": "literalExpression", "text": "\"u+rx,g+x,o+x\""}, "description": {"_type": "mdDoc", "text": "The permissions of the wrapper program. The format is that of a\nsymbolic or numeric file mode understood by {command}`chmod`.\n"}, "example": {"_type": "literalExpression", "text": "\"a+rx\""}, "loc": ["security", "wrappers", "<name>", "permissions"], "readOnly": false, "type": "file mode string"}, "security.wrappers.<name>.program": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The name of the wrapper program. Defaults to the attribute name.\n"}, "loc": ["security", "wrappers", "<name>", "program"], "readOnly": false, "type": "null or string"}, "security.wrappers.<name>.setgid": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add the setgid bit the wrapper program."}, "loc": ["security", "wrappers", "<name>", "setgid"], "readOnly": false, "type": "boolean"}, "security.wrappers.<name>.setuid": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add the setuid bit the wrapper program."}, "loc": ["security", "wrappers", "<name>", "setuid"], "readOnly": false, "type": "boolean"}, "security.wrappers.<name>.source": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "description": {"_type": "mdDoc", "text": "The absolute path to the program to be wrapped."}, "loc": ["security", "wrappers", "<name>", "source"], "readOnly": false, "type": "path"}, "services.SystemdJournal2Gelf.enable": {"declarations": ["nixos/modules/services/logging/SystemdJournal2Gelf.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SystemdJournal2Gelf.\n"}, "loc": ["services", "SystemdJournal2Gelf", "enable"], "readOnly": false, "type": "boolean"}, "services.SystemdJournal2Gelf.extraOptions": {"declarations": ["nixos/modules/services/logging/SystemdJournal2Gelf.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Any extra flags to pass to SystemdJournal2Gelf. Note that\nthese are basically `journalctl` flags.\n"}, "loc": ["services", "SystemdJournal2Gelf", "extraOptions"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.SystemdJournal2Gelf.graylogServer": {"declarations": ["nixos/modules/services/logging/SystemdJournal2Gelf.nix"], "description": {"_type": "mdDoc", "text": "Host and port of your graylog2 input. This should be a GELF\nUDP input.\n"}, "example": {"_type": "literalExpression", "text": "\"graylog2.example.com:11201\""}, "loc": ["services", "SystemdJournal2Gelf", "graylogServer"], "readOnly": false, "type": "string"}, "services.SystemdJournal2Gelf.package": {"declarations": ["nixos/modules/services/logging/SystemdJournal2Gelf.nix"], "default": {"_type": "literalExpression", "text": "pkgs.systemd-journal2gelf"}, "description": {"_type": "mdDoc", "text": "SystemdJournal2Gelf package to use.\n"}, "loc": ["services", "SystemdJournal2Gelf", "package"], "readOnly": false, "type": "package"}, "services._3proxy.confFile": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "description": {"_type": "mdDoc", "text": "Ignore all other 3proxy options and load configuration from this file.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/3proxy/3proxy.conf\""}, "loc": ["services", "_3proxy", "confFile"], "readOnly": false, "type": "path"}, "services._3proxy.denyPrivate": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to deny access to private IP ranges including loopback.\n"}, "loc": ["services", "_3proxy", "denyPrivate"], "readOnly": false, "type": "boolean"}, "services._3proxy.enable": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable 3proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "_3proxy", "enable"], "readOnly": false, "type": "boolean"}, "services._3proxy.extraConfig": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Extra configuration, appended to the 3proxy configuration file.\nConsult [documentation](https://github.com/z3APA3A/3proxy/wiki/3proxy.cfg) for available options.\n"}, "loc": ["services", "_3proxy", "extraConfig"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services._3proxy.privateRanges": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0/8\"\n  \"127.0.0.0/8\"\n  \"10.0.0.0/8\"\n  \"100.64.0.0/10\"\n  \"172.16.0.0/12\"\n  \"192.168.0.0/16\"\n  \"::\"\n  \"::1\"\n  \"fc00::/7\"\n]"}, "description": {"_type": "mdDoc", "text": "What IP ranges to deny access when denyPrivate is set tu true.\n"}, "loc": ["services", "_3proxy", "privateRanges"], "readOnly": false, "type": "list of string"}, "services._3proxy.resolution": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Use this option to configure name resolution and DNS caching.\n"}, "loc": ["services", "_3proxy", "resolution"], "readOnly": false, "type": "submodule"}, "services._3proxy.resolution.nscache": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "65535"}, "description": {"_type": "mdDoc", "text": "Set name cache size for IPv4."}, "loc": ["services", "_3proxy", "resolution", "nscache"], "readOnly": false, "type": "signed integer"}, "services._3proxy.resolution.nscache6": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "65535"}, "description": {"_type": "mdDoc", "text": "Set name cache size for IPv6."}, "loc": ["services", "_3proxy", "resolution", "nscache6"], "readOnly": false, "type": "signed integer"}, "services._3proxy.resolution.nserver": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of nameservers to use.\n\nUp to 5 nservers may be specified. If no nserver is configured,\ndefault system name resolution functions are used.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.53\"\n  \"192.168.1.3:5353/tcp\"\n]"}, "loc": ["services", "_3proxy", "resolution", "nserver"], "readOnly": false, "type": "list of string"}, "services._3proxy.resolution.nsrecord": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Adds static nsrecords."}, "example": {"_type": "literalExpression", "text": "{\n  \"files.local\" = \"192.168.1.12\";\n  \"site.local\" = \"192.168.1.43\";\n}\n"}, "loc": ["services", "_3proxy", "resolution", "nsrecord"], "readOnly": false, "type": "attribute set of string"}, "services._3proxy.services": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Use this option to define 3proxy services.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    type = \"proxy\";\n    bindAddress = \"192.168.1.24\";\n    bindPort = 3128;\n    auth = [ \"none\" ];\n  }\n  {\n    type = \"proxy\";\n    bindAddress = \"10.10.1.20\";\n    bindPort = 3128;\n    auth = [ \"iponly\" ];\n  }\n  {\n    type = \"socks\";\n    bindAddress = \"172.17.0.1\";\n    bindPort = 1080;\n    auth = [ \"strong\" ];\n  }\n]\n"}, "loc": ["services", "_3proxy", "services"], "readOnly": false, "type": "list of (submodule)"}, "services._3proxy.services.*.acl": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Use this option to limit user access to resources.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    rule = \"allow\";\n    users = [ \"user1\" ];\n  }\n  {\n    rule = \"allow\";\n    sources = [ \"192.168.1.0/24\" ];\n  }\n  {\n    rule = \"deny\";\n  }\n]\n"}, "loc": ["services", "_3proxy", "services", "*", "acl"], "readOnly": false, "type": "list of (submodule)"}, "services._3proxy.services.*.acl.*.rule": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "description": {"_type": "mdDoc", "text": "ACL rule. The following values are valid:\n\n- `\"allow\"`: connections allowed.\n- `\"deny\"`: connections not allowed.\n"}, "example": {"_type": "literalExpression", "text": "\"allow\""}, "loc": ["services", "_3proxy", "services", "*", "acl", "*", "rule"], "readOnly": false, "type": "one of \"allow\", \"deny\""}, "services._3proxy.services.*.acl.*.sources": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of source IP range, use empty list for any.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"192.168.1.0/24\"\n]"}, "loc": ["services", "_3proxy", "services", "*", "acl", "*", "sources"], "readOnly": false, "type": "list of string"}, "services._3proxy.services.*.acl.*.targetPorts": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of target ports, use empty list for any.\n"}, "example": {"_type": "literalExpression", "text": "[\n  80\n  443\n]"}, "loc": ["services", "_3proxy", "services", "*", "acl", "*", "targetPorts"], "readOnly": false, "type": "list of signed integer"}, "services._3proxy.services.*.acl.*.targets": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of target IP ranges, use empty list for any.\nMay also contain host names instead of addresses.\nIt's possible to use wildmask in the beginning and in the the end of hostname, e.g. `*badsite.com` or `*badcontent*`.\nHostname is only checked if hostname presents in request.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"192.168.1.0/24\"\n]"}, "loc": ["services", "_3proxy", "services", "*", "acl", "*", "targets"], "readOnly": false, "type": "list of string"}, "services._3proxy.services.*.acl.*.users": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of users, use empty list for any.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"user1\"\n  \"user2\"\n  \"user3\"\n]"}, "loc": ["services", "_3proxy", "services", "*", "acl", "*", "users"], "readOnly": false, "type": "list of string"}, "services._3proxy.services.*.auth": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "description": {"_type": "mdDoc", "text": "Authentication type. The following values are valid:\n\n- `\"none\"`: disables both authentication and authorization. You can not use ACLs.\n- `\"iponly\"`: specifies no authentication. ACLs authorization is used.\n- `\"strong\"`: authentication by username/password. If user is not registered their access is denied regardless of ACLs.\n\nDouble authentication is possible, e.g.\n\n```\n  {\n    auth = [ \"iponly\" \"strong\" ];\n    acl = [\n      {\n        rule = \"allow\";\n        targets = [ \"192.168.0.0/16\" ];\n      }\n      {\n        rule = \"allow\"\n        users = [ \"user1\" \"user2\" ];\n      }\n    ];\n  }\n```\nIn this example strong username authentication is not required to access 192.168.0.0/16.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"iponly\"\n  \"strong\"\n]"}, "loc": ["services", "_3proxy", "services", "*", "auth"], "readOnly": false, "type": "list of (one of \"none\", \"iponly\", \"strong\")"}, "services._3proxy.services.*.bindAddress": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "\"[::]\""}, "description": {"_type": "mdDoc", "text": "Address used for service.\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "_3proxy", "services", "*", "bindAddress"], "readOnly": false, "type": "string"}, "services._3proxy.services.*.bindPort": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Override default port used for service.\n"}, "example": {"_type": "literalExpression", "text": "3128"}, "loc": ["services", "_3proxy", "services", "*", "bindPort"], "readOnly": false, "type": "null or signed integer"}, "services._3proxy.services.*.extraArguments": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Extra arguments for service.\nConsult \"Options\" section in [documentation](https://github.com/z3APA3A/3proxy/wiki/3proxy.cfg) for available arguments.\n"}, "example": {"_type": "literalExpression", "text": "\"-46\""}, "loc": ["services", "_3proxy", "services", "*", "extraArguments"], "readOnly": false, "type": "null or string"}, "services._3proxy.services.*.extraConfig": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Extra configuration for service. Use this to configure things like bandwidth limiter or ACL-based redirection.\nConsult [documentation](https://github.com/z3APA3A/3proxy/wiki/3proxy.cfg) for available options.\n"}, "loc": ["services", "_3proxy", "services", "*", "extraConfig"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services._3proxy.services.*.maxConnections": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "100"}, "description": {"_type": "mdDoc", "text": "Maximum number of simulationeous connections to this service.\n"}, "example": {"_type": "literalExpression", "text": "1000"}, "loc": ["services", "_3proxy", "services", "*", "maxConnections"], "readOnly": false, "type": "signed integer"}, "services._3proxy.services.*.type": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "description": {"_type": "mdDoc", "text": "Service type. The following values are valid:\n\n- `\"proxy\"`: HTTP/HTTPS proxy (default port 3128).\n- `\"socks\"`: SOCKS 4/4.5/5 proxy (default port 1080).\n- `\"pop3p\"`: POP3 proxy (default port 110).\n- `\"ftppr\"`: FTP proxy (default port 21).\n- `\"admin\"`: Web interface (default port 80).\n- `\"dnspr\"`: Caching DNS proxy (default port 53).\n- `\"tcppm\"`: TCP portmapper.\n- `\"udppm\"`: UDP portmapper.\n"}, "example": {"_type": "literalExpression", "text": "\"proxy\""}, "loc": ["services", "_3proxy", "services", "*", "type"], "readOnly": false, "type": "one of \"proxy\", \"socks\", \"pop3p\", \"ftppr\", \"admin\", \"dnspr\", \"tcppm\", \"udppm\""}, "services._3proxy.usersFile": {"declarations": ["nixos/modules/services/networking/3proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Load users and passwords from this file.\n\nExample users file with plain-text passwords:\n\n```\n  test1:CL:password1\n  test2:CL:password2\n```\n\nExample users file with md5-crypted passwords:\n\n```\n  test1:CR:$1$tFkisVd2$1GA8JXkRmTXdLDytM/i3a1\n  test2:CR:$1$rkpibm5J$Aq1.9VtYAn0JrqZ8M.1ME.\n```\n\nYou can generate md5-crypted passwords via https://unix4lyfe.org/crypt/\nNote that htpasswd tool generates incompatible md5-crypted passwords.\nConsult [documentation](https://github.com/z3APA3A/3proxy/wiki/How-To-%28incomplete%29#USERS) for more information.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/3proxy/3proxy.passwd\""}, "loc": ["services", "_3proxy", "usersFile"], "readOnly": false, "type": "null or path"}, "services.accounts-daemon.enable": {"declarations": ["nixos/modules/services/desktops/accountsservice.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable AccountsService, a DBus service for accessing\nthe list of user accounts and information attached to those accounts.\n"}, "loc": ["services", "accounts-daemon", "enable"], "readOnly": false, "type": "boolean"}, "services.acpid.acEventCommands": {"declarations": ["nixos/modules/services/hardware/acpid.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to execute on an ac_adapter.* event."}, "loc": ["services", "acpid", "acEventCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.acpid.enable": {"declarations": ["nixos/modules/services/hardware/acpid.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the ACPI daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "acpid", "enable"], "readOnly": false, "type": "boolean"}, "services.acpid.handlers": {"declarations": ["nixos/modules/services/hardware/acpid.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Event handlers.\n\n::: {.note}\nHandler can be a single command.\n:::\n"}, "example": {"_type": "literalExpression", "text": "{\n  ac-power = {\n    action = ''\n      vals=($1)  # space separated string to array of multiple values\n      case ''${vals[3]} in\n          00000000)\n              echo unplugged >> /tmp/acpi.log\n              ;;\n          00000001)\n              echo plugged in >> /tmp/acpi.log\n              ;;\n          *)\n              echo unknown >> /tmp/acpi.log\n              ;;\n      esac\n    '';\n    event = \"ac_adapter/*\";\n  };\n}"}, "loc": ["services", "acpid", "handlers"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.acpid.handlers.<name>.action": {"declarations": ["nixos/modules/services/hardware/acpid.nix"], "description": {"_type": "mdDoc", "text": "Shell commands to execute when the event is triggered."}, "loc": ["services", "acpid", "handlers", "<name>", "action"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.acpid.handlers.<name>.event": {"declarations": ["nixos/modules/services/hardware/acpid.nix"], "description": {"_type": "mdDoc", "text": "Event type."}, "example": {"_type": "literalExpression", "text": "\"button/power.*\" \"button/lid.*\" \"ac_adapter.*\" \"button/mute.*\" \"button/volumedown.*\" \"cd/play.*\" \"cd/next.*\""}, "loc": ["services", "acpid", "handlers", "<name>", "event"], "readOnly": false, "type": "string"}, "services.acpid.lidEventCommands": {"declarations": ["nixos/modules/services/hardware/acpid.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to execute on a button/lid.* event."}, "loc": ["services", "acpid", "lidEventCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.acpid.logEvents": {"declarations": ["nixos/modules/services/hardware/acpid.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Log all event activity."}, "loc": ["services", "acpid", "logEvents"], "readOnly": false, "type": "boolean"}, "services.acpid.powerEventCommands": {"declarations": ["nixos/modules/services/hardware/acpid.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to execute on a button/power.* event."}, "loc": ["services", "acpid", "powerEventCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.activemq.baseDir": {"declarations": ["nixos/modules/services/amqp/activemq/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/activemq\""}, "description": {"_type": "mdDoc", "text": "The base directory where ActiveMQ stores its persistent data and logs.\nThis will be overridden if you set \"activemq.base\" and \"activemq.data\"\nin the `javaProperties` option. You can also override\nthis in activemq.xml.\n"}, "loc": ["services", "activemq", "baseDir"], "readOnly": false, "type": "string"}, "services.activemq.configurationDir": {"declarations": ["nixos/modules/services/amqp/activemq/default.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.activemq}/conf\""}, "description": {"_type": "mdDoc", "text": "The base directory for ActiveMQ's configuration.\nBy default, this directory is searched for a file named activemq.xml,\nwhich should contain the configuration for the broker service.\n"}, "loc": ["services", "activemq", "configurationDir"], "readOnly": false, "type": "string"}, "services.activemq.configurationURI": {"declarations": ["nixos/modules/services/amqp/activemq/default.nix"], "default": {"_type": "literalExpression", "text": "\"xbean:activemq.xml\""}, "description": {"_type": "mdDoc", "text": "The URI that is passed along to the BrokerFactory to\nset up the configuration of the ActiveMQ broker service.\nYou should not need to change this. For custom configuration,\nset the `configurationDir` instead, and create\nan activemq.xml configuration file in it.\n"}, "loc": ["services", "activemq", "configurationURI"], "readOnly": false, "type": "string"}, "services.activemq.enable": {"declarations": ["nixos/modules/services/amqp/activemq/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the Apache ActiveMQ message broker service.\n"}, "loc": ["services", "activemq", "enable"], "readOnly": false, "type": "boolean"}, "services.activemq.extraJavaOptions": {"declarations": ["nixos/modules/services/amqp/activemq/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Add extra options here that you want to be sent to the\nJava runtime when the broker service is started.\n"}, "example": {"_type": "literalExpression", "text": "\"-Xmx2G -Xms2G -XX:MaxPermSize=512M\""}, "loc": ["services", "activemq", "extraJavaOptions"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.activemq.javaProperties": {"declarations": ["nixos/modules/services/amqp/activemq/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specifies Java properties that are sent to the ActiveMQ\nbroker service with the \"-D\" option. You can set properties\nhere to change the behaviour and configuration of the broker.\nAll essential properties that are not set here are automatically\ngiven reasonable defaults.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"java.net.preferIPv4Stack\" = \"true\";\n}\n"}, "loc": ["services", "activemq", "javaProperties"], "readOnly": false, "type": "attribute set"}, "services.actkbd.bindings": {"declarations": ["nixos/modules/services/hardware/actkbd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Key bindings for {command}`actkbd`.\n\nSee {command}`actkbd` {file}`README` for documentation.\n\nThe example shows a piece of what {option}`sound.mediaKeys.enable` does when enabled.\n"}, "example": {"_type": "literalExpression", "text": "[ { keys = [ 113 ]; events = [ \"key\" ]; command = \"${pkgs.alsa-utils}/bin/amixer -q set Master toggle\"; }\n]\n"}, "loc": ["services", "actkbd", "bindings"], "readOnly": false, "type": "list of (submodule)"}, "services.actkbd.bindings.*.attributes": {"declarations": ["nixos/modules/services/hardware/actkbd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"exec\"\n]"}, "description": {"_type": "mdDoc", "text": "List of attributes."}, "loc": ["services", "actkbd", "bindings", "*", "attributes"], "readOnly": false, "type": "list of string"}, "services.actkbd.bindings.*.command": {"declarations": ["nixos/modules/services/hardware/actkbd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "What to run."}, "loc": ["services", "actkbd", "bindings", "*", "command"], "readOnly": false, "type": "string"}, "services.actkbd.bindings.*.events": {"declarations": ["nixos/modules/services/hardware/actkbd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"key\"\n]"}, "description": {"_type": "mdDoc", "text": "List of events to match."}, "loc": ["services", "actkbd", "bindings", "*", "events"], "readOnly": false, "type": "list of (one of \"key\", \"rep\", \"rel\")"}, "services.actkbd.bindings.*.keys": {"declarations": ["nixos/modules/services/hardware/actkbd.nix"], "description": {"_type": "mdDoc", "text": "List of keycodes to match."}, "loc": ["services", "actkbd", "bindings", "*", "keys"], "readOnly": false, "type": "list of signed integer"}, "services.actkbd.enable": {"declarations": ["nixos/modules/services/hardware/actkbd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the {command}`actkbd` key mapping daemon.\n\nTurning this on will start an {command}`actkbd`\ninstance for every evdev input that has at least one key\n(which is okay even for systems with tiny memory footprint,\nsince actkbd normally uses \\<100 bytes of memory per\ninstance).\n\nThis allows binding keys globally without the need for e.g.\nX11.\n"}, "loc": ["services", "actkbd", "enable"], "readOnly": false, "type": "boolean"}, "services.actkbd.extraConfig": {"declarations": ["nixos/modules/services/hardware/actkbd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Literal contents to append to the end of actkbd configuration file.\n"}, "loc": ["services", "actkbd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.adguardhome.enable": {"declarations": ["nixos/modules/services/networking/adguardhome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable AdGuard Home network-wide ad blocker."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "adguardhome", "enable"], "readOnly": false, "type": "boolean"}, "services.adguardhome.extraArgs": {"declarations": ["nixos/modules/services/networking/adguardhome.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line parameters to be passed to the adguardhome binary.\n"}, "loc": ["services", "adguardhome", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.adguardhome.mutableSettings": {"declarations": ["nixos/modules/services/networking/adguardhome.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow changes made on the AdGuard Home web interface to persist between\nservice restarts.\n"}, "loc": ["services", "adguardhome", "mutableSettings"], "readOnly": false, "type": "boolean"}, "services.adguardhome.openFirewall": {"declarations": ["nixos/modules/services/networking/adguardhome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the AdGuard Home web interface. Does not\nopen the port needed to access the DNS resolver.\n"}, "loc": ["services", "adguardhome", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.adguardhome.settings": {"declarations": ["nixos/modules/services/networking/adguardhome.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "AdGuard Home configuration. Refer to\n<https://github.com/AdguardTeam/AdGuardHome/wiki/Configuration#configuration-file>\nfor details on supported values.\n\n::: {.note}\nOn start and if {option}`mutableSettings` is `true`,\nthese options are merged into the configuration file on start, taking\nprecedence over configuration changes made on the web interface.\n\nSet this to `null` (default) for a non-declarative configuration without any\nNix-supplied values.\nDeclarative configurations are supplied with a default `schema_version`, `bind_host`, and `bind_port`.\n:::\n"}, "loc": ["services", "adguardhome", "settings"], "readOnly": false, "type": "null or (YAML value)"}, "services.adguardhome.settings.bind_host": {"declarations": ["nixos/modules/services/networking/adguardhome.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Host address to bind HTTP server to.\n"}, "loc": ["services", "adguardhome", "settings", "bind_host"], "readOnly": false, "type": "string"}, "services.adguardhome.settings.bind_port": {"declarations": ["nixos/modules/services/networking/adguardhome.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Port to serve HTTP pages on.\n"}, "loc": ["services", "adguardhome", "settings", "bind_port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.adguardhome.settings.schema_version": {"declarations": ["nixos/modules/services/networking/adguardhome.nix"], "default": {"_type": "literalExpression", "text": "pkgs.adguardhome.schema_version"}, "description": {"_type": "mdDoc", "text": "Schema version for the configuration.\nDefaults to the `schema_version` supplied by `pkgs.adguardhome`.\n"}, "loc": ["services", "adguardhome", "settings", "schema_version"], "readOnly": false, "type": "signed integer"}, "services.aerospike.enable": {"declarations": ["nixos/modules/services/databases/aerospike.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Aerospike server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "aerospike", "enable"], "readOnly": false, "type": "boolean"}, "services.aerospike.extraConfig": {"declarations": ["nixos/modules/services/databases/aerospike.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration"}, "example": {"_type": "literalExpression", "text": "''\n  namespace test {\n    replication-factor 2\n    memory-size 4G\n    default-ttl 30d\n    storage-engine memory\n  }\n''"}, "loc": ["services", "aerospike", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.aerospike.networkConfig": {"declarations": ["nixos/modules/services/databases/aerospike.nix"], "default": {"_type": "literalExpression", "text": "''\n  service {\n    address any\n    port 3000\n  }\n  \n  heartbeat {\n    address any\n    mode mesh\n    port 3002\n    interval 150\n    timeout 10\n  }\n  \n  fabric {\n    address any\n    port 3001\n  }\n  \n  info {\n    address any\n    port 3003\n  }\n''"}, "description": {"_type": "mdDoc", "text": "network section of configuration file"}, "loc": ["services", "aerospike", "networkConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.aerospike.package": {"declarations": ["nixos/modules/services/databases/aerospike.nix"], "default": {"_type": "literalExpression", "text": "pkgs.aerospike"}, "description": {"_type": "mdDoc", "text": "Which Aerospike derivation to use"}, "loc": ["services", "aerospike", "package"], "readOnly": false, "type": "package"}, "services.aerospike.workDir": {"declarations": ["nixos/modules/services/databases/aerospike.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/aerospike\""}, "description": {"_type": "mdDoc", "text": "Location where Aerospike stores its files"}, "loc": ["services", "aerospike", "workDir"], "readOnly": false, "type": "string"}, "services.aesmd.debug": {"declarations": ["nixos/modules/services/security/aesmd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to build the PSW package in debug mode."}, "loc": ["services", "aesmd", "debug"], "readOnly": false, "type": "boolean"}, "services.aesmd.enable": {"declarations": ["nixos/modules/services/security/aesmd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Intel's Architectural Enclave Service Manager (AESM) for Intel SGX."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "aesmd", "enable"], "readOnly": false, "type": "boolean"}, "services.aesmd.environment": {"declarations": ["nixos/modules/services/security/aesmd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional environment variables to pass to the AESM service."}, "example": {"_type": "literalExpression", "text": "{\n  AZDCAP_COLLATERAL_VERSION = \"v2\";\n  AZDCAP_DEBUG_LOG_LEVEL = \"INFO\";\n}"}, "loc": ["services", "aesmd", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.aesmd.quoteProviderLibrary": {"declarations": ["nixos/modules/services/security/aesmd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Custom quote provider library to use."}, "example": {"_type": "literalExpression", "text": "pkgs.sgx-azure-dcap-client"}, "loc": ["services", "aesmd", "quoteProviderLibrary"], "readOnly": false, "type": "null or path"}, "services.aesmd.settings": {"declarations": ["nixos/modules/services/security/aesmd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "AESM configuration"}, "loc": ["services", "aesmd", "settings"], "readOnly": false, "type": "submodule"}, "services.aesmd.settings.defaultQuotingType": {"declarations": ["nixos/modules/services/security/aesmd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Attestation quote type."}, "example": {"_type": "literalExpression", "text": "\"ecdsa_256\""}, "loc": ["services", "aesmd", "settings", "defaultQuotingType"], "readOnly": false, "type": "null or one of \"ecdsa_256\", \"epid_linkable\", \"epid_unlinkable\""}, "services.aesmd.settings.proxy": {"declarations": ["nixos/modules/services/security/aesmd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP network proxy."}, "example": {"_type": "literalExpression", "text": "\"http://proxy_url:1234\""}, "loc": ["services", "aesmd", "settings", "proxy"], "readOnly": false, "type": "null or string"}, "services.aesmd.settings.proxyType": {"declarations": ["nixos/modules/services/security/aesmd.nix"], "default": {"_type": "literalExpression", "text": "if (config.services.aesmd.settings.proxy != null) then \"manual\" else null\n"}, "description": {"_type": "mdDoc", "text": "Type of proxy to use. The `default` uses the system's default proxy.\nIf `direct` is given, uses no proxy.\nA value of `manual` uses the proxy from\n{option}`services.aesmd.settings.proxy`.\n"}, "example": {"_type": "literalExpression", "text": "\"default\""}, "loc": ["services", "aesmd", "settings", "proxyType"], "readOnly": false, "type": "null or one of \"default\", \"direct\", \"manual\""}, "services.aesmd.settings.whitelistUrl": {"declarations": ["nixos/modules/services/security/aesmd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "URL to retrieve authorized Intel SGX enclave signers."}, "example": {"_type": "literalExpression", "text": "\"http://whitelist.trustedservices.intel.com/SGX/LCWL/Linux/sgx_white_list_cert.bin\""}, "loc": ["services", "aesmd", "settings", "whitelistUrl"], "readOnly": false, "type": "null or string"}, "services.agate.addresses": {"declarations": ["nixos/modules/services/web-servers/agate.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0:1965\"\n]"}, "description": {"_type": "mdDoc", "text": "Addresses to listen on, IP:PORT, if you haven't disabled forwarding\nonly set IPv4.\n"}, "loc": ["services", "agate", "addresses"], "readOnly": false, "type": "list of string"}, "services.agate.certificatesDir": {"declarations": ["nixos/modules/services/web-servers/agate.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/agate/certificates\""}, "description": {"_type": "mdDoc", "text": "Root of the certificate directory."}, "loc": ["services", "agate", "certificatesDir"], "readOnly": false, "type": "path"}, "services.agate.contentDir": {"declarations": ["nixos/modules/services/web-servers/agate.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/agate/content\""}, "description": {"_type": "mdDoc", "text": "Root of the content directory."}, "loc": ["services", "agate", "contentDir"], "readOnly": false, "type": "path"}, "services.agate.enable": {"declarations": ["nixos/modules/services/web-servers/agate.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Agate Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "agate", "enable"], "readOnly": false, "type": "boolean"}, "services.agate.extraArgs": {"declarations": ["nixos/modules/services/web-servers/agate.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments to use running agate."}, "example": {"_type": "literalExpression", "text": "[\n  \"--log-ip\"\n]"}, "loc": ["services", "agate", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.agate.hostnames": {"declarations": ["nixos/modules/services/web-servers/agate.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Domain name of this Gemini server, enables checking hostname and port\nin requests. (multiple occurrences means basic vhosts)\n"}, "loc": ["services", "agate", "hostnames"], "readOnly": false, "type": "list of string"}, "services.agate.language": {"declarations": ["nixos/modules/services/web-servers/agate.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "RFC 4646 Language code for text/gemini documents."}, "loc": ["services", "agate", "language"], "readOnly": false, "type": "null or string"}, "services.agate.onlyTls_1_3": {"declarations": ["nixos/modules/services/web-servers/agate.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Only use TLSv1.3 (default also allows TLSv1.2)."}, "loc": ["services", "agate", "onlyTls_1_3"], "readOnly": false, "type": "boolean"}, "services.agate.package": {"declarations": ["nixos/modules/services/web-servers/agate.nix"], "default": {"_type": "literalExpression", "text": "pkgs.agate"}, "description": {"_type": "mdDoc", "text": "The package to use"}, "loc": ["services", "agate", "package"], "readOnly": false, "type": "package"}, "services.airsonic.contextPath": {"declarations": ["nixos/modules/services/misc/airsonic.nix"], "default": {"_type": "literalExpression", "text": "\"/\""}, "description": {"_type": "mdDoc", "text": "The context path, i.e., the last part of the Airsonic\nURL. Typically '/' or '/airsonic'. Default '/'\n"}, "loc": ["services", "airsonic", "contextPath"], "readOnly": false, "type": "path"}, "services.airsonic.enable": {"declarations": ["nixos/modules/services/misc/airsonic.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Airsonic, the Free and Open Source media streaming server (fork of Subsonic and Libresonic)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "airsonic", "enable"], "readOnly": false, "type": "boolean"}, "services.airsonic.home": {"declarations": ["nixos/modules/services/misc/airsonic.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/airsonic\""}, "description": {"_type": "mdDoc", "text": "The directory where Airsonic will create files.\nMake sure it is writable.\n"}, "loc": ["services", "airsonic", "home"], "readOnly": false, "type": "path"}, "services.airsonic.jre": {"declarations": ["nixos/modules/services/misc/airsonic.nix"], "default": {"_type": "literalExpression", "text": "pkgs.jre8"}, "description": {"_type": "mdDoc", "text": "JRE package to use.\n\nAirsonic only supports Java 8, airsonic-advanced requires at least\nJava 11.\n"}, "loc": ["services", "airsonic", "jre"], "readOnly": false, "type": "package"}, "services.airsonic.jvmOptions": {"declarations": ["nixos/modules/services/misc/airsonic.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line options for the JVM running AirSonic.\nUseful for sending jukebox output to non-default alsa\ndevices.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-Djavax.sound.sampled.Clip='#CODEC [plughw:1,0]'\"\n  \"-Djavax.sound.sampled.Port='#Port CODEC [hw:1]'\"\n  \"-Djavax.sound.sampled.SourceDataLine='#CODEC [plughw:1,0]'\"\n  \"-Djavax.sound.sampled.TargetDataLine='#CODEC [plughw:1,0]'\"\n]"}, "loc": ["services", "airsonic", "jvmOptions"], "readOnly": false, "type": "list of string"}, "services.airsonic.listenAddress": {"declarations": ["nixos/modules/services/misc/airsonic.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The host name or IP address on which to bind Airsonic.\nThe default value is appropriate for first launch, when the\ndefault credentials are easy to guess. It is also appropriate\nif you intend to use the virtualhost option in the service\nmodule. In other cases, you may want to change this to a\nspecific IP or 0.0.0.0 to listen on all interfaces.\n"}, "loc": ["services", "airsonic", "listenAddress"], "readOnly": false, "type": "string"}, "services.airsonic.maxMemory": {"declarations": ["nixos/modules/services/misc/airsonic.nix"], "default": {"_type": "literalExpression", "text": "100"}, "description": {"_type": "mdDoc", "text": "The memory limit (max Java heap size) in megabytes.\nDefault: 100\n"}, "loc": ["services", "airsonic", "maxMemory"], "readOnly": false, "type": "signed integer"}, "services.airsonic.port": {"declarations": ["nixos/modules/services/misc/airsonic.nix"], "default": {"_type": "literalExpression", "text": "4040"}, "description": {"_type": "mdDoc", "text": "The port on which Airsonic will listen for\nincoming HTTP traffic. Set to 0 to disable.\n"}, "loc": ["services", "airsonic", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.airsonic.transcoders": {"declarations": ["nixos/modules/services/misc/airsonic.nix"], "default": {"_type": "literalExpression", "text": "[ \"${pkgs.ffmpeg.bin}/bin/ffmpeg\" ]"}, "description": {"_type": "mdDoc", "text": "List of paths to transcoder executables that should be accessible\nfrom Airsonic. Symlinks will be created to each executable inside\n${config.services.airsonic.home}/transcoders.\n"}, "loc": ["services", "airsonic", "transcoders"], "readOnly": false, "type": "list of path"}, "services.airsonic.user": {"declarations": ["nixos/modules/services/misc/airsonic.nix"], "default": {"_type": "literalExpression", "text": "\"airsonic\""}, "description": {"_type": "mdDoc", "text": "User account under which airsonic runs."}, "loc": ["services", "airsonic", "user"], "readOnly": false, "type": "string"}, "services.airsonic.virtualHost": {"declarations": ["nixos/modules/services/misc/airsonic.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the nginx virtualhost to use and setup. If null, do not setup any virtualhost.\n"}, "loc": ["services", "airsonic", "virtualHost"], "readOnly": false, "type": "null or string"}, "services.airsonic.war": {"declarations": ["nixos/modules/services/misc/airsonic.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.airsonic}/webapps/airsonic.war\""}, "description": {"_type": "mdDoc", "text": "Airsonic war file to use."}, "loc": ["services", "airsonic", "war"], "readOnly": false, "type": "path"}, "services.akkoma.config": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "description": {"_type": "mdDoc", "text": "Configuration for Akkoma. The attributes are serialised to Elixir DSL.\n\nRefer to <https://docs.akkoma.dev/stable/configuration/cheatsheet/> for\nconfiguration options.\n\nSettings containing secret data should be set to an attribute set containing the\nattribute `_secret` - a string pointing to a file containing the value the option\nshould be set to.\n"}, "loc": ["services", "akkoma", "config"], "readOnly": false, "type": "attribute set of attribute set of (Elixir value)"}, "services.akkoma.config.\":joken\".\":default_signer\"": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "{\n  _secret = \"/var/lib/secrets/akkoma/jwt-signer\";\n}"}, "description": {"_type": "mdDoc", "text": "JWT signing secret.\n\nThe attribute `_secret` should point to a file containing the secret.\n\nThis secret can be generated as follows:\n\n```ShellSession\n$ tr -dc 'A-Za-z0-9-._~' </dev/urandom | head -c 64\n```\n"}, "loc": ["services", "akkoma", "config", ":joken", ":default_signer"], "readOnly": false, "type": "secret value"}, "services.akkoma.config.\":logger\".\":ex_syslogger\".level": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "\":info\""}, "description": {"_type": "mdDoc", "text": "Log level.\n\nRefer to\n<https://hexdocs.pm/logger/Logger.html#module-levels>\nfor options.\n"}, "example": {"_type": "literalExpression", "text": "\":warning\""}, "loc": ["services", "akkoma", "config", ":logger", ":ex_syslogger", "level"], "readOnly": false, "type": "non-empty string"}, "services.akkoma.config.\":pleroma\".\":frontends\"": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "lib.mapAttrs (key: val:\n  (pkgs.formats.elixirConf { }).lib.mkMap { name = val.name; ref = val.ref; })\n  config.services.akkoma.frontends;\n"}, "description": {"_type": "mdDoc", "text": "Frontend configuration.\n\nUsers should rely on the default value and prefer to configure frontends through\n[{option}`config.services.akkoma.frontends`](#opt-services.akkoma.frontends).\n"}, "loc": ["services", "akkoma", "config", ":pleroma", ":frontends"], "readOnly": false, "type": "Elixir value"}, "services.akkoma.config.\":pleroma\".\":instance\".description": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "description": {"_type": "mdDoc", "text": "Instance description."}, "loc": ["services", "akkoma", "config", ":pleroma", ":instance", "description"], "readOnly": false, "type": "non-empty string"}, "services.akkoma.config.\":pleroma\".\":instance\".email": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "description": {"_type": "mdDoc", "text": "Instance administrator email."}, "loc": ["services", "akkoma", "config", ":pleroma", ":instance", "email"], "readOnly": false, "type": "non-empty string"}, "services.akkoma.config.\":pleroma\".\":instance\".name": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "description": {"_type": "mdDoc", "text": "Instance name."}, "loc": ["services", "akkoma", "config", ":pleroma", ":instance", "name"], "readOnly": false, "type": "non-empty string"}, "services.akkoma.config.\":pleroma\".\":instance\".static_dir": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalMD", "text": "Derivation gathering the following paths into a directory:\n\n- [{option}`services.akkoma.frontends`](#opt-services.akkoma.frontends)\n- [{option}`services.akkoma.extraStatic`](#opt-services.akkoma.extraStatic)\n"}, "description": {"_type": "mdDoc", "text": "Directory of static files.\n\nThis directory can be built using a derivation, or it can be managed as mutable\nstate by setting the option to an absolute path.\n"}, "loc": ["services", "akkoma", "config", ":pleroma", ":instance", "static_dir"], "readOnly": false, "type": "path"}, "services.akkoma.config.\":pleroma\".\":instance\".upload_dir": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/akkoma/uploads\""}, "description": {"_type": "mdDoc", "text": "Directory where Akkoma will put uploaded files.\n"}, "loc": ["services", "akkoma", "config", ":pleroma", ":instance", "upload_dir"], "readOnly": false, "type": "absolute path"}, "services.akkoma.config.\":pleroma\".\"Pleroma.Repo\"": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "{\n  adapter = (pkgs.formats.elixirConf { }).lib.mkRaw \"Ecto.Adapters.Postgres\";\n  socket_dir = \"/run/postgresql\";\n  username = config.services.akkoma.user;\n  database = \"akkoma\";\n}\n"}, "description": {"_type": "mdDoc", "text": "Database configuration.\n\nRefer to\n<https://hexdocs.pm/ecto_sql/Ecto.Adapters.Postgres.html#module-connection-options>\nfor options.\n"}, "loc": ["services", "akkoma", "config", ":pleroma", "Pleroma.Repo"], "readOnly": false, "type": "Elixir value"}, "services.akkoma.config.\":pleroma\".\"Pleroma.Web.Endpoint\".http.ip": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "\"/run/akkoma/socket\""}, "description": {"_type": "mdDoc", "text": "Listener IP address or Unix socket path.\n\nThe value is automatically converted to Elixir\u2019s internal address\nrepresentation during serialisation.\n"}, "example": {"_type": "literalExpression", "text": "\"::1\""}, "loc": ["services", "akkoma", "config", ":pleroma", "Pleroma.Web.Endpoint", "http", "ip"], "readOnly": false, "type": "absolute path or IPv4 or IPv6 address"}, "services.akkoma.config.\":pleroma\".\"Pleroma.Web.Endpoint\".http.port": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "if isAbsolutePath config.services.akkoma.config.:pleroma\".\"Pleroma.Web.Endpoint\".http.ip\n  then 0\n  else 4000;\n"}, "description": {"_type": "mdDoc", "text": "Listener port number.\n\nMust be 0 if using a Unix socket.\n"}, "loc": ["services", "akkoma", "config", ":pleroma", "Pleroma.Web.Endpoint", "http", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.akkoma.config.\":pleroma\".\"Pleroma.Web.Endpoint\".live_view.signing_salt": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "{\n  _secret = \"/var/lib/secrets/akkoma/liveview-salt\";\n}"}, "description": {"_type": "mdDoc", "text": "LiveView signing salt.\n\nThe attribute `_secret` should point to a file containing the secret.\n\nThis salt can be generated as follows:\n\n```ShellSession\n$ tr -dc 'A-Za-z0-9-._~' </dev/urandom | head -c 8\n```\n"}, "loc": ["services", "akkoma", "config", ":pleroma", "Pleroma.Web.Endpoint", "live_view", "signing_salt"], "readOnly": false, "type": "secret value"}, "services.akkoma.config.\":pleroma\".\"Pleroma.Web.Endpoint\".secret_key_base": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "{\n  _secret = \"/var/lib/secrets/akkoma/key-base\";\n}"}, "description": {"_type": "mdDoc", "text": "Secret key used as a base to generate further secrets for encrypting and\nsigning data.\n\nThe attribute `_secret` should point to a file containing the secret.\n\nThis key can generated can be generated as follows:\n\n```ShellSession\n$ tr -dc 'A-Za-z-._~' </dev/urandom | head -c 64\n```\n"}, "loc": ["services", "akkoma", "config", ":pleroma", "Pleroma.Web.Endpoint", "secret_key_base"], "readOnly": false, "type": "secret value"}, "services.akkoma.config.\":pleroma\".\"Pleroma.Web.Endpoint\".signing_salt": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "{\n  _secret = \"/var/lib/secrets/akkoma/signing-salt\";\n}"}, "description": {"_type": "mdDoc", "text": "Signing salt.\n\nThe attribute `_secret` should point to a file containing the secret.\n\nThis salt can be generated as follows:\n\n```ShellSession\n$ tr -dc 'A-Za-z0-9-._~' </dev/urandom | head -c 8\n```\n"}, "loc": ["services", "akkoma", "config", ":pleroma", "Pleroma.Web.Endpoint", "signing_salt"], "readOnly": false, "type": "secret value"}, "services.akkoma.config.\":pleroma\".\"Pleroma.Web.Endpoint\".url.host": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "config.networking.fqdn"}, "description": {"_type": "mdDoc", "text": "Domain name of the instance."}, "loc": ["services", "akkoma", "config", ":pleroma", "Pleroma.Web.Endpoint", "url", "host"], "readOnly": false, "type": "non-empty string"}, "services.akkoma.config.\":pleroma\".\"Pleroma.Web.Endpoint\".url.port": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "443"}, "description": {"_type": "mdDoc", "text": "External port number."}, "loc": ["services", "akkoma", "config", ":pleroma", "Pleroma.Web.Endpoint", "url", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.akkoma.config.\":pleroma\".\"Pleroma.Web.Endpoint\".url.scheme": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "\"https\""}, "description": {"_type": "mdDoc", "text": "URL scheme."}, "loc": ["services", "akkoma", "config", ":pleroma", "Pleroma.Web.Endpoint", "url", "scheme"], "readOnly": false, "type": "non-empty string"}, "services.akkoma.config.\":web_push_encryption\"": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Web Push Notifications configuration.\n\nThe necessary key pair can be generated as follows:\n\n```ShellSession\n$ nix-shell -p nodejs --run 'npx web-push generate-vapid-keys'\n```\n"}, "loc": ["services", "akkoma", "config", ":web_push_encryption"], "readOnly": false, "type": "Elixir value"}, "services.akkoma.config.\":web_push_encryption\".\":vapid_details\".private_key": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "{\n  _secret = \"/var/lib/secrets/akkoma/vapid-private\";\n}"}, "description": {"_type": "mdDoc", "text": "base64-encoded private ECDH key.\n\nThe attribute `_secret` should point to a file containing the secret.\n"}, "loc": ["services", "akkoma", "config", ":web_push_encryption", ":vapid_details", "private_key"], "readOnly": false, "type": "secret value"}, "services.akkoma.config.\":web_push_encryption\".\":vapid_details\".public_key": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "{\n  _secret = \"/var/lib/secrets/akkoma/vapid-public\";\n}"}, "description": {"_type": "mdDoc", "text": "base64-encoded public ECDH key."}, "loc": ["services", "akkoma", "config", ":web_push_encryption", ":vapid_details", "public_key"], "readOnly": false, "type": "non-empty string or secret value"}, "services.akkoma.config.\":web_push_encryption\".\":vapid_details\".subject": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "\"mailto:${config.services.akkoma.config.\":pleroma\".\":instance\".email}\"\n"}, "description": {"_type": "mdDoc", "text": "mailto URI for administrative contact."}, "loc": ["services", "akkoma", "config", ":web_push_encryption", ":vapid_details", "subject"], "readOnly": false, "type": "non-empty string"}, "services.akkoma.dist.address": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listen address for Erlang distribution protocol and Port Mapper Daemon (epmd).\n"}, "loc": ["services", "akkoma", "dist", "address"], "readOnly": false, "type": "IPv4 or IPv6 address"}, "services.akkoma.dist.cookie": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Erlang release cookie.\n\nIf set to `null`, a temporary random cookie will be generated.\n"}, "example": {"_type": "literalExpression", "text": "{\n  _secret = \"/var/lib/secrets/akkoma/releaseCookie\";\n}"}, "loc": ["services", "akkoma", "dist", "cookie"], "readOnly": false, "type": "null or secret value"}, "services.akkoma.dist.epmdPort": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "4369"}, "description": {"_type": "mdDoc", "text": "TCP port to bind Erlang Port Mapper Daemon to."}, "loc": ["services", "akkoma", "dist", "epmdPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.akkoma.dist.portMax": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "65535"}, "description": {"_type": "mdDoc", "text": "Upper bound for Erlang distribution protocol TCP port."}, "loc": ["services", "akkoma", "dist", "portMax"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.akkoma.dist.portMin": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "49152"}, "description": {"_type": "mdDoc", "text": "Lower bound for Erlang distribution protocol TCP port."}, "loc": ["services", "akkoma", "dist", "portMin"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.akkoma.enable": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Akkoma."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "akkoma", "enable"], "readOnly": false, "type": "boolean"}, "services.akkoma.extraPackages": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "with pkgs; [ exiftool graphicsmagick-imagemagick-compat ffmpeg_5-headless ]"}, "description": {"_type": "mdDoc", "text": "List of extra packages to include in the executable search path of the service unit.\nThese are needed by various configurable components such as:\n\n- ExifTool for the `Pleroma.Upload.Filter.Exiftool` upload filter,\n- ImageMagick for still image previews in the media proxy as well as for the\n  `Pleroma.Upload.Filters.Mogrify` upload filter, and\n- ffmpeg for video previews in the media proxy.\n"}, "example": {"_type": "literalExpression", "text": "with pkgs; [ exiftool imagemagick ffmpeg_5-full ]"}, "loc": ["services", "akkoma", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.akkoma.extraStatic": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Attribute set of extra packages to add to the static files directory.\n\nDo not add frontends here. These should be configured through\n[{option}`services.akkoma.frontends`](#opt-services.akkoma.frontends).\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"emoji/blobs.gg\" = pkgs.akkoma-emoji.blobs_gg;\n  \"static/terms-of-service.html\" = pkgs.writeText \"terms-of-service.html\" ''\n    \u2026\n  '';\n  \"favicon.png\" = let\n    rev = \"697a8211b0f427a921e7935a35d14bb3e32d0a2c\";\n  in pkgs.stdenvNoCC.mkDerivation {\n    name = \"favicon.png\";\n\n    src = pkgs.fetchurl {\n      url = \"https://raw.githubusercontent.com/TilCreator/NixOwO/${rev}/NixOwO_plain.svg\";\n      hash = \"sha256-tWhHMfJ3Od58N9H5yOKPMfM56hYWSOnr/TGCBi8bo9E=\";\n    };\n\n    nativeBuildInputs = with pkgs; [ librsvg ];\n\n    dontUnpack = true;\n    installPhase = ''\n      rsvg-convert -o $out -w 96 -h 96 $src\n    '';\n  };\n}\n"}, "loc": ["services", "akkoma", "extraStatic"], "readOnly": false, "type": "null or (attribute set of package)"}, "services.akkoma.frontends": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "{\n  primary = {\n    package = pkgs.akkoma-frontends.akkoma-fe;\n    name = \"akkoma-fe\";\n    ref = \"stable\";\n  };\n  admin = {\n    package = pkgs.akkoma-frontends.admin-fe;\n    name = \"admin-fe\";\n    ref = \"stable\";\n  };\n}\n"}, "description": {"_type": "mdDoc", "text": "Akkoma frontends."}, "loc": ["services", "akkoma", "frontends"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.akkoma.frontends.<name>.name": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "description": {"_type": "mdDoc", "text": "Akkoma frontend name."}, "example": {"_type": "literalExpression", "text": "\"akkoma-fe\""}, "loc": ["services", "akkoma", "frontends", "<name>", "name"], "readOnly": false, "type": "non-empty string"}, "services.akkoma.frontends.<name>.package": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "description": {"_type": "mdDoc", "text": "Akkoma frontend package."}, "example": {"_type": "literalExpression", "text": "pkgs.akkoma-frontends.akkoma-fe"}, "loc": ["services", "akkoma", "frontends", "<name>", "package"], "readOnly": false, "type": "package"}, "services.akkoma.frontends.<name>.ref": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "description": {"_type": "mdDoc", "text": "Akkoma frontend reference."}, "example": {"_type": "literalExpression", "text": "\"stable\""}, "loc": ["services", "akkoma", "frontends", "<name>", "ref"], "readOnly": false, "type": "non-empty string"}, "services.akkoma.group": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "\"akkoma\""}, "description": {"_type": "mdDoc", "text": "Group account under which Akkoma runs."}, "loc": ["services", "akkoma", "group"], "readOnly": false, "type": "non-empty string"}, "services.akkoma.initDb.enable": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to automatically initialise the database on startup. This will create a\ndatabase role and database if they do not already exist, and (re)set the role password\nand the ownership of the database.\n\nThis setting can be used safely even if the database already exists and contains data.\n\nThe database settings are configured through\n[{option}`config.services.akkoma.config.\":pleroma\".\"Pleroma.Repo\"`](#opt-services.akkoma.config.__pleroma_._Pleroma.Repo_).\n\nIf disabled, the database has to be set up manually:\n\n```SQL\nCREATE ROLE akkoma LOGIN;\n\nCREATE DATABASE akkoma\n  OWNER akkoma\n  TEMPLATE template0\n  ENCODING 'utf8'\n  LOCALE 'C';\n\n\\connect akkoma\nCREATE EXTENSION IF NOT EXISTS citext;\nCREATE EXTENSION IF NOT EXISTS pg_trgm;\nCREATE EXTENSION IF NOT EXISTS \"uuid-ossp\";\n```\n"}, "loc": ["services", "akkoma", "initDb", "enable"], "readOnly": false, "type": "boolean"}, "services.akkoma.initDb.password": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password of the database user to initialise the database with.\n\nIf set to `null`, no password will be used.\n\nThe attribute `_secret` should point to a file containing the secret.\n"}, "loc": ["services", "akkoma", "initDb", "password"], "readOnly": false, "type": "null or secret value"}, "services.akkoma.initDb.username": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "config.services.postgresql.superUser"}, "description": {"_type": "mdDoc", "text": "Name of the database user to initialise the database with.\n\nThis user is required to have the `CREATEROLE` and `CREATEDB` capabilities.\n"}, "loc": ["services", "akkoma", "initDb", "username"], "readOnly": false, "type": "non-empty string"}, "services.akkoma.initSecrets": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to initialise non\u2010existent secrets with random values.\n\nIf enabled, appropriate secrets for the following options will be created automatically\nif the files referenced in the `_secrets` attribute do not exist during startup.\n\n- {option}`config.\":pleroma\".\"Pleroma.Web.Endpoint\".secret_key_base`\n- {option}`config.\":pleroma\".\"Pleroma.Web.Endpoint\".signing_salt`\n- {option}`config.\":pleroma\".\"Pleroma.Web.Endpoint\".live_view.signing_salt`\n- {option}`config.\":web_push_encryption\".\":vapid_details\".private_key`\n- {option}`config.\":web_push_encryption\".\":vapid_details\".public_key`\n- {option}`config.\":joken\".\":default_signer\"`\n"}, "loc": ["services", "akkoma", "initSecrets"], "readOnly": false, "type": "boolean"}, "services.akkoma.installWrapper": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install a wrapper around `pleroma_ctl` to simplify administration of the\nAkkoma instance.\n"}, "loc": ["services", "akkoma", "installWrapper"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Extra configuration for the nginx virtual host of Akkoma.\n\nIf set to `null`, no virtual host will be added to the nginx configuration.\n"}, "loc": ["services", "akkoma", "nginx"], "readOnly": false, "type": "null or (submodule)"}, "services.akkoma.nginx.acmeFallbackHost": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host which to proxy requests to if ACME challenge is not found. Useful\nif you want multiple hosts to be able to verify the same domain name.\n\nWith this option, you could request certificates for the present domain\nwith an ACME client that is running on another host, which you would\nspecify here.\n"}, "loc": ["services", "akkoma", "nginx", "acmeFallbackHost"], "readOnly": false, "type": "null or string"}, "services.akkoma.nginx.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the ACME challenge, which is **public**. Don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "akkoma", "nginx", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.akkoma.nginx.addSSL": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "akkoma", "nginx", "addSSL"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.basicAuth": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "akkoma", "nginx", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.akkoma.nginx.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "akkoma", "nginx", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.akkoma.nginx.default": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Makes this vhost the default.\n"}, "loc": ["services", "akkoma", "nginx", "default"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.enableACME": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "akkoma", "nginx", "enableACME"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.extraConfig": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the vhost verbatim.\n"}, "loc": ["services", "akkoma", "nginx", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.akkoma.nginx.forceSSL": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "akkoma", "nginx", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given hostname.\n"}, "example": {"_type": "literalExpression", "text": "\"newserver.example.org\""}, "loc": ["services", "akkoma", "nginx", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.akkoma.nginx.http2": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/2 protocol.\nNote that (as of writing) due to nginx's implementation, to disable\nHTTP/2 you have to disable it on all vhosts that use a given\nIP address / port.\nIf there is one server block configured to enable http2, then it is\nenabled for all server blocks on this IP.\nSee https://stackoverflow.com/a/39466948/263061.\n"}, "loc": ["services", "akkoma", "nginx", "http2"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.http3": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/3 protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that HTTP/3 support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "akkoma", "nginx", "http3"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.http3_hq": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that special application protocol support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "akkoma", "nginx", "http3_hq"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.kTLS": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kTLS support.\nImplementing TLS in the kernel (kTLS) improves performance by significantly\nreducing the need for copying operations between user space and the kernel.\nRequired Nginx version 1.21.4 or later.\n"}, "loc": ["services", "akkoma", "nginx", "kTLS"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.listen": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\nIPv6 addresses must be enclosed in square brackets.\nNote: this option overrides `addSSL`\nand `onlySSL`.\n\nIf you only want to set the addresses manually and not\nthe ports, take a look at `listenAddresses`\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    addr = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    addr = \"192.154.1.1\";\n    port = 80;\n  }\n]"}, "loc": ["services", "akkoma", "nginx", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.akkoma.nginx.listen.*.addr": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "description": {"_type": "mdDoc", "text": "IP address."}, "loc": ["services", "akkoma", "nginx", "listen", "*", "addr"], "readOnly": false, "type": "string"}, "services.akkoma.nginx.listen.*.extraParameters": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters of this listen directive."}, "example": {"_type": "literalExpression", "text": "[\n  \"backlog=1024\"\n  \"deferred\"\n]"}, "loc": ["services", "akkoma", "nginx", "listen", "*", "extraParameters"], "readOnly": false, "type": "list of string"}, "services.akkoma.nginx.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Port number."}, "loc": ["services", "akkoma", "nginx", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.akkoma.nginx.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SSL."}, "loc": ["services", "akkoma", "nginx", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n\nNote: This option overrides `enableIPv6`\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"[::1]\"\n]"}, "loc": ["services", "akkoma", "nginx", "listenAddresses"], "readOnly": false, "type": "list of string"}, "services.akkoma.nginx.locations": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n};\n"}, "loc": ["services", "akkoma", "nginx", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.akkoma.nginx.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "akkoma", "nginx", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.akkoma.nginx.locations.<name>.basicAuth": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "akkoma", "nginx", "locations", "<name>", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.akkoma.nginx.locations.<name>.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "akkoma", "nginx", "locations", "<name>", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.akkoma.nginx.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "akkoma", "nginx", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.akkoma.nginx.locations.<name>.fastcgiParams": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "FastCGI parameters to override.  Unlike in the Nginx\nconfiguration file, overriding only some default parameters\nwon't unset the default values for other parameters.\n"}, "loc": ["services", "akkoma", "nginx", "locations", "<name>", "fastcgiParams"], "readOnly": false, "type": "attribute set of (string or path)"}, "services.akkoma.nginx.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds index directive.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "akkoma", "nginx", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.akkoma.nginx.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "akkoma", "nginx", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.akkoma.nginx.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds proxy_pass directive and sets recommended proxy headers if\nrecommendedProxySettings is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "akkoma", "nginx", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.akkoma.nginx.locations.<name>.proxyWebsockets": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to support proxying websocket connections with HTTP/1.1.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "akkoma", "nginx", "locations", "<name>", "proxyWebsockets"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.locations.<name>.recommendedProxySettings": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "config.services.nginx.recommendedProxySettings"}, "description": {"_type": "mdDoc", "text": "Enable recommended proxy settings.\n"}, "loc": ["services", "akkoma", "nginx", "locations", "<name>", "recommendedProxySettings"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.locations.<name>.return": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds a return directive, for e.g. redirections.\n"}, "example": {"_type": "literalExpression", "text": "\"301 http://example.com$request_uri\""}, "loc": ["services", "akkoma", "nginx", "locations", "<name>", "return"], "readOnly": false, "type": "null or string"}, "services.akkoma.nginx.locations.<name>.root": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Root directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/root/directory\""}, "loc": ["services", "akkoma", "nginx", "locations", "<name>", "root"], "readOnly": false, "type": "null or path"}, "services.akkoma.nginx.locations.<name>.tryFiles": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds try_files directive.\n"}, "example": {"_type": "literalExpression", "text": "\"$uri =404\""}, "loc": ["services", "akkoma", "nginx", "locations", "<name>", "tryFiles"], "readOnly": false, "type": "null or string"}, "services.akkoma.nginx.onlySSL": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "akkoma", "nginx", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.quic": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the QUIC transport protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.\nNote that QUIC support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "akkoma", "nginx", "quic"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.rejectSSL": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to listen for and reject all HTTPS connections to this vhost. Useful in\n[default](#opt-services.nginx.virtualHosts._name_.default)\nserver blocks to avoid serving the certificate for another vhost. Uses the\n`ssl_reject_handshake` directive available in nginx versions\n1.19.4 and above.\n"}, "loc": ["services", "akkoma", "nginx", "rejectSSL"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.reuseport": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create an individual listening socket .\nIt is required to specify only once on one of the hosts.\n"}, "loc": ["services", "akkoma", "nginx", "reuseport"], "readOnly": false, "type": "boolean"}, "services.akkoma.nginx.root": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of the web root directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "akkoma", "nginx", "root"], "readOnly": false, "type": "null or path"}, "services.akkoma.nginx.serverAliases": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"example.org\"\n]"}, "loc": ["services", "akkoma", "nginx", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.akkoma.nginx.serverName": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of this virtual host. Defaults to attribute name in virtualHosts.\n"}, "example": {"_type": "literalExpression", "text": "\"example.org\""}, "loc": ["services", "akkoma", "nginx", "serverName"], "readOnly": false, "type": "null or string"}, "services.akkoma.nginx.sslCertificate": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "akkoma", "nginx", "sslCertificate"], "readOnly": false, "type": "path"}, "services.akkoma.nginx.sslCertificateKey": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "akkoma", "nginx", "sslCertificateKey"], "readOnly": false, "type": "path"}, "services.akkoma.nginx.sslTrustedCertificate": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to root SSL certificate for stapling and client certificates."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\""}, "loc": ["services", "akkoma", "nginx", "sslTrustedCertificate"], "readOnly": false, "type": "null or path"}, "services.akkoma.nginx.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "akkoma", "nginx", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.akkoma.package": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "pkgs.akkoma"}, "description": {"_type": "mdDoc", "text": "Akkoma package to use."}, "loc": ["services", "akkoma", "package"], "readOnly": false, "type": "package"}, "services.akkoma.user": {"declarations": ["nixos/modules/services/web-apps/akkoma.nix"], "default": {"_type": "literalExpression", "text": "\"akkoma\""}, "description": {"_type": "mdDoc", "text": "User account under which Akkoma runs."}, "loc": ["services", "akkoma", "user"], "readOnly": false, "type": "non-empty string"}, "services.alerta.authenticationRequired": {"declarations": ["nixos/modules/services/monitoring/alerta.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether users must authenticate when using the web UI or command-line tool"}, "loc": ["services", "alerta", "authenticationRequired"], "readOnly": false, "type": "boolean"}, "services.alerta.bind": {"declarations": ["nixos/modules/services/monitoring/alerta.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to bind to. The default is to bind to all addresses"}, "loc": ["services", "alerta", "bind"], "readOnly": false, "type": "string"}, "services.alerta.corsOrigins": {"declarations": ["nixos/modules/services/monitoring/alerta.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"http://localhost\"\n  \"http://localhost:5000\"\n]"}, "description": {"_type": "mdDoc", "text": "List of URLs that can access the API for Cross-Origin Resource Sharing (CORS)"}, "loc": ["services", "alerta", "corsOrigins"], "readOnly": false, "type": "list of string"}, "services.alerta.databaseName": {"declarations": ["nixos/modules/services/monitoring/alerta.nix"], "default": {"_type": "literalExpression", "text": "\"monitoring\""}, "description": {"_type": "mdDoc", "text": "Name of the database instance to connect to"}, "loc": ["services", "alerta", "databaseName"], "readOnly": false, "type": "string"}, "services.alerta.databaseUrl": {"declarations": ["nixos/modules/services/monitoring/alerta.nix"], "default": {"_type": "literalExpression", "text": "\"mongodb://localhost\""}, "description": {"_type": "mdDoc", "text": "URL of the MongoDB or PostgreSQL database to connect to"}, "loc": ["services", "alerta", "databaseUrl"], "readOnly": false, "type": "string"}, "services.alerta.enable": {"declarations": ["nixos/modules/services/monitoring/alerta.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable alerta."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "alerta", "enable"], "readOnly": false, "type": "boolean"}, "services.alerta.extraConfig": {"declarations": ["nixos/modules/services/monitoring/alerta.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go into alertad.conf verbatim."}, "loc": ["services", "alerta", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.alerta.logDir": {"declarations": ["nixos/modules/services/monitoring/alerta.nix"], "default": {"_type": "literalExpression", "text": "\"/var/log/alerta\""}, "description": {"_type": "mdDoc", "text": "Location where the logfiles are stored"}, "loc": ["services", "alerta", "logDir"], "readOnly": false, "type": "path"}, "services.alerta.port": {"declarations": ["nixos/modules/services/monitoring/alerta.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Port of Alerta"}, "loc": ["services", "alerta", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.alerta.signupEnabled": {"declarations": ["nixos/modules/services/monitoring/alerta.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to prevent sign-up of new users via the web UI"}, "loc": ["services", "alerta", "signupEnabled"], "readOnly": false, "type": "boolean"}, "services.alice-lg.enable": {"declarations": ["nixos/modules/services/networking/alice-lg.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Alice Looking Glass."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "alice-lg", "enable"], "readOnly": false, "type": "boolean"}, "services.alice-lg.package": {"declarations": ["nixos/modules/services/networking/alice-lg.nix"], "default": {"_type": "literalExpression", "text": "pkgs.alice-lg"}, "description": {"_type": "mdDoc", "text": "The alice-lg package to use."}, "loc": ["services", "alice-lg", "package"], "readOnly": false, "type": "package"}, "services.alice-lg.settings": {"declarations": ["nixos/modules/services/networking/alice-lg.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "alice-lg configuration, for configuration options see the example on [github](https://github.com/alice-lg/alice-lg/blob/main/etc/alice-lg/alice.example.conf)\n"}, "example": {"_type": "literalExpression", "text": "{\n  server = {\n    # configures the built-in webserver and provides global application settings\n    listen_http = \"127.0.0.1:7340\";\n    enable_prefix_lookup = true;\n    asn = 9033;\n    store_backend = postgres;\n    routes_store_refresh_parallelism = 5;\n    neighbors_store_refresh_parallelism = 10000;\n    routes_store_refresh_interval = 5;\n    neighbors_store_refresh_interval = 5;\n  };\n  postgres = {\n    url = \"postgres://postgres:postgres@localhost:5432/alice\";\n    min_connections = 2;\n    max_connections = 128;\n  };\n  pagination = {\n    routes_filtered_page_size = 250;\n    routes_accepted_page_size = 250;\n    routes_not_exported_page_size = 250;\n  };\n}\n"}, "loc": ["services", "alice-lg", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.alps.bindIP": {"declarations": ["nixos/modules/services/web-apps/alps.nix"], "default": {"_type": "literalExpression", "text": "\"[::]\""}, "description": {"_type": "mdDoc", "text": "The IP the service should listen on.\n"}, "loc": ["services", "alps", "bindIP"], "readOnly": false, "type": "string"}, "services.alps.enable": {"declarations": ["nixos/modules/services/web-apps/alps.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable alps."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "alps", "enable"], "readOnly": false, "type": "boolean"}, "services.alps.imaps.host": {"declarations": ["nixos/modules/services/web-apps/alps.nix"], "default": {"_type": "literalExpression", "text": "\"[::1]\""}, "description": {"_type": "mdDoc", "text": "The IMAPS server address.\n"}, "example": {"_type": "literalExpression", "text": "\"mail.example.org\""}, "loc": ["services", "alps", "imaps", "host"], "readOnly": false, "type": "string"}, "services.alps.imaps.port": {"declarations": ["nixos/modules/services/web-apps/alps.nix"], "default": {"_type": "literalExpression", "text": "993"}, "description": {"_type": "mdDoc", "text": "The IMAPS server port.\n"}, "loc": ["services", "alps", "imaps", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.alps.port": {"declarations": ["nixos/modules/services/web-apps/alps.nix"], "default": {"_type": "literalExpression", "text": "1323"}, "description": {"_type": "mdDoc", "text": "TCP port the service should listen on.\n"}, "loc": ["services", "alps", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.alps.smtps.host": {"declarations": ["nixos/modules/services/web-apps/alps.nix"], "default": {"_type": "literalExpression", "text": "\"services.alps.imaps.host\""}, "description": {"_type": "mdDoc", "text": "The SMTPS server address.\n"}, "example": {"_type": "literalExpression", "text": "\"mail.example.org\""}, "loc": ["services", "alps", "smtps", "host"], "readOnly": false, "type": "string"}, "services.alps.smtps.port": {"declarations": ["nixos/modules/services/web-apps/alps.nix"], "default": {"_type": "literalExpression", "text": "465"}, "description": {"_type": "mdDoc", "text": "The SMTPS server port.\n"}, "loc": ["services", "alps", "smtps", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.alps.theme": {"declarations": ["nixos/modules/services/web-apps/alps.nix"], "default": {"_type": "literalExpression", "text": "\"sourcehut\""}, "description": {"_type": "mdDoc", "text": "The frontend's theme to use.\n"}, "loc": ["services", "alps", "theme"], "readOnly": false, "type": "one of \"alps\", \"sourcehut\""}, "services.amule.dataDir": {"declarations": ["nixos/modules/services/networking/amuled.nix"], "default": {"_type": "literalExpression", "text": "\"/home/${config.services.amule.user}/\"\n"}, "description": {"_type": "mdDoc", "text": "The directory holding configuration, incoming and temporary files.\n"}, "loc": ["services", "amule", "dataDir"], "readOnly": false, "type": "string"}, "services.amule.enable": {"declarations": ["nixos/modules/services/networking/amuled.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the AMule daemon. You need to manually run \"amuled --ec-config\" to configure the service for the first time.\n"}, "loc": ["services", "amule", "enable"], "readOnly": false, "type": "boolean"}, "services.amule.user": {"declarations": ["nixos/modules/services/networking/amuled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The user the AMule daemon should run as.\n"}, "loc": ["services", "amule", "user"], "readOnly": false, "type": "null or string"}, "services.ananicy.enable": {"declarations": ["nixos/modules/services/misc/ananicy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ananicy, an auto nice daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ananicy", "enable"], "readOnly": false, "type": "boolean"}, "services.ananicy.extraRules": {"declarations": ["nixos/modules/services/misc/ananicy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra rules in json format on separate lines. See:\n<https://github.com/Nefelim4ag/Ananicy#configuration>\n<https://gitlab.com/ananicy-cpp/ananicy-cpp/#global-configuration>\n"}, "example": {"_type": "literalExpression", "text": "''\n  { \"name\": \"eog\", \"type\": \"Image-View\" }\n  { \"name\": \"fdupes\", \"type\": \"BG_CPUIO\" }\n''\n"}, "loc": ["services", "ananicy", "extraRules"], "readOnly": false, "type": "string"}, "services.ananicy.package": {"declarations": ["nixos/modules/services/misc/ananicy.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ananicy"}, "description": {"_type": "mdDoc", "text": "Which ananicy package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.ananicy-cpp"}, "loc": ["services", "ananicy", "package"], "readOnly": false, "type": "package"}, "services.ananicy.settings": {"declarations": ["nixos/modules/services/misc/ananicy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "See <https://github.com/Nefelim4ag/Ananicy/blob/master/ananicy.d/ananicy.conf>\n"}, "example": {"_type": "literalExpression", "text": "{\n  apply_nice = false;\n}"}, "loc": ["services", "ananicy", "settings"], "readOnly": false, "type": "attribute set of (signed integer or boolean or string)"}, "services.ankisyncd.enable": {"declarations": ["nixos/modules/services/misc/ankisyncd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ankisyncd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ankisyncd", "enable"], "readOnly": false, "type": "boolean"}, "services.ankisyncd.host": {"declarations": ["nixos/modules/services/misc/ankisyncd.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "ankisyncd host"}, "loc": ["services", "ankisyncd", "host"], "readOnly": false, "type": "string"}, "services.ankisyncd.openFirewall": {"declarations": ["nixos/modules/services/misc/ankisyncd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the firewall for the specified port."}, "loc": ["services", "ankisyncd", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.ankisyncd.package": {"declarations": ["nixos/modules/services/misc/ankisyncd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ankisyncd"}, "description": {"_type": "mdDoc", "text": "The package to use for the ankisyncd command."}, "loc": ["services", "ankisyncd", "package"], "readOnly": false, "type": "package"}, "services.ankisyncd.port": {"declarations": ["nixos/modules/services/misc/ankisyncd.nix"], "default": {"_type": "literalExpression", "text": "27701"}, "description": {"_type": "mdDoc", "text": "ankisyncd port"}, "loc": ["services", "ankisyncd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.antennas.antennasUrl": {"declarations": ["nixos/modules/services/networking/antennas.nix"], "default": {"_type": "literalExpression", "text": "\"http://127.0.0.1:5004\""}, "description": {"_type": "mdDoc", "text": "URL of Antennas."}, "loc": ["services", "antennas", "antennasUrl"], "readOnly": false, "type": "string"}, "services.antennas.deviceUUID": {"declarations": ["nixos/modules/services/networking/antennas.nix"], "default": {"_type": "literalExpression", "text": "\"2f70c0d7-90a3-4429-8275-cbeeee9cd605\""}, "description": {"_type": "mdDoc", "text": "Device tuner UUID. Change this if you are running multiple instances."}, "loc": ["services", "antennas", "deviceUUID"], "readOnly": false, "type": "string"}, "services.antennas.enable": {"declarations": ["nixos/modules/services/networking/antennas.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Antennas."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "antennas", "enable"], "readOnly": false, "type": "boolean"}, "services.antennas.tunerCount": {"declarations": ["nixos/modules/services/networking/antennas.nix"], "default": {"_type": "literalExpression", "text": "6"}, "description": {"_type": "mdDoc", "text": "Numbers of tuners in tvheadend."}, "loc": ["services", "antennas", "tunerCount"], "readOnly": false, "type": "signed integer"}, "services.antennas.tvheadendUrl": {"declarations": ["nixos/modules/services/networking/antennas.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:9981\""}, "description": {"_type": "mdDoc", "text": "URL of Tvheadend."}, "loc": ["services", "antennas", "tvheadendUrl"], "readOnly": false, "type": "string"}, "services.apache-kafka.brokerId": {"declarations": ["nixos/modules/services/misc/apache-kafka.nix"], "default": {"_type": "literalExpression", "text": "-1"}, "description": {"_type": "mdDoc", "text": "Broker ID."}, "loc": ["services", "apache-kafka", "brokerId"], "readOnly": false, "type": "signed integer"}, "services.apache-kafka.enable": {"declarations": ["nixos/modules/services/misc/apache-kafka.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Apache Kafka."}, "loc": ["services", "apache-kafka", "enable"], "readOnly": false, "type": "boolean"}, "services.apache-kafka.extraProperties": {"declarations": ["nixos/modules/services/misc/apache-kafka.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Extra properties for server.properties."}, "loc": ["services", "apache-kafka", "extraProperties"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.apache-kafka.hostname": {"declarations": ["nixos/modules/services/misc/apache-kafka.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Hostname the broker should bind to."}, "loc": ["services", "apache-kafka", "hostname"], "readOnly": false, "type": "string"}, "services.apache-kafka.jre": {"declarations": ["nixos/modules/services/misc/apache-kafka.nix"], "default": {"_type": "literalExpression", "text": "pkgs.apacheKafka.passthru.jre"}, "description": {"_type": "mdDoc", "text": "The JRE with which to run Kafka"}, "loc": ["services", "apache-kafka", "jre"], "readOnly": false, "type": "package"}, "services.apache-kafka.jvmOptions": {"declarations": ["nixos/modules/services/misc/apache-kafka.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line options for the JVM running Kafka."}, "example": {"_type": "literalExpression", "text": "[\n  \"-Djava.net.preferIPv4Stack=true\"\n  \"-Dcom.sun.management.jmxremote\"\n  \"-Dcom.sun.management.jmxremote.local.only=true\"\n]"}, "loc": ["services", "apache-kafka", "jvmOptions"], "readOnly": false, "type": "list of string"}, "services.apache-kafka.log4jProperties": {"declarations": ["nixos/modules/services/misc/apache-kafka.nix"], "default": {"_type": "literalExpression", "text": "''\n  log4j.rootLogger=INFO, stdout\n  \n  log4j.appender.stdout=org.apache.log4j.ConsoleAppender\n  log4j.appender.stdout.layout=org.apache.log4j.PatternLayout\n  log4j.appender.stdout.layout.ConversionPattern=[%d] %p %m (%c)%n\n''"}, "description": {"_type": "mdDoc", "text": "Kafka log4j property configuration."}, "loc": ["services", "apache-kafka", "log4jProperties"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.apache-kafka.logDirs": {"declarations": ["nixos/modules/services/misc/apache-kafka.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"/tmp/kafka-logs\"\n]"}, "description": {"_type": "mdDoc", "text": "Log file directories"}, "loc": ["services", "apache-kafka", "logDirs"], "readOnly": false, "type": "list of path"}, "services.apache-kafka.package": {"declarations": ["nixos/modules/services/misc/apache-kafka.nix"], "default": {"_type": "literalExpression", "text": "pkgs.apacheKafka"}, "description": {"_type": "mdDoc", "text": "The kafka package to use"}, "loc": ["services", "apache-kafka", "package"], "readOnly": false, "type": "package"}, "services.apache-kafka.port": {"declarations": ["nixos/modules/services/misc/apache-kafka.nix"], "default": {"_type": "literalExpression", "text": "9092"}, "description": {"_type": "mdDoc", "text": "Port number the broker should listen on."}, "loc": ["services", "apache-kafka", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.apache-kafka.serverProperties": {"declarations": ["nixos/modules/services/misc/apache-kafka.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Complete server.properties content. Other server.properties config\noptions will be ignored if this option is used.\n"}, "loc": ["services", "apache-kafka", "serverProperties"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.apache-kafka.zookeeper": {"declarations": ["nixos/modules/services/misc/apache-kafka.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:2181\""}, "description": {"_type": "mdDoc", "text": "Zookeeper connection string"}, "loc": ["services", "apache-kafka", "zookeeper"], "readOnly": false, "type": "string"}, "services.apcupsd.configText": {"declarations": ["nixos/modules/services/monitoring/apcupsd.nix"], "default": {"_type": "literalExpression", "text": "''\n  UPSTYPE usb\n  NISIP 127.0.0.1\n  BATTERYLEVEL 50\n  MINUTES 5\n''"}, "description": {"_type": "mdDoc", "text": "Contents of the runtime configuration file, apcupsd.conf. The default\nsettings makes apcupsd autodetect USB UPSes, limit network access to\nlocalhost and shutdown the system when the battery level is below 50\npercent, or when the UPS has calculated that it has 5 minutes or less\nof remaining power-on time. See man apcupsd.conf for details.\n"}, "loc": ["services", "apcupsd", "configText"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.apcupsd.enable": {"declarations": ["nixos/modules/services/monitoring/apcupsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the APC UPS daemon. apcupsd monitors your UPS and\npermits orderly shutdown of your computer in the event of a power\nfailure. User manual: http://www.apcupsd.com/manual/manual.html.\nNote that apcupsd runs as root (to allow shutdown of computer).\nYou can check the status of your UPS with the \"apcaccess\" command.\n"}, "loc": ["services", "apcupsd", "enable"], "readOnly": false, "type": "boolean"}, "services.apcupsd.hooks": {"declarations": ["nixos/modules/services/monitoring/apcupsd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this option names an apcupsd event and the string\nvalue it contains will be executed in a shell, in response to that\nevent (prior to the default action). See \"man apccontrol\" for the\nlist of events and what they represent.\n\nA hook script can stop apccontrol from doing its default action by\nexiting with value 99. Do not do this unless you know what you're\ndoing.\n"}, "example": {"_type": "literalExpression", "text": "{\n  doshutdown = \"# shell commands to notify that the computer is shutting down\";\n}"}, "loc": ["services", "apcupsd", "hooks"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.arbtt.enable": {"declarations": ["nixos/modules/services/monitoring/arbtt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Arbtt statistics capture service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "arbtt", "enable"], "readOnly": false, "type": "boolean"}, "services.arbtt.logFile": {"declarations": ["nixos/modules/services/monitoring/arbtt.nix"], "default": {"_type": "literalExpression", "text": "\"%h/.arbtt/capture.log\""}, "description": {"_type": "mdDoc", "text": "The log file for captured samples.\n"}, "example": {"_type": "literalExpression", "text": "\"/home/username/.arbtt-capture.log\""}, "loc": ["services", "arbtt", "logFile"], "readOnly": false, "type": "string"}, "services.arbtt.package": {"declarations": ["nixos/modules/services/monitoring/arbtt.nix"], "default": {"_type": "literalExpression", "text": "pkgs.haskellPackages.arbtt"}, "description": {"_type": "mdDoc", "text": "The package to use for the arbtt binaries.\n"}, "loc": ["services", "arbtt", "package"], "readOnly": false, "type": "package"}, "services.arbtt.sampleRate": {"declarations": ["nixos/modules/services/monitoring/arbtt.nix"], "default": {"_type": "literalExpression", "text": "60"}, "description": {"_type": "mdDoc", "text": "The sampling interval in seconds.\n"}, "example": {"_type": "literalExpression", "text": "120"}, "loc": ["services", "arbtt", "sampleRate"], "readOnly": false, "type": "signed integer"}, "services.aria2.downloadDir": {"declarations": ["nixos/modules/services/networking/aria2.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/aria2/Downloads\""}, "description": {"_type": "mdDoc", "text": "Directory to store downloaded files.\n"}, "loc": ["services", "aria2", "downloadDir"], "readOnly": false, "type": "path"}, "services.aria2.enable": {"declarations": ["nixos/modules/services/networking/aria2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to enable the headless Aria2 daemon service.\n\nAria2 daemon can be controlled via the RPC interface using\none of many WebUI (http://localhost:6800/ by default).\n\nTargets are downloaded to /var/lib/aria2/Downloads by default and are\naccessible to users in the \"aria2\" group.\n"}, "loc": ["services", "aria2", "enable"], "readOnly": false, "type": "boolean"}, "services.aria2.extraArguments": {"declarations": ["nixos/modules/services/networking/aria2.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional arguments to be passed to Aria2.\n"}, "example": {"_type": "literalExpression", "text": "\"--rpc-listen-all --remote-time=true\""}, "loc": ["services", "aria2", "extraArguments"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.aria2.listenPortRange": {"declarations": ["nixos/modules/services/networking/aria2.nix"], "default": {"_type": "literalExpression", "text": "[\n  {\n    from = 6881;\n    to = 6999;\n  }\n]"}, "description": {"_type": "mdDoc", "text": "Set UDP listening port range used by DHT(IPv4, IPv6) and UDP tracker.\n"}, "loc": ["services", "aria2", "listenPortRange"], "readOnly": false, "type": "list of (attribute set)"}, "services.aria2.openPorts": {"declarations": ["nixos/modules/services/networking/aria2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open listen and RPC ports found in listenPortRange and rpcListenPort\noptions in the firewall.\n"}, "loc": ["services", "aria2", "openPorts"], "readOnly": false, "type": "boolean"}, "services.aria2.rpcListenPort": {"declarations": ["nixos/modules/services/networking/aria2.nix"], "default": {"_type": "literalExpression", "text": "6800"}, "description": {"_type": "mdDoc", "text": "Specify a port number for JSON-RPC/XML-RPC server to listen to. Possible Values: 1024-65535"}, "loc": ["services", "aria2", "rpcListenPort"], "readOnly": false, "type": "signed integer"}, "services.aria2.rpcSecret": {"declarations": ["nixos/modules/services/networking/aria2.nix"], "default": {"_type": "literalExpression", "text": "\"aria2rpc\""}, "description": {"_type": "mdDoc", "text": "Set RPC secret authorization token.\nRead https://aria2.github.io/manual/en/html/aria2c.html#rpc-auth to know how this option value is used.\n"}, "loc": ["services", "aria2", "rpcSecret"], "readOnly": false, "type": "string"}, "services.asterisk.confFiles": {"declarations": ["nixos/modules/services/networking/asterisk.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Sets the content of config files (typically ending with\n`.conf`) in the Asterisk configuration directory.\n\nNote that if you want to change `asterisk.conf`, it\nis preferable to use the {option}`services.asterisk.extraConfig`\noption over this option. If `\"asterisk.conf\"` is\nspecified with the {option}`confFiles` option (not recommended),\nyou must be prepared to set your own `astetcdir`\npath.\n\nSee\n<http://www.asterisk.org/community/documentation>\nfor more examples of what is possible here.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"extensions.conf\" = ''\n    [tests]\n    ; Dial 100 for \"hello, world\"\n    exten => 100,1,Answer()\n    same  =>     n,Wait(1)\n    same  =>     n,Playback(hello-world)\n    same  =>     n,Hangup()\n\n    [softphones]\n    include => tests\n\n    [unauthorized]\n  '';\n  \"sip.conf\" = ''\n    [general]\n    allowguest=no              ; Require authentication\n    context=unauthorized       ; Send unauthorized users to /dev/null\n    srvlookup=no               ; Don't do DNS lookup\n    udpbindaddr=0.0.0.0        ; Listen on all interfaces\n    nat=force_rport,comedia    ; Assume device is behind NAT\n\n    [softphone](!)\n    type=friend                ; Match on username first, IP second\n    context=softphones         ; Send to softphones context in\n                               ; extensions.conf file\n    host=dynamic               ; Device will register with asterisk\n    disallow=all               ; Manually specify codecs to allow\n    allow=g722\n    allow=ulaw\n    allow=alaw\n\n    [myphone](softphone)\n    secret=GhoshevFew          ; Change this password!\n  '';\n  \"logger.conf\" = ''\n    [general]\n\n    [logfiles]\n    ; Add debug output to log\n    syslog.local0 => notice,warning,error,debug\n  '';\n}\n"}, "loc": ["services", "asterisk", "confFiles"], "readOnly": false, "type": "attribute set of string"}, "services.asterisk.enable": {"declarations": ["nixos/modules/services/networking/asterisk.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Asterisk PBX server.\n"}, "loc": ["services", "asterisk", "enable"], "readOnly": false, "type": "boolean"}, "services.asterisk.extraArguments": {"declarations": ["nixos/modules/services/networking/asterisk.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command line arguments to pass to Asterisk.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-vvvddd\"\n  \"-e\"\n  \"1024\"\n]"}, "loc": ["services", "asterisk", "extraArguments"], "readOnly": false, "type": "list of string"}, "services.asterisk.extraConfig": {"declarations": ["nixos/modules/services/networking/asterisk.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options appended to the default\n`asterisk.conf` file.\n"}, "example": {"_type": "literalExpression", "text": "''\n  [options]\n  verbose=3\n  debug=3\n''"}, "loc": ["services", "asterisk", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.asterisk.package": {"declarations": ["nixos/modules/services/networking/asterisk.nix"], "default": {"_type": "literalExpression", "text": "pkgs.asterisk"}, "description": {"_type": "mdDoc", "text": "The Asterisk package to use."}, "loc": ["services", "asterisk", "package"], "readOnly": false, "type": "package"}, "services.asterisk.useTheseDefaultConfFiles": {"declarations": ["nixos/modules/services/networking/asterisk.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"ari.conf\"\n  \"acl.conf\"\n  \"agents.conf\"\n  \"amd.conf\"\n  \"calendar.conf\"\n  \"cdr.conf\"\n  \"cdr_syslog.conf\"\n  \"cdr_custom.conf\"\n  \"cel.conf\"\n  \"cel_custom.conf\"\n  \"cli_aliases.conf\"\n  \"confbridge.conf\"\n  \"dundi.conf\"\n  \"features.conf\"\n  \"hep.conf\"\n  \"iax.conf\"\n  \"pjsip.conf\"\n  \"pjsip_wizard.conf\"\n  \"phone.conf\"\n  \"phoneprov.conf\"\n  \"queues.conf\"\n  \"res_config_sqlite3.conf\"\n  \"res_parking.conf\"\n  \"statsd.conf\"\n  \"udptl.conf\"\n  \"unistim.conf\"\n]"}, "description": {"_type": "mdDoc", "text": "Sets these config files to the default content. The default value for\n          this option contains all necesscary files to avoid errors at startup.\n          This does not override settings via {option}`services.asterisk.confFiles`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"sip.conf\"\n  \"dundi.conf\"\n]"}, "loc": ["services", "asterisk", "useTheseDefaultConfFiles"], "readOnly": false, "type": "list of string"}, "services.asusd.animeConfig": {"declarations": ["nixos/modules/services/hardware/asusd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The content of /etc/asusd/anime.ron.\nSee https://asus-linux.org/asusctl/#anime-control.\n"}, "loc": ["services", "asusd", "animeConfig"], "readOnly": false, "type": "null or string"}, "services.asusd.asusdConfig": {"declarations": ["nixos/modules/services/hardware/asusd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The content of /etc/asusd/asusd.ron.\nSee https://asus-linux.org/asusctl/.\n"}, "loc": ["services", "asusd", "asusdConfig"], "readOnly": false, "type": "null or string"}, "services.asusd.auraConfig": {"declarations": ["nixos/modules/services/hardware/asusd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The content of /etc/asusd/aura.ron.\nSee https://asus-linux.org/asusctl/#led-keyboard-control.\n"}, "loc": ["services", "asusd", "auraConfig"], "readOnly": false, "type": "null or string"}, "services.asusd.enable": {"declarations": ["nixos/modules/services/hardware/asusd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the asusd service for ASUS ROG laptops."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "asusd", "enable"], "readOnly": false, "type": "boolean"}, "services.asusd.enableUserService": {"declarations": ["nixos/modules/services/hardware/asusd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Activate the asusd-user service.\n"}, "loc": ["services", "asusd", "enableUserService"], "readOnly": false, "type": "boolean"}, "services.asusd.fanCurvesConfig": {"declarations": ["nixos/modules/services/hardware/asusd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The content of /etc/asusd/fan_curves.ron.\nSee https://asus-linux.org/asusctl/#fan-curves.\n"}, "loc": ["services", "asusd", "fanCurvesConfig"], "readOnly": false, "type": "null or string"}, "services.asusd.profileConfig": {"declarations": ["nixos/modules/services/hardware/asusd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The content of /etc/asusd/profile.ron.\nSee https://asus-linux.org/asusctl/#profiles.\n"}, "loc": ["services", "asusd", "profileConfig"], "readOnly": false, "type": "null or string"}, "services.asusd.userLedModesConfig": {"declarations": ["nixos/modules/services/hardware/asusd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The content of /etc/asusd/asusd-user-ledmodes.ron.\nSee https://asus-linux.org/asusctl/#led-keyboard-control.\n"}, "loc": ["services", "asusd", "userLedModesConfig"], "readOnly": false, "type": "null or string"}, "services.atd.allowEveryone": {"declarations": ["nixos/modules/services/scheduling/atd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to make {file}`/var/spool/at{jobs,spool}`\nwriteable by everyone (and sticky).  This is normally not\nneeded since the {command}`at` commands are\nsetuid/setgid `atd`.\n"}, "loc": ["services", "atd", "allowEveryone"], "readOnly": false, "type": "boolean"}, "services.atd.enable": {"declarations": ["nixos/modules/services/scheduling/atd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the {command}`at` daemon, a command scheduler.\n"}, "loc": ["services", "atd", "enable"], "readOnly": false, "type": "boolean"}, "services.atftpd.enable": {"declarations": ["nixos/modules/services/networking/atftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the atftpd TFTP server. By default, the server\nbinds to address 0.0.0.0.\n"}, "loc": ["services", "atftpd", "enable"], "readOnly": false, "type": "boolean"}, "services.atftpd.extraOptions": {"declarations": ["nixos/modules/services/networking/atftpd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line arguments to pass to atftp.\n"}, "example": {"_type": "literalExpression", "text": "[ \"--bind-address 192.168.9.1\"\n  \"--verbose=7\"\n]\n"}, "loc": ["services", "atftpd", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.atftpd.root": {"declarations": ["nixos/modules/services/networking/atftpd.nix"], "default": {"_type": "literalExpression", "text": "\"/srv/tftp\""}, "description": {"_type": "mdDoc", "text": "Document root directory for the atftpd.\n"}, "loc": ["services", "atftpd", "root"], "readOnly": false, "type": "path"}, "services.atuin.enable": {"declarations": ["nixos/modules/services/misc/atuin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Enable server for shell history sync with atuin."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "atuin", "enable"], "readOnly": false, "type": "boolean"}, "services.atuin.host": {"declarations": ["nixos/modules/services/misc/atuin.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The host address the atuin server should listen on."}, "loc": ["services", "atuin", "host"], "readOnly": false, "type": "string"}, "services.atuin.maxHistoryLength": {"declarations": ["nixos/modules/services/misc/atuin.nix"], "default": {"_type": "literalExpression", "text": "8192"}, "description": {"_type": "mdDoc", "text": "The max length of each history item the atuin server should store."}, "loc": ["services", "atuin", "maxHistoryLength"], "readOnly": false, "type": "signed integer"}, "services.atuin.openFirewall": {"declarations": ["nixos/modules/services/misc/atuin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the atuin server."}, "loc": ["services", "atuin", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.atuin.openRegistration": {"declarations": ["nixos/modules/services/misc/atuin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow new user registrations with the atuin server."}, "loc": ["services", "atuin", "openRegistration"], "readOnly": false, "type": "boolean"}, "services.atuin.path": {"declarations": ["nixos/modules/services/misc/atuin.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "A path to prepend to all the routes of the server."}, "loc": ["services", "atuin", "path"], "readOnly": false, "type": "string"}, "services.atuin.port": {"declarations": ["nixos/modules/services/misc/atuin.nix"], "default": {"_type": "literalExpression", "text": "8888"}, "description": {"_type": "mdDoc", "text": "The port the atuin server should listen on."}, "loc": ["services", "atuin", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.authelia.instances": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Multi-domain protection currently requires multiple instances of Authelia.\nIf you don't require multiple instances of Authelia you can define just the one.\n\nhttps://www.authelia.com/roadmap/active/multi-domain-protection/\n"}, "example": {"_type": "literalExpression", "text": "''\n  {\n    main = {\n      enable = true;\n      secrets.storageEncryptionKeyFile = \"/etc/authelia/storageEncryptionKeyFile\";\n      secrets.jwtSecretFile = \"/etc/authelia/jwtSecretFile\";\n      settings = {\n        theme = \"light\";\n        default_2fa_method = \"totp\";\n        log.level = \"debug\";\n        server.disable_healthcheck = true;\n      };\n    };\n    preprod = {\n      enable = false;\n      secrets.storageEncryptionKeyFile = \"/mnt/pre-prod/authelia/storageEncryptionKeyFile\";\n      secrets.jwtSecretFile = \"/mnt/pre-prod/jwtSecretFile\";\n      settings = {\n        theme = \"dark\";\n        default_2fa_method = \"webauthn\";\n        server.host = \"0.0.0.0\";\n      };\n    };\n    test.enable = true;\n    test.secrets.manual = true;\n    test.settings.theme = \"grey\";\n    test.settings.server.disable_healthcheck = true;\n    test.settingsFiles = [ \"/mnt/test/authelia\" \"/mnt/test-authelia.conf\" ];\n    };\n  }\n''"}, "loc": ["services", "authelia", "instances"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.authelia.instances.<name>.enable": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Authelia instance."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "authelia", "instances", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.authelia.instances.<name>.environmentVariables": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional environment variables to provide to authelia.\nIf you are providing secrets please consider the options under {option}`services.authelia.<instance>.secrets`\nor make sure you use the `_FILE` suffix.\nIf you provide the raw secret rather than the location of a secret file that secret will be preserved in the nix store.\nFor more details: https://www.authelia.com/configuration/methods/secrets/\n"}, "loc": ["services", "authelia", "instances", "<name>", "environmentVariables"], "readOnly": false, "type": "attribute set of string"}, "services.authelia.instances.<name>.group": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "\"authelia-\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The name of the group for this authelia instance."}, "loc": ["services", "authelia", "instances", "<name>", "group"], "readOnly": false, "type": "string"}, "services.authelia.instances.<name>.name": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Name is used as a suffix for the service name, user, and group.\nBy default it takes the value you use for `<instance>` in:\n{option}`services.authelia.<instance>`\n"}, "loc": ["services", "authelia", "instances", "<name>", "name"], "readOnly": false, "type": "string"}, "services.authelia.instances.<name>.package": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "pkgs.authelia"}, "description": {"_type": "mdDoc", "text": "Authelia derivation to use."}, "loc": ["services", "authelia", "instances", "<name>", "package"], "readOnly": false, "type": "package"}, "services.authelia.instances.<name>.secrets": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "It is recommended you keep your secrets separate from the configuration.\nIt's especially important to keep the raw secrets out of your nix configuration,\nas the values will be preserved in your nix store.\nThis attribute allows you to configure the location of secret files to be loaded at runtime.\n\nhttps://www.authelia.com/configuration/methods/secrets/\n"}, "loc": ["services", "authelia", "instances", "<name>", "secrets"], "readOnly": false, "type": "submodule"}, "services.authelia.instances.<name>.secrets.jwtSecretFile": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to your JWT secret used during identity verificaton.\n"}, "loc": ["services", "authelia", "instances", "<name>", "secrets", "jwtSecretFile"], "readOnly": false, "type": "null or path"}, "services.authelia.instances.<name>.secrets.manual": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Configuring authelia's secret files via the secrets attribute set\nis intended to be convenient and help catch cases where values are required\nto run at all.\nIf a user wants to set these values themselves and bypass the validation they can set this value to true.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "authelia", "instances", "<name>", "secrets", "manual"], "readOnly": false, "type": "boolean"}, "services.authelia.instances.<name>.secrets.oidcHmacSecretFile": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to your HMAC secret used to sign OIDC JWTs.\n"}, "loc": ["services", "authelia", "instances", "<name>", "secrets", "oidcHmacSecretFile"], "readOnly": false, "type": "null or path"}, "services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to your private key file used to encrypt OIDC JWTs.\n"}, "loc": ["services", "authelia", "instances", "<name>", "secrets", "oidcIssuerPrivateKeyFile"], "readOnly": false, "type": "null or path"}, "services.authelia.instances.<name>.secrets.sessionSecretFile": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to your session secret. Only used when redis is used as session storage.\n"}, "loc": ["services", "authelia", "instances", "<name>", "secrets", "sessionSecretFile"], "readOnly": false, "type": "null or path"}, "services.authelia.instances.<name>.secrets.storageEncryptionKeyFile": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to your storage encryption key.\n"}, "loc": ["services", "authelia", "instances", "<name>", "secrets", "storageEncryptionKeyFile"], "readOnly": false, "type": "null or path"}, "services.authelia.instances.<name>.settings": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Your Authelia config.yml as a Nix attribute set.\nThere are several values that are defined and documented in nix such as `default_2fa_method`,\nbut additional items can also be included.\n\nhttps://github.com/authelia/authelia/blob/master/config.template.yml\n"}, "example": {"_type": "literalExpression", "text": "''\n  {\n    theme = \"light\";\n    default_2fa_method = \"totp\";\n    log.level = \"debug\";\n    server.disable_healthcheck = true;\n  }\n''"}, "loc": ["services", "authelia", "instances", "<name>", "settings"], "readOnly": false, "type": "YAML value"}, "services.authelia.instances.<name>.settings.default_2fa_method": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Default 2FA method for new users and fallback for preferred but disabled methods.\n"}, "example": {"_type": "literalExpression", "text": "\"webauthn\""}, "loc": ["services", "authelia", "instances", "<name>", "settings", "default_2fa_method"], "readOnly": false, "type": "one of \"\", \"totp\", \"webauthn\", \"mobile_push\""}, "services.authelia.instances.<name>.settings.log.file_path": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File path where the logs will be written. If not set logs are written to stdout."}, "example": {"_type": "literalExpression", "text": "\"/var/log/authelia/authelia.log\""}, "loc": ["services", "authelia", "instances", "<name>", "settings", "log", "file_path"], "readOnly": false, "type": "null or path"}, "services.authelia.instances.<name>.settings.log.format": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "\"json\""}, "description": {"_type": "mdDoc", "text": "Format the logs are written as."}, "example": {"_type": "literalExpression", "text": "\"text\""}, "loc": ["services", "authelia", "instances", "<name>", "settings", "log", "format"], "readOnly": false, "type": "one of \"json\", \"text\""}, "services.authelia.instances.<name>.settings.log.keep_stdout": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to also log to stdout when a `file_path` is defined."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "authelia", "instances", "<name>", "settings", "log", "keep_stdout"], "readOnly": false, "type": "boolean"}, "services.authelia.instances.<name>.settings.log.level": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "\"debug\""}, "description": {"_type": "mdDoc", "text": "Level of verbosity for logs: info, debug, trace."}, "example": {"_type": "literalExpression", "text": "\"info\""}, "loc": ["services", "authelia", "instances", "<name>", "settings", "log", "level"], "readOnly": false, "type": "one of \"info\", \"debug\", \"trace\""}, "services.authelia.instances.<name>.settings.server.host": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The address to listen on."}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "authelia", "instances", "<name>", "settings", "server", "host"], "readOnly": false, "type": "string"}, "services.authelia.instances.<name>.settings.server.port": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "9091"}, "description": {"_type": "mdDoc", "text": "The port to listen on."}, "loc": ["services", "authelia", "instances", "<name>", "settings", "server", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.authelia.instances.<name>.settings.telemetry.metrics.address": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "\"tcp://127.0.0.1:9959\""}, "description": {"_type": "mdDoc", "text": "The address to listen on for metrics. This should be on a different port to the main `server.port` value."}, "example": {"_type": "literalExpression", "text": "\"tcp://0.0.0.0:8888\""}, "loc": ["services", "authelia", "instances", "<name>", "settings", "telemetry", "metrics", "address"], "readOnly": false, "type": "string"}, "services.authelia.instances.<name>.settings.telemetry.metrics.enabled": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Metrics."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "authelia", "instances", "<name>", "settings", "telemetry", "metrics", "enabled"], "readOnly": false, "type": "boolean"}, "services.authelia.instances.<name>.settings.theme": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "\"light\""}, "description": {"_type": "mdDoc", "text": "The theme to display."}, "example": {"_type": "literalExpression", "text": "\"dark\""}, "loc": ["services", "authelia", "instances", "<name>", "settings", "theme"], "readOnly": false, "type": "one of \"light\", \"dark\", \"grey\", \"auto\""}, "services.authelia.instances.<name>.settingsFiles": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Here you can provide authelia with configuration files or directories.\nIt is possible to give authelia multiple files and use the nix generated configuration\nfile set via {option}`services.authelia.<instance>.settings`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/etc/authelia/config.yml\"\n  \"/etc/authelia/access-control.yml\"\n  \"/etc/authelia/config/\"\n]"}, "loc": ["services", "authelia", "instances", "<name>", "settingsFiles"], "readOnly": false, "type": "list of path"}, "services.authelia.instances.<name>.user": {"declarations": ["nixos/modules/services/security/authelia.nix"], "default": {"_type": "literalExpression", "text": "\"authelia-\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The name of the user for this authelia instance."}, "loc": ["services", "authelia", "instances", "<name>", "user"], "readOnly": false, "type": "string"}, "services.auto-cpufreq.enable": {"declarations": ["nixos/modules/services/hardware/auto-cpufreq.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable auto-cpufreq daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "auto-cpufreq", "enable"], "readOnly": false, "type": "boolean"}, "services.auto-cpufreq.settings": {"declarations": ["nixos/modules/services/hardware/auto-cpufreq.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for `auto-cpufreq`.\n\nSee its [example configuration file] for supported settings.\n[example configuration file]: https://github.com/AdnanHodzic/auto-cpufreq/blob/master/auto-cpufreq.conf-example\n"}, "loc": ["services", "auto-cpufreq", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.autofs.autoMaster": {"declarations": ["nixos/modules/services/misc/autofs.nix"], "description": {"_type": "mdDoc", "text": "Contents of `/etc/auto.master` file. See {command}`auto.master(5)` and {command}`autofs(5)`.\n"}, "example": {"_type": "literalExpression", "text": "let\n  mapConf = pkgs.writeText \"auto\" ''\n   kernel    -ro,soft,intr       ftp.kernel.org:/pub/linux\n   boot      -fstype=ext2        :/dev/hda1\n   windoze   -fstype=smbfs       ://windoze/c\n   removable -fstype=ext2        :/dev/hdd\n   cd        -fstype=iso9660,ro  :/dev/hdc\n   floppy    -fstype=auto        :/dev/fd0\n   server    -rw,hard,intr       / -ro myserver.me.org:/ \\\n                                 /usr myserver.me.org:/usr \\\n                                 /home myserver.me.org:/home\n  '';\nin ''\n  /auto file:${mapConf}\n''\n"}, "loc": ["services", "autofs", "autoMaster"], "readOnly": false, "type": "string"}, "services.autofs.debug": {"declarations": ["nixos/modules/services/misc/autofs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Pass -d and -7 to automount and write log to the system journal.\n"}, "loc": ["services", "autofs", "debug"], "readOnly": false, "type": "boolean"}, "services.autofs.enable": {"declarations": ["nixos/modules/services/misc/autofs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Mount filesystems on demand. Unmount them automatically.\nYou may also be interested in afuse.\n"}, "loc": ["services", "autofs", "enable"], "readOnly": false, "type": "boolean"}, "services.autofs.timeout": {"declarations": ["nixos/modules/services/misc/autofs.nix"], "default": {"_type": "literalExpression", "text": "600"}, "description": {"_type": "mdDoc", "text": "Set the global minimum timeout, in seconds, until directories are unmounted"}, "loc": ["services", "autofs", "timeout"], "readOnly": false, "type": "signed integer"}, "services.automatic-timezoned.enable": {"declarations": ["nixos/modules/services/system/automatic-timezoned.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable `automatic-timezoned`, simple daemon for keeping the system\ntimezone up-to-date based on the current location. It uses geoclue2 to\ndetermine the current location and systemd-timedated to actually set\nthe timezone.\n"}, "loc": ["services", "automatic-timezoned", "enable"], "readOnly": false, "type": "boolean"}, "services.automatic-timezoned.package": {"declarations": ["nixos/modules/services/system/automatic-timezoned.nix"], "default": {"_type": "literalExpression", "text": "pkgs.automatic-timezoned"}, "description": {"_type": "mdDoc", "text": "Which `automatic-timezoned` package to use.\n"}, "loc": ["services", "automatic-timezoned", "package"], "readOnly": false, "type": "package"}, "services.automysqlbackup.calendar": {"declarations": ["nixos/modules/services/backup/automysqlbackup.nix"], "default": {"_type": "literalExpression", "text": "\"01:15:00\""}, "description": {"_type": "mdDoc", "text": "Configured when to run the backup service systemd unit (DayOfWeek Year-Month-Day Hour:Minute:Second).\n"}, "loc": ["services", "automysqlbackup", "calendar"], "readOnly": false, "type": "string"}, "services.automysqlbackup.enable": {"declarations": ["nixos/modules/services/backup/automysqlbackup.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable AutoMySQLBackup."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "automysqlbackup", "enable"], "readOnly": false, "type": "boolean"}, "services.automysqlbackup.settings": {"declarations": ["nixos/modules/services/backup/automysqlbackup.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "automysqlbackup configuration. Refer to\n{file}`${pkgs.automysqlbackup}/etc/automysqlbackup.conf`\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  db_names = [ \"nextcloud\" \"matomo\" ];\n  table_exclude = [ \"nextcloud.oc_users\" \"nextcloud.oc_whats_new\" ];\n  mailcontent = \"log\";\n  mail_address = \"admin@example.org\";\n}\n"}, "loc": ["services", "automysqlbackup", "settings"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean or list of string)"}, "services.autorandr.defaultTarget": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "\"default\""}, "description": {"_type": "mdDoc", "text": "Fallback if no monitor layout can be detected. See the docs\n(https://github.com/phillipberndt/autorandr/blob/v1.0/README.md#how-to-use)\nfor further reference.\n"}, "loc": ["services", "autorandr", "defaultTarget"], "readOnly": false, "type": "string"}, "services.autorandr.enable": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable handling of hotplug and sleep events by autorandr."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "autorandr", "enable"], "readOnly": false, "type": "boolean"}, "services.autorandr.hooks": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Global hook scripts"}, "example": {"_type": "literalExpression", "text": "{\n  postswitch = {\n    \"notify-i3\" = \"${pkgs.i3}/bin/i3-msg restart\";\n    \"change-background\" = readFile ./change-background.sh;\n    \"change-dpi\" = ''\n      case \"$AUTORANDR_CURRENT_PROFILE\" in\n        default)\n          DPI=120\n          ;;\n        home)\n          DPI=192\n          ;;\n        work)\n          DPI=144\n          ;;\n        *)\n          echo \"Unknown profle: $AUTORANDR_CURRENT_PROFILE\"\n          exit 1\n      esac\n      echo \"Xft.dpi: $DPI\" | ${pkgs.xorg.xrdb}/bin/xrdb -merge\n    '';\n  };\n}\n"}, "loc": ["services", "autorandr", "hooks"], "readOnly": false, "type": "submodule"}, "services.autorandr.hooks.postswitch": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Postswitch hook executed after mode switch."}, "loc": ["services", "autorandr", "hooks", "postswitch"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.autorandr.hooks.predetect": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Predetect hook executed before autorandr attempts to run xrandr.\n"}, "loc": ["services", "autorandr", "hooks", "predetect"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.autorandr.hooks.preswitch": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Preswitch hook executed before mode switch."}, "loc": ["services", "autorandr", "hooks", "preswitch"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.autorandr.ignoreLid": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Treat outputs as connected even if their lids are closed"}, "loc": ["services", "autorandr", "ignoreLid"], "readOnly": false, "type": "boolean"}, "services.autorandr.profiles": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Autorandr profiles specification."}, "example": {"_type": "literalExpression", "text": "{\n  \"work\" = {\n    fingerprint = {\n      eDP1 = \"<EDID>\";\n      DP1 = \"<EDID>\";\n    };\n    config = {\n      eDP1.enable = false;\n      DP1 = {\n        enable = true;\n        crtc = 0;\n        primary = true;\n        position = \"0x0\";\n        mode = \"3840x2160\";\n        gamma = \"1.0:0.909:0.833\";\n        rate = \"60.00\";\n        rotate = \"left\";\n      };\n    };\n    hooks.postswitch = readFile ./work-postswitch.sh;\n  };\n}\n"}, "loc": ["services", "autorandr", "profiles"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.autorandr.profiles.<name>.config": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Per output profile configuration."}, "loc": ["services", "autorandr", "profiles", "<name>", "config"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.autorandr.profiles.<name>.config.<name>.crtc": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Output video display controller."}, "example": {"_type": "literalExpression", "text": "0"}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "crtc"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "services.autorandr.profiles.<name>.config.<name>.dpi": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Output DPI configuration."}, "example": {"_type": "literalExpression", "text": "96"}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "dpi"], "readOnly": false, "type": "null or positive integer, meaning >0"}, "services.autorandr.profiles.<name>.config.<name>.enable": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the output."}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.autorandr.profiles.<name>.config.<name>.gamma": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Output gamma configuration."}, "example": {"_type": "literalExpression", "text": "\"1.0:0.909:0.833\""}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "gamma"], "readOnly": false, "type": "string"}, "services.autorandr.profiles.<name>.config.<name>.mode": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Output resolution."}, "example": {"_type": "literalExpression", "text": "\"3840x2160\""}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "mode"], "readOnly": false, "type": "string"}, "services.autorandr.profiles.<name>.config.<name>.position": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Output position"}, "example": {"_type": "literalExpression", "text": "\"5760x0\""}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "position"], "readOnly": false, "type": "string"}, "services.autorandr.profiles.<name>.config.<name>.primary": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether output should be marked as primary"}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "primary"], "readOnly": false, "type": "boolean"}, "services.autorandr.profiles.<name>.config.<name>.rate": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Output framerate."}, "example": {"_type": "literalExpression", "text": "\"60.00\""}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "rate"], "readOnly": false, "type": "string"}, "services.autorandr.profiles.<name>.config.<name>.rotate": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Output rotate configuration."}, "example": {"_type": "literalExpression", "text": "\"left\""}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "rotate"], "readOnly": false, "type": "null or one of \"normal\", \"left\", \"right\", \"inverted\""}, "services.autorandr.profiles.<name>.config.<name>.scale": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Output scale configuration.\n\nEither configure by pixels or a scaling factor. When using pixel method the\n{manpage}`xrandr(1)`\noption\n`--scale-from`\nwill be used; when using factor method the option\n`--scale`\nwill be used.\n\nThis option is a shortcut version of the transform option and they are mutually\nexclusive.\n"}, "example": {"_type": "literalExpression", "text": "{\n  x = 1.25;\n  y = 1.25;\n}\n"}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "scale"], "readOnly": false, "type": "null or (submodule)"}, "services.autorandr.profiles.<name>.config.<name>.scale.method": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "\"factor\""}, "description": {"_type": "mdDoc", "text": "Output scaling method."}, "example": {"_type": "literalExpression", "text": "\"pixel\""}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "scale", "method"], "readOnly": false, "type": "one of \"factor\", \"pixel\""}, "services.autorandr.profiles.<name>.config.<name>.scale.x": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "description": {"_type": "mdDoc", "text": "Horizontal scaling factor/pixels."}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "scale", "x"], "readOnly": false, "type": "floating point number or positive integer, meaning >0"}, "services.autorandr.profiles.<name>.config.<name>.scale.y": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "description": {"_type": "mdDoc", "text": "Vertical scaling factor/pixels."}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "scale", "y"], "readOnly": false, "type": "floating point number or positive integer, meaning >0"}, "services.autorandr.profiles.<name>.config.<name>.transform": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refer to\n{manpage}`xrandr(1)`\nfor the documentation of the transform matrix.\n"}, "example": {"_type": "literalExpression", "text": "[\n  [ 0.6 0.0 0.0 ]\n  [ 0.0 0.6 0.0 ]\n  [ 0.0 0.0 1.0 ]\n]\n"}, "loc": ["services", "autorandr", "profiles", "<name>", "config", "<name>", "transform"], "readOnly": false, "type": "null or (3\u00d73 matrix of floating point numbers)"}, "services.autorandr.profiles.<name>.fingerprint": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Output name to EDID mapping.\nUse `autorandr --fingerprint` to get current setup values.\n"}, "loc": ["services", "autorandr", "profiles", "<name>", "fingerprint"], "readOnly": false, "type": "attribute set of string"}, "services.autorandr.profiles.<name>.hooks": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Profile hook scripts."}, "loc": ["services", "autorandr", "profiles", "<name>", "hooks"], "readOnly": false, "type": "submodule"}, "services.autorandr.profiles.<name>.hooks.postswitch": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Postswitch hook executed after mode switch."}, "loc": ["services", "autorandr", "profiles", "<name>", "hooks", "postswitch"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.autorandr.profiles.<name>.hooks.predetect": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Predetect hook executed before autorandr attempts to run xrandr.\n"}, "loc": ["services", "autorandr", "profiles", "<name>", "hooks", "predetect"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.autorandr.profiles.<name>.hooks.preswitch": {"declarations": ["nixos/modules/services/misc/autorandr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Preswitch hook executed before mode switch."}, "loc": ["services", "autorandr", "profiles", "<name>", "hooks", "preswitch"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.autossh.sessions": {"declarations": ["nixos/modules/services/networking/autossh.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of AutoSSH sessions to start as systemd services. Each service is\nnamed 'autossh-{session.name}'.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    extraArguments = \"-N -D4343 billremote@socks.host.net\";\n    monitoringPort = 20000;\n    name = \"socks-peer\";\n    user = \"bill\";\n  }\n]"}, "loc": ["services", "autossh", "sessions"], "readOnly": false, "type": "list of (submodule)"}, "services.autossh.sessions.*.extraArguments": {"declarations": ["nixos/modules/services/networking/autossh.nix"], "description": {"_type": "mdDoc", "text": "Arguments to be passed to AutoSSH and retransmitted to SSH\nprocess. Some meaningful options include -N (don't run remote\ncommand), -D (open SOCKS proxy on local port), -R (forward\nremote port), -L (forward local port), -v (Enable debug). Check\nssh manual for the complete list.\n"}, "example": {"_type": "literalExpression", "text": "\"-N -D4343 bill@socks.example.net\""}, "loc": ["services", "autossh", "sessions", "*", "extraArguments"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.autossh.sessions.*.monitoringPort": {"declarations": ["nixos/modules/services/networking/autossh.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Port to be used by AutoSSH for peer monitoring. Note, that\nAutoSSH also uses mport+1. Value of 0 disables the keep-alive\nstyle monitoring\n"}, "example": {"_type": "literalExpression", "text": "20000"}, "loc": ["services", "autossh", "sessions", "*", "monitoringPort"], "readOnly": false, "type": "signed integer"}, "services.autossh.sessions.*.name": {"declarations": ["nixos/modules/services/networking/autossh.nix"], "description": {"_type": "mdDoc", "text": "Name of the local AutoSSH session"}, "example": {"_type": "literalExpression", "text": "\"socks-peer\""}, "loc": ["services", "autossh", "sessions", "*", "name"], "readOnly": false, "type": "string"}, "services.autossh.sessions.*.user": {"declarations": ["nixos/modules/services/networking/autossh.nix"], "description": {"_type": "mdDoc", "text": "Name of the user the AutoSSH session should run as"}, "example": {"_type": "literalExpression", "text": "\"bill\""}, "loc": ["services", "autossh", "sessions", "*", "user"], "readOnly": false, "type": "string"}, "services.autosuspend.checks": {"declarations": ["nixos/modules/services/misc/autosuspend.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Checks for activity.  For more information, see:\n - <https://autosuspend.readthedocs.io/en/latest/configuration_file.html#activity-check-configuration>\n - <https://autosuspend.readthedocs.io/en/latest/available_checks.html>\n"}, "example": {"_type": "literalExpression", "text": "{\n  # Basic activity check configuration.\n  # The check class name is derived from the section header (Ping in this case).\n  # Remember to enable desired checks. They are disabled by default.\n  Ping = {\n    hosts = \"192.168.0.7\";\n  };\n\n  # This check is disabled.\n  Smb.enabled = false;\n\n  # Example for a custom check name.\n  # This will use the Users check with the custom name RemoteUsers.\n  # Custom names are necessary in case a check class is used multiple times.\n  # Custom names can also be used for clarification.\n  RemoteUsers = {\n    class = \"Users\";\n    name = \".*\";\n    terminal = \".*\";\n    host = \"[0-9].*\";\n  };\n\n  # Here the Users activity check is used again with different settings and a different name\n  LocalUsers = {\n    class = \"Users\";\n    name = \".*\";\n    terminal = \".*\";\n    host = \"localhost\";\n  };\n}\n"}, "loc": ["services", "autosuspend", "checks"], "readOnly": false, "type": "attribute set of (attribute set of (INI atom (null, bool, int, float or string)))"}, "services.autosuspend.checks.<name>.class": {"declarations": ["nixos/modules/services/misc/autosuspend.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the class implementing the check.  If this option is not specified, the check's\nname must represent a valid internal check class.\n"}, "loc": ["services", "autosuspend", "checks", "<name>", "class"], "readOnly": false, "type": "null or one of \"ActiveCalendarEvent\", \"ActiveConnection\", \"ExternalCommand\", \"JsonPath\", \"Kodi\", \"KodiIdleTime\", \"LastLogActivity\", \"Load\", \"LogindSessionsIdle\", \"Mpd\", \"NetworkBandwidth\", \"Ping\", \"Processes\", \"Smb\", \"Users\", \"XIdleTime\", \"XPath\""}, "services.autosuspend.checks.<name>.enabled": {"declarations": ["nixos/modules/services/misc/autosuspend.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable this activity check."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "autosuspend", "checks", "<name>", "enabled"], "readOnly": false, "type": "boolean"}, "services.autosuspend.enable": {"declarations": ["nixos/modules/services/misc/autosuspend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the autosuspend daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "autosuspend", "enable"], "readOnly": false, "type": "boolean"}, "services.autosuspend.package": {"declarations": ["nixos/modules/services/misc/autosuspend.nix"], "default": {"_type": "literalExpression", "text": "pkgs.autosuspend"}, "description": {"_type": "mdDoc", "text": "The autosuspend package to use."}, "loc": ["services", "autosuspend", "package"], "readOnly": false, "type": "package"}, "services.autosuspend.settings": {"declarations": ["nixos/modules/services/misc/autosuspend.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for autosuspend, see\n<https://autosuspend.readthedocs.io/en/latest/configuration_file.html#general-configuration>\nfor supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  enable = true;\n  interval = 30;\n  idle_time = 120;\n}\n"}, "loc": ["services", "autosuspend", "settings"], "readOnly": false, "type": "attribute set of (INI atom (null, bool, int, float or string))"}, "services.autosuspend.settings.suspend_cmd": {"declarations": ["nixos/modules/services/misc/autosuspend.nix"], "default": {"_type": "literalExpression", "text": "\"systemctl suspend\""}, "description": {"_type": "mdDoc", "text": "The command to execute in case the host shall be suspended. This line can contain\nadditional command line arguments to the command to execute.\n"}, "loc": ["services", "autosuspend", "settings", "suspend_cmd"], "readOnly": false, "type": "string"}, "services.autosuspend.settings.wakeup_cmd": {"declarations": ["nixos/modules/services/misc/autosuspend.nix"], "default": {"_type": "literalExpression", "text": "\"sh -c 'echo 0 > /sys/class/rtc/rtc0/wakealarm && echo {timestamp:.0f} > /sys/class/rtc/rtc0/wakealarm' \""}, "description": {"_type": "mdDoc", "text": "The command to execute for scheduling a wake up of the system. The given string is\nprocessed using Python\u2019s `str.format()` and a format argument called `timestamp`\nencodes the UTC timestamp of the planned wake up time (float). Additionally `iso`\ncan be used to acquire the timestamp in ISO 8601 format.\n"}, "loc": ["services", "autosuspend", "settings", "wakeup_cmd"], "readOnly": false, "type": "string"}, "services.autosuspend.wakeups": {"declarations": ["nixos/modules/services/misc/autosuspend.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Checks for wake up.  For more information, see:\n - <https://autosuspend.readthedocs.io/en/latest/configuration_file.html#wake-up-check-configuration>\n - <https://autosuspend.readthedocs.io/en/latest/available_wakeups.html>\n"}, "example": {"_type": "literalExpression", "text": "{\n  # Wake up checks reuse the same configuration mechanism as activity checks.\n  Calendar = {\n    url = \"http://example.org/test.ics\";\n  };\n}\n"}, "loc": ["services", "autosuspend", "wakeups"], "readOnly": false, "type": "attribute set of (attribute set of (INI atom (null, bool, int, float or string)))"}, "services.autosuspend.wakeups.<name>.class": {"declarations": ["nixos/modules/services/misc/autosuspend.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the class implementing the check.  If this option is not specified, the check's\nname must represent a valid internal check class.\n"}, "loc": ["services", "autosuspend", "wakeups", "<name>", "class"], "readOnly": false, "type": "null or one of \"Calendar\", \"Command\", \"File\", \"Periodic\", \"SystemdTimer\", \"XPath\", \"XPathDelta\""}, "services.autosuspend.wakeups.<name>.enabled": {"declarations": ["nixos/modules/services/misc/autosuspend.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable this wake-up check."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "autosuspend", "wakeups", "<name>", "enabled"], "readOnly": false, "type": "boolean"}, "services.avahi.allowInterfaces": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of network interfaces that should be used by the {command}`avahi-daemon`.\nOther interfaces will be ignored. If `null`, all local interfaces\nexcept loopback and point-to-point will be used.\n"}, "loc": ["services", "avahi", "allowInterfaces"], "readOnly": false, "type": "null or (list of string)"}, "services.avahi.allowPointToPoint": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use POINTTOPOINT interfaces. Might make mDNS unreliable due to usually large\nlatencies with such links and opens a potential security hole by allowing mDNS access from Internet\nconnections.\n"}, "loc": ["services", "avahi", "allowPointToPoint"], "readOnly": false, "type": "boolean"}, "services.avahi.browseDomains": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of non-local DNS domains to be browsed.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"0pointer.de\"\n  \"zeroconf.org\"\n]"}, "loc": ["services", "avahi", "browseDomains"], "readOnly": false, "type": "list of string"}, "services.avahi.cacheEntriesMax": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of resource records to be cached per interface. Use 0 to\ndisable caching. Avahi daemon defaults to 4096 if not set.\n"}, "loc": ["services", "avahi", "cacheEntriesMax"], "readOnly": false, "type": "null or signed integer"}, "services.avahi.denyInterfaces": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of network interfaces that should be ignored by the\n{command}`avahi-daemon`. Other unspecified interfaces will be used,\nunless {option}`allowInterfaces` is set. This option takes precedence\nover {option}`allowInterfaces`.\n"}, "loc": ["services", "avahi", "denyInterfaces"], "readOnly": false, "type": "null or (list of string)"}, "services.avahi.domainName": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "\"local\""}, "description": {"_type": "mdDoc", "text": "Domain name for all advertisements.\n"}, "loc": ["services", "avahi", "domainName"], "readOnly": false, "type": "string"}, "services.avahi.enable": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the Avahi daemon, which allows Avahi clients\nto use Avahi's service discovery facilities and also allows\nthe local machine to advertise its presence and services\n(through the mDNS responder implemented by `avahi-daemon`).\n"}, "loc": ["services", "avahi", "enable"], "readOnly": false, "type": "boolean"}, "services.avahi.extraConfig": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config to append to avahi-daemon.conf.\n"}, "loc": ["services", "avahi", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.avahi.extraServiceFiles": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specify custom service definitions which are placed in the avahi service directory.\nSee the {manpage}`avahi.service(5)` manpage for detailed information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ssh = \"${pkgs.avahi}/etc/avahi/services/ssh.service\";\n  smb = ''\n    <?xml version=\"1.0\" standalone='no'?><!--*-nxml-*-->\n    <!DOCTYPE service-group SYSTEM \"avahi-service.dtd\">\n    <service-group>\n      <name replace-wildcards=\"yes\">%h</name>\n      <service>\n        <type>_smb._tcp</type>\n        <port>445</port>\n      </service>\n    </service-group>\n  '';\n}\n"}, "loc": ["services", "avahi", "extraServiceFiles"], "readOnly": false, "type": "attribute set of (string or path)"}, "services.avahi.hostName": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "Host name advertised on the LAN. If not set, avahi will use the value\nof {option}`config.networking.hostName`.\n"}, "loc": ["services", "avahi", "hostName"], "readOnly": false, "type": "string"}, "services.avahi.ipv4": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to use IPv4."}, "loc": ["services", "avahi", "ipv4"], "readOnly": false, "type": "boolean"}, "services.avahi.ipv6": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "config.networking.enableIPv6"}, "description": {"_type": "mdDoc", "text": "Whether to use IPv6."}, "loc": ["services", "avahi", "ipv6"], "readOnly": false, "type": "boolean"}, "services.avahi.nssmdns": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the mDNS NSS (Name Service Switch) plug-in.\nEnabling it allows applications to resolve names in the `.local`\ndomain by transparently querying the Avahi daemon.\n"}, "loc": ["services", "avahi", "nssmdns"], "readOnly": false, "type": "boolean"}, "services.avahi.openFirewall": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to open the firewall for UDP port 5353.\nDisabling this setting also disables discovering of network devices.\n"}, "loc": ["services", "avahi", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.avahi.publish.addresses": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to register mDNS address records for all local IP addresses."}, "loc": ["services", "avahi", "publish", "addresses"], "readOnly": false, "type": "boolean"}, "services.avahi.publish.domain": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to announce the locally used domain name for browsing by other hosts."}, "loc": ["services", "avahi", "publish", "domain"], "readOnly": false, "type": "boolean"}, "services.avahi.publish.enable": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow publishing in general."}, "loc": ["services", "avahi", "publish", "enable"], "readOnly": false, "type": "boolean"}, "services.avahi.publish.hinfo": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to register a mDNS HINFO record which contains information about the\nlocal operating system and CPU.\n"}, "loc": ["services", "avahi", "publish", "hinfo"], "readOnly": false, "type": "boolean"}, "services.avahi.publish.userServices": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to publish user services. Will set `addresses=true`."}, "loc": ["services", "avahi", "publish", "userServices"], "readOnly": false, "type": "boolean"}, "services.avahi.publish.workstation": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to register a service of type \"_workstation._tcp\" on the local LAN.\n"}, "loc": ["services", "avahi", "publish", "workstation"], "readOnly": false, "type": "boolean"}, "services.avahi.reflector": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Reflect incoming mDNS requests to all allowed network interfaces."}, "loc": ["services", "avahi", "reflector"], "readOnly": false, "type": "boolean"}, "services.avahi.wideArea": {"declarations": ["nixos/modules/services/networking/avahi-daemon.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable wide-area service discovery."}, "loc": ["services", "avahi", "wideArea"], "readOnly": false, "type": "boolean"}, "services.awstats.configs": {"declarations": ["nixos/modules/services/logging/awstats.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute set of domains to collect stats for."}, "example": {"_type": "literalExpression", "text": "{\n  \"mysite\" = {\n    domain = \"example.com\";\n    logFile = \"/var/log/nginx/access.log\";\n  };\n}\n"}, "loc": ["services", "awstats", "configs"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.awstats.configs.<name>.domain": {"declarations": ["nixos/modules/services/logging/awstats.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The domain name to collect stats for."}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "awstats", "configs", "<name>", "domain"], "readOnly": false, "type": "string"}, "services.awstats.configs.<name>.extraConfig": {"declarations": ["nixos/modules/services/logging/awstats.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration to be appended to awstats.${name}.conf."}, "example": {"_type": "literalExpression", "text": "{\n  \"ValidHTTPCodes\" = \"404\";\n}\n"}, "loc": ["services", "awstats", "configs", "<name>", "extraConfig"], "readOnly": false, "type": "attribute set of string"}, "services.awstats.configs.<name>.hostAliases": {"declarations": ["nixos/modules/services/logging/awstats.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of aliases the site has.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n]"}, "loc": ["services", "awstats", "configs", "<name>", "hostAliases"], "readOnly": false, "type": "list of string"}, "services.awstats.configs.<name>.logFile": {"declarations": ["nixos/modules/services/logging/awstats.nix"], "description": {"_type": "mdDoc", "text": "The log file to be scanned.\n\nFor mail, set this to\n```\njournalctl $OLD_CURSOR -u postfix.service | ${pkgs.perl}/bin/perl ${pkgs.awstats.out}/share/awstats/tools/maillogconvert.pl standard |\n```\n"}, "example": {"_type": "literalExpression", "text": "\"/var/log/nginx/access.log\""}, "loc": ["services", "awstats", "configs", "<name>", "logFile"], "readOnly": false, "type": "string"}, "services.awstats.configs.<name>.logFormat": {"declarations": ["nixos/modules/services/logging/awstats.nix"], "default": {"_type": "literalExpression", "text": "\"1\""}, "description": {"_type": "mdDoc", "text": "The log format being used.\n\nFor mail, set this to\n```\n%time2 %email %email_r %host %host_r %method %url %code %bytesd\n```\n"}, "loc": ["services", "awstats", "configs", "<name>", "logFormat"], "readOnly": false, "type": "string"}, "services.awstats.configs.<name>.type": {"declarations": ["nixos/modules/services/logging/awstats.nix"], "default": {"_type": "literalExpression", "text": "\"web\""}, "description": {"_type": "mdDoc", "text": "The type of log being collected.\n"}, "example": {"_type": "literalExpression", "text": "\"mail\""}, "loc": ["services", "awstats", "configs", "<name>", "type"], "readOnly": false, "type": "one of \"mail\", \"web\""}, "services.awstats.configs.<name>.webService.enable": {"declarations": ["nixos/modules/services/logging/awstats.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable awstats web service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "awstats", "configs", "<name>", "webService", "enable"], "readOnly": false, "type": "boolean"}, "services.awstats.configs.<name>.webService.hostname": {"declarations": ["nixos/modules/services/logging/awstats.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The hostname the web service appears under."}, "loc": ["services", "awstats", "configs", "<name>", "webService", "hostname"], "readOnly": false, "type": "string"}, "services.awstats.configs.<name>.webService.urlPrefix": {"declarations": ["nixos/modules/services/logging/awstats.nix"], "default": {"_type": "literalExpression", "text": "\"/awstats\""}, "description": {"_type": "mdDoc", "text": "The URL prefix under which the awstats pages appear."}, "loc": ["services", "awstats", "configs", "<name>", "webService", "urlPrefix"], "readOnly": false, "type": "string"}, "services.awstats.dataDir": {"declarations": ["nixos/modules/services/logging/awstats.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/awstats\""}, "description": {"_type": "mdDoc", "text": "The directory where awstats data will be stored."}, "loc": ["services", "awstats", "dataDir"], "readOnly": false, "type": "path"}, "services.awstats.enable": {"declarations": ["nixos/modules/services/logging/awstats.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable awstats."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "awstats", "enable"], "readOnly": false, "type": "boolean"}, "services.awstats.updateAt": {"declarations": ["nixos/modules/services/logging/awstats.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specification of the time at which awstats will get updated.\n(in the format described by {manpage}`systemd.time(7)`)\n"}, "example": {"_type": "literalExpression", "text": "\"hourly\""}, "loc": ["services", "awstats", "updateAt"], "readOnly": false, "type": "null or string"}, "services.babeld.enable": {"declarations": ["nixos/modules/services/networking/babeld.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the babeld network routing daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "babeld", "enable"], "readOnly": false, "type": "boolean"}, "services.babeld.extraConfig": {"declarations": ["nixos/modules/services/networking/babeld.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Options that will be copied to babeld.conf.\nSee {manpage}`babeld(8)` for details.\n"}, "loc": ["services", "babeld", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.babeld.interfaceDefaults": {"declarations": ["nixos/modules/services/networking/babeld.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A set describing default parameters for babeld interfaces.\nSee {manpage}`babeld(8)` for options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  split-horizon = true;\n  type = \"tunnel\";\n}"}, "loc": ["services", "babeld", "interfaceDefaults"], "readOnly": false, "type": "null or (attribute set of unspecified value)"}, "services.babeld.interfaces": {"declarations": ["nixos/modules/services/networking/babeld.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set describing babeld interfaces.\nSee {manpage}`babeld(8)` for options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  enp0s2 = {\n    hello-interval = 5;\n    split-horizon = \"auto\";\n    type = \"wired\";\n  };\n}"}, "loc": ["services", "babeld", "interfaces"], "readOnly": false, "type": "attribute set of attribute set of unspecified value"}, "services.bacula-dir.enable": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Bacula Director Daemon.\n"}, "loc": ["services", "bacula-dir", "enable"], "readOnly": false, "type": "boolean"}, "services.bacula-dir.extraConfig": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration for Bacula Director Daemon.\n"}, "example": {"_type": "literalExpression", "text": "''\n  TODO\n''"}, "loc": ["services", "bacula-dir", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bacula-dir.extraDirectorConfig": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to be passed in Director directive.\n"}, "example": {"_type": "literalExpression", "text": "''\n  Maximum Concurrent Jobs = 20;\n  Heartbeat Interval = 30;\n''"}, "loc": ["services", "bacula-dir", "extraDirectorConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bacula-dir.extraMessagesConfig": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to be passed in Messages directive.\n"}, "example": {"_type": "literalExpression", "text": "''\n  console = all\n''"}, "loc": ["services", "bacula-dir", "extraMessagesConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bacula-dir.name": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"${config.networking.hostName}-dir\""}, "description": {"_type": "mdDoc", "text": "The director name used by the system administrator. This directive is\nrequired.\n"}, "loc": ["services", "bacula-dir", "name"], "readOnly": false, "type": "string"}, "services.bacula-dir.password": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "description": {"_type": "mdDoc", "text": "Specifies the password that must be supplied for a Director.\n"}, "loc": ["services", "bacula-dir", "password"], "readOnly": false, "type": "string"}, "services.bacula-dir.port": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "9101"}, "description": {"_type": "mdDoc", "text": "Specify the port (a positive integer) on which the Director daemon\nwill listen for Bacula Console connections. This same port number\nmust be specified in the Director resource of the Console\nconfiguration file. The default is 9101, so normally this directive\nneed not be specified. This directive should not be used if you\nspecify DirAddresses (N.B plural) directive.\n"}, "loc": ["services", "bacula-dir", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.bacula-fd.director": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option defines director resources in Bacula File Daemon.\n"}, "loc": ["services", "bacula-fd", "director"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.bacula-fd.director.<name>.monitor": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"no\""}, "description": {"_type": "mdDoc", "text": "If Monitor is set to `no`, this director will have\nfull access to this Storage daemon. If Monitor is set to\n`yes`, this director will only be able to fetch the\ncurrent status of this Storage daemon.\n\nPlease note that if this director is being used by a Monitor, we\nhighly recommend to set this directive to yes to avoid serious\nsecurity problems.\n"}, "example": {"_type": "literalExpression", "text": "\"yes\""}, "loc": ["services", "bacula-fd", "director", "<name>", "monitor"], "readOnly": false, "type": "one of \"no\", \"yes\""}, "services.bacula-fd.director.<name>.password": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "description": {"_type": "mdDoc", "text": "Specifies the password that must be supplied for the default Bacula\nConsole to be authorized. The same password must appear in the\nDirector resource of the Console configuration file. For added\nsecurity, the password is never passed across the network but instead\na challenge response hash code created with the password. This\ndirective is required. If you have either /dev/random or bc on your\nmachine, Bacula will generate a random password during the\nconfiguration process, otherwise it will be left blank and you must\nmanually supply it.\n\nThe password is plain text. It is not generated through any special\nprocess but as noted above, it is better to use random text for\nsecurity reasons.\n"}, "loc": ["services", "bacula-fd", "director", "<name>", "password"], "readOnly": false, "type": "string"}, "services.bacula-fd.enable": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Bacula File Daemon.\n"}, "loc": ["services", "bacula-fd", "enable"], "readOnly": false, "type": "boolean"}, "services.bacula-fd.extraClientConfig": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to be passed in Client directive.\n"}, "example": {"_type": "literalExpression", "text": "''\n  Maximum Concurrent Jobs = 20;\n  Heartbeat Interval = 30;\n''"}, "loc": ["services", "bacula-fd", "extraClientConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bacula-fd.extraMessagesConfig": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to be passed in Messages directive.\n"}, "example": {"_type": "literalExpression", "text": "''\n  console = all\n''"}, "loc": ["services", "bacula-fd", "extraMessagesConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bacula-fd.name": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"${config.networking.hostName}-fd\""}, "description": {"_type": "mdDoc", "text": "The client name that must be used by the Director when connecting.\nGenerally, it is a good idea to use a name related to the machine so\nthat error messages can be easily identified if you have multiple\nClients. This directive is required.\n"}, "loc": ["services", "bacula-fd", "name"], "readOnly": false, "type": "string"}, "services.bacula-fd.port": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "9102"}, "description": {"_type": "mdDoc", "text": "This specifies the port number on which the Client listens for\nDirector connections. It must agree with the FDPort specified in\nthe Client resource of the Director's configuration file.\n"}, "loc": ["services", "bacula-fd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.bacula-sd.autochanger": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option defines Autochanger resources in Bacula Storage Daemon.\n"}, "loc": ["services", "bacula-sd", "autochanger"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.bacula-sd.autochanger.<name>.changerCommand": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/bacula/mtx-changer %c %o %S %a %d\""}, "description": {"_type": "mdDoc", "text": "The name-string specifies an external program to be called that will\nautomatically change volumes as required by Bacula. Normally, this\ndirective will be specified only in the AutoChanger resource, which\nis then used for all devices. However, you may also specify the\ndifferent Changer Command in each Device resource. Most frequently,\nyou will specify the Bacula supplied mtx-changer script as follows:\n\n`\"/path/mtx-changer %c %o %S %a %d\"`\n\nand you will install the mtx on your system (found in the depkgs\nrelease). An example of this command is in the default bacula-sd.conf\nfile. For more details on the substitution characters that may be\nspecified to configure your autochanger please see the\nAutochangersAutochangersChapter chapter of this manual. For FreeBSD\nusers, you might want to see one of the several chio scripts in\nexamples/autochangers.\n"}, "loc": ["services", "bacula-sd", "autochanger", "<name>", "changerCommand"], "readOnly": false, "type": "string"}, "services.bacula-sd.autochanger.<name>.changerDevice": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "description": {"_type": "mdDoc", "text": "The specified name-string must be the generic SCSI device name of the\nautochanger that corresponds to the normal read/write Archive Device\nspecified in the Device resource. This generic SCSI device name\nshould be specified if you have an autochanger or if you have a\nstandard tape drive and want to use the Alert Command (see below).\nFor example, on Linux systems, for an Archive Device name of\n`/dev/nst0`, you would specify\n`/dev/sg0` for the Changer Device name.  Depending\non your exact configuration, and the number of autochangers or the\ntype of autochanger, what you specify here can vary. This directive\nis optional. See the Using AutochangersAutochangersChapter chapter of\nthis manual for more details of using this and the following\nautochanger directives.\n"}, "loc": ["services", "bacula-sd", "autochanger", "<name>", "changerDevice"], "readOnly": false, "type": "string"}, "services.bacula-sd.autochanger.<name>.devices": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "description": {"_type": "mdDoc", "text": ""}, "loc": ["services", "bacula-sd", "autochanger", "<name>", "devices"], "readOnly": false, "type": "list of string"}, "services.bacula-sd.autochanger.<name>.extraAutochangerConfig": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to be passed in Autochanger directive.\n"}, "example": {"_type": "literalExpression", "text": "''\n  \n''"}, "loc": ["services", "bacula-sd", "autochanger", "<name>", "extraAutochangerConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bacula-sd.device": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option defines Device resources in Bacula Storage Daemon.\n"}, "loc": ["services", "bacula-sd", "device"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.bacula-sd.device.<name>.archiveDevice": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "description": {"_type": "mdDoc", "text": "The specified name-string gives the system file name of the storage\ndevice managed by this storage daemon. This will usually be the\ndevice file name of a removable storage device (tape drive), for\nexample `/dev/nst0` or\n`/dev/rmt/0mbn`. For a DVD-writer, it will be for\nexample `/dev/hdc`. It may also be a directory name\nif you are archiving to disk storage. In this case, you must supply\nthe full absolute path to the directory. When specifying a tape\ndevice, it is preferable that the \"non-rewind\" variant of the device\nfile name be given.\n"}, "loc": ["services", "bacula-sd", "device", "<name>", "archiveDevice"], "readOnly": false, "type": "string"}, "services.bacula-sd.device.<name>.extraDeviceConfig": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to be passed in Device directive.\n"}, "example": {"_type": "literalExpression", "text": "''\n  LabelMedia = yes\n  Random Access = no\n  AutomaticMount = no\n  RemovableMedia = no\n  MaximumOpenWait = 60\n  AlwaysOpen = no\n''"}, "loc": ["services", "bacula-sd", "device", "<name>", "extraDeviceConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bacula-sd.device.<name>.mediaType": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "description": {"_type": "mdDoc", "text": "The specified name-string names the type of media supported by this\ndevice, for example, `DLT7000`. Media type names are\narbitrary in that you set them to anything you want, but they must be\nknown to the volume database to keep track of which storage daemons\ncan read which volumes. In general, each different storage type\nshould have a unique Media Type associated with it. The same\nname-string must appear in the appropriate Storage resource\ndefinition in the Director's configuration file.\n\nEven though the names you assign are arbitrary (i.e. you choose the\nname you want), you should take care in specifying them because the\nMedia Type is used to determine which storage device Bacula will\nselect during restore. Thus you should probably use the same Media\nType specification for all drives where the Media can be freely\ninterchanged. This is not generally an issue if you have a single\nStorage daemon, but it is with multiple Storage daemons, especially\nif they have incompatible media.\n\nFor example, if you specify a Media Type of `DDS-4`\nthen during the restore, Bacula will be able to choose any Storage\nDaemon that handles `DDS-4`. If you have an\nautochanger, you might want to name the Media Type in a way that is\nunique to the autochanger, unless you wish to possibly use the\nVolumes in other drives. You should also ensure to have unique Media\nType names if the Media is not compatible between drives. This\nspecification is required for all devices.\n\nIn addition, if you are using disk storage, each Device resource will\ngenerally have a different mount point or directory. In order for\nBacula to select the correct Device resource, each one must have a\nunique Media Type.\n"}, "loc": ["services", "bacula-sd", "device", "<name>", "mediaType"], "readOnly": false, "type": "string"}, "services.bacula-sd.director": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option defines Director resources in Bacula Storage Daemon.\n"}, "loc": ["services", "bacula-sd", "director"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.bacula-sd.director.<name>.monitor": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"no\""}, "description": {"_type": "mdDoc", "text": "If Monitor is set to `no`, this director will have\nfull access to this Storage daemon. If Monitor is set to\n`yes`, this director will only be able to fetch the\ncurrent status of this Storage daemon.\n\nPlease note that if this director is being used by a Monitor, we\nhighly recommend to set this directive to yes to avoid serious\nsecurity problems.\n"}, "example": {"_type": "literalExpression", "text": "\"yes\""}, "loc": ["services", "bacula-sd", "director", "<name>", "monitor"], "readOnly": false, "type": "one of \"no\", \"yes\""}, "services.bacula-sd.director.<name>.password": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "description": {"_type": "mdDoc", "text": "Specifies the password that must be supplied for the default Bacula\nConsole to be authorized. The same password must appear in the\nDirector resource of the Console configuration file. For added\nsecurity, the password is never passed across the network but instead\na challenge response hash code created with the password. This\ndirective is required. If you have either /dev/random or bc on your\nmachine, Bacula will generate a random password during the\nconfiguration process, otherwise it will be left blank and you must\nmanually supply it.\n\nThe password is plain text. It is not generated through any special\nprocess but as noted above, it is better to use random text for\nsecurity reasons.\n"}, "loc": ["services", "bacula-sd", "director", "<name>", "password"], "readOnly": false, "type": "string"}, "services.bacula-sd.enable": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Bacula Storage Daemon.\n"}, "loc": ["services", "bacula-sd", "enable"], "readOnly": false, "type": "boolean"}, "services.bacula-sd.extraMessagesConfig": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to be passed in Messages directive.\n"}, "example": {"_type": "literalExpression", "text": "''\n  console = all\n''"}, "loc": ["services", "bacula-sd", "extraMessagesConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bacula-sd.extraStorageConfig": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to be passed in Storage directive.\n"}, "example": {"_type": "literalExpression", "text": "''\n  Maximum Concurrent Jobs = 20;\n  Heartbeat Interval = 30;\n''"}, "loc": ["services", "bacula-sd", "extraStorageConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bacula-sd.name": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "\"${config.networking.hostName}-sd\""}, "description": {"_type": "mdDoc", "text": "Specifies the Name of the Storage daemon.\n"}, "loc": ["services", "bacula-sd", "name"], "readOnly": false, "type": "string"}, "services.bacula-sd.port": {"declarations": ["nixos/modules/services/backup/bacula.nix"], "default": {"_type": "literalExpression", "text": "9103"}, "description": {"_type": "mdDoc", "text": "Specifies port number on which the Storage daemon listens for\nDirector connections.\n"}, "loc": ["services", "bacula-sd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.bamf.enable": {"declarations": ["nixos/modules/services/desktops/bamf.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable bamf."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "bamf", "enable"], "readOnly": false, "type": "boolean"}, "services.bazarr.enable": {"declarations": ["nixos/modules/services/misc/bazarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable bazarr, a subtitle manager for Sonarr and Radarr."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "bazarr", "enable"], "readOnly": false, "type": "boolean"}, "services.bazarr.group": {"declarations": ["nixos/modules/services/misc/bazarr.nix"], "default": {"_type": "literalExpression", "text": "\"bazarr\""}, "description": {"_type": "mdDoc", "text": "Group under which bazarr runs."}, "loc": ["services", "bazarr", "group"], "readOnly": false, "type": "string"}, "services.bazarr.listenPort": {"declarations": ["nixos/modules/services/misc/bazarr.nix"], "default": {"_type": "literalExpression", "text": "6767"}, "description": {"_type": "mdDoc", "text": "Port on which the bazarr web interface should listen"}, "loc": ["services", "bazarr", "listenPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.bazarr.openFirewall": {"declarations": ["nixos/modules/services/misc/bazarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the bazarr web interface."}, "loc": ["services", "bazarr", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.bazarr.user": {"declarations": ["nixos/modules/services/misc/bazarr.nix"], "default": {"_type": "literalExpression", "text": "\"bazarr\""}, "description": {"_type": "mdDoc", "text": "User account under which bazarr runs."}, "loc": ["services", "bazarr", "user"], "readOnly": false, "type": "string"}, "services.beanstalkd.enable": {"declarations": ["nixos/modules/services/misc/beanstalkd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Beanstalk work queue."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "beanstalkd", "enable"], "readOnly": false, "type": "boolean"}, "services.beanstalkd.listen.address": {"declarations": ["nixos/modules/services/misc/beanstalkd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "IP address to listen on."}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "beanstalkd", "listen", "address"], "readOnly": false, "type": "string"}, "services.beanstalkd.listen.port": {"declarations": ["nixos/modules/services/misc/beanstalkd.nix"], "default": {"_type": "literalExpression", "text": "11300"}, "description": {"_type": "mdDoc", "text": "TCP port that will be used to accept client connections."}, "loc": ["services", "beanstalkd", "listen", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.beanstalkd.openFirewall": {"declarations": ["nixos/modules/services/misc/beanstalkd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open ports in the firewall for the server."}, "loc": ["services", "beanstalkd", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.bee-clef.dataDir": {"declarations": ["nixos/modules/services/networking/bee-clef.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/bee-clef\""}, "description": {"_type": "mdDoc", "text": "Data dir for bee-clef. Beware that some helper scripts may not work when changed!\nThe service itself should work fine, though.\n"}, "loc": ["services", "bee-clef", "dataDir"], "readOnly": false, "type": "null or string"}, "services.bee-clef.enable": {"declarations": ["nixos/modules/services/networking/bee-clef.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable clef external signer instance for Ethereum Swarm Bee."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "bee-clef", "enable"], "readOnly": false, "type": "boolean"}, "services.bee-clef.group": {"declarations": ["nixos/modules/services/networking/bee-clef.nix"], "default": {"_type": "literalExpression", "text": "\"bee-clef\""}, "description": {"_type": "mdDoc", "text": "Group the bee-clef daemon should execute under.\n"}, "loc": ["services", "bee-clef", "group"], "readOnly": false, "type": "string"}, "services.bee-clef.passwordFile": {"declarations": ["nixos/modules/services/networking/bee-clef.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/bee-clef/password\""}, "description": {"_type": "mdDoc", "text": "Password file for bee-clef."}, "loc": ["services", "bee-clef", "passwordFile"], "readOnly": false, "type": "null or string"}, "services.bee-clef.user": {"declarations": ["nixos/modules/services/networking/bee-clef.nix"], "default": {"_type": "literalExpression", "text": "\"bee-clef\""}, "description": {"_type": "mdDoc", "text": "User the bee-clef daemon should execute under.\n"}, "loc": ["services", "bee-clef", "user"], "readOnly": false, "type": "string"}, "services.bee.daemonNiceLevel": {"declarations": ["nixos/modules/services/networking/bee.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Daemon process priority for bee.\n0 is the default Unix process priority, 19 is the lowest.\n"}, "loc": ["services", "bee", "daemonNiceLevel"], "readOnly": false, "type": "signed integer"}, "services.bee.enable": {"declarations": ["nixos/modules/services/networking/bee.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ethereum Swarm Bee."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "bee", "enable"], "readOnly": false, "type": "boolean"}, "services.bee.group": {"declarations": ["nixos/modules/services/networking/bee.nix"], "default": {"_type": "literalExpression", "text": "\"bee\""}, "description": {"_type": "mdDoc", "text": "Group the bee binary should execute under.\n"}, "loc": ["services", "bee", "group"], "readOnly": false, "type": "string"}, "services.bee.package": {"declarations": ["nixos/modules/services/networking/bee.nix"], "default": {"_type": "literalExpression", "text": "pkgs.bee"}, "description": {"_type": "mdDoc", "text": "The package providing the bee binary for the service."}, "example": {"_type": "literalExpression", "text": "pkgs.bee-unstable"}, "loc": ["services", "bee", "package"], "readOnly": false, "type": "package"}, "services.bee.settings": {"declarations": ["nixos/modules/services/networking/bee.nix"], "description": {"_type": "mdDoc", "text": "Ethereum Swarm Bee configuration. Refer to\n<https://gateway.ethswarm.org/bzz/docs.swarm.eth/docs/installation/configuration/>\nfor details on supported values.\n"}, "loc": ["services", "bee", "settings"], "readOnly": false, "type": "YAML value"}, "services.bee.user": {"declarations": ["nixos/modules/services/networking/bee.nix"], "default": {"_type": "literalExpression", "text": "\"bee\""}, "description": {"_type": "mdDoc", "text": "User the bee binary should execute under.\n"}, "loc": ["services", "bee", "user"], "readOnly": false, "type": "string"}, "services.beesd.filesystems": {"declarations": ["nixos/modules/services/misc/bees.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "BTRFS filesystems to run block-level deduplication on."}, "example": {"_type": "literalExpression", "text": "{\n  root = {\n    spec = \"LABEL=root\";\n    hashTableSizeMB = 2048;\n    verbosity = \"crit\";\n    extraOptions = [ \"--loadavg-target\" \"5.0\" ];\n  };\n}\n"}, "loc": ["services", "beesd", "filesystems"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.beesd.filesystems.<name>.extraOptions": {"declarations": ["nixos/modules/services/misc/bees.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command-line options passed to the daemon. See upstream bees documentation.\n"}, "example": {"_type": "literalExpression", "text": "[ \"--thread-count\" \"4\" ]\n"}, "loc": ["services", "beesd", "filesystems", "<name>", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.beesd.filesystems.<name>.hashTableSizeMB": {"declarations": ["nixos/modules/services/misc/bees.nix"], "default": {"_type": "literalExpression", "text": "1024"}, "description": {"_type": "mdDoc", "text": "Hash table size in MB; must be a multiple of 16.\n\nA larger ratio of index size to storage size means smaller blocks of\nduplicate content are recognized.\n\nIf you have 1TB of data, a 4GB hash table (which is to say, a value of\n4096) will permit 4KB extents (the smallest possible size) to be\nrecognized, whereas a value of 1024 -- creating a 1GB hash table --\nwill recognize only aligned duplicate blocks of 16KB.\n"}, "loc": ["services", "beesd", "filesystems", "<name>", "hashTableSizeMB"], "readOnly": false, "type": "signed integer"}, "services.beesd.filesystems.<name>.spec": {"declarations": ["nixos/modules/services/misc/bees.nix"], "description": {"_type": "mdDoc", "text": "Description of how to identify the filesystem to be duplicated by this\ninstance of bees. Note that deduplication crosses subvolumes; one must\nnot configure multiple instances for subvolumes of the same filesystem\n(or block devices which are part of the same filesystem), but only for\ncompletely independent btrfs filesystems.\n\nThis must be in a format usable by findmnt; that could be a key=value\npair, or a bare path to a mount point.\nUsing bare paths will allow systemd to start the beesd service only\nafter mounting the associated path.\n"}, "example": {"_type": "literalExpression", "text": "\"LABEL=MyBulkDataDrive\""}, "loc": ["services", "beesd", "filesystems", "<name>", "spec"], "readOnly": false, "type": "string"}, "services.beesd.filesystems.<name>.verbosity": {"declarations": ["nixos/modules/services/misc/bees.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Log verbosity (syslog keyword/level)."}, "loc": ["services", "beesd", "filesystems", "<name>", "verbosity"], "readOnly": false, "type": "one of \"alert\", \"crit\", \"debug\", \"emerg\", \"err\", \"info\", \"notice\", \"warning\", 1, 2, 7, 0, 3, 6, 5, 4"}, "services.beesd.filesystems.<name>.workDir": {"declarations": ["nixos/modules/services/misc/bees.nix"], "default": {"_type": "literalExpression", "text": "\".beeshome\""}, "description": {"_type": "mdDoc", "text": "Name (relative to the root of the filesystem) of the subvolume where\nthe hash table will be stored.\n"}, "loc": ["services", "beesd", "filesystems", "<name>", "workDir"], "readOnly": false, "type": "string"}, "services.bepasty.enable": {"declarations": ["nixos/modules/services/misc/bepasty.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Bepasty servers."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "bepasty", "enable"], "readOnly": false, "type": "boolean"}, "services.bepasty.servers": {"declarations": ["nixos/modules/services/misc/bepasty.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "configure a number of bepasty servers which will be started with\ngunicorn.\n"}, "loc": ["services", "bepasty", "servers"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.bepasty.servers.<name>.bind": {"declarations": ["nixos/modules/services/misc/bepasty.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:8000\""}, "description": {"_type": "mdDoc", "text": "Bind address to be used for this server.\n"}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0:8000\""}, "loc": ["services", "bepasty", "servers", "<name>", "bind"], "readOnly": false, "type": "string"}, "services.bepasty.servers.<name>.dataDir": {"declarations": ["nixos/modules/services/misc/bepasty.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/bepasty/data\""}, "description": {"_type": "mdDoc", "text": "Path to the directory where the pastes will be saved to\n"}, "loc": ["services", "bepasty", "servers", "<name>", "dataDir"], "readOnly": false, "type": "string"}, "services.bepasty.servers.<name>.defaultPermissions": {"declarations": ["nixos/modules/services/misc/bepasty.nix"], "default": {"_type": "literalExpression", "text": "\"read\""}, "description": {"_type": "mdDoc", "text": "default permissions for all unauthenticated accesses.\n"}, "example": {"_type": "literalExpression", "text": "\"read,create,delete\""}, "loc": ["services", "bepasty", "servers", "<name>", "defaultPermissions"], "readOnly": false, "type": "string"}, "services.bepasty.servers.<name>.extraConfig": {"declarations": ["nixos/modules/services/misc/bepasty.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration for bepasty server to be appended on the\nconfiguration.\nsee https://bepasty-server.readthedocs.org/en/latest/quickstart.html#configuring-bepasty\nfor all options.\n"}, "example": {"_type": "literalExpression", "text": "''\n  PERMISSIONS = {\n    'myadminsecret': 'admin,list,create,read,delete',\n  }\n  MAX_ALLOWED_FILE_SIZE = 5 * 1000 * 1000\n''"}, "loc": ["services", "bepasty", "servers", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bepasty.servers.<name>.secretKey": {"declarations": ["nixos/modules/services/misc/bepasty.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "server secret for safe session cookies, must be set.\n\nWarning: this secret is stored in the WORLD-READABLE Nix store!\n\nIt's recommended to use {option}`secretKeyFile`\nwhich takes precedence over {option}`secretKey`.\n"}, "loc": ["services", "bepasty", "servers", "<name>", "secretKey"], "readOnly": false, "type": "string"}, "services.bepasty.servers.<name>.secretKeyFile": {"declarations": ["nixos/modules/services/misc/bepasty.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file that contains the server secret for safe session cookies, must be set.\n\n{option}`secretKeyFile` takes precedence over {option}`secretKey`.\n\nWarning: when {option}`secretKey` is non-empty {option}`secretKeyFile`\ndefaults to a file in the WORLD-READABLE Nix store containing that secret.\n"}, "loc": ["services", "bepasty", "servers", "<name>", "secretKeyFile"], "readOnly": false, "type": "null or string"}, "services.bepasty.servers.<name>.workDir": {"declarations": ["nixos/modules/services/misc/bepasty.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/bepasty\""}, "description": {"_type": "mdDoc", "text": "Path to the working directory (used for config and pidfile).\nDefaults to the users home directory.\n"}, "loc": ["services", "bepasty", "servers", "<name>", "workDir"], "readOnly": false, "type": "string"}, "services.biboumi.credentialsFile": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "\"/dev/null\""}, "description": {"_type": "mdDoc", "text": "Path to a configuration file to be merged with the settings.\nBeware not to surround \"=\" with spaces when setting biboumi's options in this file.\nUseful to merge a file which is better kept out of the Nix store\nbecause it contains sensible data like\n[password](#opt-services.biboumi.settings.password).\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/biboumi.cfg\""}, "loc": ["services", "biboumi", "credentialsFile"], "readOnly": false, "type": "path"}, "services.biboumi.enable": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Biboumi XMPP gateway to IRC."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "biboumi", "enable"], "readOnly": false, "type": "boolean"}, "services.biboumi.openFirewall": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable opening of the identd port in the firewall."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "biboumi", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.biboumi.settings": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "See [biboumi 8.5](https://lab.louiz.org/louiz/biboumi/blob/8.5/doc/biboumi.1.rst)\nfor documentation.\n"}, "loc": ["services", "biboumi", "settings"], "readOnly": false, "type": "settings option"}, "services.biboumi.settings.admin": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The bare JID of the gateway administrator. This JID will have more\nprivileges than other standard users, for example some administration\nad-hoc commands will only be available to that JID.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"admin@example.org\"\n]"}, "loc": ["services", "biboumi", "settings", "admin"], "readOnly": false, "type": "list of string"}, "services.biboumi.settings.ca_file": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/ssl/certs/ca-certificates.crt\""}, "description": {"_type": "mdDoc", "text": "Specifies which file should be used as the list of trusted CA\nwhen negotiating a TLS session.\n"}, "loc": ["services", "biboumi", "settings", "ca_file"], "readOnly": false, "type": "path"}, "services.biboumi.settings.db_name": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/biboumi/biboumi.sqlite\""}, "description": {"_type": "mdDoc", "text": "The name of the database to use.\n"}, "example": {"_type": "literalExpression", "text": "\"postgresql://user:secret@localhost\""}, "loc": ["services", "biboumi", "settings", "db_name"], "readOnly": false, "type": "path or string"}, "services.biboumi.settings.hostname": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "description": {"_type": "mdDoc", "text": "The hostname served by the XMPP\u202fgateway.\nThis domain must be configured in the XMPP server\nas an external component.\n"}, "example": {"_type": "literalExpression", "text": "\"biboumi.example.org\""}, "loc": ["services", "biboumi", "settings", "hostname"], "readOnly": false, "type": "string"}, "services.biboumi.settings.identd_port": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "113"}, "description": {"_type": "mdDoc", "text": "The TCP port on which to listen for identd queries.\n"}, "example": {"_type": "literalExpression", "text": "0"}, "loc": ["services", "biboumi", "settings", "identd_port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.biboumi.settings.log_level": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Indicate what type of log messages to write in the logs.\n0 is debug, 1 is info, 2 is warning, 3 is error.\n"}, "loc": ["services", "biboumi", "settings", "log_level"], "readOnly": false, "type": "integer between 0 and 3 (both inclusive)"}, "services.biboumi.settings.password": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "description": {"_type": "mdDoc", "text": "The password used to authenticate the XMPP component to your XMPP server.\nThis password must be configured in the XMPP server,\nassociated with the external component on\n[hostname](#opt-services.biboumi.settings.hostname).\n\nSet it to null and use [credentialsFile](#opt-services.biboumi.credentialsFile)\nif you do not want this password to go into the Nix store.\n"}, "loc": ["services", "biboumi", "settings", "password"], "readOnly": false, "type": "null or string"}, "services.biboumi.settings.persistent_by_default": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether all rooms will be persistent by default:\nthe value of the \u201cpersistent\u201d option in the global configuration of each\nuser will be \u201ctrue\u201d, but the value of each individual room will still\ndefault to false. This means that a user just needs to change the global\n\u201cpersistent\u201d configuration option to false in order to override this.\n"}, "loc": ["services", "biboumi", "settings", "persistent_by_default"], "readOnly": false, "type": "boolean"}, "services.biboumi.settings.policy_directory": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.biboumi}/etc/biboumi\""}, "description": {"_type": "mdDoc", "text": "A directory that should contain the policy files,\nused to customize Botan\u2019s behaviour\nwhen negotiating the TLS connections with the IRC servers.\n"}, "loc": ["services", "biboumi", "settings", "policy_directory"], "readOnly": false, "type": "path"}, "services.biboumi.settings.port": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "5347"}, "description": {"_type": "mdDoc", "text": "The TCP port to use to connect to the local XMPP component.\n"}, "loc": ["services", "biboumi", "settings", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.biboumi.settings.realname_customization": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the users will be able to use\nthe ad-hoc commands that lets them configure\ntheir realname and username.\n"}, "loc": ["services", "biboumi", "settings", "realname_customization"], "readOnly": false, "type": "boolean"}, "services.biboumi.settings.realname_from_jid": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the realname and username of each biboumi\nuser will be extracted from their JID.\nOtherwise they will be set to the nick\nthey used to connect to the IRC server.\n"}, "loc": ["services", "biboumi", "settings", "realname_from_jid"], "readOnly": false, "type": "boolean"}, "services.biboumi.settings.xmpp_server_ip": {"declarations": ["nixos/modules/services/networking/biboumi.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The IP address to connect to the XMPP server on.\nThe connection to the XMPP server is unencrypted,\nso the biboumi instance and the server should\nnormally be on the same host.\n"}, "loc": ["services", "biboumi", "settings", "xmpp_server_ip"], "readOnly": false, "type": "string"}, "services.bind.blockedNetworks": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "What networks are just blocked.\n"}, "loc": ["services", "bind", "blockedNetworks"], "readOnly": false, "type": "list of string"}, "services.bind.cacheNetworks": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.0/24\"\n]"}, "description": {"_type": "mdDoc", "text": "What networks are allowed to use us as a resolver.  Note\nthat this is for recursive queries -- all networks are\nallowed to query zones configured with the `zones` option\nby default (although this may be overridden within each\nzone's configuration, via the `allowQuery` option).\nIt is recommended that you limit cacheNetworks to avoid your\nserver being used for DNS amplification attacks.\n"}, "loc": ["services", "bind", "cacheNetworks"], "readOnly": false, "type": "list of string"}, "services.bind.configFile": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "confFile"}, "description": {"_type": "mdDoc", "text": "Overridable config file to use for named. By default, that\ngenerated by nixos.\n"}, "loc": ["services", "bind", "configFile"], "readOnly": false, "type": "path"}, "services.bind.directory": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "\"/run/named\""}, "description": {"_type": "mdDoc", "text": "Working directory of BIND."}, "loc": ["services", "bind", "directory"], "readOnly": false, "type": "string"}, "services.bind.enable": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable BIND domain name server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "bind", "enable"], "readOnly": false, "type": "boolean"}, "services.bind.extraConfig": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to the generated named configuration file.\n"}, "loc": ["services", "bind", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bind.extraOptions": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to the options section of the\ngenerated named configuration file.\n"}, "loc": ["services", "bind", "extraOptions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bind.forward": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "\"first\""}, "description": {"_type": "mdDoc", "text": "Whether to forward 'first' (try forwarding but lookup directly if forwarding fails) or 'only'.\n"}, "loc": ["services", "bind", "forward"], "readOnly": false, "type": "one of \"first\", \"only\""}, "services.bind.forwarders": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "config.networking.nameservers"}, "description": {"_type": "mdDoc", "text": "List of servers we should forward requests to.\n"}, "loc": ["services", "bind", "forwarders"], "readOnly": false, "type": "list of string"}, "services.bind.ipv4Only": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Only use ipv4, even if the host supports ipv6.\n"}, "loc": ["services", "bind", "ipv4Only"], "readOnly": false, "type": "boolean"}, "services.bind.listenOn": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"any\"\n]"}, "description": {"_type": "mdDoc", "text": "Interfaces to listen on.\n"}, "loc": ["services", "bind", "listenOn"], "readOnly": false, "type": "list of string"}, "services.bind.listenOnIpv6": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"any\"\n]"}, "description": {"_type": "mdDoc", "text": "Ipv6 interfaces to listen on.\n"}, "loc": ["services", "bind", "listenOnIpv6"], "readOnly": false, "type": "list of string"}, "services.bind.package": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "pkgs.bind"}, "description": {"_type": "mdDoc", "text": "The BIND package to use."}, "loc": ["services", "bind", "package"], "readOnly": false, "type": "package"}, "services.bind.zones": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of zones we claim authority over.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"example.com\" = {\n    extraConfig = \"\";\n    file = \"/var/dns/example.com\";\n    master = false;\n    masters = [\n      \"192.168.0.1\"\n    ];\n    slaves = [ ];\n  };\n}"}, "loc": ["services", "bind", "zones"], "readOnly": false, "type": "(attribute set of (submodule)) or (list of (attribute set)) convertible to it"}, "services.bind.zones.<name>.allowQuery": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"any\"\n]"}, "description": {"_type": "mdDoc", "text": "List of address ranges allowed to query this zone. Instead of the address(es), this may instead\ncontain the single string \"any\".\n\nNOTE: This overrides the global-level `allow-query` setting, which is set to the contents\nof `cachenetworks`.\n"}, "loc": ["services", "bind", "zones", "<name>", "allowQuery"], "readOnly": false, "type": "list of string"}, "services.bind.zones.<name>.extraConfig": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra zone config to be appended at the end of the zone section."}, "loc": ["services", "bind", "zones", "<name>", "extraConfig"], "readOnly": false, "type": "string"}, "services.bind.zones.<name>.file": {"declarations": ["nixos/modules/services/networking/bind.nix"], "description": {"_type": "mdDoc", "text": "Zone file resource records contain columns of data, separated by whitespace, that define the record."}, "loc": ["services", "bind", "zones", "<name>", "file"], "readOnly": false, "type": "string or path"}, "services.bind.zones.<name>.master": {"declarations": ["nixos/modules/services/networking/bind.nix"], "description": {"_type": "mdDoc", "text": "Master=false means slave server"}, "loc": ["services", "bind", "zones", "<name>", "master"], "readOnly": false, "type": "boolean"}, "services.bind.zones.<name>.masters": {"declarations": ["nixos/modules/services/networking/bind.nix"], "description": {"_type": "mdDoc", "text": "List of servers for inclusion in stub and secondary zones."}, "loc": ["services", "bind", "zones", "<name>", "masters"], "readOnly": false, "type": "list of string"}, "services.bind.zones.<name>.name": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Name of the zone."}, "loc": ["services", "bind", "zones", "<name>", "name"], "readOnly": false, "type": "string"}, "services.bind.zones.<name>.slaves": {"declarations": ["nixos/modules/services/networking/bind.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Addresses who may request zone transfers."}, "loc": ["services", "bind", "zones", "<name>", "slaves"], "readOnly": false, "type": "list of string"}, "services.bird-lg.frontend.bgpMapInfo": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"asn\"\n  \"as-name\"\n  \"ASName\"\n  \"descr\"\n]"}, "description": {"_type": "mdDoc", "text": "Information displayed in bgpmap."}, "loc": ["services", "bird-lg", "frontend", "bgpMapInfo"], "readOnly": false, "type": "list of string"}, "services.bird-lg.frontend.dnsInterface": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"asn.cymru.com\""}, "description": {"_type": "mdDoc", "text": "DNS zone to query ASN information."}, "loc": ["services", "bird-lg", "frontend", "dnsInterface"], "readOnly": false, "type": "string"}, "services.bird-lg.frontend.domain": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "description": {"_type": "mdDoc", "text": "Server name domain suffixes."}, "example": {"_type": "literalExpression", "text": "\"dn42.lantian.pub\""}, "loc": ["services", "bird-lg", "frontend", "domain"], "readOnly": false, "type": "string"}, "services.bird-lg.frontend.enable": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Bird Looking Glass Frontend Webserver."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "bird-lg", "frontend", "enable"], "readOnly": false, "type": "boolean"}, "services.bird-lg.frontend.extraArgs": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters documented [here](https://github.com/xddxdd/bird-lg-go#frontend).\n\n:::{.note}\nPassing lines (plain strings) is deprecated in favour of passing lists of strings.\n:::\n"}, "loc": ["services", "bird-lg", "frontend", "extraArgs"], "readOnly": false, "type": "strings concatenated with \"\\n\" or list of string"}, "services.bird-lg.frontend.listenAddress": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:5000\""}, "description": {"_type": "mdDoc", "text": "Address to listen on."}, "loc": ["services", "bird-lg", "frontend", "listenAddress"], "readOnly": false, "type": "string"}, "services.bird-lg.frontend.nameFilter": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Protocol names to hide in summary tables (RE2 syntax),"}, "example": {"_type": "literalExpression", "text": "\"^ospf\""}, "loc": ["services", "bird-lg", "frontend", "nameFilter"], "readOnly": false, "type": "string"}, "services.bird-lg.frontend.navbar.allServers": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"ALL Servers\""}, "description": {"_type": "mdDoc", "text": "Text of 'All server' button in the navigation bar."}, "loc": ["services", "bird-lg", "frontend", "navbar", "allServers"], "readOnly": false, "type": "string"}, "services.bird-lg.frontend.navbar.allServersURL": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"all\""}, "description": {"_type": "mdDoc", "text": "URL of 'All servers' button."}, "loc": ["services", "bird-lg", "frontend", "navbar", "allServersURL"], "readOnly": false, "type": "string"}, "services.bird-lg.frontend.navbar.brand": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"Bird-lg Go\""}, "description": {"_type": "mdDoc", "text": "Brand to show in the navigation bar ."}, "loc": ["services", "bird-lg", "frontend", "navbar", "brand"], "readOnly": false, "type": "string"}, "services.bird-lg.frontend.navbar.brandURL": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"/\""}, "description": {"_type": "mdDoc", "text": "URL of the brand to show in the navigation bar."}, "loc": ["services", "bird-lg", "frontend", "navbar", "brandURL"], "readOnly": false, "type": "string"}, "services.bird-lg.frontend.netSpecificMode": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Apply network-specific changes for some networks."}, "example": {"_type": "literalExpression", "text": "\"dn42\""}, "loc": ["services", "bird-lg", "frontend", "netSpecificMode"], "readOnly": false, "type": "string"}, "services.bird-lg.frontend.protocolFilter": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Information displayed in bgpmap."}, "example": {"_type": "literalExpression", "text": "[\n  \"ospf\"\n]"}, "loc": ["services", "bird-lg", "frontend", "protocolFilter"], "readOnly": false, "type": "list of string"}, "services.bird-lg.frontend.proxyPort": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "8000"}, "description": {"_type": "mdDoc", "text": "Port bird-lg-proxy is running on."}, "loc": ["services", "bird-lg", "frontend", "proxyPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.bird-lg.frontend.servers": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "description": {"_type": "mdDoc", "text": "Server name prefixes."}, "example": {"_type": "literalExpression", "text": "[\n  \"gigsgigscloud\"\n  \"hostdare\"\n]"}, "loc": ["services", "bird-lg", "frontend", "servers"], "readOnly": false, "type": "list of string"}, "services.bird-lg.frontend.timeout": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "120"}, "description": {"_type": "mdDoc", "text": "Time before request timed out, in seconds."}, "loc": ["services", "bird-lg", "frontend", "timeout"], "readOnly": false, "type": "signed integer"}, "services.bird-lg.frontend.titleBrand": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"Bird-lg Go\""}, "description": {"_type": "mdDoc", "text": "Prefix of page titles in browser tabs."}, "loc": ["services", "bird-lg", "frontend", "titleBrand"], "readOnly": false, "type": "string"}, "services.bird-lg.frontend.whois": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"whois.verisign-grs.com\""}, "description": {"_type": "mdDoc", "text": "Whois server for queries."}, "loc": ["services", "bird-lg", "frontend", "whois"], "readOnly": false, "type": "string"}, "services.bird-lg.group": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"bird-lg\""}, "description": {"_type": "mdDoc", "text": "Group to run the service."}, "loc": ["services", "bird-lg", "group"], "readOnly": false, "type": "string"}, "services.bird-lg.package": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "pkgs.bird-lg"}, "description": {"_type": "mdDoc", "text": "The Bird Looking Glass package to use."}, "loc": ["services", "bird-lg", "package"], "readOnly": false, "type": "package"}, "services.bird-lg.proxy.allowedIPs": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of IPs to allow (default all allowed)."}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168.25.52\"\n  \"192.168.25.53\"\n]"}, "loc": ["services", "bird-lg", "proxy", "allowedIPs"], "readOnly": false, "type": "list of string"}, "services.bird-lg.proxy.birdSocket": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"/var/run/bird/bird.ctl\""}, "description": {"_type": "mdDoc", "text": "Bird control socket path."}, "loc": ["services", "bird-lg", "proxy", "birdSocket"], "readOnly": false, "type": "string"}, "services.bird-lg.proxy.enable": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Bird Looking Glass Proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "bird-lg", "proxy", "enable"], "readOnly": false, "type": "boolean"}, "services.bird-lg.proxy.extraArgs": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters documented [here](https://github.com/xddxdd/bird-lg-go#proxy).\n\n:::{.note}\nPassing lines (plain strings) is deprecated in favour of passing lists of strings.\n:::\n"}, "loc": ["services", "bird-lg", "proxy", "extraArgs"], "readOnly": false, "type": "strings concatenated with \"\\n\" or list of string"}, "services.bird-lg.proxy.listenAddress": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:8000\""}, "description": {"_type": "mdDoc", "text": "Address to listen on."}, "loc": ["services", "bird-lg", "proxy", "listenAddress"], "readOnly": false, "type": "string"}, "services.bird-lg.proxy.traceroute.binary": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.traceroute}/bin/traceroute\""}, "description": {"_type": "mdDoc", "text": "Traceroute's binary path."}, "loc": ["services", "bird-lg", "proxy", "traceroute", "binary"], "readOnly": false, "type": "string"}, "services.bird-lg.proxy.traceroute.flags": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Flags for traceroute process"}, "loc": ["services", "bird-lg", "proxy", "traceroute", "flags"], "readOnly": false, "type": "list of string"}, "services.bird-lg.proxy.traceroute.rawOutput": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Display traceroute output in raw format."}, "loc": ["services", "bird-lg", "proxy", "traceroute", "rawOutput"], "readOnly": false, "type": "boolean"}, "services.bird-lg.user": {"declarations": ["nixos/modules/services/networking/bird-lg.nix"], "default": {"_type": "literalExpression", "text": "\"bird-lg\""}, "description": {"_type": "mdDoc", "text": "User to run the service."}, "loc": ["services", "bird-lg", "user"], "readOnly": false, "type": "string"}, "services.bird2.checkConfig": {"declarations": ["nixos/modules/services/networking/bird.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the config should be checked at build time.\nWhen the config can't be checked during build time, for example when it includes\nother files, either disable this option or use `preCheckConfig` to create\nthe included files before checking.\n"}, "loc": ["services", "bird2", "checkConfig"], "readOnly": false, "type": "boolean"}, "services.bird2.config": {"declarations": ["nixos/modules/services/networking/bird.nix"], "description": {"_type": "mdDoc", "text": "BIRD Internet Routing Daemon configuration file.\n<http://bird.network.cz/>\n"}, "loc": ["services", "bird2", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bird2.enable": {"declarations": ["nixos/modules/services/networking/bird.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable BIRD Internet Routing Daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "bird2", "enable"], "readOnly": false, "type": "boolean"}, "services.bird2.preCheckConfig": {"declarations": ["nixos/modules/services/networking/bird.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Commands to execute before the config file check. The file to be checked will be\navailable as `bird2.conf` in the current directory.\n\nFiles created with this option will not be available at service runtime, only during\nbuild time checking.\n"}, "example": {"_type": "literalExpression", "text": "''\n  echo \"cost 100;\" > include.conf\n''"}, "loc": ["services", "bird2", "preCheckConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.birdwatcher.enable": {"declarations": ["nixos/modules/services/networking/birdwatcher.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Birdwatcher."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "birdwatcher", "enable"], "readOnly": false, "type": "boolean"}, "services.birdwatcher.flags": {"declarations": ["nixos/modules/services/networking/birdwatcher.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Flags to append to the program call\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-worker-pool-size 16\"\n  \"-6\"\n]"}, "loc": ["services", "birdwatcher", "flags"], "readOnly": false, "type": "list of string"}, "services.birdwatcher.package": {"declarations": ["nixos/modules/services/networking/birdwatcher.nix"], "default": {"_type": "literalExpression", "text": "pkgs.birdwatcher"}, "description": {"_type": "mdDoc", "text": "The Birdwatcher package to use."}, "loc": ["services", "birdwatcher", "package"], "readOnly": false, "type": "package"}, "services.birdwatcher.settings": {"declarations": ["nixos/modules/services/networking/birdwatcher.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "birdwatcher configuration, for configuration options see the example on [github](https://github.com/alice-lg/birdwatcher/blob/master/etc/birdwatcher/birdwatcher.conf)\n"}, "example": {"_type": "literalExpression", "text": "[server]\nallow_from = []\nallow_uncached = false\nmodules_enabled = [\"status\",\n                   \"protocols\",\n                   \"protocols_bgp\",\n                   \"protocols_short\",\n                   \"routes_protocol\",\n                   \"routes_peer\",\n                   \"routes_table\",\n                   \"routes_table_filtered\",\n                   \"routes_table_peer\",\n                   \"routes_filtered\",\n                   \"routes_prefixed\",\n                   \"routes_noexport\",\n                   \"routes_pipe_filtered_count\",\n                   \"routes_pipe_filtered\"\n                  ]\n\n[status]\nreconfig_timestamp_source = \"bird\"\nreconfig_timestamp_match = \"# created: (.*)\"\n\nfilter_fields = []\n\n[bird]\nlisten = \"0.0.0.0:29184\"\nconfig = \"/etc/bird/bird2.conf\"\nbirdc  = \"${pkgs.bird}/bin/birdc\"\nttl = 5 # time to live (in minutes) for caching of cli output\n\n[parser]\nfilter_fields = []\n\n[cache]\nuse_redis = false # if not using redis cache, activate housekeeping to save memory!\n\n[housekeeping]\ninterval = 5\nforce_release_memory = true\n"}, "loc": ["services", "birdwatcher", "settings"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bitcoind": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specification of one or more bitcoind instances."}, "loc": ["services", "bitcoind"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.bitcoind.<name>.configFile": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The configuration file path to supply bitcoind."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/\u2039name\u203a/bitcoin.conf\""}, "loc": ["services", "bitcoind", "<name>", "configFile"], "readOnly": false, "type": "null or path"}, "services.bitcoind.<name>.dataDir": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/bitcoind-\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The data directory for bitcoind."}, "loc": ["services", "bitcoind", "<name>", "dataDir"], "readOnly": false, "type": "path"}, "services.bitcoind.<name>.dbCache": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Override the default database cache size in MiB."}, "example": {"_type": "literalExpression", "text": "4000"}, "loc": ["services", "bitcoind", "<name>", "dbCache"], "readOnly": false, "type": "null or integer between 4 and 16384 (both inclusive)"}, "services.bitcoind.<name>.enable": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Bitcoin daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "bitcoind", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.bitcoind.<name>.extraCmdlineOptions": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line options to pass to bitcoind.\nRun bitcoind --help to list all available options.\n"}, "loc": ["services", "bitcoind", "<name>", "extraCmdlineOptions"], "readOnly": false, "type": "list of string"}, "services.bitcoind.<name>.extraConfig": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional configurations to be appended to {file}`bitcoin.conf`."}, "example": {"_type": "literalExpression", "text": "''\n  par=16\n  rpcthreads=16\n  logips=1\n''"}, "loc": ["services", "bitcoind", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bitcoind.<name>.group": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "\"bitcoind-\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The group as which to run bitcoind."}, "loc": ["services", "bitcoind", "<name>", "group"], "readOnly": false, "type": "string"}, "services.bitcoind.<name>.package": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "pkgs.bitcoind"}, "description": {"_type": "mdDoc", "text": "The package providing bitcoin binaries."}, "loc": ["services", "bitcoind", "<name>", "package"], "readOnly": false, "type": "package"}, "services.bitcoind.<name>.pidFile": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/bitcoind-\u2039name\u203a/bitcoind.pid\""}, "description": {"_type": "mdDoc", "text": "Location of bitcoind pid file."}, "loc": ["services", "bitcoind", "<name>", "pidFile"], "readOnly": false, "type": "path"}, "services.bitcoind.<name>.port": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Override the default port on which to listen for connections."}, "loc": ["services", "bitcoind", "<name>", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.bitcoind.<name>.prune": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Reduce storage requirements by enabling pruning (deleting) of old\nblocks. This allows the pruneblockchain RPC to be called to delete\nspecific blocks, and enables automatic pruning of old blocks if a\ntarget size in MiB is provided. This mode is incompatible with -txindex\nand -rescan. Warning: Reverting this setting requires re-downloading\nthe entire blockchain. (\"disable\" = disable pruning blocks, \"manual\"\n= allow manual pruning via RPC, >=550 = automatically prune block files\nto stay under the specified target size in MiB).\n"}, "example": {"_type": "literalExpression", "text": "10000"}, "loc": ["services", "bitcoind", "<name>", "prune"], "readOnly": false, "type": "null or (unsigned integer, meaning >=0 or (one of \"disable\", \"manual\") convertible to it)"}, "services.bitcoind.<name>.rpc.port": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Override the default port on which to listen for JSON-RPC connections."}, "loc": ["services", "bitcoind", "<name>", "rpc", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.bitcoind.<name>.rpc.users": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "RPC user information for JSON-RPC connections."}, "example": {"_type": "literalExpression", "text": "{\n  alice.passwordHMAC = \"f7efda5c189b999524f151318c0c86$d5b51b3beffbc02b724e5d095828e0bc8b2456e9ac8757ae3211a5d9b16a22ae\";\n  bob.passwordHMAC = \"b2dd077cb54591a2f3139e69a897ac$4e71f08d48b4347cf8eff3815c0e25ae2e9a4340474079f55705f40574f4ec99\";\n}\n"}, "loc": ["services", "bitcoind", "<name>", "rpc", "users"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.bitcoind.<name>.rpc.users.<name>.name": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "description": {"_type": "mdDoc", "text": "Username for JSON-RPC connections.\n"}, "example": {"_type": "literalExpression", "text": "\"alice\""}, "loc": ["services", "bitcoind", "<name>", "rpc", "users", "<name>", "name"], "readOnly": false, "type": "string"}, "services.bitcoind.<name>.rpc.users.<name>.passwordHMAC": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "description": {"_type": "mdDoc", "text": "Password HMAC-SHA-256 for JSON-RPC connections. Must be a string of the\nformat \\<SALT-HEX\\>$\\<HMAC-HEX\\>.\n\nTool (Python script) for HMAC generation is available here:\n<https://github.com/bitcoin/bitcoin/blob/master/share/rpcauth/rpcauth.py>\n"}, "example": {"_type": "literalExpression", "text": "\"f7efda5c189b999524f151318c0c86$d5b51b3beffbc02b724e5d095828e0bc8b2456e9ac8757ae3211a5d9b16a22ae\""}, "loc": ["services", "bitcoind", "<name>", "rpc", "users", "<name>", "passwordHMAC"], "readOnly": false, "type": "string matching the pattern [0-9a-f]+\\$[0-9a-f]{64}"}, "services.bitcoind.<name>.testnet": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use the testnet instead of mainnet."}, "loc": ["services", "bitcoind", "<name>", "testnet"], "readOnly": false, "type": "boolean"}, "services.bitcoind.<name>.user": {"declarations": ["nixos/modules/services/networking/bitcoind.nix"], "default": {"_type": "literalExpression", "text": "\"bitcoind-\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The user as which to run bitcoind."}, "loc": ["services", "bitcoind", "<name>", "user"], "readOnly": false, "type": "string"}, "services.bitlbee.authBackend": {"declarations": ["nixos/modules/services/networking/bitlbee.nix"], "default": {"_type": "literalExpression", "text": "\"storage\""}, "description": {"_type": "mdDoc", "text": "How users are authenticated\n  storage -- save passwords internally\n  pam -- Linux PAM authentication\n"}, "loc": ["services", "bitlbee", "authBackend"], "readOnly": false, "type": "one of \"storage\", \"pam\""}, "services.bitlbee.authMode": {"declarations": ["nixos/modules/services/networking/bitlbee.nix"], "default": {"_type": "literalExpression", "text": "\"Open\""}, "description": {"_type": "mdDoc", "text": "The following authentication modes are available:\n  Open -- Accept connections from anyone, use NickServ for user authentication.\n  Closed -- Require authorization (using the PASS command during login) before allowing the user to connect at all.\n  Registered -- Only allow registered users to use this server; this disables the register- and the account command until the user identifies himself.\n"}, "loc": ["services", "bitlbee", "authMode"], "readOnly": false, "type": "one of \"Open\", \"Closed\", \"Registered\""}, "services.bitlbee.configDir": {"declarations": ["nixos/modules/services/networking/bitlbee.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/bitlbee\""}, "description": {"_type": "mdDoc", "text": "Specify an alternative directory to store all the per-user configuration\nfiles.\n"}, "loc": ["services", "bitlbee", "configDir"], "readOnly": false, "type": "path"}, "services.bitlbee.enable": {"declarations": ["nixos/modules/services/networking/bitlbee.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the BitlBee IRC to other chat network gateway.\nRunning it allows you to access the MSN, Jabber, Yahoo! and ICQ chat\nnetworks via an IRC client.\n"}, "loc": ["services", "bitlbee", "enable"], "readOnly": false, "type": "boolean"}, "services.bitlbee.extraDefaults": {"declarations": ["nixos/modules/services/networking/bitlbee.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Will be inserted in the Default section of the config file.\n"}, "loc": ["services", "bitlbee", "extraDefaults"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bitlbee.extraSettings": {"declarations": ["nixos/modules/services/networking/bitlbee.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Will be inserted in the Settings section of the config file.\n"}, "loc": ["services", "bitlbee", "extraSettings"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bitlbee.hostName": {"declarations": ["nixos/modules/services/networking/bitlbee.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Normally, BitlBee gets a hostname using getsockname(). If you have a nicer\nalias for your BitlBee daemon, you can set it here and BitlBee will identify\nitself with that name instead.\n"}, "loc": ["services", "bitlbee", "hostName"], "readOnly": false, "type": "string"}, "services.bitlbee.interface": {"declarations": ["nixos/modules/services/networking/bitlbee.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The interface the BitlBee daemon will be listening to.  If `127.0.0.1`,\nonly clients on the local host can connect to it; if `0.0.0.0`, clients\ncan access it from any network interface.\n"}, "loc": ["services", "bitlbee", "interface"], "readOnly": false, "type": "string"}, "services.bitlbee.libpurple_plugins": {"declarations": ["nixos/modules/services/networking/bitlbee.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The list of libpurple plugins to install.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.purple-matrix ]"}, "loc": ["services", "bitlbee", "libpurple_plugins"], "readOnly": false, "type": "list of package"}, "services.bitlbee.plugins": {"declarations": ["nixos/modules/services/networking/bitlbee.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The list of bitlbee plugins to install.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.bitlbee-facebook ]"}, "loc": ["services", "bitlbee", "plugins"], "readOnly": false, "type": "list of package"}, "services.bitlbee.portNumber": {"declarations": ["nixos/modules/services/networking/bitlbee.nix"], "default": {"_type": "literalExpression", "text": "6667"}, "description": {"_type": "mdDoc", "text": "Number of the port BitlBee will be listening to.\n"}, "loc": ["services", "bitlbee", "portNumber"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.bitlbee.protocols": {"declarations": ["nixos/modules/services/networking/bitlbee.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "This option allows to remove the support of protocol, even if compiled\nin. If nothing is given, there are no restrictions.\n"}, "loc": ["services", "bitlbee", "protocols"], "readOnly": false, "type": "string"}, "services.blackfire-agent.enable": {"declarations": ["nixos/modules/services/development/blackfire.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Blackfire profiler agent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "blackfire-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.blackfire-agent.settings": {"declarations": ["nixos/modules/services/development/blackfire.nix"], "description": {"_type": "mdDoc", "text": "See https://blackfire.io/docs/up-and-running/configuration/agent\n"}, "loc": ["services", "blackfire-agent", "settings"], "readOnly": false, "type": "attribute set of string"}, "services.blackfire-agent.settings.server-id": {"declarations": ["nixos/modules/services/development/blackfire.nix"], "description": {"_type": "mdDoc", "text": "Sets the server id used to authenticate with Blackfire\n\nYou can find your personal server-id at https://blackfire.io/my/settings/credentials\n"}, "loc": ["services", "blackfire-agent", "settings", "server-id"], "readOnly": false, "type": "string"}, "services.blackfire-agent.settings.server-token": {"declarations": ["nixos/modules/services/development/blackfire.nix"], "description": {"_type": "mdDoc", "text": "Sets the server token used to authenticate with Blackfire\n\nYou can find your personal server-token at https://blackfire.io/my/settings/credentials\n"}, "loc": ["services", "blackfire-agent", "settings", "server-token"], "readOnly": false, "type": "string"}, "services.blockbook-frontend": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specification of one or more blockbook-frontend instances."}, "loc": ["services", "blockbook-frontend"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.blockbook-frontend.<name>.certFile": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "To enable SSL, specify path to the name of certificate files without extension.\nExpecting {file}`certFile.crt` and {file}`certFile.key`.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/secrets/blockbook-frontend-\u2039name\u203a/certFile\""}, "loc": ["services", "blockbook-frontend", "<name>", "certFile"], "readOnly": false, "type": "null or path"}, "services.blockbook-frontend.<name>.coinName": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "\"Bitcoin\""}, "description": {"_type": "mdDoc", "text": "See <https://github.com/trezor/blockbook/blob/master/bchain/coins/blockchain.go#L61>\nfor current of coins supported in master (Note: may differ from release).\n"}, "loc": ["services", "blockbook-frontend", "<name>", "coinName"], "readOnly": false, "type": "string"}, "services.blockbook-frontend.<name>.configFile": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Location of the blockbook configuration file."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/blockbook-frontend-\u2039name\u203a/config.json\""}, "loc": ["services", "blockbook-frontend", "<name>", "configFile"], "readOnly": false, "type": "null or path"}, "services.blockbook-frontend.<name>.cssDir": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "\"${package}/share/css/\""}, "description": {"_type": "mdDoc", "text": "Location of the dir with {file}`main.css` CSS file.\nBy default, the one shipped with the package is used.\n"}, "example": {"_type": "literalExpression", "text": "\"${dataDir}/static/css/\""}, "loc": ["services", "blockbook-frontend", "<name>", "cssDir"], "readOnly": false, "type": "path"}, "services.blockbook-frontend.<name>.dataDir": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/blockbook-frontend-\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Location of blockbook-frontend-\u2039name\u203a data directory."}, "loc": ["services", "blockbook-frontend", "<name>", "dataDir"], "readOnly": false, "type": "path"}, "services.blockbook-frontend.<name>.debug": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Debug mode, return more verbose errors, reload templates on each request."}, "loc": ["services", "blockbook-frontend", "<name>", "debug"], "readOnly": false, "type": "boolean"}, "services.blockbook-frontend.<name>.enable": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable blockbook-frontend application."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "blockbook-frontend", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.blockbook-frontend.<name>.extraCmdLineOptions": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line options to pass to Blockbook.\nRun blockbook --help to list all available options.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-workers=1\"\n  \"-dbcache=0\"\n  \"-logtosderr\"\n]"}, "loc": ["services", "blockbook-frontend", "<name>", "extraCmdLineOptions"], "readOnly": false, "type": "list of string"}, "services.blockbook-frontend.<name>.extraConfig": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional configurations to be appended to {file}`coin.conf`.\nOverrides any already defined configuration options.\nSee <https://github.com/trezor/blockbook/tree/master/configs/coins>\nfor current configuration options supported in master (Note: may differ from release).\n"}, "example": {"_type": "literalExpression", "text": "{\n         \"alternative_estimate_fee\" = \"whatthefee-disabled\";\n         \"alternative_estimate_fee_params\" = \"{\\\"url\\\": \\\"https://whatthefee.io/data.json\\\", \\\"periodSeconds\\\": 60}\";\n         \"fiat_rates\" = \"coingecko\";\n         \"fiat_rates_params\" = \"{\\\"url\\\": \\\"https://api.coingecko.com/api/v3\\\", \\\"coin\\\": \\\"bitcoin\\\", \\\"periodSeconds\\\": 60}\";\n         \"coin_shortcut\" = \"BTC\";\n         \"coin_label\" = \"Bitcoin\";\n         \"parse\" = true;\n         \"subversion\" = \"\";\n         \"address_format\" = \"\";\n         \"xpub_magic\" = 76067358;\n         \"xpub_magic_segwit_p2sh\" = 77429938;\n         \"xpub_magic_segwit_native\" = 78792518;\n         \"mempool_workers\" = 8;\n         \"mempool_sub_workers\" = 2;\n         \"block_addresses_to_keep\" = 300;\n       }"}, "loc": ["services", "blockbook-frontend", "<name>", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.blockbook-frontend.<name>.group": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "\"blockbook-frontend-\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The group as which to run blockbook-frontend-\u2039name\u203a."}, "loc": ["services", "blockbook-frontend", "<name>", "group"], "readOnly": false, "type": "string"}, "services.blockbook-frontend.<name>.internal": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "\":9030\""}, "description": {"_type": "mdDoc", "text": "Internal http server binding `[address]:port`."}, "loc": ["services", "blockbook-frontend", "<name>", "internal"], "readOnly": false, "type": "null or string"}, "services.blockbook-frontend.<name>.messageQueueBinding": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "\"tcp://127.0.0.1:38330\""}, "description": {"_type": "mdDoc", "text": "Message Queue Binding `address:port`."}, "loc": ["services", "blockbook-frontend", "<name>", "messageQueueBinding"], "readOnly": false, "type": "string"}, "services.blockbook-frontend.<name>.package": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "pkgs.blockbook"}, "description": {"_type": "mdDoc", "text": "Which blockbook package to use."}, "loc": ["services", "blockbook-frontend", "<name>", "package"], "readOnly": false, "type": "package"}, "services.blockbook-frontend.<name>.public": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "\":9130\""}, "description": {"_type": "mdDoc", "text": "Public http server binding `[address]:port`."}, "loc": ["services", "blockbook-frontend", "<name>", "public"], "readOnly": false, "type": "null or string"}, "services.blockbook-frontend.<name>.rpc.password": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "\"rpc\""}, "description": {"_type": "mdDoc", "text": "RPC password for JSON-RPC connections.\nWarning: this is stored in cleartext in the Nix store!!!\nUse `configFile` or `passwordFile` if needed.\n"}, "loc": ["services", "blockbook-frontend", "<name>", "rpc", "password"], "readOnly": false, "type": "string"}, "services.blockbook-frontend.<name>.rpc.passwordFile": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing password of the RPC user.\nNote: This options is ignored when `configFile` is used.\n"}, "loc": ["services", "blockbook-frontend", "<name>", "rpc", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.blockbook-frontend.<name>.rpc.port": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "8030"}, "description": {"_type": "mdDoc", "text": "Port for JSON-RPC connections."}, "loc": ["services", "blockbook-frontend", "<name>", "rpc", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.blockbook-frontend.<name>.rpc.url": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "\"http://127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "URL for JSON-RPC connections."}, "loc": ["services", "blockbook-frontend", "<name>", "rpc", "url"], "readOnly": false, "type": "string"}, "services.blockbook-frontend.<name>.rpc.user": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "\"rpc\""}, "description": {"_type": "mdDoc", "text": "Username for JSON-RPC connections."}, "loc": ["services", "blockbook-frontend", "<name>", "rpc", "user"], "readOnly": false, "type": "string"}, "services.blockbook-frontend.<name>.sync": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Synchronizes until tip, if together with zeromq, keeps index synchronized."}, "loc": ["services", "blockbook-frontend", "<name>", "sync"], "readOnly": false, "type": "boolean"}, "services.blockbook-frontend.<name>.templateDir": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "\"${package}/share/templates/\""}, "description": {"_type": "mdDoc", "text": "Location of the HTML templates. By default, ones shipped with the package are used."}, "example": {"_type": "literalExpression", "text": "\"${dataDir}/templates/static/\""}, "loc": ["services", "blockbook-frontend", "<name>", "templateDir"], "readOnly": false, "type": "path"}, "services.blockbook-frontend.<name>.user": {"declarations": ["nixos/modules/services/networking/blockbook-frontend.nix"], "default": {"_type": "literalExpression", "text": "\"blockbook-frontend-\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The user as which to run blockbook-frontend-\u2039name\u203a."}, "loc": ["services", "blockbook-frontend", "<name>", "user"], "readOnly": false, "type": "string"}, "services.blocky.enable": {"declarations": ["nixos/modules/services/networking/blocky.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable blocky, a fast and lightweight DNS proxy as ad-blocker for local network with many features."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "blocky", "enable"], "readOnly": false, "type": "boolean"}, "services.blocky.settings": {"declarations": ["nixos/modules/services/networking/blocky.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Blocky configuration. Refer to\n<https://0xerr0r.github.io/blocky/configuration/>\nfor details on supported values.\n"}, "loc": ["services", "blocky", "settings"], "readOnly": false, "type": "YAML value"}, "services.bloop.extraOptions": {"declarations": ["nixos/modules/services/development/bloop.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Specifies additional command line argument to pass to bloop\njava process.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-J-Xmx2G\"\n  \"-J-XX:MaxInlineLevel=20\"\n  \"-J-XX:+UseParallelGC\"\n]"}, "loc": ["services", "bloop", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.bloop.install": {"declarations": ["nixos/modules/services/development/bloop.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install a user service for the Bloop server.\n\nThe service must be manually started for each user with\n\"systemctl --user start bloop\".\n"}, "loc": ["services", "bloop", "install"], "readOnly": false, "type": "boolean"}, "services.blueman.enable": {"declarations": ["nixos/modules/services/desktops/blueman.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable blueman."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "blueman", "enable"], "readOnly": false, "type": "boolean"}, "services.boinc.allowRemoteGuiRpc": {"declarations": ["nixos/modules/services/computing/boinc/client.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set to true, any remote host can connect to and control this BOINC\nclient (subject to password authentication). If instead set to false,\nonly the hosts listed in {var}`dataDir`/remote_hosts.cfg will be allowed to\nconnect.\n\nSee also: <http://boinc.berkeley.edu/wiki/Controlling_BOINC_remotely#Remote_access>\n"}, "loc": ["services", "boinc", "allowRemoteGuiRpc"], "readOnly": false, "type": "boolean"}, "services.boinc.dataDir": {"declarations": ["nixos/modules/services/computing/boinc/client.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/boinc\""}, "description": {"_type": "mdDoc", "text": "The directory in which to store BOINC's configuration and data files.\n"}, "loc": ["services", "boinc", "dataDir"], "readOnly": false, "type": "path"}, "services.boinc.enable": {"declarations": ["nixos/modules/services/computing/boinc/client.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the BOINC distributed computing client. If this\noption is set to true, the boinc_client daemon will be run as a\nbackground service. The boinccmd command can be used to control the\ndaemon.\n"}, "loc": ["services", "boinc", "enable"], "readOnly": false, "type": "boolean"}, "services.boinc.extraEnvPackages": {"declarations": ["nixos/modules/services/computing/boinc/client.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional packages to make available in the environment in which\nBOINC will run. Common choices are:\n\n- {var}`pkgs.virtualbox`:\n  The VirtualBox virtual machine framework. Required by some BOINC\n  projects, such as ATLAS@home.\n- {var}`pkgs.ocl-icd`:\n  OpenCL infrastructure library. Required by BOINC projects that\n  use OpenCL, in addition to a device-specific OpenCL driver.\n- {var}`pkgs.linuxPackages.nvidia_x11`:\n  Provides CUDA libraries. Required by BOINC projects that use\n  CUDA. Note that this requires an NVIDIA graphics device to be\n  present on the system.\n\n  Also provides OpenCL drivers for NVIDIA GPUs;\n  {var}`pkgs.ocl-icd` is also needed in this case.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.virtualbox ]"}, "loc": ["services", "boinc", "extraEnvPackages"], "readOnly": false, "type": "list of package"}, "services.boinc.package": {"declarations": ["nixos/modules/services/computing/boinc/client.nix"], "default": {"_type": "literalExpression", "text": "pkgs.boinc"}, "description": {"_type": "mdDoc", "text": "Which BOINC package to use.\n"}, "loc": ["services", "boinc", "package"], "readOnly": false, "type": "package"}, "services.bookstack.appKeyFile": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "description": {"_type": "mdDoc", "text": "A file containing the Laravel APP_KEY - a 32 character long,\nbase64 encoded key used for encryption where needed. Can be\ngenerated with `head -c 32 /dev/urandom | base64`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/bookstack-appkey\""}, "loc": ["services", "bookstack", "appKeyFile"], "readOnly": false, "type": "path"}, "services.bookstack.appURL": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"http\\${lib.optionalString tlsEnabled \\\"s\\\"}://\\${cfg.hostname}\""}, "description": {"_type": "mdDoc", "text": "The root URL that you want to host BookStack on. All URLs in BookStack will be generated using this value.\nIf you change this in the future you may need to run a command to update stored URLs in the database. Command example: `php artisan bookstack:update-url https://old.example.com https://new.example.com`\n"}, "example": {"_type": "literalExpression", "text": "\"https://example.com\""}, "loc": ["services", "bookstack", "appURL"], "readOnly": false, "type": "string"}, "services.bookstack.config": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "BookStack configuration options to set in the\n{file}`.env` file.\n\nRefer to <https://www.bookstackapp.com/docs/>\nfor details on supported values.\n\nSettings containing secret data should be set to an attribute\nset containing the attribute `_secret` - a\nstring pointing to a file containing the value the option\nshould be set to. See the example to get a better picture of\nthis: in the resulting {file}`.env` file, the\n`OIDC_CLIENT_SECRET` key will be set to the\ncontents of the {file}`/run/keys/oidc_secret`\nfile.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ALLOWED_IFRAME_HOSTS = \"https://example.com\";\n  WKHTMLTOPDF = \"/home/user/bins/wkhtmltopdf\";\n  AUTH_METHOD = \"oidc\";\n  OIDC_NAME = \"MyLogin\";\n  OIDC_DISPLAY_NAME_CLAIMS = \"name\";\n  OIDC_CLIENT_ID = \"bookstack\";\n  OIDC_CLIENT_SECRET = {_secret = \"/run/keys/oidc_secret\"};\n  OIDC_ISSUER = \"https://keycloak.example.com/auth/realms/My%20Realm\";\n  OIDC_ISSUER_DISCOVER = true;\n}\n"}, "loc": ["services", "bookstack", "config"], "readOnly": false, "type": "attribute set of (null or boolean or signed integer or 16 bit unsigned integer; between 0 and 65535 (both inclusive) or path or string or (submodule))"}, "services.bookstack.dataDir": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/bookstack\""}, "description": {"_type": "mdDoc", "text": "BookStack data directory"}, "loc": ["services", "bookstack", "dataDir"], "readOnly": false, "type": "path"}, "services.bookstack.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally."}, "loc": ["services", "bookstack", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.bookstack.database.host": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "bookstack", "database", "host"], "readOnly": false, "type": "string"}, "services.bookstack.database.name": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"bookstack\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "bookstack", "database", "name"], "readOnly": false, "type": "string"}, "services.bookstack.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/bookstack-dbpassword\""}, "loc": ["services", "bookstack", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.bookstack.database.port": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "3306"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "bookstack", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.bookstack.database.user": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "user"}, "description": {"_type": "mdDoc", "text": "Database username."}, "loc": ["services", "bookstack", "database", "user"], "readOnly": false, "type": "string"}, "services.bookstack.enable": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable BookStack."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "bookstack", "enable"], "readOnly": false, "type": "boolean"}, "services.bookstack.group": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"bookstack\""}, "description": {"_type": "mdDoc", "text": "Group bookstack runs as."}, "loc": ["services", "bookstack", "group"], "readOnly": false, "type": "string"}, "services.bookstack.hostname": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "config.networking.fqdnOrHostName"}, "description": {"_type": "mdDoc", "text": "The hostname to serve BookStack on.\n"}, "example": {"_type": "literalExpression", "text": "\"bookstack.example.com\""}, "loc": ["services", "bookstack", "hostname"], "readOnly": false, "type": "string"}, "services.bookstack.mail.driver": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"smtp\""}, "description": {"_type": "mdDoc", "text": "Mail driver to use."}, "loc": ["services", "bookstack", "mail", "driver"], "readOnly": false, "type": "one of \"smtp\", \"sendmail\""}, "services.bookstack.mail.encryption": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SMTP encryption mechanism to use."}, "loc": ["services", "bookstack", "mail", "encryption"], "readOnly": false, "type": "null or value \"tls\" (singular enum)"}, "services.bookstack.mail.from": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"mail@bookstackapp.com\""}, "description": {"_type": "mdDoc", "text": "Mail \"from\" email."}, "loc": ["services", "bookstack", "mail", "from"], "readOnly": false, "type": "string"}, "services.bookstack.mail.fromName": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"BookStack\""}, "description": {"_type": "mdDoc", "text": "Mail \"from\" name."}, "loc": ["services", "bookstack", "mail", "fromName"], "readOnly": false, "type": "string"}, "services.bookstack.mail.host": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Mail host address."}, "loc": ["services", "bookstack", "mail", "host"], "readOnly": false, "type": "string"}, "services.bookstack.mail.passwordFile": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`mail.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/bookstack-mailpassword\""}, "loc": ["services", "bookstack", "mail", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.bookstack.mail.port": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "1025"}, "description": {"_type": "mdDoc", "text": "Mail host port."}, "loc": ["services", "bookstack", "mail", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.bookstack.mail.user": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Mail username."}, "example": {"_type": "literalExpression", "text": "\"bookstack\""}, "loc": ["services", "bookstack", "mail", "user"], "readOnly": false, "type": "null or string"}, "services.bookstack.maxUploadSize": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"18M\""}, "description": {"_type": "mdDoc", "text": "The maximum size for uploads (e.g. images)."}, "example": {"_type": "literalExpression", "text": "\"1G\""}, "loc": ["services", "bookstack", "maxUploadSize"], "readOnly": false, "type": "string"}, "services.bookstack.nginx": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "With this option, you can customize the nginx virtualHost settings.\n"}, "example": {"_type": "literalExpression", "text": "{\n  serverAliases = [\n    \"bookstack.${config.networking.domain}\"\n  ];\n  # To enable encryption and let let's encrypt take care of certificate\n  forceSSL = true;\n  enableACME = true;\n}\n"}, "loc": ["services", "bookstack", "nginx"], "readOnly": false, "type": "submodule"}, "services.bookstack.nginx.acmeFallbackHost": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host which to proxy requests to if ACME challenge is not found. Useful\nif you want multiple hosts to be able to verify the same domain name.\n\nWith this option, you could request certificates for the present domain\nwith an ACME client that is running on another host, which you would\nspecify here.\n"}, "loc": ["services", "bookstack", "nginx", "acmeFallbackHost"], "readOnly": false, "type": "null or string"}, "services.bookstack.nginx.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the ACME challenge, which is **public**. Don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "bookstack", "nginx", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.bookstack.nginx.addSSL": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "bookstack", "nginx", "addSSL"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.basicAuth": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "bookstack", "nginx", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.bookstack.nginx.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "bookstack", "nginx", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.bookstack.nginx.default": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Makes this vhost the default.\n"}, "loc": ["services", "bookstack", "nginx", "default"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.enableACME": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "bookstack", "nginx", "enableACME"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.extraConfig": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the vhost verbatim.\n"}, "loc": ["services", "bookstack", "nginx", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bookstack.nginx.forceSSL": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "bookstack", "nginx", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given hostname.\n"}, "example": {"_type": "literalExpression", "text": "\"newserver.example.org\""}, "loc": ["services", "bookstack", "nginx", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.bookstack.nginx.http2": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/2 protocol.\nNote that (as of writing) due to nginx's implementation, to disable\nHTTP/2 you have to disable it on all vhosts that use a given\nIP address / port.\nIf there is one server block configured to enable http2, then it is\nenabled for all server blocks on this IP.\nSee https://stackoverflow.com/a/39466948/263061.\n"}, "loc": ["services", "bookstack", "nginx", "http2"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.http3": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/3 protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that HTTP/3 support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "bookstack", "nginx", "http3"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.http3_hq": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that special application protocol support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "bookstack", "nginx", "http3_hq"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.kTLS": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kTLS support.\nImplementing TLS in the kernel (kTLS) improves performance by significantly\nreducing the need for copying operations between user space and the kernel.\nRequired Nginx version 1.21.4 or later.\n"}, "loc": ["services", "bookstack", "nginx", "kTLS"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.listen": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\nIPv6 addresses must be enclosed in square brackets.\nNote: this option overrides `addSSL`\nand `onlySSL`.\n\nIf you only want to set the addresses manually and not\nthe ports, take a look at `listenAddresses`\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    addr = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    addr = \"192.154.1.1\";\n    port = 80;\n  }\n]"}, "loc": ["services", "bookstack", "nginx", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.bookstack.nginx.listen.*.addr": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "description": {"_type": "mdDoc", "text": "IP address."}, "loc": ["services", "bookstack", "nginx", "listen", "*", "addr"], "readOnly": false, "type": "string"}, "services.bookstack.nginx.listen.*.extraParameters": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters of this listen directive."}, "example": {"_type": "literalExpression", "text": "[\n  \"backlog=1024\"\n  \"deferred\"\n]"}, "loc": ["services", "bookstack", "nginx", "listen", "*", "extraParameters"], "readOnly": false, "type": "list of string"}, "services.bookstack.nginx.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Port number."}, "loc": ["services", "bookstack", "nginx", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.bookstack.nginx.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SSL."}, "loc": ["services", "bookstack", "nginx", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n\nNote: This option overrides `enableIPv6`\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"[::1]\"\n]"}, "loc": ["services", "bookstack", "nginx", "listenAddresses"], "readOnly": false, "type": "list of string"}, "services.bookstack.nginx.locations": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n};\n"}, "loc": ["services", "bookstack", "nginx", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.bookstack.nginx.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "bookstack", "nginx", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.bookstack.nginx.locations.<name>.basicAuth": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "bookstack", "nginx", "locations", "<name>", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.bookstack.nginx.locations.<name>.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "bookstack", "nginx", "locations", "<name>", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.bookstack.nginx.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "bookstack", "nginx", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bookstack.nginx.locations.<name>.fastcgiParams": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "FastCGI parameters to override.  Unlike in the Nginx\nconfiguration file, overriding only some default parameters\nwon't unset the default values for other parameters.\n"}, "loc": ["services", "bookstack", "nginx", "locations", "<name>", "fastcgiParams"], "readOnly": false, "type": "attribute set of (string or path)"}, "services.bookstack.nginx.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds index directive.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "bookstack", "nginx", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.bookstack.nginx.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "bookstack", "nginx", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.bookstack.nginx.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds proxy_pass directive and sets recommended proxy headers if\nrecommendedProxySettings is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "bookstack", "nginx", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.bookstack.nginx.locations.<name>.proxyWebsockets": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to support proxying websocket connections with HTTP/1.1.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "bookstack", "nginx", "locations", "<name>", "proxyWebsockets"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.locations.<name>.recommendedProxySettings": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "config.services.nginx.recommendedProxySettings"}, "description": {"_type": "mdDoc", "text": "Enable recommended proxy settings.\n"}, "loc": ["services", "bookstack", "nginx", "locations", "<name>", "recommendedProxySettings"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.locations.<name>.return": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds a return directive, for e.g. redirections.\n"}, "example": {"_type": "literalExpression", "text": "\"301 http://example.com$request_uri\""}, "loc": ["services", "bookstack", "nginx", "locations", "<name>", "return"], "readOnly": false, "type": "null or string"}, "services.bookstack.nginx.locations.<name>.root": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Root directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/root/directory\""}, "loc": ["services", "bookstack", "nginx", "locations", "<name>", "root"], "readOnly": false, "type": "null or path"}, "services.bookstack.nginx.locations.<name>.tryFiles": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds try_files directive.\n"}, "example": {"_type": "literalExpression", "text": "\"$uri =404\""}, "loc": ["services", "bookstack", "nginx", "locations", "<name>", "tryFiles"], "readOnly": false, "type": "null or string"}, "services.bookstack.nginx.onlySSL": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "bookstack", "nginx", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.quic": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the QUIC transport protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.\nNote that QUIC support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "bookstack", "nginx", "quic"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.rejectSSL": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to listen for and reject all HTTPS connections to this vhost. Useful in\n[default](#opt-services.nginx.virtualHosts._name_.default)\nserver blocks to avoid serving the certificate for another vhost. Uses the\n`ssl_reject_handshake` directive available in nginx versions\n1.19.4 and above.\n"}, "loc": ["services", "bookstack", "nginx", "rejectSSL"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.reuseport": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create an individual listening socket .\nIt is required to specify only once on one of the hosts.\n"}, "loc": ["services", "bookstack", "nginx", "reuseport"], "readOnly": false, "type": "boolean"}, "services.bookstack.nginx.root": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of the web root directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "bookstack", "nginx", "root"], "readOnly": false, "type": "null or path"}, "services.bookstack.nginx.serverAliases": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"example.org\"\n]"}, "loc": ["services", "bookstack", "nginx", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.bookstack.nginx.serverName": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of this virtual host. Defaults to attribute name in virtualHosts.\n"}, "example": {"_type": "literalExpression", "text": "\"example.org\""}, "loc": ["services", "bookstack", "nginx", "serverName"], "readOnly": false, "type": "null or string"}, "services.bookstack.nginx.sslCertificate": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "bookstack", "nginx", "sslCertificate"], "readOnly": false, "type": "path"}, "services.bookstack.nginx.sslCertificateKey": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "bookstack", "nginx", "sslCertificateKey"], "readOnly": false, "type": "path"}, "services.bookstack.nginx.sslTrustedCertificate": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to root SSL certificate for stapling and client certificates."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\""}, "loc": ["services", "bookstack", "nginx", "sslTrustedCertificate"], "readOnly": false, "type": "null or path"}, "services.bookstack.nginx.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "bookstack", "nginx", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.bookstack.poolConfig": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = 32;\n  \"pm.max_requests\" = 500;\n  \"pm.max_spare_servers\" = 4;\n  \"pm.min_spare_servers\" = 2;\n  \"pm.start_servers\" = 2;\n}"}, "description": {"_type": "mdDoc", "text": "Options for the bookstack PHP pool. See the documentation on `php-fpm.conf`\nfor details on configuration directives.\n"}, "loc": ["services", "bookstack", "poolConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.bookstack.user": {"declarations": ["nixos/modules/services/web-apps/bookstack.nix"], "default": {"_type": "literalExpression", "text": "\"bookstack\""}, "description": {"_type": "mdDoc", "text": "User bookstack runs as."}, "loc": ["services", "bookstack", "user"], "readOnly": false, "type": "string"}, "services.borgbackup.jobs": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Deduplicating backups using BorgBackup.\nAdding a job will cause a borg-job-NAME wrapper to be added\nto your system path, so that you can perform maintenance easily.\nSee also the chapter about BorgBackup in the NixOS manual.\n"}, "example": {"_type": "literalExpression", "text": "  { # for a local backup\n    rootBackup = {\n      paths = \"/\";\n      exclude = [ \"/nix\" ];\n      repo = \"/path/to/local/repo\";\n      encryption = {\n        mode = \"repokey\";\n        passphrase = \"secret\";\n      };\n      compression = \"auto,lzma\";\n      startAt = \"weekly\";\n    };\n  }\n  { # Root backing each day up to a remote backup server. We assume that you have\n    #   * created a password less key: ssh-keygen -N \"\" -t ed25519 -f /path/to/ssh_key\n    #     best practices are: use -t ed25519, /path/to = /run/keys\n    #   * the passphrase is in the file /run/keys/borgbackup_passphrase\n    #   * you have initialized the repository manually\n    paths = [ \"/etc\" \"/home\" ];\n    exclude = [ \"/nix\" \"'**/.cache'\" ];\n    doInit = false;\n    repo =  \"user3@arep.repo.borgbase.com:repo\";\n    encryption = {\n      mode = \"repokey-blake2\";\n      passCommand = \"cat /path/to/passphrase\";\n    };\n    environment = { BORG_RSH = \"ssh -i /path/to/ssh_key\"; };\n    compression = \"auto,lzma\";\n    startAt = \"daily\";\n};\n"}, "loc": ["services", "borgbackup", "jobs"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.borgbackup.jobs.<name>.appendFailedSuffix": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Append a `.failed` suffix\nto the archive name, which is only removed if\n{command}`borg create` has a zero exit status.\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "appendFailedSuffix"], "readOnly": false, "type": "boolean"}, "services.borgbackup.jobs.<name>.archiveBaseName": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"${config.networking.hostName}-<name>\""}, "description": {"_type": "mdDoc", "text": "How to name the created archives. A timestamp, whose format is\ndetermined by {option}`dateFormat`, will be appended. The full\nname can be modified at runtime (`$archiveName`).\nPlaceholders like `{hostname}` must not be used.\nUse `null` for no base name.\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "archiveBaseName"], "readOnly": false, "type": "null or string matching the pattern [^/{}]+"}, "services.borgbackup.jobs.<name>.compression": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"lz4\""}, "description": {"_type": "mdDoc", "text": "Compression method to use. Refer to\n{command}`borg help compression`\nfor all available options.\n"}, "example": {"_type": "literalExpression", "text": "\"auto,lzma\""}, "loc": ["services", "borgbackup", "jobs", "<name>", "compression"], "readOnly": false, "type": "string matching the pattern none|(auto,)?(lz4|zstd|zlib|lzma)(,[[:digit:]]{1,2})?"}, "services.borgbackup.jobs.<name>.dateFormat": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"+%Y-%m-%dT%H:%M:%S\""}, "description": {"_type": "mdDoc", "text": "Arguments passed to {command}`date`\nto create a timestamp suffix for the archive name.\n"}, "example": {"_type": "literalExpression", "text": "\"-u +%s\""}, "loc": ["services", "borgbackup", "jobs", "<name>", "dateFormat"], "readOnly": false, "type": "string"}, "services.borgbackup.jobs.<name>.doInit": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Run {command}`borg init` if the\nspecified {option}`repo` does not exist.\nYou should set this to `false`\nif the repository is located on an external drive\nthat might not always be mounted.\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "doInit"], "readOnly": false, "type": "boolean"}, "services.borgbackup.jobs.<name>.dumpCommand": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Backup the stdout of this program instead of filesystem paths.\nMutually exclusive with {option}`paths`.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/createZFSsend.sh\""}, "loc": ["services", "borgbackup", "jobs", "<name>", "dumpCommand"], "readOnly": false, "type": "null or path"}, "services.borgbackup.jobs.<name>.encryption.mode": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "description": {"_type": "mdDoc", "text": "Encryption mode to use. Setting a mode\nother than `\"none\"` requires\nyou to specify a {option}`passCommand`\nor a {option}`passphrase`.\n"}, "example": {"_type": "literalExpression", "text": "\"repokey-blake2\""}, "loc": ["services", "borgbackup", "jobs", "<name>", "encryption", "mode"], "readOnly": false, "type": "one of \"repokey\", \"keyfile\", \"repokey-blake2\", \"keyfile-blake2\", \"authenticated\", \"authenticated-blake2\", \"none\""}, "services.borgbackup.jobs.<name>.encryption.passCommand": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A command which prints the passphrase to stdout.\nMutually exclusive with {option}`passphrase`.\n"}, "example": {"_type": "literalExpression", "text": "\"cat /path/to/passphrase_file\""}, "loc": ["services", "borgbackup", "jobs", "<name>", "encryption", "passCommand"], "readOnly": false, "type": "null or string"}, "services.borgbackup.jobs.<name>.encryption.passphrase": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The passphrase the backups are encrypted with.\nMutually exclusive with {option}`passCommand`.\nIf you do not want the passphrase to be stored in the\nworld-readable Nix store, use {option}`passCommand`.\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "encryption", "passphrase"], "readOnly": false, "type": "null or string"}, "services.borgbackup.jobs.<name>.environment": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables passed to the backup script.\nYou can for example specify which SSH key to use.\n"}, "example": {"_type": "literalExpression", "text": "{\n  BORG_RSH = \"ssh -i /path/to/key\";\n}"}, "loc": ["services", "borgbackup", "jobs", "<name>", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.borgbackup.jobs.<name>.exclude": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Exclude paths matching any of the given patterns. See\n{command}`borg help patterns` for pattern syntax.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/home/*/.cache\"\n  \"/nix\"\n]"}, "loc": ["services", "borgbackup", "jobs", "<name>", "exclude"], "readOnly": false, "type": "list of string"}, "services.borgbackup.jobs.<name>.extraArgs": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional arguments for all {command}`borg` calls the\nservice has. Handle with care.\n"}, "example": {"_type": "literalExpression", "text": "\"--remote-path=/path/to/borg\""}, "loc": ["services", "borgbackup", "jobs", "<name>", "extraArgs"], "readOnly": false, "type": "string"}, "services.borgbackup.jobs.<name>.extraCompactArgs": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional arguments for {command}`borg compact`.\nCan also be set at runtime using `$extraCompactArgs`.\n"}, "example": {"_type": "literalExpression", "text": "\"--cleanup-commits\""}, "loc": ["services", "borgbackup", "jobs", "<name>", "extraCompactArgs"], "readOnly": false, "type": "string"}, "services.borgbackup.jobs.<name>.extraCreateArgs": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional arguments for {command}`borg create`.\nCan also be set at runtime using `$extraCreateArgs`.\n"}, "example": {"_type": "literalExpression", "text": "\"--stats --checkpoint-interval 600\""}, "loc": ["services", "borgbackup", "jobs", "<name>", "extraCreateArgs"], "readOnly": false, "type": "string"}, "services.borgbackup.jobs.<name>.extraInitArgs": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional arguments for {command}`borg init`.\nCan also be set at runtime using `$extraInitArgs`.\n"}, "example": {"_type": "literalExpression", "text": "\"--append-only\""}, "loc": ["services", "borgbackup", "jobs", "<name>", "extraInitArgs"], "readOnly": false, "type": "string"}, "services.borgbackup.jobs.<name>.extraPruneArgs": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional arguments for {command}`borg prune`.\nCan also be set at runtime using `$extraPruneArgs`.\n"}, "example": {"_type": "literalExpression", "text": "\"--save-space\""}, "loc": ["services", "borgbackup", "jobs", "<name>", "extraPruneArgs"], "readOnly": false, "type": "string"}, "services.borgbackup.jobs.<name>.group": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "The group borg is run as. User or group needs read permission\nfor the specified {option}`paths`.\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "group"], "readOnly": false, "type": "string"}, "services.borgbackup.jobs.<name>.inhibitsSleep": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Prevents the system from sleeping while backing up.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "borgbackup", "jobs", "<name>", "inhibitsSleep"], "readOnly": false, "type": "boolean"}, "services.borgbackup.jobs.<name>.paths": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path(s) to back up.\nMutually exclusive with {option}`dumpCommand`.\n"}, "example": {"_type": "literalExpression", "text": "\"/home/user\""}, "loc": ["services", "borgbackup", "jobs", "<name>", "paths"], "readOnly": false, "type": "null or ((list of string) or string convertible to it)"}, "services.borgbackup.jobs.<name>.patterns": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Include/exclude paths matching the given patterns. The first\nmatching patterns is used, so if an include pattern (prefix `+`)\nmatches before an exclude pattern (prefix `-`), the file is\nbacked up. See [{command}`borg help patterns`](https://borgbackup.readthedocs.io/en/stable/usage/help.html#borg-patterns) for pattern syntax.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"+ /home/susan\"\n  \"- /home/*\"\n]"}, "loc": ["services", "borgbackup", "jobs", "<name>", "patterns"], "readOnly": false, "type": "list of string"}, "services.borgbackup.jobs.<name>.persistentTimer": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set the `persistentTimer` option for the\n{manpage}`systemd.timer(5)`\nwhich triggers the backup immediately if the last trigger\nwas missed (e.g. if the system was powered down).\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "borgbackup", "jobs", "<name>", "persistentTimer"], "readOnly": false, "type": "boolean"}, "services.borgbackup.jobs.<name>.postCreate": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to run after {command}`borg create`. The name\nof the created archive is stored in `$archiveName`.\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "postCreate"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.borgbackup.jobs.<name>.postHook": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to run just before exit. They are executed\neven if a previous command exits with a non-zero exit code.\nThe latter is available as `$exitStatus`.\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "postHook"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.borgbackup.jobs.<name>.postInit": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to run after {command}`borg init`.\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "postInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.borgbackup.jobs.<name>.postPrune": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to run after {command}`borg prune`.\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "postPrune"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.borgbackup.jobs.<name>.preHook": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands to run before the backup.\nThis can for example be used to mount file systems.\n"}, "example": {"_type": "literalExpression", "text": "''\n  # To add excluded paths at runtime\n  extraCreateArgs=\"$extraCreateArgs --exclude /some/path\"\n''"}, "loc": ["services", "borgbackup", "jobs", "<name>", "preHook"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.borgbackup.jobs.<name>.privateTmp": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Set the `PrivateTmp` option for\nthe systemd-service. Set to false if you need sockets\nor other files from global /tmp.\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "privateTmp"], "readOnly": false, "type": "boolean"}, "services.borgbackup.jobs.<name>.prune.keep": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Prune a repository by deleting all archives not matching any of the\nspecified retention options. See {command}`borg help prune`\nfor the available options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  within = \"1d\"; # Keep all archives from the last day\n  daily = 7;\n  weekly = 4;\n  monthly = -1;  # Keep at least one archive for each month\n}\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "prune", "keep"], "readOnly": false, "type": "attribute set of (signed integer or string matching the pattern [[:digit:]]+[Hdwmy])"}, "services.borgbackup.jobs.<name>.prune.prefix": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "archiveBaseName"}, "description": {"_type": "mdDoc", "text": "Only consider archive names starting with this prefix for pruning.\nBy default, only archives created by this job are considered.\nUse `\"\"` or `null` to consider all archives.\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "prune", "prefix"], "readOnly": false, "type": "null or string"}, "services.borgbackup.jobs.<name>.readWritePaths": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "By default, borg cannot write anywhere on the system but\n`$HOME/.config/borg` and `$HOME/.cache/borg`.\nIf, for example, your preHook script needs to dump files\nsomewhere, put those directories here.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/var/backup/mysqldump\"\n]"}, "loc": ["services", "borgbackup", "jobs", "<name>", "readWritePaths"], "readOnly": false, "type": "list of path"}, "services.borgbackup.jobs.<name>.removableDevice": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the repo (which must be local) is a removable device."}, "loc": ["services", "borgbackup", "jobs", "<name>", "removableDevice"], "readOnly": false, "type": "boolean"}, "services.borgbackup.jobs.<name>.repo": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "description": {"_type": "mdDoc", "text": "Remote or local repository to back up to."}, "example": {"_type": "literalExpression", "text": "\"user@machine:/path/to/repo\""}, "loc": ["services", "borgbackup", "jobs", "<name>", "repo"], "readOnly": false, "type": "string"}, "services.borgbackup.jobs.<name>.startAt": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"daily\""}, "description": {"_type": "mdDoc", "text": "When or how often the backup should run.\nMust be in the format described in\n{manpage}`systemd.time(7)`.\nIf you do not want the backup to start\nautomatically, use `[ ]`.\nIt will generate a systemd service borgbackup-job-NAME.\nYou may trigger it manually via systemctl restart borgbackup-job-NAME.\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "startAt"], "readOnly": false, "type": "string or list of string"}, "services.borgbackup.jobs.<name>.user": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "The user {command}`borg` is run as.\nUser or group need read permission\nfor the specified {option}`paths`.\n"}, "loc": ["services", "borgbackup", "jobs", "<name>", "user"], "readOnly": false, "type": "string"}, "services.borgbackup.repos": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Serve BorgBackup repositories to given public SSH keys,\nrestricting their access to the repository only.\nSee also the chapter about BorgBackup in the NixOS manual.\nAlso, clients do not need to specify the absolute path when accessing the repository,\ni.e. `user@machine:.` is enough. (Note colon and dot.)\n"}, "loc": ["services", "borgbackup", "repos"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.borgbackup.repos.<name>.allowSubRepos": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow clients to create repositories in subdirectories of the\nspecified {option}`path`. These can be accessed using\n`user@machine:path/to/subrepo`. Note that a\n{option}`quota` applies to repositories independently.\nTherefore, if this is enabled, clients can create multiple\nrepositories and upload an arbitrary amount of data.\n"}, "loc": ["services", "borgbackup", "repos", "<name>", "allowSubRepos"], "readOnly": false, "type": "boolean"}, "services.borgbackup.repos.<name>.authorizedKeys": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Public SSH keys that are given full write access to this repository.\nYou should use a different SSH key for each repository you write to, because\nthe specified keys are restricted to running {command}`borg serve`\nand can only access this single repository.\n"}, "loc": ["services", "borgbackup", "repos", "<name>", "authorizedKeys"], "readOnly": false, "type": "list of string"}, "services.borgbackup.repos.<name>.authorizedKeysAppendOnly": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Public SSH keys that can only be used to append new data (archives) to the repository.\nNote that archives can still be marked as deleted and are subsequently removed from disk\nupon accessing the repo with full write access, e.g. when pruning.\n"}, "loc": ["services", "borgbackup", "repos", "<name>", "authorizedKeysAppendOnly"], "readOnly": false, "type": "list of string"}, "services.borgbackup.repos.<name>.group": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"borg\""}, "description": {"_type": "mdDoc", "text": "The group {command}`borg serve` is run as.\nUser or group needs write permission\nfor the specified {option}`path`.\n"}, "loc": ["services", "borgbackup", "repos", "<name>", "group"], "readOnly": false, "type": "string"}, "services.borgbackup.repos.<name>.path": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/borgbackup\""}, "description": {"_type": "mdDoc", "text": "Where to store the backups. Note that the directory\nis created automatically, with correct permissions.\n"}, "loc": ["services", "borgbackup", "repos", "<name>", "path"], "readOnly": false, "type": "path"}, "services.borgbackup.repos.<name>.quota": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Storage quota for the repository. This quota is ensured for all\nsub-repositories if {option}`allowSubRepos` is enabled\nbut not for the overall storage space used.\n"}, "example": {"_type": "literalExpression", "text": "\"100G\""}, "loc": ["services", "borgbackup", "repos", "<name>", "quota"], "readOnly": false, "type": "null or string matching the pattern [[:digit:].]+[KMGTP]?"}, "services.borgbackup.repos.<name>.user": {"declarations": ["nixos/modules/services/backup/borgbackup.nix"], "default": {"_type": "literalExpression", "text": "\"borg\""}, "description": {"_type": "mdDoc", "text": "The user {command}`borg serve` is run as.\nUser or group needs write permission\nfor the specified {option}`path`.\n"}, "loc": ["services", "borgbackup", "repos", "<name>", "user"], "readOnly": false, "type": "string"}, "services.borgmatic.configurations": {"declarations": ["nixos/modules/services/backup/borgmatic.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of borgmatic configurations, see https://torsion.org/borgmatic/docs/reference/configuration/\n"}, "loc": ["services", "borgmatic", "configurations"], "readOnly": false, "type": "attribute set of (YAML value)"}, "services.borgmatic.configurations.<name>.location.repositories": {"declarations": ["nixos/modules/services/backup/borgmatic.nix"], "description": {"_type": "mdDoc", "text": "Paths to local or remote repositories (required). Tildes are\nexpanded. Multiple repositories are backed up to in\nsequence. Borg placeholders can be used. See the output of\n\"borg help placeholders\" for details. See ssh_command for\nSSH options like identity file or port. If systemd service\nis used, then add local repository paths in the systemd\nservice file to the ReadWritePaths list.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"ssh://user@backupserver/./sourcehostname.borg\"\n  \"ssh://user@backupserver/./{fqdn}\"\n  \"/var/local/backups/local.borg\"\n]"}, "loc": ["services", "borgmatic", "configurations", "<name>", "location", "repositories"], "readOnly": false, "type": "list of string"}, "services.borgmatic.configurations.<name>.location.source_directories": {"declarations": ["nixos/modules/services/backup/borgmatic.nix"], "description": {"_type": "mdDoc", "text": "List of source directories to backup (required). Globs and\ntildes are expanded.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/home\"\n  \"/etc\"\n  \"/var/log/syslog*\"\n]"}, "loc": ["services", "borgmatic", "configurations", "<name>", "location", "source_directories"], "readOnly": false, "type": "list of string"}, "services.borgmatic.enable": {"declarations": ["nixos/modules/services/backup/borgmatic.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable borgmatic."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "borgmatic", "enable"], "readOnly": false, "type": "boolean"}, "services.borgmatic.settings": {"declarations": ["nixos/modules/services/backup/borgmatic.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See https://torsion.org/borgmatic/docs/reference/configuration/\n"}, "loc": ["services", "borgmatic", "settings"], "readOnly": false, "type": "null or (YAML value)"}, "services.borgmatic.settings.location.repositories": {"declarations": ["nixos/modules/services/backup/borgmatic.nix"], "description": {"_type": "mdDoc", "text": "Paths to local or remote repositories (required). Tildes are\nexpanded. Multiple repositories are backed up to in\nsequence. Borg placeholders can be used. See the output of\n\"borg help placeholders\" for details. See ssh_command for\nSSH options like identity file or port. If systemd service\nis used, then add local repository paths in the systemd\nservice file to the ReadWritePaths list.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"ssh://user@backupserver/./sourcehostname.borg\"\n  \"ssh://user@backupserver/./{fqdn}\"\n  \"/var/local/backups/local.borg\"\n]"}, "loc": ["services", "borgmatic", "settings", "location", "repositories"], "readOnly": false, "type": "list of string"}, "services.borgmatic.settings.location.source_directories": {"declarations": ["nixos/modules/services/backup/borgmatic.nix"], "description": {"_type": "mdDoc", "text": "List of source directories to backup (required). Globs and\ntildes are expanded.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/home\"\n  \"/etc\"\n  \"/var/log/syslog*\"\n]"}, "loc": ["services", "borgmatic", "settings", "location", "source_directories"], "readOnly": false, "type": "list of string"}, "services.bosun.checkFrequency": {"declarations": ["nixos/modules/services/monitoring/bosun.nix"], "default": {"_type": "literalExpression", "text": "\"5m\""}, "description": {"_type": "mdDoc", "text": "Bosun's check frequency\n"}, "loc": ["services", "bosun", "checkFrequency"], "readOnly": false, "type": "string"}, "services.bosun.enable": {"declarations": ["nixos/modules/services/monitoring/bosun.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable bosun."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "bosun", "enable"], "readOnly": false, "type": "boolean"}, "services.bosun.extraConfig": {"declarations": ["nixos/modules/services/monitoring/bosun.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options for Bosun. You should describe your\ndesired templates, alerts, macros, etc through this configuration\noption.\n\nA detailed description of the supported syntax can be found at-spi2-atk\nhttp://bosun.org/configuration.html\n"}, "loc": ["services", "bosun", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.bosun.group": {"declarations": ["nixos/modules/services/monitoring/bosun.nix"], "default": {"_type": "literalExpression", "text": "\"bosun\""}, "description": {"_type": "mdDoc", "text": "Group account under which bosun runs.\n"}, "loc": ["services", "bosun", "group"], "readOnly": false, "type": "string"}, "services.bosun.influxHost": {"declarations": ["nixos/modules/services/monitoring/bosun.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host and port of the influxdb database.\n"}, "example": {"_type": "literalExpression", "text": "\"localhost:8086\""}, "loc": ["services", "bosun", "influxHost"], "readOnly": false, "type": "null or string"}, "services.bosun.ledisDir": {"declarations": ["nixos/modules/services/monitoring/bosun.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/bosun/ledis_data\""}, "description": {"_type": "mdDoc", "text": "Path to bosun's ledis data dir\n"}, "loc": ["services", "bosun", "ledisDir"], "readOnly": false, "type": "path"}, "services.bosun.listenAddress": {"declarations": ["nixos/modules/services/monitoring/bosun.nix"], "default": {"_type": "literalExpression", "text": "\":8070\""}, "description": {"_type": "mdDoc", "text": "The host address and port that bosun's web interface will listen on.\n"}, "loc": ["services", "bosun", "listenAddress"], "readOnly": false, "type": "string"}, "services.bosun.opentsdbHost": {"declarations": ["nixos/modules/services/monitoring/bosun.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:4242\""}, "description": {"_type": "mdDoc", "text": "Host and port of the OpenTSDB database that stores bosun data.\nTo disable opentsdb you can pass null as parameter.\n"}, "loc": ["services", "bosun", "opentsdbHost"], "readOnly": false, "type": "null or string"}, "services.bosun.package": {"declarations": ["nixos/modules/services/monitoring/bosun.nix"], "default": {"_type": "literalExpression", "text": "pkgs.bosun"}, "description": {"_type": "mdDoc", "text": "bosun binary to use.\n"}, "loc": ["services", "bosun", "package"], "readOnly": false, "type": "package"}, "services.bosun.stateFile": {"declarations": ["nixos/modules/services/monitoring/bosun.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/bosun/bosun.state\""}, "description": {"_type": "mdDoc", "text": "Path to bosun's state file.\n"}, "loc": ["services", "bosun", "stateFile"], "readOnly": false, "type": "path"}, "services.bosun.user": {"declarations": ["nixos/modules/services/monitoring/bosun.nix"], "default": {"_type": "literalExpression", "text": "\"bosun\""}, "description": {"_type": "mdDoc", "text": "User account under which bosun runs.\n"}, "loc": ["services", "bosun", "user"], "readOnly": false, "type": "string"}, "services.botamusique.enable": {"declarations": ["nixos/modules/services/audio/botamusique.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable botamusique, a bot to play audio streams on mumble."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "botamusique", "enable"], "readOnly": false, "type": "boolean"}, "services.botamusique.package": {"declarations": ["nixos/modules/services/audio/botamusique.nix"], "default": {"_type": "literalExpression", "text": "pkgs.botamusique"}, "description": {"_type": "mdDoc", "text": "The botamusique package to use."}, "loc": ["services", "botamusique", "package"], "readOnly": false, "type": "package"}, "services.botamusique.settings": {"declarations": ["nixos/modules/services/audio/botamusique.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Your {file}`configuration.ini` as a Nix attribute set. Look up\npossible options in the [configuration.example.ini](https://github.com/azlux/botamusique/blob/master/configuration.example.ini).\n"}, "loc": ["services", "botamusique", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.botamusique.settings.bot.comment": {"declarations": ["nixos/modules/services/audio/botamusique.nix"], "default": {"_type": "literalExpression", "text": "\"Hi, I'm here to play radio, local music or youtube/soundcloud music. Have fun!\""}, "description": {"_type": "mdDoc", "text": "Comment displayed for the bot."}, "loc": ["services", "botamusique", "settings", "bot", "comment"], "readOnly": false, "type": "string"}, "services.botamusique.settings.bot.username": {"declarations": ["nixos/modules/services/audio/botamusique.nix"], "default": {"_type": "literalExpression", "text": "\"botamusique\""}, "description": {"_type": "mdDoc", "text": "Name the bot should appear with."}, "loc": ["services", "botamusique", "settings", "bot", "username"], "readOnly": false, "type": "string"}, "services.botamusique.settings.server.host": {"declarations": ["nixos/modules/services/audio/botamusique.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Hostname of the mumble server to connect to."}, "example": {"_type": "literalExpression", "text": "\"mumble.example.com\""}, "loc": ["services", "botamusique", "settings", "server", "host"], "readOnly": false, "type": "string"}, "services.botamusique.settings.server.port": {"declarations": ["nixos/modules/services/audio/botamusique.nix"], "default": {"_type": "literalExpression", "text": "64738"}, "description": {"_type": "mdDoc", "text": "Port of the mumble server to connect to."}, "loc": ["services", "botamusique", "settings", "server", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.brltty.enable": {"declarations": ["nixos/modules/services/hardware/brltty.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the BRLTTY daemon."}, "loc": ["services", "brltty", "enable"], "readOnly": false, "type": "boolean"}, "services.btrbk.extraPackages": {"declarations": ["nixos/modules/services/backup/btrbk.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra packages for btrbk, like compression utilities for `stream_compress`"}, "example": {"_type": "literalExpression", "text": "[ pkgs.xz ]"}, "loc": ["services", "btrbk", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.btrbk.instances": {"declarations": ["nixos/modules/services/backup/btrbk.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of btrbk instances. The instance named `btrbk` is the default one."}, "loc": ["services", "btrbk", "instances"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.btrbk.instances.<name>.onCalendar": {"declarations": ["nixos/modules/services/backup/btrbk.nix"], "default": {"_type": "literalExpression", "text": "\"daily\""}, "description": {"_type": "mdDoc", "text": "How often this btrbk instance is started. See systemd.time(7) for more information about the format.\nSetting it to null disables the timer, thus this instance can only be started manually.\n"}, "loc": ["services", "btrbk", "instances", "<name>", "onCalendar"], "readOnly": false, "type": "null or string"}, "services.btrbk.instances.<name>.settings": {"declarations": ["nixos/modules/services/backup/btrbk.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "configuration options for btrbk. Nested attrsets translate to subsections."}, "example": {"_type": "literalExpression", "text": "{\n  snapshot_preserve = \"14d\";\n  snapshot_preserve_min = \"2d\";\n  volume = {\n    \"/mnt/btr_pool\" = {\n      subvolume = {\n        home = {\n          snapshot_create = \"always\";\n        };\n        rootfs = { };\n      };\n      target = \"/mnt/btr_backup/mylaptop\";\n    };\n  };\n}"}, "loc": ["services", "btrbk", "instances", "<name>", "settings"], "readOnly": false, "type": "attribute set of (string or instances of this type recursively)"}, "services.btrbk.ioSchedulingClass": {"declarations": ["nixos/modules/services/backup/btrbk.nix"], "default": {"_type": "literalExpression", "text": "\"best-effort\""}, "description": {"_type": "mdDoc", "text": "IO scheduling class for btrbk (see ionice(1) for a quick description). Applies to local instances, and remote ones connecting by ssh if set to idle."}, "loc": ["services", "btrbk", "ioSchedulingClass"], "readOnly": false, "type": "one of \"idle\", \"best-effort\", \"realtime\""}, "services.btrbk.niceness": {"declarations": ["nixos/modules/services/backup/btrbk.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Niceness for local instances of btrbk. Also applies to remote ones connecting via ssh when positive."}, "loc": ["services", "btrbk", "niceness"], "readOnly": false, "type": "integer between -20 and 19 (both inclusive)"}, "services.btrbk.sshAccess": {"declarations": ["nixos/modules/services/backup/btrbk.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "SSH keys that should be able to make or push snapshots on this system remotely with btrbk"}, "loc": ["services", "btrbk", "sshAccess"], "readOnly": false, "type": "list of (submodule)"}, "services.btrbk.sshAccess.*.key": {"declarations": ["nixos/modules/services/backup/btrbk.nix"], "description": {"_type": "mdDoc", "text": "SSH public key allowed to login as user `btrbk` to run remote backups."}, "loc": ["services", "btrbk", "sshAccess", "*", "key"], "readOnly": false, "type": "string"}, "services.btrbk.sshAccess.*.roles": {"declarations": ["nixos/modules/services/backup/btrbk.nix"], "description": {"_type": "mdDoc", "text": "What actions can be performed with this SSH key. See ssh_filter_btrbk(1) for details"}, "example": {"_type": "literalExpression", "text": "[\n  \"source\"\n  \"info\"\n  \"send\"\n]"}, "loc": ["services", "btrbk", "sshAccess", "*", "roles"], "readOnly": false, "type": "list of (one of \"info\", \"source\", \"target\", \"delete\", \"snapshot\", \"send\", \"receive\")"}, "services.btrfs.autoScrub.enable": {"declarations": ["nixos/modules/tasks/filesystems/btrfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable regular btrfs scrub."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "btrfs", "autoScrub", "enable"], "readOnly": false, "type": "boolean"}, "services.btrfs.autoScrub.fileSystems": {"declarations": ["nixos/modules/tasks/filesystems/btrfs.nix"], "description": {"_type": "mdDoc", "text": "List of paths to btrfs filesystems to regularly call {command}`btrfs scrub` on.\nDefaults to all mount points with btrfs filesystems.\nIf you mount a filesystem multiple times or additionally mount subvolumes,\nyou need to manually specify this list to avoid scrubbing multiple times.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/\"\n]"}, "loc": ["services", "btrfs", "autoScrub", "fileSystems"], "readOnly": false, "type": "list of path"}, "services.btrfs.autoScrub.interval": {"declarations": ["nixos/modules/tasks/filesystems/btrfs.nix"], "default": {"_type": "literalExpression", "text": "\"monthly\""}, "description": {"_type": "mdDoc", "text": "Systemd calendar expression for when to scrub btrfs filesystems.\nThe recommended period is a month but could be less\n({manpage}`btrfs-scrub(8)`).\nSee\n{manpage}`systemd.time(7)`\nfor more information on the syntax.\n"}, "example": {"_type": "literalExpression", "text": "\"weekly\""}, "loc": ["services", "btrfs", "autoScrub", "interval"], "readOnly": false, "type": "string"}, "services.buildbot-master.buildbotDir": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.buildbot-master.home}/master\""}, "description": {"_type": "mdDoc", "text": "Specifies the Buildbot directory."}, "loc": ["services", "buildbot-master", "buildbotDir"], "readOnly": false, "type": "path"}, "services.buildbot-master.buildbotUrl": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:8010/\""}, "description": {"_type": "mdDoc", "text": "Specifies the Buildbot URL."}, "loc": ["services", "buildbot-master", "buildbotUrl"], "readOnly": false, "type": "string"}, "services.buildbot-master.builders": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"util.BuilderConfig(name='runtests',workernames=['example-worker'],factory=factory)\"\n]"}, "description": {"_type": "mdDoc", "text": "List of Builders."}, "loc": ["services", "buildbot-master", "builders"], "readOnly": false, "type": "list of string"}, "services.buildbot-master.changeSource": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of Change Sources."}, "example": {"_type": "literalExpression", "text": "[\n  \"changes.GitPoller('https://github.com/buildbot/pyflakes.git', workdir='gitpoller-workdir', branch='master', pollinterval=300)\"\n]"}, "loc": ["services", "buildbot-master", "changeSource"], "readOnly": false, "type": "list of string"}, "services.buildbot-master.dbUrl": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite:///state.sqlite\""}, "description": {"_type": "mdDoc", "text": "Specifies the database connection string."}, "loc": ["services", "buildbot-master", "dbUrl"], "readOnly": false, "type": "string"}, "services.buildbot-master.enable": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Buildbot continuous integration server."}, "loc": ["services", "buildbot-master", "enable"], "readOnly": false, "type": "boolean"}, "services.buildbot-master.extraConfig": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "\"c['buildbotNetUsageData'] = None\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to append to master.cfg"}, "loc": ["services", "buildbot-master", "extraConfig"], "readOnly": false, "type": "string"}, "services.buildbot-master.extraGroups": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of extra groups that the buildbot user should be a part of."}, "loc": ["services", "buildbot-master", "extraGroups"], "readOnly": false, "type": "list of string"}, "services.buildbot-master.factorySteps": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Factory Steps"}, "example": {"_type": "literalExpression", "text": "[\n  \"steps.Git(repourl='https://github.com/buildbot/pyflakes.git', mode='incremental')\"\n  \"steps.ShellCommand(command=['trial', 'pyflakes'])\"\n]"}, "loc": ["services", "buildbot-master", "factorySteps"], "readOnly": false, "type": "list of string"}, "services.buildbot-master.group": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "\"buildbot\""}, "description": {"_type": "mdDoc", "text": "Primary group of buildbot user."}, "loc": ["services", "buildbot-master", "group"], "readOnly": false, "type": "string"}, "services.buildbot-master.home": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "\"/home/buildbot\""}, "description": {"_type": "mdDoc", "text": "Buildbot home directory."}, "loc": ["services", "buildbot-master", "home"], "readOnly": false, "type": "path"}, "services.buildbot-master.listenAddress": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Specifies the bind address on which the buildbot HTTP interface listens."}, "loc": ["services", "buildbot-master", "listenAddress"], "readOnly": false, "type": "string"}, "services.buildbot-master.masterCfg": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalMD", "text": "generated configuration file"}, "description": {"_type": "mdDoc", "text": "Optionally pass master.cfg path. Other options in this configuration will be ignored."}, "example": {"_type": "literalExpression", "text": "\"/etc/nixos/buildbot/master.cfg\""}, "loc": ["services", "buildbot-master", "masterCfg"], "readOnly": false, "type": "path"}, "services.buildbot-master.package": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "pkgs.buildbot-full"}, "description": {"_type": "mdDoc", "text": "Package to use for buildbot."}, "example": {"_type": "literalExpression", "text": "pkgs.buildbot"}, "loc": ["services", "buildbot-master", "package"], "readOnly": false, "type": "package"}, "services.buildbot-master.packages": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "[ pkgs.git ]"}, "description": {"_type": "mdDoc", "text": "Packages to add to PATH for the buildbot process."}, "loc": ["services", "buildbot-master", "packages"], "readOnly": false, "type": "list of package"}, "services.buildbot-master.pbPort": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "9989"}, "description": {"_type": "mdDoc", "text": "The buildmaster will listen on a TCP port of your choosing\nfor connections from workers.\nIt can also use this port for connections from remote Change Sources,\nstatus clients, and debug tools.\nThis port should be visible to the outside world, and you\u2019ll need to tell\nyour worker admins about your choice.\nIf put in (single) quotes, this can also be used as a connection string,\nas defined in the [ConnectionStrings guide](https://twistedmatrix.com/documents/current/core/howto/endpoints.html).\n"}, "example": {"_type": "literalExpression", "text": "\"'tcp:9990:interface=127.0.0.1'\""}, "loc": ["services", "buildbot-master", "pbPort"], "readOnly": false, "type": "string or signed integer"}, "services.buildbot-master.port": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "8010"}, "description": {"_type": "mdDoc", "text": "Specifies port number on which the buildbot HTTP interface listens."}, "loc": ["services", "buildbot-master", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.buildbot-master.pythonPackages": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "pythonPackages: with pythonPackages; [ ]"}, "description": {"_type": "mdDoc", "text": "Packages to add the to the PYTHONPATH of the buildbot process."}, "example": {"_type": "literalExpression", "text": "pythonPackages: with pythonPackages; [ requests ]"}, "loc": ["services", "buildbot-master", "pythonPackages"], "readOnly": false, "type": "function that evaluates to a(n) list of package"}, "services.buildbot-master.reporters": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of reporter objects used to present build status to various users."}, "loc": ["services", "buildbot-master", "reporters"], "readOnly": false, "type": "list of string"}, "services.buildbot-master.schedulers": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"schedulers.SingleBranchScheduler(name='all', change_filter=util.ChangeFilter(branch='master'), treeStableTimer=None, builderNames=['runtests'])\"\n  \"schedulers.ForceScheduler(name='force',builderNames=['runtests'])\"\n]"}, "description": {"_type": "mdDoc", "text": "List of Schedulers."}, "loc": ["services", "buildbot-master", "schedulers"], "readOnly": false, "type": "list of string"}, "services.buildbot-master.title": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "\"Buildbot\""}, "description": {"_type": "mdDoc", "text": "Specifies the Buildbot Title."}, "loc": ["services", "buildbot-master", "title"], "readOnly": false, "type": "string"}, "services.buildbot-master.titleUrl": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "\"Buildbot\""}, "description": {"_type": "mdDoc", "text": "Specifies the Buildbot TitleURL."}, "loc": ["services", "buildbot-master", "titleUrl"], "readOnly": false, "type": "string"}, "services.buildbot-master.user": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "\"buildbot\""}, "description": {"_type": "mdDoc", "text": "User the buildbot server should execute under."}, "loc": ["services", "buildbot-master", "user"], "readOnly": false, "type": "string"}, "services.buildbot-master.workers": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/master.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"worker.Worker('example-worker', 'pass')\"\n]"}, "description": {"_type": "mdDoc", "text": "List of Workers."}, "loc": ["services", "buildbot-master", "workers"], "readOnly": false, "type": "list of string"}, "services.buildbot-worker.adminMessage": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the administrator of this worker"}, "loc": ["services", "buildbot-worker", "adminMessage"], "readOnly": false, "type": "null or string"}, "services.buildbot-worker.buildbotDir": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.buildbot-worker.home}/worker\""}, "description": {"_type": "mdDoc", "text": "Specifies the Buildbot directory."}, "loc": ["services", "buildbot-worker", "buildbotDir"], "readOnly": false, "type": "path"}, "services.buildbot-worker.enable": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Buildbot Worker."}, "loc": ["services", "buildbot-worker", "enable"], "readOnly": false, "type": "boolean"}, "services.buildbot-worker.extraGroups": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of extra groups that the Buildbot Worker user should be a part of."}, "loc": ["services", "buildbot-worker", "extraGroups"], "readOnly": false, "type": "list of string"}, "services.buildbot-worker.group": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "\"bbworker\""}, "description": {"_type": "mdDoc", "text": "Primary group of buildbot Worker user."}, "loc": ["services", "buildbot-worker", "group"], "readOnly": false, "type": "string"}, "services.buildbot-worker.home": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "\"/home/bbworker\""}, "description": {"_type": "mdDoc", "text": "Buildbot home directory."}, "loc": ["services", "buildbot-worker", "home"], "readOnly": false, "type": "path"}, "services.buildbot-worker.hostMessage": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Description of this worker"}, "loc": ["services", "buildbot-worker", "hostMessage"], "readOnly": false, "type": "null or string"}, "services.buildbot-worker.keepalive": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "600"}, "description": {"_type": "mdDoc", "text": "This is a number that indicates how frequently keepalive messages should be sent\nfrom the worker to the buildmaster, expressed in seconds.\n"}, "loc": ["services", "buildbot-worker", "keepalive"], "readOnly": false, "type": "signed integer"}, "services.buildbot-worker.masterUrl": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:9989\""}, "description": {"_type": "mdDoc", "text": "Specifies the Buildbot Worker connection string."}, "loc": ["services", "buildbot-worker", "masterUrl"], "readOnly": false, "type": "string"}, "services.buildbot-worker.package": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "pkgs.python3Packages.buildbot-worker"}, "description": {"_type": "mdDoc", "text": "Package to use for buildbot worker."}, "example": {"_type": "literalExpression", "text": "pkgs.python2Packages.buildbot-worker"}, "loc": ["services", "buildbot-worker", "package"], "readOnly": false, "type": "package"}, "services.buildbot-worker.packages": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "[ pkgs.git ]"}, "description": {"_type": "mdDoc", "text": "Packages to add to PATH for the buildbot process."}, "loc": ["services", "buildbot-worker", "packages"], "readOnly": false, "type": "list of package"}, "services.buildbot-worker.user": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "\"bbworker\""}, "description": {"_type": "mdDoc", "text": "User the buildbot Worker should execute under."}, "loc": ["services", "buildbot-worker", "user"], "readOnly": false, "type": "string"}, "services.buildbot-worker.workerPass": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "\"pass\""}, "description": {"_type": "mdDoc", "text": "Specifies the Buildbot Worker password."}, "loc": ["services", "buildbot-worker", "workerPass"], "readOnly": false, "type": "string"}, "services.buildbot-worker.workerPassFile": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "description": {"_type": "mdDoc", "text": "File used to store the Buildbot Worker password"}, "loc": ["services", "buildbot-worker", "workerPassFile"], "readOnly": false, "type": "path"}, "services.buildbot-worker.workerUser": {"declarations": ["nixos/modules/services/continuous-integration/buildbot/worker.nix"], "default": {"_type": "literalExpression", "text": "\"example-worker\""}, "description": {"_type": "mdDoc", "text": "Specifies the Buildbot Worker user."}, "loc": ["services", "buildbot-worker", "workerUser"], "readOnly": false, "type": "string"}, "services.buildkite-agents": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute set of buildkite agents.\nThe attribute key is combined with the hostname and a unique integer to\ncreate the final agent name. This can be overridden by setting the `name`\nattribute.\n"}, "loc": ["services", "buildkite-agents"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.buildkite-agents.<name>.dataDir": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/buildkite-agent-\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The workdir for the agent"}, "loc": ["services", "buildkite-agents", "<name>", "dataDir"], "readOnly": false, "type": "string"}, "services.buildkite-agents.<name>.enable": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable this buildkite agent"}, "loc": ["services", "buildkite-agents", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.buildkite-agents.<name>.extraConfig": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to the configuration file.\n"}, "example": {"_type": "literalExpression", "text": "\"debug=true\""}, "loc": ["services", "buildkite-agents", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.buildkite-agents.<name>.hooks.checkout": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The `checkout` hook script will replace the default checkout routine of the\nbootstrap.sh script. You can use this hook to do your own SCM checkout\nbehaviour\n"}, "loc": ["services", "buildkite-agents", "<name>", "hooks", "checkout"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.buildkite-agents.<name>.hooks.command": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The `command` hook script will replace the default implementation of running\nthe build command.\n"}, "loc": ["services", "buildkite-agents", "<name>", "hooks", "command"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.buildkite-agents.<name>.hooks.environment": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The `environment` hook will run before all other commands, and can be used\nto set up secrets, data, etc. Anything exported in hooks will be available\nto the build script.\n\nNote: the contents of this file will be copied to the world-readable\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "''\n  export SECRET_VAR=`head -1 /run/keys/secret`\n''"}, "loc": ["services", "buildkite-agents", "<name>", "hooks", "environment"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.buildkite-agents.<name>.hooks.post-artifact": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The `post-artifact` hook will run just after artifacts are uploaded\n"}, "loc": ["services", "buildkite-agents", "<name>", "hooks", "post-artifact"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.buildkite-agents.<name>.hooks.post-checkout": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The `post-checkout` hook will run after the bootstrap script has checked out\nyour projects source code.\n"}, "loc": ["services", "buildkite-agents", "<name>", "hooks", "post-checkout"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.buildkite-agents.<name>.hooks.post-command": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The `post-command` hook will run after the bootstrap script has run your\nbuild commands\n"}, "loc": ["services", "buildkite-agents", "<name>", "hooks", "post-command"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.buildkite-agents.<name>.hooks.pre-artifact": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The `pre-artifact` hook will run just before artifacts are uploaded\n"}, "loc": ["services", "buildkite-agents", "<name>", "hooks", "pre-artifact"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.buildkite-agents.<name>.hooks.pre-checkout": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The `pre-checkout` hook will run just before your projects source code is\nchecked out from your SCM provider\n"}, "loc": ["services", "buildkite-agents", "<name>", "hooks", "pre-checkout"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.buildkite-agents.<name>.hooks.pre-command": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The `pre-command` hook will run just before your build command runs\n"}, "loc": ["services", "buildkite-agents", "<name>", "hooks", "pre-command"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.buildkite-agents.<name>.hooks.pre-exit": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The `pre-exit` hook will run just before your build job finishes\n"}, "loc": ["services", "buildkite-agents", "<name>", "hooks", "pre-exit"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.buildkite-agents.<name>.hooksPath": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalMD", "text": "generated from {option}`services.buildkite-agents.<name>.hooks`"}, "description": {"_type": "mdDoc", "text": "Path to the directory storing the hooks.\nConsider using {option}`services.buildkite-agents.<name>.hooks.<name>`\ninstead.\n"}, "loc": ["services", "buildkite-agents", "<name>", "hooksPath"], "readOnly": false, "type": "path"}, "services.buildkite-agents.<name>.name": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "\"%hostname-\u2039name\u203a-%n\""}, "description": {"_type": "mdDoc", "text": "The name of the agent as seen in the buildkite dashboard.\n"}, "loc": ["services", "buildkite-agents", "<name>", "name"], "readOnly": false, "type": "string"}, "services.buildkite-agents.<name>.package": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "pkgs.buildkite-agent"}, "description": {"_type": "mdDoc", "text": "Which buildkite-agent derivation to use"}, "loc": ["services", "buildkite-agents", "<name>", "package"], "readOnly": false, "type": "package"}, "services.buildkite-agents.<name>.privateSshKeyPath": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OpenSSH private key\n\nA run-time path to the key file, which is supposed to be provisioned\noutside of Nix store.\n"}, "loc": ["services", "buildkite-agents", "<name>", "privateSshKeyPath"], "readOnly": false, "type": "null or path"}, "services.buildkite-agents.<name>.runtimePackages": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "[ pkgs.bash pkgs.gnutar pkgs.gzip pkgs.git pkgs.nix ]"}, "description": {"_type": "mdDoc", "text": "Add programs to the buildkite-agent environment"}, "loc": ["services", "buildkite-agents", "<name>", "runtimePackages"], "readOnly": false, "type": "list of package"}, "services.buildkite-agents.<name>.shell": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.bash}/bin/bash -e -c\""}, "description": {"_type": "mdDoc", "text": "Command that buildkite-agent 3 will execute when it spawns a shell.\n"}, "loc": ["services", "buildkite-agents", "<name>", "shell"], "readOnly": false, "type": "string"}, "services.buildkite-agents.<name>.tags": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Tags for the agent.\n"}, "example": {"_type": "literalExpression", "text": "{\n  docker = \"true\";\n  queue = \"default\";\n  ruby2 = \"true\";\n}"}, "loc": ["services", "buildkite-agents", "<name>", "tags"], "readOnly": false, "type": "attribute set of (string or list of string)"}, "services.buildkite-agents.<name>.tokenPath": {"declarations": ["nixos/modules/services/continuous-integration/buildkite-agents.nix"], "description": {"_type": "mdDoc", "text": "The token from your Buildkite \"Agents\" page.\n\nA run-time path to the token file, which is supposed to be provisioned\noutside of Nix store.\n"}, "loc": ["services", "buildkite-agents", "<name>", "tokenPath"], "readOnly": false, "type": "path"}, "services.cachefilesd.cacheDir": {"declarations": ["nixos/modules/services/network-filesystems/cachefilesd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/cache/fscache\""}, "description": {"_type": "mdDoc", "text": "Directory to contain filesystem cache."}, "loc": ["services", "cachefilesd", "cacheDir"], "readOnly": false, "type": "string"}, "services.cachefilesd.enable": {"declarations": ["nixos/modules/services/network-filesystems/cachefilesd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable cachefilesd network filesystems caching daemon."}, "loc": ["services", "cachefilesd", "enable"], "readOnly": false, "type": "boolean"}, "services.cachefilesd.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/cachefilesd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional configuration file entries. See cachefilesd.conf(5) for more information."}, "example": {"_type": "literalExpression", "text": "\"brun 10%\""}, "loc": ["services", "cachefilesd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.cachix-agent.credentialsFile": {"declarations": ["nixos/modules/services/system/cachix-agent/default.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/cachix-agent.token\""}, "description": {"_type": "mdDoc", "text": "Required file that needs to contain CACHIX_AGENT_TOKEN=...\n"}, "loc": ["services", "cachix-agent", "credentialsFile"], "readOnly": false, "type": "path"}, "services.cachix-agent.enable": {"declarations": ["nixos/modules/services/system/cachix-agent/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Cachix Deploy Agent: https://docs.cachix.org/deploy/."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cachix-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.cachix-agent.host": {"declarations": ["nixos/modules/services/system/cachix-agent/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Cachix uri to use."}, "loc": ["services", "cachix-agent", "host"], "readOnly": false, "type": "null or string"}, "services.cachix-agent.name": {"declarations": ["nixos/modules/services/system/cachix-agent/default.nix"], "default": {"_type": "literalExpression", "text": "\"config.networking.hostName\""}, "description": {"_type": "mdDoc", "text": "Agent name, usually same as the hostname"}, "loc": ["services", "cachix-agent", "name"], "readOnly": false, "type": "string"}, "services.cachix-agent.package": {"declarations": ["nixos/modules/services/system/cachix-agent/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.cachix"}, "description": {"_type": "mdDoc", "text": "Cachix Client package to use."}, "loc": ["services", "cachix-agent", "package"], "readOnly": false, "type": "package"}, "services.cachix-agent.profile": {"declarations": ["nixos/modules/services/system/cachix-agent/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Profile name, defaults to 'system' (NixOS)."}, "loc": ["services", "cachix-agent", "profile"], "readOnly": false, "type": "null or string"}, "services.cachix-agent.verbose": {"declarations": ["nixos/modules/services/system/cachix-agent/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable verbose output"}, "loc": ["services", "cachix-agent", "verbose"], "readOnly": false, "type": "boolean"}, "services.cachix-watch-store.cacheName": {"declarations": ["nixos/modules/services/system/cachix-watch-store.nix"], "description": {"_type": "mdDoc", "text": "Cachix binary cache name"}, "loc": ["services", "cachix-watch-store", "cacheName"], "readOnly": false, "type": "string"}, "services.cachix-watch-store.cachixTokenFile": {"declarations": ["nixos/modules/services/system/cachix-watch-store.nix"], "description": {"_type": "mdDoc", "text": "Required file that needs to contain the cachix auth token.\n"}, "loc": ["services", "cachix-watch-store", "cachixTokenFile"], "readOnly": false, "type": "path"}, "services.cachix-watch-store.compressionLevel": {"declarations": ["nixos/modules/services/system/cachix-watch-store.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The compression level for ZSTD compression (between 0 and 16)"}, "loc": ["services", "cachix-watch-store", "compressionLevel"], "readOnly": false, "type": "null or signed integer"}, "services.cachix-watch-store.enable": {"declarations": ["nixos/modules/services/system/cachix-watch-store.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Cachix Watch Store: https://docs.cachix.org."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cachix-watch-store", "enable"], "readOnly": false, "type": "boolean"}, "services.cachix-watch-store.host": {"declarations": ["nixos/modules/services/system/cachix-watch-store.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Cachix host to connect to"}, "loc": ["services", "cachix-watch-store", "host"], "readOnly": false, "type": "null or string"}, "services.cachix-watch-store.jobs": {"declarations": ["nixos/modules/services/system/cachix-watch-store.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of threads used for pushing store paths"}, "loc": ["services", "cachix-watch-store", "jobs"], "readOnly": false, "type": "null or signed integer"}, "services.cachix-watch-store.package": {"declarations": ["nixos/modules/services/system/cachix-watch-store.nix"], "default": {"_type": "literalExpression", "text": "pkgs.cachix"}, "description": {"_type": "mdDoc", "text": "Cachix Client package to use."}, "loc": ["services", "cachix-watch-store", "package"], "readOnly": false, "type": "package"}, "services.cachix-watch-store.verbose": {"declarations": ["nixos/modules/services/system/cachix-watch-store.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable verbose output"}, "loc": ["services", "cachix-watch-store", "verbose"], "readOnly": false, "type": "boolean"}, "services.caddy.acmeCA": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "\"https://acme-v02.api.letsencrypt.org/directory\""}, "description": {"_type": "mdDoc", "text": "The URL to the ACME CA's directory. It is strongly recommended to set\nthis to Let's Encrypt's staging endpoint for testing or development.\n\nSet it to `null` if you want to write a more\nfine-grained configuration manually.\n"}, "example": {"_type": "literalExpression", "text": "\"https://acme-staging-v02.api.letsencrypt.org/directory\""}, "loc": ["services", "caddy", "acmeCA"], "readOnly": false, "type": "null or string"}, "services.caddy.adapter": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the config adapter to use.\nSee <https://caddyserver.com/docs/config-adapters>\nfor the full list.\n\nIf `null` is specified, the `--adapter` argument is omitted when\nstarting or restarting Caddy. Notably, this allows specification of a\nconfiguration file in Caddy's native JSON format, as long as the\nfilename does not start with `Caddyfile` (in which case the `caddyfile`\nadapter is implicitly enabled). See\n<https://caddyserver.com/docs/command-line#caddy-run> for details.\n\n::: {.note}\nAny value other than `null` or `caddyfile` is only valid when providing\nyour own `configFile`.\n:::\n"}, "example": {"_type": "literalExpression", "text": "nginx"}, "loc": ["services", "caddy", "adapter"], "readOnly": false, "type": "null or string"}, "services.caddy.configFile": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "\"A Caddyfile automatically generated by values from services.caddy.*\""}, "description": {"_type": "mdDoc", "text": "Override the configuration file used by Caddy. By default,\nNixOS generates one automatically.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.writeTextDir \"Caddyfile\" ''\n  example.com\n\n  root * /var/www/wordpress\n  php_fastcgi unix//run/php/php-version-fpm.sock\n  file_server\n'';\n"}, "loc": ["services", "caddy", "configFile"], "readOnly": false, "type": "path"}, "services.caddy.dataDir": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/caddy\""}, "description": {"_type": "mdDoc", "text": "The data directory for caddy.\n\n::: {.note}\nIf left as the default value this directory will automatically be created\nbefore the Caddy server starts, otherwise you are responsible for ensuring\nthe directory exists with appropriate ownership and permissions.\n\nCaddy v2 replaced `CADDYPATH` with XDG directories.\nSee <https://caddyserver.com/docs/conventions#file-locations>.\n:::\n"}, "loc": ["services", "caddy", "dataDir"], "readOnly": false, "type": "path"}, "services.caddy.email": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Your email address. Mainly used when creating an ACME account with your\nCA, and is highly recommended in case there are problems with your\ncertificates.\n"}, "loc": ["services", "caddy", "email"], "readOnly": false, "type": "null or string"}, "services.caddy.enable": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Caddy web server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "caddy", "enable"], "readOnly": false, "type": "boolean"}, "services.caddy.extraConfig": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional lines of configuration appended to the automatically\ngenerated `Caddyfile`.\n"}, "example": {"_type": "literalExpression", "text": "''\n  example.com {\n    encode gzip\n    log\n    root /srv/http\n  }\n''"}, "loc": ["services", "caddy", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.caddy.globalConfig": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional lines of configuration appended to the global config section\nof the `Caddyfile`.\n\nRefer to <https://caddyserver.com/docs/caddyfile/options#global-options>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "''\n  debug\n  servers {\n    protocol {\n      experimental_http3\n    }\n  }\n''"}, "loc": ["services", "caddy", "globalConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.caddy.group": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "\"caddy\""}, "description": {"_type": "mdDoc", "text": "Group account under which caddy runs.\n\n::: {.note}\nIf left as the default value this user will automatically be created\non system activation, otherwise you are responsible for\nensuring the user exists before the Caddy service starts.\n:::\n"}, "loc": ["services", "caddy", "group"], "readOnly": false, "type": "string"}, "services.caddy.logDir": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/log/caddy\""}, "description": {"_type": "mdDoc", "text": "Directory for storing Caddy access logs.\n\n::: {.note}\nIf left as the default value this directory will automatically be created\nbefore the Caddy server starts, otherwise the sysadmin is responsible for\nensuring the directory exists with appropriate ownership and permissions.\n:::\n"}, "loc": ["services", "caddy", "logDir"], "readOnly": false, "type": "path"}, "services.caddy.logFormat": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "''\n  level ERROR\n''"}, "description": {"_type": "mdDoc", "text": "Configuration for the default logger. See\n<https://caddyserver.com/docs/caddyfile/options#log>\nfor details.\n"}, "example": {"_type": "literalExpression", "text": "mkForce \"level INFO\";\n"}, "loc": ["services", "caddy", "logFormat"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.caddy.package": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.caddy"}, "description": {"_type": "mdDoc", "text": "Caddy package to use.\n"}, "loc": ["services", "caddy", "package"], "readOnly": false, "type": "package"}, "services.caddy.resume": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use saved config, if any (and prefer over any specified configuration passed with `--config`).\n"}, "loc": ["services", "caddy", "resume"], "readOnly": false, "type": "boolean"}, "services.caddy.user": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "\"caddy\""}, "description": {"_type": "mdDoc", "text": "User account under which caddy runs.\n\n::: {.note}\nIf left as the default value this user will automatically be created\non system activation, otherwise you are responsible for\nensuring the user exists before the Caddy service starts.\n:::\n"}, "loc": ["services", "caddy", "user"], "readOnly": false, "type": "string"}, "services.caddy.virtualHosts": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative specification of virtual hosts served by Caddy.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"hydra.example.com\" = {\n    serverAliases = [ \"www.hydra.example.com\" ];\n    extraConfig = ''\n      encode gzip\n      root /srv/http\n    '';\n  };\n};\n"}, "loc": ["services", "caddy", "virtualHosts"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.caddy.virtualHosts.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional lines of configuration appended to this virtual host in the\nautomatically generated `Caddyfile`.\n"}, "loc": ["services", "caddy", "virtualHosts", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.caddy.virtualHosts.<name>.hostName": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Canonical hostname for the server."}, "loc": ["services", "caddy", "virtualHosts", "<name>", "hostName"], "readOnly": false, "type": "string"}, "services.caddy.virtualHosts.<name>.listenAddresses": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of host interfaces to bind to for this virtual host.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"::1\"\n]"}, "loc": ["services", "caddy", "virtualHosts", "<name>", "listenAddresses"], "readOnly": false, "type": "list of string"}, "services.caddy.virtualHosts.<name>.logFormat": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "''\n  output file ''${config.services.caddy.logDir}/access-''${hostName}.log\n''"}, "description": {"_type": "mdDoc", "text": "Configuration for HTTP request logging (also known as access logs). See\n<https://caddyserver.com/docs/caddyfile/directives/log#log>\nfor details.\n"}, "example": {"_type": "literalExpression", "text": "mkForce ''\n  output discard\n'';\n"}, "loc": ["services", "caddy", "virtualHosts", "<name>", "logFormat"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.caddy.virtualHosts.<name>.serverAliases": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"example.org\"\n]"}, "loc": ["services", "caddy", "virtualHosts", "<name>", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.caddy.virtualHosts.<name>.useACMEHost": {"declarations": ["nixos/modules/services/web-servers/caddy/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is mostly useful if you use DNS challenges but Caddy does not\ncurrently support your provider.\n\n*Note that this option does not create any certificates, nor\ndoes it add subdomains to existing ones \u2013 you will need to create them\nmanually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "caddy", "virtualHosts", "<name>", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.cadvisor.enable": {"declarations": ["nixos/modules/services/monitoring/cadvisor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Cadvisor service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cadvisor", "enable"], "readOnly": false, "type": "boolean"}, "services.cadvisor.extraOptions": {"declarations": ["nixos/modules/services/monitoring/cadvisor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional cadvisor options.\n\nSee <https://github.com/google/cadvisor/blob/master/docs/runtime_options.md> for available options.\n"}, "loc": ["services", "cadvisor", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.cadvisor.listenAddress": {"declarations": ["nixos/modules/services/monitoring/cadvisor.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Cadvisor listening host"}, "loc": ["services", "cadvisor", "listenAddress"], "readOnly": false, "type": "string"}, "services.cadvisor.port": {"declarations": ["nixos/modules/services/monitoring/cadvisor.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Cadvisor listening port"}, "loc": ["services", "cadvisor", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.cadvisor.storageDriver": {"declarations": ["nixos/modules/services/monitoring/cadvisor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Cadvisor storage driver."}, "example": {"_type": "literalExpression", "text": "\"influxdb\""}, "loc": ["services", "cadvisor", "storageDriver"], "readOnly": false, "type": "null or string"}, "services.cadvisor.storageDriverDb": {"declarations": ["nixos/modules/services/monitoring/cadvisor.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "Cadvisord storage driver database name."}, "loc": ["services", "cadvisor", "storageDriverDb"], "readOnly": false, "type": "string"}, "services.cadvisor.storageDriverHost": {"declarations": ["nixos/modules/services/monitoring/cadvisor.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:8086\""}, "description": {"_type": "mdDoc", "text": "Cadvisor storage driver host."}, "loc": ["services", "cadvisor", "storageDriverHost"], "readOnly": false, "type": "string"}, "services.cadvisor.storageDriverPassword": {"declarations": ["nixos/modules/services/monitoring/cadvisor.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "Cadvisor storage driver password.\n\nWarning: this password is stored in the world-readable Nix store. It's\nrecommended to use the {option}`storageDriverPasswordFile` option\nsince that gives you control over the security of the password.\n{option}`storageDriverPasswordFile` also takes precedence over {option}`storageDriverPassword`.\n"}, "loc": ["services", "cadvisor", "storageDriverPassword"], "readOnly": false, "type": "string"}, "services.cadvisor.storageDriverPasswordFile": {"declarations": ["nixos/modules/services/monitoring/cadvisor.nix"], "description": {"_type": "mdDoc", "text": "File that contains the cadvisor storage driver password.\n\n{option}`storageDriverPasswordFile` takes precedence over {option}`storageDriverPassword`\n\nWarning: when {option}`storageDriverPassword` is non-empty this defaults to a file in the\nworld-readable Nix store that contains the value of {option}`storageDriverPassword`.\n\nIt's recommended to override this with a path not in the Nix store.\nTip: use [nixops key management](https://nixos.org/nixops/manual/#idm140737318306400)\n"}, "loc": ["services", "cadvisor", "storageDriverPasswordFile"], "readOnly": false, "type": "string"}, "services.cadvisor.storageDriverSecure": {"declarations": ["nixos/modules/services/monitoring/cadvisor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Cadvisor storage driver, enable secure communication."}, "loc": ["services", "cadvisor", "storageDriverSecure"], "readOnly": false, "type": "boolean"}, "services.cadvisor.storageDriverUser": {"declarations": ["nixos/modules/services/monitoring/cadvisor.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "Cadvisor storage driver username."}, "loc": ["services", "cadvisor", "storageDriverUser"], "readOnly": false, "type": "string"}, "services.cage.enable": {"declarations": ["nixos/modules/services/wayland/cage.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable cage kiosk service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cage", "enable"], "readOnly": false, "type": "boolean"}, "services.cage.extraArguments": {"declarations": ["nixos/modules/services/wayland/cage.nix"], "default": {"_type": "literalExpression", "text": "[]"}, "description": {"_type": "mdDoc", "text": "Additional command line arguments to pass to Cage."}, "example": {"_type": "literalExpression", "text": "[\n  \"-d\"\n]"}, "loc": ["services", "cage", "extraArguments"], "readOnly": false, "type": "list of string"}, "services.cage.program": {"declarations": ["nixos/modules/services/wayland/cage.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.xterm}/bin/xterm\""}, "description": {"_type": "mdDoc", "text": "Program to run in cage.\n"}, "loc": ["services", "cage", "program"], "readOnly": false, "type": "path"}, "services.cage.user": {"declarations": ["nixos/modules/services/wayland/cage.nix"], "default": {"_type": "literalExpression", "text": "\"demo\""}, "description": {"_type": "mdDoc", "text": "User to log-in as.\n"}, "loc": ["services", "cage", "user"], "readOnly": false, "type": "string"}, "services.calibre-server.enable": {"declarations": ["nixos/modules/services/misc/calibre-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable calibre-server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "calibre-server", "enable"], "readOnly": false, "type": "boolean"}, "services.calibre-server.group": {"declarations": ["nixos/modules/services/misc/calibre-server.nix"], "default": {"_type": "literalExpression", "text": "\"calibre-server\""}, "description": {"_type": "mdDoc", "text": "The group under which calibre-server runs."}, "loc": ["services", "calibre-server", "group"], "readOnly": false, "type": "string"}, "services.calibre-server.libraries": {"declarations": ["nixos/modules/services/misc/calibre-server.nix"], "description": {"_type": "mdDoc", "text": "The directories of the libraries to serve. They must be readable for the user under which the server runs.\n"}, "loc": ["services", "calibre-server", "libraries"], "readOnly": false, "type": "list of path"}, "services.calibre-server.user": {"declarations": ["nixos/modules/services/misc/calibre-server.nix"], "default": {"_type": "literalExpression", "text": "\"calibre-server\""}, "description": {"_type": "mdDoc", "text": "The user under which calibre-server runs."}, "loc": ["services", "calibre-server", "user"], "readOnly": false, "type": "string"}, "services.calibre-web.dataDir": {"declarations": ["nixos/modules/services/web-apps/calibre-web.nix"], "default": {"_type": "literalExpression", "text": "\"calibre-web\""}, "description": {"_type": "mdDoc", "text": "The directory below {file}`/var/lib` where Calibre-Web stores its data.\n"}, "loc": ["services", "calibre-web", "dataDir"], "readOnly": false, "type": "string"}, "services.calibre-web.enable": {"declarations": ["nixos/modules/services/web-apps/calibre-web.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Calibre-Web."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "calibre-web", "enable"], "readOnly": false, "type": "boolean"}, "services.calibre-web.group": {"declarations": ["nixos/modules/services/web-apps/calibre-web.nix"], "default": {"_type": "literalExpression", "text": "\"calibre-web\""}, "description": {"_type": "mdDoc", "text": "Group account under which Calibre-Web runs."}, "loc": ["services", "calibre-web", "group"], "readOnly": false, "type": "string"}, "services.calibre-web.listen.ip": {"declarations": ["nixos/modules/services/web-apps/calibre-web.nix"], "default": {"_type": "literalExpression", "text": "\"::1\""}, "description": {"_type": "mdDoc", "text": "IP address that Calibre-Web should listen on.\n"}, "loc": ["services", "calibre-web", "listen", "ip"], "readOnly": false, "type": "string"}, "services.calibre-web.listen.port": {"declarations": ["nixos/modules/services/web-apps/calibre-web.nix"], "default": {"_type": "literalExpression", "text": "8083"}, "description": {"_type": "mdDoc", "text": "Listen port for Calibre-Web.\n"}, "loc": ["services", "calibre-web", "listen", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.calibre-web.openFirewall": {"declarations": ["nixos/modules/services/web-apps/calibre-web.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the server.\n"}, "loc": ["services", "calibre-web", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.calibre-web.options.calibreLibrary": {"declarations": ["nixos/modules/services/web-apps/calibre-web.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to Calibre library.\n"}, "loc": ["services", "calibre-web", "options", "calibreLibrary"], "readOnly": false, "type": "null or path"}, "services.calibre-web.options.enableBookConversion": {"declarations": ["nixos/modules/services/web-apps/calibre-web.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Configure path to the Calibre's ebook-convert in the DB.\n"}, "loc": ["services", "calibre-web", "options", "enableBookConversion"], "readOnly": false, "type": "boolean"}, "services.calibre-web.options.enableBookUploading": {"declarations": ["nixos/modules/services/web-apps/calibre-web.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow books to be uploaded via Calibre-Web UI.\n"}, "loc": ["services", "calibre-web", "options", "enableBookUploading"], "readOnly": false, "type": "boolean"}, "services.calibre-web.options.reverseProxyAuth.enable": {"declarations": ["nixos/modules/services/web-apps/calibre-web.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable authorization using auth proxy.\n"}, "loc": ["services", "calibre-web", "options", "reverseProxyAuth", "enable"], "readOnly": false, "type": "boolean"}, "services.calibre-web.options.reverseProxyAuth.header": {"declarations": ["nixos/modules/services/web-apps/calibre-web.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Auth proxy header name.\n"}, "loc": ["services", "calibre-web", "options", "reverseProxyAuth", "header"], "readOnly": false, "type": "string"}, "services.calibre-web.user": {"declarations": ["nixos/modules/services/web-apps/calibre-web.nix"], "default": {"_type": "literalExpression", "text": "\"calibre-web\""}, "description": {"_type": "mdDoc", "text": "User account under which Calibre-Web runs."}, "loc": ["services", "calibre-web", "user"], "readOnly": false, "type": "string"}, "services.canto-daemon.enable": {"declarations": ["nixos/modules/services/misc/canto-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the canto RSS daemon."}, "loc": ["services", "canto-daemon", "enable"], "readOnly": false, "type": "boolean"}, "services.cassandra.allowClients": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enables or disables the native transport server (CQL binary protocol).\nThis server uses the same address as the {option}`rpcAddress`,\nbut the port it uses is not `rpc_port` but\n`native_transport_port`. See the official Cassandra\ndocs for more information on these variables and set them using\n{option}`extraConfig`.\n"}, "loc": ["services", "cassandra", "allowClients"], "readOnly": false, "type": "boolean"}, "services.cassandra.clusterName": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "\"Test Cluster\""}, "description": {"_type": "mdDoc", "text": "The name of the cluster.\nThis setting prevents nodes in one logical cluster from joining\nanother. All nodes in a cluster must have the same value.\n"}, "loc": ["services", "cassandra", "clusterName"], "readOnly": false, "type": "string"}, "services.cassandra.enable": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Apache Cassandra \u2013 Scalable and highly available database.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cassandra", "enable"], "readOnly": false, "type": "boolean"}, "services.cassandra.extraConfig": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra options to be merged into {file}`cassandra.yaml` as nix attribute set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  commitlog_sync_batch_window_in_ms = 3;\n}"}, "loc": ["services", "cassandra", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.cassandra.extraEnvSh": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra shell lines to be appended onto {file}`cassandra-env.sh`.\n"}, "example": {"_type": "literalExpression", "text": "\"CLASSPATH=$CLASSPATH:${extraJar}\""}, "loc": ["services", "cassandra", "extraEnvSh"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.cassandra.fullRepairInterval": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "\"3w\""}, "description": {"_type": "mdDoc", "text": "Set the interval how often full repairs are run, i.e.\n{command}`nodetool repair --full` is executed. See\n<https://cassandra.apache.org/doc/latest/operating/repair.html>\nfor more information.\n\nSet to `null` to disable full repairs.\n"}, "example": {"_type": "literalExpression", "text": "null"}, "loc": ["services", "cassandra", "fullRepairInterval"], "readOnly": false, "type": "null or string"}, "services.cassandra.fullRepairOptions": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Options passed through to the full repair command.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--partitioner-range\"\n]"}, "loc": ["services", "cassandra", "fullRepairOptions"], "readOnly": false, "type": "list of string"}, "services.cassandra.group": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "\"cassandra\""}, "description": {"_type": "mdDoc", "text": "Run Apache Cassandra under this group."}, "loc": ["services", "cassandra", "group"], "readOnly": false, "type": "string"}, "services.cassandra.heapNewSize": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Must be left blank or set together with {option}`heapNewSize`.\nIf left blank a sensible value for the available amount of RAM and CPU\ncores is calculated.\n\nOverride to set the amount of memory to allocate to the JVM at\nstart-up. For production use you may wish to adjust this for your\nenvironment. `HEAP_NEWSIZE` refers to the size of the young\ngeneration.\n\nThe main trade-off for the young generation is that the larger it\nis, the longer GC pause times will be. The shorter it is, the more\nexpensive GC will be (usually).\n\nThe example `HEAP_NEWSIZE` assumes a modern 8-core+ machine for decent pause\ntimes. If in doubt, and if you do not particularly want to tweak, go with\n100 MB per physical CPU core.\n"}, "example": {"_type": "literalExpression", "text": "\"800M\""}, "loc": ["services", "cassandra", "heapNewSize"], "readOnly": false, "type": "null or string"}, "services.cassandra.homeDir": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/cassandra\""}, "description": {"_type": "mdDoc", "text": "Home directory for Apache Cassandra.\n"}, "loc": ["services", "cassandra", "homeDir"], "readOnly": false, "type": "path"}, "services.cassandra.incrementalRepairInterval": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "\"3d\""}, "description": {"_type": "mdDoc", "text": "Set the interval how often incremental repairs are run, i.e.\n{command}`nodetool repair` is executed. See\n<https://cassandra.apache.org/doc/latest/operating/repair.html>\nfor more information.\n\nSet to `null` to disable incremental repairs.\n"}, "example": {"_type": "literalExpression", "text": "null"}, "loc": ["services", "cassandra", "incrementalRepairInterval"], "readOnly": false, "type": "null or string"}, "services.cassandra.incrementalRepairOptions": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Options passed through to the incremental repair command.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--partitioner-range\"\n]"}, "loc": ["services", "cassandra", "incrementalRepairOptions"], "readOnly": false, "type": "list of string"}, "services.cassandra.jmxPort": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "7199"}, "description": {"_type": "mdDoc", "text": "Specifies the default port over which Cassandra will be available for\nJMX connections.\nFor security reasons, you should not expose this port to the internet.\nFirewall it if needed.\n"}, "loc": ["services", "cassandra", "jmxPort"], "readOnly": false, "type": "signed integer"}, "services.cassandra.jmxRoles": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Roles that are allowed to access the JMX (e.g. {command}`nodetool`)\nBEWARE: The passwords will be stored world readable in the nix store.\n        It's recommended to use your own protected file using\n        {option}`jmxRolesFile`\n\nDoesn't work in versions older than 3.11 because they don't like that\nit's world readable.\n"}, "loc": ["services", "cassandra", "jmxRoles"], "readOnly": false, "type": "list of (submodule)"}, "services.cassandra.jmxRoles.*.password": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "description": {"_type": "mdDoc", "text": "Password for JMX"}, "loc": ["services", "cassandra", "jmxRoles", "*", "password"], "readOnly": false, "type": "string"}, "services.cassandra.jmxRoles.*.username": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "description": {"_type": "mdDoc", "text": "Username for JMX"}, "loc": ["services", "cassandra", "jmxRoles", "*", "username"], "readOnly": false, "type": "string"}, "services.cassandra.jmxRolesFile": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalMD", "text": "generated configuration file if version is at least 3.11, otherwise `null`"}, "description": {"_type": "mdDoc", "text": "Specify your own jmx roles file.\n\nMake sure the permissions forbid \"others\" from reading the file if\nyou're using Cassandra below version 3.11.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/cassandra/jmx.password\""}, "loc": ["services", "cassandra", "jmxRolesFile"], "readOnly": false, "type": "null or path"}, "services.cassandra.jvmOpts": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Populate the `JVM_OPT` environment variable.\n"}, "loc": ["services", "cassandra", "jvmOpts"], "readOnly": false, "type": "list of string"}, "services.cassandra.listenAddress": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address or interface to bind to and tell other Cassandra nodes\nto connect to. You _must_ change this if you want multiple\nnodes to be able to communicate!\n\nSet {option}`listenAddress` OR {option}`listenInterface`, not both.\n\nLeaving it blank leaves it up to\n`InetAddress.getLocalHost()`. This will always do the \"Right\nThing\" _if_ the node is properly configured (hostname, name\nresolution, etc), and the Right Thing is to use the address\nassociated with the hostname (it might not be).\n\nSetting {option}`listenAddress` to `0.0.0.0` is always wrong.\n"}, "example": {"_type": "literalExpression", "text": "null"}, "loc": ["services", "cassandra", "listenAddress"], "readOnly": false, "type": "null or string"}, "services.cassandra.listenInterface": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set `listenAddress` OR `listenInterface`, not both. Interfaces\nmust correspond to a single address, IP aliasing is not\nsupported.\n"}, "example": {"_type": "literalExpression", "text": "\"eth1\""}, "loc": ["services", "cassandra", "listenInterface"], "readOnly": false, "type": "null or string"}, "services.cassandra.logbackConfig": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "''\n  <configuration scan=\"false\">\n    <appender name=\"STDOUT\" class=\"ch.qos.logback.core.ConsoleAppender\">\n      <encoder>\n        <pattern>%-5level %date{HH:mm:ss,SSS} %msg%n</pattern>\n      </encoder>\n    </appender>\n  \n    <root level=\"INFO\">\n      <appender-ref ref=\"STDOUT\" />\n    </root>\n  \n    <logger name=\"com.thinkaurelius.thrift\" level=\"ERROR\"/>\n  </configuration>\n''"}, "description": {"_type": "mdDoc", "text": "XML logback configuration for cassandra\n"}, "loc": ["services", "cassandra", "logbackConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.cassandra.mallocArenaMax": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set this to control the amount of arenas per-thread in glibc.\n"}, "example": {"_type": "literalExpression", "text": "4"}, "loc": ["services", "cassandra", "mallocArenaMax"], "readOnly": false, "type": "null or signed integer"}, "services.cassandra.maxHeapSize": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Must be left blank or set together with {option}`heapNewSize`.\nIf left blank a sensible value for the available amount of RAM and CPU\ncores is calculated.\n\nOverride to set the amount of memory to allocate to the JVM at\nstart-up. For production use you may wish to adjust this for your\nenvironment. `MAX_HEAP_SIZE` is the total amount of memory dedicated\nto the Java heap. `HEAP_NEWSIZE` refers to the size of the young\ngeneration.\n\nThe main trade-off for the young generation is that the larger it\nis, the longer GC pause times will be. The shorter it is, the more\nexpensive GC will be (usually).\n"}, "example": {"_type": "literalExpression", "text": "\"4G\""}, "loc": ["services", "cassandra", "maxHeapSize"], "readOnly": false, "type": "null or string"}, "services.cassandra.package": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "pkgs.cassandra"}, "description": {"_type": "mdDoc", "text": "The Apache Cassandra package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.cassandra_3_11"}, "loc": ["services", "cassandra", "package"], "readOnly": false, "type": "package"}, "services.cassandra.remoteJmx": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Cassandra ships with JMX accessible *only* from localhost.\nTo enable remote JMX connections set to true.\n\nBe sure to also enable authentication and/or TLS.\nSee: <https://wiki.apache.org/cassandra/JmxSecurity>\n"}, "loc": ["services", "cassandra", "remoteJmx"], "readOnly": false, "type": "boolean"}, "services.cassandra.rpcAddress": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The address or interface to bind the native transport server to.\n\nSet {option}`rpcAddress` OR {option}`rpcInterface`, not both.\n\nLeaving {option}`rpcAddress` blank has the same effect as on\n{option}`listenAddress` (i.e. it will be based on the configured hostname\nof the node).\n\nNote that unlike {option}`listenAddress`, you can specify `\"0.0.0.0\"`, but you\nmust also set `extraConfig.broadcast_rpc_address` to a value other\nthan `\"0.0.0.0\"`.\n\nFor security reasons, you should not expose this port to the\ninternet. Firewall it if needed.\n"}, "example": {"_type": "literalExpression", "text": "null"}, "loc": ["services", "cassandra", "rpcAddress"], "readOnly": false, "type": "null or string"}, "services.cassandra.rpcInterface": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set {option}`rpcAddress` OR {option}`rpcInterface`, not both. Interfaces must\ncorrespond to a single address, IP aliasing is not supported.\n"}, "example": {"_type": "literalExpression", "text": "\"eth1\""}, "loc": ["services", "cassandra", "rpcInterface"], "readOnly": false, "type": "null or string"}, "services.cassandra.seedAddresses": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "description": {"_type": "mdDoc", "text": "The addresses of hosts designated as contact points in the cluster. A\njoining node contacts one of the nodes in the seeds list to learn the\ntopology of the ring.\nSet to `[ \"127.0.0.1\" ]` for a single node cluster.\n"}, "loc": ["services", "cassandra", "seedAddresses"], "readOnly": false, "type": "list of string"}, "services.cassandra.user": {"declarations": ["nixos/modules/services/databases/cassandra.nix"], "default": {"_type": "literalExpression", "text": "\"cassandra\""}, "description": {"_type": "mdDoc", "text": "Run Apache Cassandra under this user."}, "loc": ["services", "cassandra", "user"], "readOnly": false, "type": "string"}, "services.ceph.client.enable": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ceph client configuration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ceph", "client", "enable"], "readOnly": false, "type": "boolean"}, "services.ceph.client.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration to add to the client section. Configuration for rados gateways\nwould be added here, with their own sections, see example.\n"}, "example": {"_type": "literalExpression", "text": "{\n  # This would create a section for a radosgw daemon named node0 and related\n  # configuration for it\n  \"client.radosgw.node0\" = { \"some config option\" = \"true\"; };\n};\n"}, "loc": ["services", "ceph", "client", "extraConfig"], "readOnly": false, "type": "attribute set of attribute set of string"}, "services.ceph.enable": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ceph global configuration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ceph", "enable"], "readOnly": false, "type": "boolean"}, "services.ceph.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration to add to the global section. Use for setting values that are common for all daemons in the cluster.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"ms bind ipv6\" = \"true\";\n}"}, "loc": ["services", "ceph", "extraConfig"], "readOnly": false, "type": "attribute set of string"}, "services.ceph.global.authClientRequired": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "\"cephx\""}, "description": {"_type": "mdDoc", "text": "Enables requiring the cluster to authenticate itself to the client.\n"}, "loc": ["services", "ceph", "global", "authClientRequired"], "readOnly": false, "type": "one of \"cephx\", \"none\""}, "services.ceph.global.authClusterRequired": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "\"cephx\""}, "description": {"_type": "mdDoc", "text": "Enables requiring daemons to authenticate with eachother in the cluster.\n"}, "loc": ["services", "ceph", "global", "authClusterRequired"], "readOnly": false, "type": "one of \"cephx\", \"none\""}, "services.ceph.global.authServiceRequired": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "\"cephx\""}, "description": {"_type": "mdDoc", "text": "Enables requiring clients to authenticate with the cluster to access services in the cluster (e.g. radosgw, mds or osd).\n"}, "loc": ["services", "ceph", "global", "authServiceRequired"], "readOnly": false, "type": "one of \"cephx\", \"none\""}, "services.ceph.global.clusterName": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "\"ceph\""}, "description": {"_type": "mdDoc", "text": "Name of cluster\n"}, "loc": ["services", "ceph", "global", "clusterName"], "readOnly": false, "type": "string"}, "services.ceph.global.clusterNetwork": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A comma-separated list of subnets that will be used as cluster networks in the cluster.\n"}, "example": {"_type": "literalExpression", "text": "''\n  10.10.0.0/24, 192.168.0.0/24\n''"}, "loc": ["services", "ceph", "global", "clusterNetwork"], "readOnly": false, "type": "null or strings concatenated with \",\""}, "services.ceph.global.fsid": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "description": {"_type": "mdDoc", "text": "Filesystem ID, a generated uuid, its must be generated and set before\nattempting to start a cluster\n"}, "example": {"_type": "literalExpression", "text": "''\n  433a2193-4f8a-47a0-95d2-209d7ca2cca5\n''"}, "loc": ["services", "ceph", "global", "fsid"], "readOnly": false, "type": "string"}, "services.ceph.global.maxOpenFiles": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "131072"}, "description": {"_type": "mdDoc", "text": "Max open files for each OSD daemon.\n"}, "loc": ["services", "ceph", "global", "maxOpenFiles"], "readOnly": false, "type": "signed integer"}, "services.ceph.global.mgrModulePath": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.ceph.lib}/lib/ceph/mgr\""}, "description": {"_type": "mdDoc", "text": "Path at which to find ceph-mgr modules.\n"}, "loc": ["services", "ceph", "global", "mgrModulePath"], "readOnly": false, "type": "path"}, "services.ceph.global.monHost": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of hostname shortnames/IP addresses of the initial monitors.\n"}, "example": {"_type": "literalExpression", "text": "''\n  10.10.0.1, 10.10.0.2, 10.10.0.3\n''"}, "loc": ["services", "ceph", "global", "monHost"], "readOnly": false, "type": "null or strings concatenated with \",\""}, "services.ceph.global.monInitialMembers": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of hosts that will be used as monitors at startup.\n"}, "example": {"_type": "literalExpression", "text": "''\n  node0, node1, node2\n''"}, "loc": ["services", "ceph", "global", "monInitialMembers"], "readOnly": false, "type": "null or strings concatenated with \",\""}, "services.ceph.global.publicNetwork": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A comma-separated list of subnets that will be used as public networks in the cluster.\n"}, "example": {"_type": "literalExpression", "text": "''\n  10.20.0.0/24, 192.168.1.0/24\n''"}, "loc": ["services", "ceph", "global", "publicNetwork"], "readOnly": false, "type": "null or strings concatenated with \",\""}, "services.ceph.global.rgwMimeTypesFile": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.mailcap}/etc/mime.types\""}, "description": {"_type": "mdDoc", "text": "Path to mime types used by radosgw.\n"}, "loc": ["services", "ceph", "global", "rgwMimeTypesFile"], "readOnly": false, "type": "null or path"}, "services.ceph.mds.daemons": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of metadata service daemons that should have a service created. The names correspond\nto the id part in ceph i.e. [ \"name1\" ] would result in mds.name1\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"name1\"\n  \"name2\"\n]"}, "loc": ["services", "ceph", "mds", "daemons"], "readOnly": false, "type": "list of string"}, "services.ceph.mds.enable": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ceph MDS daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ceph", "mds", "enable"], "readOnly": false, "type": "boolean"}, "services.ceph.mds.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration to add to the MDS section.\n"}, "loc": ["services", "ceph", "mds", "extraConfig"], "readOnly": false, "type": "attribute set of string"}, "services.ceph.mgr.daemons": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of names for manager daemons that should have a service created. The names correspond\nto the id part in ceph i.e. [ \"name1\" ] would result in mgr.name1\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"name1\"\n  \"name2\"\n]"}, "loc": ["services", "ceph", "mgr", "daemons"], "readOnly": false, "type": "list of string"}, "services.ceph.mgr.enable": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ceph MGR daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ceph", "mgr", "enable"], "readOnly": false, "type": "boolean"}, "services.ceph.mgr.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration to add to the global section for manager daemons.\n"}, "loc": ["services", "ceph", "mgr", "extraConfig"], "readOnly": false, "type": "attribute set of string"}, "services.ceph.mon.daemons": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of monitor daemons that should have a service created. The names correspond\nto the id part in ceph i.e. [ \"name1\" ] would result in mon.name1\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"name1\"\n  \"name2\"\n]"}, "loc": ["services", "ceph", "mon", "daemons"], "readOnly": false, "type": "list of string"}, "services.ceph.mon.enable": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ceph MON daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ceph", "mon", "enable"], "readOnly": false, "type": "boolean"}, "services.ceph.mon.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration to add to the monitor section.\n"}, "loc": ["services", "ceph", "mon", "extraConfig"], "readOnly": false, "type": "attribute set of string"}, "services.ceph.osd.daemons": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of OSD daemons that should have a service created. The names correspond\nto the id part in ceph i.e. [ \"name1\" ] would result in osd.name1\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"name1\"\n  \"name2\"\n]"}, "loc": ["services", "ceph", "osd", "daemons"], "readOnly": false, "type": "list of string"}, "services.ceph.osd.enable": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ceph OSD daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ceph", "osd", "enable"], "readOnly": false, "type": "boolean"}, "services.ceph.osd.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "{\n  \"osd crush chooseleaf type\" = \"1\";\n  \"osd journal size\" = \"10000\";\n  \"osd pool default min size\" = \"2\";\n  \"osd pool default pg num\" = \"200\";\n  \"osd pool default pgp num\" = \"200\";\n  \"osd pool default size\" = \"3\";\n}"}, "description": {"_type": "mdDoc", "text": "Extra configuration to add to the OSD section.\n"}, "loc": ["services", "ceph", "osd", "extraConfig"], "readOnly": false, "type": "attribute set of string"}, "services.ceph.rgw.daemons": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of rados gateway daemons that should have a service created. The names correspond\nto the id part in ceph i.e. [ \"name1\" ] would result in client.name1, radosgw daemons\naren't daemons to cluster in the sense that OSD, MGR or MON daemons are. They are simply\ndaemons, from ceph, that uses the cluster as a backend.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"name1\"\n  \"name2\"\n]"}, "loc": ["services", "ceph", "rgw", "daemons"], "readOnly": false, "type": "list of string"}, "services.ceph.rgw.enable": {"declarations": ["nixos/modules/services/network-filesystems/ceph.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ceph RadosGW daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ceph", "rgw", "enable"], "readOnly": false, "type": "boolean"}, "services.certmgr.defaultRemote": {"declarations": ["nixos/modules/services/security/certmgr.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:8888\""}, "description": {"_type": "mdDoc", "text": "The default CA host:port to use."}, "loc": ["services", "certmgr", "defaultRemote"], "readOnly": false, "type": "string"}, "services.certmgr.enable": {"declarations": ["nixos/modules/services/security/certmgr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable certmgr."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "certmgr", "enable"], "readOnly": false, "type": "boolean"}, "services.certmgr.metricsAddress": {"declarations": ["nixos/modules/services/security/certmgr.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The address for the Prometheus HTTP endpoint."}, "loc": ["services", "certmgr", "metricsAddress"], "readOnly": false, "type": "string"}, "services.certmgr.metricsPort": {"declarations": ["nixos/modules/services/security/certmgr.nix"], "default": {"_type": "literalExpression", "text": "9488"}, "description": {"_type": "mdDoc", "text": "The port for the Prometheus HTTP endpoint."}, "loc": ["services", "certmgr", "metricsPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.certmgr.package": {"declarations": ["nixos/modules/services/security/certmgr.nix"], "default": {"_type": "literalExpression", "text": "pkgs.certmgr"}, "description": {"_type": "mdDoc", "text": "Which certmgr package to use in the service."}, "loc": ["services", "certmgr", "package"], "readOnly": false, "type": "package"}, "services.certmgr.renewInterval": {"declarations": ["nixos/modules/services/security/certmgr.nix"], "default": {"_type": "literalExpression", "text": "\"30m\""}, "description": {"_type": "mdDoc", "text": "How often to check certificate expirations and how often to update the cert_next_expires metric."}, "loc": ["services", "certmgr", "renewInterval"], "readOnly": false, "type": "string"}, "services.certmgr.specs": {"declarations": ["nixos/modules/services/security/certmgr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Certificate specs as described by:\n<https://github.com/cloudflare/certmgr#certificate-specs>\nThese will be added to the Nix store, so they will be world readable.\n"}, "example": {"_type": "literalExpression", "text": "{\n  exampleCert =\n  let\n    domain = \"example.com\";\n    secret = name: \"/var/lib/secrets/${name}.pem\";\n  in {\n    service = \"nginx\";\n    action = \"reload\";\n    authority = {\n      file.path = secret \"ca\";\n    };\n    certificate = {\n      path = secret domain;\n    };\n    private_key = {\n      owner = \"root\";\n      group = \"root\";\n      mode = \"0600\";\n      path = secret \"${domain}-key\";\n    };\n    request = {\n      CN = domain;\n      hosts = [ \"mail.${domain}\" \"www.${domain}\" ];\n      key = {\n        algo = \"rsa\";\n        size = 2048;\n      };\n      names = {\n        O = \"Example Organization\";\n        C = \"USA\";\n      };\n    };\n  };\n  otherCert = \"/var/certmgr/specs/other-cert.json\";\n}\n"}, "loc": ["services", "certmgr", "specs"], "readOnly": false, "type": "attribute set of (path or (submodule))"}, "services.certmgr.svcManager": {"declarations": ["nixos/modules/services/security/certmgr.nix"], "default": {"_type": "literalExpression", "text": "\"systemd\""}, "description": {"_type": "mdDoc", "text": "This specifies the service manager to use for restarting or reloading services.\nSee: <https://github.com/cloudflare/certmgr#certmgryaml>.\nFor how to use the \"command\" service manager in particular,\nsee: <https://github.com/cloudflare/certmgr#command-svcmgr-and-how-to-use-it>.\n"}, "loc": ["services", "certmgr", "svcManager"], "readOnly": false, "type": "one of \"circus\", \"command\", \"dummy\", \"openrc\", \"systemd\", \"sysv\""}, "services.certmgr.validMin": {"declarations": ["nixos/modules/services/security/certmgr.nix"], "default": {"_type": "literalExpression", "text": "\"72h\""}, "description": {"_type": "mdDoc", "text": "The interval before a certificate expires to start attempting to renew it."}, "loc": ["services", "certmgr", "validMin"], "readOnly": false, "type": "string"}, "services.cfdyndns.apikeyFile": {"declarations": ["nixos/modules/services/misc/cfdyndns.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to a file containing the API Key\nused to authenticate with CloudFlare.\n"}, "loc": ["services", "cfdyndns", "apikeyFile"], "readOnly": false, "type": "null or string"}, "services.cfdyndns.email": {"declarations": ["nixos/modules/services/misc/cfdyndns.nix"], "description": {"_type": "mdDoc", "text": "The email address to use to authenticate to CloudFlare.\n"}, "loc": ["services", "cfdyndns", "email"], "readOnly": false, "type": "string"}, "services.cfdyndns.enable": {"declarations": ["nixos/modules/services/misc/cfdyndns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Cloudflare Dynamic DNS Client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cfdyndns", "enable"], "readOnly": false, "type": "boolean"}, "services.cfdyndns.records": {"declarations": ["nixos/modules/services/misc/cfdyndns.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The records to update in CloudFlare.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"host.tld\"\n]"}, "loc": ["services", "cfdyndns", "records"], "readOnly": false, "type": "list of string"}, "services.cfssl.address": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address to bind."}, "loc": ["services", "cfssl", "address"], "readOnly": false, "type": "string"}, "services.cfssl.ca": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "\"${cfg.dataDir}/ca.pem\""}, "description": {"_type": "mdDoc", "text": "CA used to sign the new certificate -- accepts '[file:]fname' or 'env:varname'."}, "loc": ["services", "cfssl", "ca"], "readOnly": false, "type": "string"}, "services.cfssl.caBundle": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to root certificate store."}, "loc": ["services", "cfssl", "caBundle"], "readOnly": false, "type": "null or path"}, "services.cfssl.caKey": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "\"file:${cfg.dataDir}/ca-key.pem\""}, "description": {"_type": "mdDoc", "text": "CA private key -- accepts '[file:]fname' or 'env:varname'."}, "loc": ["services", "cfssl", "caKey"], "readOnly": false, "type": "string"}, "services.cfssl.configFile": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to configuration file. Do not put this in nix-store as it might contain secrets."}, "loc": ["services", "cfssl", "configFile"], "readOnly": false, "type": "null or string"}, "services.cfssl.dataDir": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/cfssl\""}, "description": {"_type": "mdDoc", "text": "The work directory for CFSSL.\n\n::: {.note}\nIf left as the default value this directory will automatically be\ncreated before the CFSSL server starts, otherwise you are\nresponsible for ensuring the directory exists with appropriate\nownership and permissions.\n:::\n"}, "loc": ["services", "cfssl", "dataDir"], "readOnly": false, "type": "path"}, "services.cfssl.dbConfig": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate db configuration file. Path must be writeable."}, "loc": ["services", "cfssl", "dbConfig"], "readOnly": false, "type": "null or path"}, "services.cfssl.enable": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the CFSSL CA api-server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cfssl", "enable"], "readOnly": false, "type": "boolean"}, "services.cfssl.intBundle": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to intermediate certificate store."}, "loc": ["services", "cfssl", "intBundle"], "readOnly": false, "type": "null or path"}, "services.cfssl.intDir": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Intermediates directory."}, "loc": ["services", "cfssl", "intDir"], "readOnly": false, "type": "null or path"}, "services.cfssl.logLevel": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Log level (0 = DEBUG, 5 = FATAL)."}, "loc": ["services", "cfssl", "logLevel"], "readOnly": false, "type": "one of 0, 1, 2, 3, 4, 5"}, "services.cfssl.metadata": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Metadata file for root certificate presence.\nThe content of the file is a json dictionary (k,v): each key k is\na SHA-1 digest of a root certificate while value v is a list of key\nstore filenames.\n"}, "loc": ["services", "cfssl", "metadata"], "readOnly": false, "type": "null or path"}, "services.cfssl.mutualTlsCa": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Mutual TLS - require clients be signed by this CA."}, "loc": ["services", "cfssl", "mutualTlsCa"], "readOnly": false, "type": "null or path"}, "services.cfssl.mutualTlsClientCert": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Mutual TLS - client certificate to call remote instance requiring client certs."}, "loc": ["services", "cfssl", "mutualTlsClientCert"], "readOnly": false, "type": "null or path"}, "services.cfssl.mutualTlsClientKey": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Mutual TLS - client key to call remote instance requiring client certs. Do not put this in nix-store."}, "loc": ["services", "cfssl", "mutualTlsClientKey"], "readOnly": false, "type": "null or path"}, "services.cfssl.mutualTlsCn": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Mutual TLS - regex for whitelist of allowed client CNs."}, "loc": ["services", "cfssl", "mutualTlsCn"], "readOnly": false, "type": "null or string"}, "services.cfssl.port": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "8888"}, "description": {"_type": "mdDoc", "text": "Port to bind."}, "loc": ["services", "cfssl", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.cfssl.remote": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Remote CFSSL server."}, "loc": ["services", "cfssl", "remote"], "readOnly": false, "type": "null or string"}, "services.cfssl.responder": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate for OCSP responder."}, "loc": ["services", "cfssl", "responder"], "readOnly": false, "type": "null or path"}, "services.cfssl.responderKey": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Private key for OCSP responder certificate. Do not put this in nix-store."}, "loc": ["services", "cfssl", "responderKey"], "readOnly": false, "type": "null or string"}, "services.cfssl.tlsCert": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Other endpoint's CA to set up TLS protocol."}, "loc": ["services", "cfssl", "tlsCert"], "readOnly": false, "type": "null or path"}, "services.cfssl.tlsKey": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Other endpoint's CA private key. Do not put this in nix-store."}, "loc": ["services", "cfssl", "tlsKey"], "readOnly": false, "type": "null or string"}, "services.cfssl.tlsRemoteCa": {"declarations": ["nixos/modules/services/security/cfssl.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CAs to trust for remote TLS requests."}, "loc": ["services", "cfssl", "tlsRemoteCa"], "readOnly": false, "type": "null or path"}, "services.cgit": {"declarations": ["nixos/modules/services/networking/cgit.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configure cgit instances."}, "loc": ["services", "cgit"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.cgit.<name>.enable": {"declarations": ["nixos/modules/services/networking/cgit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable cgit."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cgit", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.cgit.<name>.extraConfig": {"declarations": ["nixos/modules/services/networking/cgit.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of cgitrc verbatim."}, "loc": ["services", "cgit", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.cgit.<name>.nginx.location": {"declarations": ["nixos/modules/services/networking/cgit.nix"], "default": {"_type": "literalExpression", "text": "\"/\""}, "description": {"_type": "mdDoc", "text": "Location to serve cgit under."}, "example": {"_type": "literalExpression", "text": "\"/git/\""}, "loc": ["services", "cgit", "<name>", "nginx", "location"], "readOnly": false, "type": "string"}, "services.cgit.<name>.nginx.virtualHost": {"declarations": ["nixos/modules/services/networking/cgit.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "VirtualHost to serve cgit on, defaults to the attribute name."}, "example": {"_type": "literalExpression", "text": "\"git.example.com\""}, "loc": ["services", "cgit", "<name>", "nginx", "virtualHost"], "readOnly": false, "type": "string"}, "services.cgit.<name>.package": {"declarations": ["nixos/modules/services/networking/cgit.nix"], "default": {"_type": "literalExpression", "text": "pkgs.cgit"}, "description": {"_type": "mdDoc", "text": "The cgit package to use."}, "loc": ["services", "cgit", "<name>", "package"], "readOnly": false, "type": "package"}, "services.cgit.<name>.repos": {"declarations": ["nixos/modules/services/networking/cgit.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "cgit repository settings, see cgitrc(5)"}, "example": {"_type": "literalExpression", "text": "{\n  blah = {\n    desc = \"An example repository\";\n    path = \"/var/lib/git/example\";\n  };\n}"}, "loc": ["services", "cgit", "<name>", "repos"], "readOnly": false, "type": "attribute set of attribute set of (boolean or signed integer or string)"}, "services.cgit.<name>.scanPath": {"declarations": ["nixos/modules/services/networking/cgit.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A path which will be scanned for repositories."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/git\""}, "loc": ["services", "cgit", "<name>", "scanPath"], "readOnly": false, "type": "null or path"}, "services.cgit.<name>.settings": {"declarations": ["nixos/modules/services/networking/cgit.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "cgit configuration, see cgitrc(5)"}, "example": {"_type": "literalExpression", "text": "{\n  enable-follow-links = true;\n  source-filter = \"${pkgs.cgit}/lib/cgit/filters/syntax-highlighting.py\";\n}\n"}, "loc": ["services", "cgit", "<name>", "settings"], "readOnly": false, "type": "attribute set of (boolean or signed integer or string)"}, "services.cgminer.config": {"declarations": ["nixos/modules/services/misc/cgminer.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional config"}, "example": {"_type": "literalExpression", "text": "{\n  auto-fan = true;\n  auto-gpu = true;\n  expiry = 120;\n  failover-only = true;\n  gpu-threads = 2;\n  log = 5;\n  queue = 1;\n  scan-time = 60;\n  temp-histeresys = 3;\n}"}, "loc": ["services", "cgminer", "config"], "readOnly": false, "type": "attribute set of (boolean or signed integer)"}, "services.cgminer.enable": {"declarations": ["nixos/modules/services/misc/cgminer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable cgminer, an ASIC/FPGA/GPU miner for bitcoin and litecoin."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cgminer", "enable"], "readOnly": false, "type": "boolean"}, "services.cgminer.hardware": {"declarations": ["nixos/modules/services/misc/cgminer.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of config options for every GPU"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    gpu-engine = \"0-985\";\n    gpu-fan = \"0-85\";\n    gpu-memclock = 860;\n    gpu-powertune = 20;\n    intensity = 9;\n    temp-cutoff = 95;\n    temp-overheat = 85;\n    temp-target = 75;\n  }\n  {\n    gpu-engine = \"0-950\";\n    gpu-fan = \"0-85\";\n    gpu-memclock = 825;\n    gpu-powertune = 20;\n    intensity = 9;\n    temp-cutoff = 95;\n    temp-overheat = 85;\n    temp-target = 75;\n  }\n]"}, "loc": ["services", "cgminer", "hardware"], "readOnly": false, "type": "list of attribute set of (string or signed integer)"}, "services.cgminer.package": {"declarations": ["nixos/modules/services/misc/cgminer.nix"], "default": {"_type": "literalExpression", "text": "pkgs.cgminer"}, "description": {"_type": "mdDoc", "text": "Which cgminer derivation to use."}, "loc": ["services", "cgminer", "package"], "readOnly": false, "type": "package"}, "services.cgminer.pools": {"declarations": ["nixos/modules/services/misc/cgminer.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of pools where to mine"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    password = \"X\";\n    url = \"http://p2pool.org:9332\";\n    username = \"17EUZxTvs9uRmPsjPZSYUU3zCz9iwstudk\";\n  }\n]"}, "loc": ["services", "cgminer", "pools"], "readOnly": false, "type": "list of attribute set of string"}, "services.cgminer.user": {"declarations": ["nixos/modules/services/misc/cgminer.nix"], "default": {"_type": "literalExpression", "text": "\"cgminer\""}, "description": {"_type": "mdDoc", "text": "User account under which cgminer runs"}, "loc": ["services", "cgminer", "user"], "readOnly": false, "type": "string"}, "services.changedetection-io.baseURL": {"declarations": ["nixos/modules/services/web-apps/changedetection-io.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The base url used in notifications and `{base_url}` token.\n"}, "example": {"_type": "literalExpression", "text": "\"https://changedetection-io.example\""}, "loc": ["services", "changedetection-io", "baseURL"], "readOnly": false, "type": "null or string"}, "services.changedetection-io.behindProxy": {"declarations": ["nixos/modules/services/web-apps/changedetection-io.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable this option when changedetection-io runs behind a reverse proxy, so that it trusts X-* headers.\nIt is recommend to run changedetection-io behind a TLS reverse proxy.\n"}, "loc": ["services", "changedetection-io", "behindProxy"], "readOnly": false, "type": "boolean"}, "services.changedetection-io.chromePort": {"declarations": ["nixos/modules/services/web-apps/changedetection-io.nix"], "default": {"_type": "literalExpression", "text": "4444"}, "description": {"_type": "mdDoc", "text": "A free port on which webDriverSupport or playwrightSupport listen on localhost.\n"}, "loc": ["services", "changedetection-io", "chromePort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.changedetection-io.datastorePath": {"declarations": ["nixos/modules/services/web-apps/changedetection-io.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/changedetection-io\""}, "description": {"_type": "mdDoc", "text": "The directory used to store all data for changedetection-io.\n"}, "loc": ["services", "changedetection-io", "datastorePath"], "readOnly": false, "type": "string"}, "services.changedetection-io.enable": {"declarations": ["nixos/modules/services/web-apps/changedetection-io.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable changedetection-io."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "changedetection-io", "enable"], "readOnly": false, "type": "boolean"}, "services.changedetection-io.environmentFile": {"declarations": ["nixos/modules/services/web-apps/changedetection-io.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Securely pass environment variabels to changedetection-io.\n\nThis can be used to set for example a frontend password reproducible via `SALTED_PASS`\nwhich convinetly also deactivates nags about the hosted version.\n`SALTED_PASS` should be 64 characters long while the first 32 are the salt and the second the frontend password.\nIt can easily be retrieved from the settings file when first set via the frontend with the following command:\n``jq -r .settings.application.password /var/lib/changedetection-io/url-watches.json``\n"}, "example": {"_type": "literalExpression", "text": "\"/run/secrets/changedetection-io.env\""}, "loc": ["services", "changedetection-io", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.changedetection-io.group": {"declarations": ["nixos/modules/services/web-apps/changedetection-io.nix"], "default": {"_type": "literalExpression", "text": "\"changedetection-io\""}, "description": {"_type": "mdDoc", "text": "Group account under which changedetection-io runs.\n"}, "loc": ["services", "changedetection-io", "group"], "readOnly": false, "type": "string"}, "services.changedetection-io.listenAddress": {"declarations": ["nixos/modules/services/web-apps/changedetection-io.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address the server will listen on."}, "loc": ["services", "changedetection-io", "listenAddress"], "readOnly": false, "type": "string"}, "services.changedetection-io.playwrightSupport": {"declarations": ["nixos/modules/services/web-apps/changedetection-io.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable support for fetching web pages using playwright and Chromium.\nThis starts a headless Chromium controlled by puppeteer in an oci container.\n\n::: {.note}\nPlaywright can currently leak memory.\nSee https://github.com/dgtlmoon/changedetection.io/wiki/Playwright-content-fetcher#playwright-memory-leak\n:::\n"}, "loc": ["services", "changedetection-io", "playwrightSupport"], "readOnly": false, "type": "boolean"}, "services.changedetection-io.port": {"declarations": ["nixos/modules/services/web-apps/changedetection-io.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Port the server will listen on."}, "loc": ["services", "changedetection-io", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.changedetection-io.user": {"declarations": ["nixos/modules/services/web-apps/changedetection-io.nix"], "default": {"_type": "literalExpression", "text": "\"changedetection-io\""}, "description": {"_type": "mdDoc", "text": "User account under which changedetection-io runs.\n"}, "loc": ["services", "changedetection-io", "user"], "readOnly": false, "type": "string"}, "services.changedetection-io.webDriverSupport": {"declarations": ["nixos/modules/services/web-apps/changedetection-io.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable support for fetching web pages using WebDriver and Chromium.\nThis starts a headless chromium controlled by puppeteer in an oci container.\n\n::: {.note}\nPlaywright can currently leak memory.\nSee https://github.com/dgtlmoon/changedetection.io/wiki/Playwright-content-fetcher#playwright-memory-leak\n:::\n"}, "loc": ["services", "changedetection-io", "webDriverSupport"], "readOnly": false, "type": "boolean"}, "services.charybdis.config": {"declarations": ["nixos/modules/services/networking/charybdis.nix"], "description": {"_type": "mdDoc", "text": "Charybdis IRC daemon configuration file.\n"}, "loc": ["services", "charybdis", "config"], "readOnly": false, "type": "string"}, "services.charybdis.enable": {"declarations": ["nixos/modules/services/networking/charybdis.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Charybdis IRC daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "charybdis", "enable"], "readOnly": false, "type": "boolean"}, "services.charybdis.group": {"declarations": ["nixos/modules/services/networking/charybdis.nix"], "default": {"_type": "literalExpression", "text": "\"ircd\""}, "description": {"_type": "mdDoc", "text": "Charybdis IRC daemon group.\n"}, "loc": ["services", "charybdis", "group"], "readOnly": false, "type": "string"}, "services.charybdis.motd": {"declarations": ["nixos/modules/services/networking/charybdis.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Charybdis MOTD text.\n\nCharybdis will read its MOTD from /etc/charybdis/ircd.motd .\nIf set, the value of this option will be written to this path.\n"}, "loc": ["services", "charybdis", "motd"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.charybdis.statedir": {"declarations": ["nixos/modules/services/networking/charybdis.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/charybdis\""}, "description": {"_type": "mdDoc", "text": "Location of the state directory of charybdis.\n"}, "loc": ["services", "charybdis", "statedir"], "readOnly": false, "type": "path"}, "services.charybdis.user": {"declarations": ["nixos/modules/services/networking/charybdis.nix"], "default": {"_type": "literalExpression", "text": "\"ircd\""}, "description": {"_type": "mdDoc", "text": "Charybdis IRC daemon user.\n"}, "loc": ["services", "charybdis", "user"], "readOnly": false, "type": "string"}, "services.chatgpt-retrieval-plugin.bearerTokenPath": {"declarations": ["nixos/modules/services/web-apps/chatgpt-retrieval-plugin.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Path to the secret bearer token used for the http api authentication.\n"}, "example": {"_type": "literalExpression", "text": "\"config.age.secrets.CHATGPT_RETRIEVAL_PLUGIN_BEARER_TOKEN.path\""}, "loc": ["services", "chatgpt-retrieval-plugin", "bearerTokenPath"], "readOnly": false, "type": "path"}, "services.chatgpt-retrieval-plugin.datastore": {"declarations": ["nixos/modules/services/web-apps/chatgpt-retrieval-plugin.nix"], "default": {"_type": "literalExpression", "text": "\"qdrant\""}, "description": {"_type": "mdDoc", "text": "This specifies the vector database provider you want to use to store and query embeddings."}, "loc": ["services", "chatgpt-retrieval-plugin", "datastore"], "readOnly": false, "type": "one of \"pinecone\", \"weaviate\", \"zilliz\", \"milvus\", \"qdrant\", \"redis\""}, "services.chatgpt-retrieval-plugin.enable": {"declarations": ["nixos/modules/services/web-apps/chatgpt-retrieval-plugin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable chatgpt-retrieval-plugin service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "chatgpt-retrieval-plugin", "enable"], "readOnly": false, "type": "boolean"}, "services.chatgpt-retrieval-plugin.host": {"declarations": ["nixos/modules/services/web-apps/chatgpt-retrieval-plugin.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The hostname or IP address for chatgpt-retrieval-plugin to bind to."}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "chatgpt-retrieval-plugin", "host"], "readOnly": false, "type": "string"}, "services.chatgpt-retrieval-plugin.openaiApiKeyPath": {"declarations": ["nixos/modules/services/web-apps/chatgpt-retrieval-plugin.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Path to the secret openai api key used for embeddings.\n"}, "example": {"_type": "literalExpression", "text": "\"config.age.secrets.CHATGPT_RETRIEVAL_PLUGIN_OPENAI_API_KEY.path\""}, "loc": ["services", "chatgpt-retrieval-plugin", "openaiApiKeyPath"], "readOnly": false, "type": "path"}, "services.chatgpt-retrieval-plugin.port": {"declarations": ["nixos/modules/services/web-apps/chatgpt-retrieval-plugin.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Port the chatgpt-retrieval-plugin service listens on."}, "loc": ["services", "chatgpt-retrieval-plugin", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.chatgpt-retrieval-plugin.qdrantCollection": {"declarations": ["nixos/modules/services/web-apps/chatgpt-retrieval-plugin.nix"], "default": {"_type": "literalExpression", "text": "\"document_chunks\""}, "description": {"_type": "mdDoc", "text": "name of the qdrant collection used to store documents.\n"}, "loc": ["services", "chatgpt-retrieval-plugin", "qdrantCollection"], "readOnly": false, "type": "string"}, "services.chisel-server.authfile": {"declarations": ["nixos/modules/services/networking/chisel-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to auth.json file"}, "loc": ["services", "chisel-server", "authfile"], "readOnly": false, "type": "null or path"}, "services.chisel-server.backend": {"declarations": ["nixos/modules/services/networking/chisel-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP server to proxy normal requests to"}, "example": {"_type": "literalExpression", "text": "\"http://127.0.0.1:8888\""}, "loc": ["services", "chisel-server", "backend"], "readOnly": false, "type": "null or string"}, "services.chisel-server.enable": {"declarations": ["nixos/modules/services/networking/chisel-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Chisel Tunnel Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "chisel-server", "enable"], "readOnly": false, "type": "boolean"}, "services.chisel-server.host": {"declarations": ["nixos/modules/services/networking/chisel-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to listen on, falls back to 0.0.0.0"}, "example": {"_type": "literalExpression", "text": "\"[::1]\""}, "loc": ["services", "chisel-server", "host"], "readOnly": false, "type": "null or string"}, "services.chisel-server.keepalive": {"declarations": ["nixos/modules/services/networking/chisel-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Keepalive interval, falls back to 25s"}, "example": {"_type": "literalExpression", "text": "\"5s\""}, "loc": ["services", "chisel-server", "keepalive"], "readOnly": false, "type": "null or string"}, "services.chisel-server.port": {"declarations": ["nixos/modules/services/networking/chisel-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to listen on, falls back to 8080"}, "loc": ["services", "chisel-server", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.chisel-server.reverse": {"declarations": ["nixos/modules/services/networking/chisel-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow clients reverse port forwarding"}, "loc": ["services", "chisel-server", "reverse"], "readOnly": false, "type": "boolean"}, "services.chisel-server.socks5": {"declarations": ["nixos/modules/services/networking/chisel-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow clients access to internal SOCKS5 proxy"}, "loc": ["services", "chisel-server", "socks5"], "readOnly": false, "type": "boolean"}, "services.chrony.directory": {"declarations": ["nixos/modules/services/networking/ntp/chrony.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/chrony\""}, "description": {"_type": "mdDoc", "text": "Directory where chrony state is stored."}, "loc": ["services", "chrony", "directory"], "readOnly": false, "type": "string"}, "services.chrony.enable": {"declarations": ["nixos/modules/services/networking/ntp/chrony.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to synchronise your machine's time using chrony.\nMake sure you disable NTP if you enable this service.\n"}, "loc": ["services", "chrony", "enable"], "readOnly": false, "type": "boolean"}, "services.chrony.enableNTS": {"declarations": ["nixos/modules/services/networking/ntp/chrony.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Network Time Security authentication.\nMake sure it is supported by your selected NTP server(s).\n"}, "loc": ["services", "chrony", "enableNTS"], "readOnly": false, "type": "boolean"}, "services.chrony.extraConfig": {"declarations": ["nixos/modules/services/networking/ntp/chrony.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration directives that should be added to\n`chrony.conf`\n"}, "loc": ["services", "chrony", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.chrony.extraFlags": {"declarations": ["nixos/modules/services/networking/ntp/chrony.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags passed to the chronyd command."}, "example": {"_type": "literalExpression", "text": "[\n  \"-s\"\n]"}, "loc": ["services", "chrony", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.chrony.initstepslew.enabled": {"declarations": ["nixos/modules/services/networking/ntp/chrony.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow chronyd to make a rapid measurement of the system clock error\nat boot time, and to correct the system clock by stepping before\nnormal operation begins.\n"}, "loc": ["services", "chrony", "initstepslew", "enabled"], "readOnly": false, "type": "boolean"}, "services.chrony.initstepslew.threshold": {"declarations": ["nixos/modules/services/networking/ntp/chrony.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "The threshold of system clock error (in seconds) above which the\nclock will be stepped. If the correction required is less than the\nthreshold, a slew is used instead.\n"}, "loc": ["services", "chrony", "initstepslew", "threshold"], "readOnly": false, "type": "floating point number or signed integer"}, "services.chrony.package": {"declarations": ["nixos/modules/services/networking/ntp/chrony.nix"], "default": {"_type": "literalExpression", "text": "pkgs.chrony"}, "description": {"_type": "mdDoc", "text": "Which chrony package to use.\n"}, "loc": ["services", "chrony", "package"], "readOnly": false, "type": "package"}, "services.chrony.serverOption": {"declarations": ["nixos/modules/services/networking/ntp/chrony.nix"], "default": {"_type": "literalExpression", "text": "\"iburst\""}, "description": {"_type": "mdDoc", "text": "Set option for server directives.\n\nUse \"iburst\" to rapidly poll on startup. Recommended if your machine\nis consistently online.\n\nUse \"offline\" to prevent polling on startup. Recommended if your\nmachine boots offline or is otherwise frequently offline.\n"}, "loc": ["services", "chrony", "serverOption"], "readOnly": false, "type": "one of \"iburst\", \"offline\""}, "services.chrony.servers": {"declarations": ["nixos/modules/services/networking/ntp/chrony.nix"], "default": {"_type": "literalExpression", "text": "config.networking.timeServers"}, "description": {"_type": "mdDoc", "text": "The set of NTP servers from which to synchronise.\n"}, "loc": ["services", "chrony", "servers"], "readOnly": false, "type": "list of string"}, "services.cinnamon.apps.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/cinnamon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Cinnamon default applications."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cinnamon", "apps", "enable"], "readOnly": false, "type": "boolean"}, "services.cjdns.ETHInterface.beacon": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Auto-connect to other cjdns nodes on the same network.\nOptions:\n  0: Disabled.\n  1: Accept beacons, this will cause cjdns to accept incoming\n     beacon messages and try connecting to the sender.\n  2: Accept and send beacons, this will cause cjdns to broadcast\n     messages on the local network which contain a randomly\n     generated per-session password, other nodes which have this\n     set to 1 or 2 will hear the beacon messages and connect\n     automatically.\n"}, "loc": ["services", "cjdns", "ETHInterface", "beacon"], "readOnly": false, "type": "signed integer"}, "services.cjdns.ETHInterface.bind": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Bind to this device for native ethernet operation.\n`all` is a pseudo-name which will try to connect to all devices.\n"}, "example": {"_type": "literalExpression", "text": "\"eth0\""}, "loc": ["services", "cjdns", "ETHInterface", "bind"], "readOnly": false, "type": "string"}, "services.cjdns.ETHInterface.connectTo": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Credentials for connecting look similar to UDP credientials\nexcept they begin with the mac address.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"01:02:03:04:05:06\" = {\n    hostname = \"homer.hype\";\n    password = \"5kG15EfpdcKNX3f2GSQ0H1HC7yIfxoCoImnO5FHM\";\n    publicKey = \"371zpkgs8ss387tmr81q04mp0hg1skb51hw34vk1cq644mjqhup0.k\";\n  };\n}\n"}, "loc": ["services", "cjdns", "ETHInterface", "connectTo"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.cjdns.ETHInterface.connectTo.<name>.hostname": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Optional hostname to add to /etc/hosts; prevents reverse lookup failures."}, "example": {"_type": "literalExpression", "text": "\"foobar.hype\""}, "loc": ["services", "cjdns", "ETHInterface", "connectTo", "<name>", "hostname"], "readOnly": false, "type": "string"}, "services.cjdns.ETHInterface.connectTo.<name>.login": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "(optional) name your peer has for you"}, "loc": ["services", "cjdns", "ETHInterface", "connectTo", "<name>", "login"], "readOnly": false, "type": "string"}, "services.cjdns.ETHInterface.connectTo.<name>.password": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "description": {"_type": "mdDoc", "text": "Authorized password to the opposite end of the tunnel."}, "loc": ["services", "cjdns", "ETHInterface", "connectTo", "<name>", "password"], "readOnly": false, "type": "string"}, "services.cjdns.ETHInterface.connectTo.<name>.peerName": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "(optional) human-readable name for peer"}, "loc": ["services", "cjdns", "ETHInterface", "connectTo", "<name>", "peerName"], "readOnly": false, "type": "string"}, "services.cjdns.ETHInterface.connectTo.<name>.publicKey": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "description": {"_type": "mdDoc", "text": "Public key at the opposite end of the tunnel."}, "loc": ["services", "cjdns", "ETHInterface", "connectTo", "<name>", "publicKey"], "readOnly": false, "type": "string"}, "services.cjdns.UDPInterface.bind": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Address and port to bind UDP tunnels to.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.1.32:43211\""}, "loc": ["services", "cjdns", "UDPInterface", "bind"], "readOnly": false, "type": "string"}, "services.cjdns.UDPInterface.connectTo": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Credentials for making UDP tunnels.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"192.168.1.1:27313\" = {\n    hostname = \"homer.hype\";\n    password = \"5kG15EfpdcKNX3f2GSQ0H1HC7yIfxoCoImnO5FHM\";\n    publicKey = \"371zpkgs8ss387tmr81q04mp0hg1skb51hw34vk1cq644mjqhup0.k\";\n  };\n}\n"}, "loc": ["services", "cjdns", "UDPInterface", "connectTo"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.cjdns.UDPInterface.connectTo.<name>.hostname": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Optional hostname to add to /etc/hosts; prevents reverse lookup failures."}, "example": {"_type": "literalExpression", "text": "\"foobar.hype\""}, "loc": ["services", "cjdns", "UDPInterface", "connectTo", "<name>", "hostname"], "readOnly": false, "type": "string"}, "services.cjdns.UDPInterface.connectTo.<name>.login": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "(optional) name your peer has for you"}, "loc": ["services", "cjdns", "UDPInterface", "connectTo", "<name>", "login"], "readOnly": false, "type": "string"}, "services.cjdns.UDPInterface.connectTo.<name>.password": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "description": {"_type": "mdDoc", "text": "Authorized password to the opposite end of the tunnel."}, "loc": ["services", "cjdns", "UDPInterface", "connectTo", "<name>", "password"], "readOnly": false, "type": "string"}, "services.cjdns.UDPInterface.connectTo.<name>.peerName": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "(optional) human-readable name for peer"}, "loc": ["services", "cjdns", "UDPInterface", "connectTo", "<name>", "peerName"], "readOnly": false, "type": "string"}, "services.cjdns.UDPInterface.connectTo.<name>.publicKey": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "description": {"_type": "mdDoc", "text": "Public key at the opposite end of the tunnel."}, "loc": ["services", "cjdns", "UDPInterface", "connectTo", "<name>", "publicKey"], "readOnly": false, "type": "string"}, "services.cjdns.addExtraHosts": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add cjdns peers with an associated hostname to\n{file}`/etc/hosts`.  Beware that enabling this\nincurs heavy eval-time costs.\n"}, "loc": ["services", "cjdns", "addExtraHosts"], "readOnly": false, "type": "boolean"}, "services.cjdns.admin.bind": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:11234\""}, "description": {"_type": "mdDoc", "text": "Bind the administration port to this address and port.\n"}, "loc": ["services", "cjdns", "admin", "bind"], "readOnly": false, "type": "string"}, "services.cjdns.authorizedPasswords": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Any remote cjdns nodes that offer these passwords on\nconnection will be allowed to route through this node.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"snyrfgkqsc98qh1y4s5hbu0j57xw5s0\"\n  \"z9md3t4p45mfrjzdjurxn4wuj0d8swv\"\n  \"49275fut6tmzu354pq70sr5b95qq0vj\"\n]"}, "loc": ["services", "cjdns", "authorizedPasswords"], "readOnly": false, "type": "list of string"}, "services.cjdns.confFile": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Ignore all other cjdns options and load configuration from this file.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/cjdroute.conf\""}, "loc": ["services", "cjdns", "confFile"], "readOnly": false, "type": "null or path"}, "services.cjdns.enable": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the cjdns network encryption\nand routing engine. A file at /etc/cjdns.keys will\nbe created if it does not exist to contain a random\nsecret key that your IPv6 address will be derived from.\n"}, "loc": ["services", "cjdns", "enable"], "readOnly": false, "type": "boolean"}, "services.cjdns.extraConfig": {"declarations": ["nixos/modules/services/networking/cjdns.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration, given as attrs, that will be merged recursively\nwith the rest of the JSON generated by this module, at the root node.\n"}, "example": {"_type": "literalExpression", "text": "{\n  router = {\n    interface = {\n      tunDevice = \"tun10\";\n    };\n  };\n}"}, "loc": ["services", "cjdns", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.clamav.daemon.enable": {"declarations": ["nixos/modules/services/security/clamav.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ClamAV clamd daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "clamav", "daemon", "enable"], "readOnly": false, "type": "boolean"}, "services.clamav.daemon.settings": {"declarations": ["nixos/modules/services/security/clamav.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "ClamAV configuration. Refer to <https://linux.die.net/man/5/clamd.conf>,\nfor details on supported values.\n"}, "loc": ["services", "clamav", "daemon", "settings"], "readOnly": false, "type": "attribute set of (boolean or signed integer or string or list of string)"}, "services.clamav.updater.enable": {"declarations": ["nixos/modules/services/security/clamav.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ClamAV freshclam updater."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "clamav", "updater", "enable"], "readOnly": false, "type": "boolean"}, "services.clamav.updater.frequency": {"declarations": ["nixos/modules/services/security/clamav.nix"], "default": {"_type": "literalExpression", "text": "12"}, "description": {"_type": "mdDoc", "text": "Number of database checks per day.\n"}, "loc": ["services", "clamav", "updater", "frequency"], "readOnly": false, "type": "signed integer"}, "services.clamav.updater.interval": {"declarations": ["nixos/modules/services/security/clamav.nix"], "default": {"_type": "literalExpression", "text": "\"hourly\""}, "description": {"_type": "mdDoc", "text": "How often freshclam is invoked. See systemd.time(7) for more\ninformation about the format.\n"}, "loc": ["services", "clamav", "updater", "interval"], "readOnly": false, "type": "string"}, "services.clamav.updater.settings": {"declarations": ["nixos/modules/services/security/clamav.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "freshclam configuration. Refer to <https://linux.die.net/man/5/freshclam.conf>,\nfor details on supported values.\n"}, "loc": ["services", "clamav", "updater", "settings"], "readOnly": false, "type": "attribute set of (boolean or signed integer or string or list of string)"}, "services.clamsmtp.enable": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable clamsmtp."}, "loc": ["services", "clamsmtp", "enable"], "readOnly": false, "type": "boolean"}, "services.clamsmtp.instances": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "description": {"_type": "mdDoc", "text": "Instances of clamsmtp to run."}, "loc": ["services", "clamsmtp", "instances"], "readOnly": false, "type": "list of (submodule)"}, "services.clamsmtp.instances.*.action": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "default": {"_type": "literalExpression", "text": "\"drop\""}, "description": {"_type": "mdDoc", "text": "Action to take when a virus is detected.\n\nNote that viruses often spoof sender addresses, so bouncing is\nin most cases not a good idea.\n"}, "loc": ["services", "clamsmtp", "instances", "*", "action"], "readOnly": false, "type": "one of \"bounce\", \"drop\", \"pass\""}, "services.clamsmtp.instances.*.header": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "A header to add to scanned messages. See clamsmtpd.conf(5) for\nmore details. Empty means no header.\n"}, "example": {"_type": "literalExpression", "text": "\"X-Virus-Scanned: ClamAV using ClamSMTP\""}, "loc": ["services", "clamsmtp", "instances", "*", "header"], "readOnly": false, "type": "string"}, "services.clamsmtp.instances.*.keepAlives": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Number of seconds to wait between each NOOP sent to the sending\nserver. 0 to disable.\n\nThis is meant for slow servers where the sending MTA times out\nwaiting for clamd to scan the file.\n"}, "loc": ["services", "clamsmtp", "instances", "*", "keepAlives"], "readOnly": false, "type": "signed integer"}, "services.clamsmtp.instances.*.listen": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "description": {"_type": "mdDoc", "text": "Address to wait for incoming SMTP connections on. See\nclamsmtpd.conf(5) for more details.\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1:10025\""}, "loc": ["services", "clamsmtp", "instances", "*", "listen"], "readOnly": false, "type": "string"}, "services.clamsmtp.instances.*.maxConnections": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "default": {"_type": "literalExpression", "text": "64"}, "description": {"_type": "mdDoc", "text": "Maximum number of connections to accept at once."}, "loc": ["services", "clamsmtp", "instances", "*", "maxConnections"], "readOnly": false, "type": "signed integer"}, "services.clamsmtp.instances.*.outAddress": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "description": {"_type": "mdDoc", "text": "Address of the SMTP server to send email to once it has been\nscanned.\n"}, "loc": ["services", "clamsmtp", "instances", "*", "outAddress"], "readOnly": false, "type": "string"}, "services.clamsmtp.instances.*.quarantine": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to quarantine files that contain viruses by leaving them\nin the temporary directory.\n"}, "loc": ["services", "clamsmtp", "instances", "*", "quarantine"], "readOnly": false, "type": "boolean"}, "services.clamsmtp.instances.*.tempDirectory": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "default": {"_type": "literalExpression", "text": "\"/tmp\""}, "description": {"_type": "mdDoc", "text": "Temporary directory that needs to be accessible to both clamd\nand clamsmtpd.\n"}, "loc": ["services", "clamsmtp", "instances", "*", "tempDirectory"], "readOnly": false, "type": "string"}, "services.clamsmtp.instances.*.timeout": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "default": {"_type": "literalExpression", "text": "180"}, "description": {"_type": "mdDoc", "text": "Time-out for network connections."}, "loc": ["services", "clamsmtp", "instances", "*", "timeout"], "readOnly": false, "type": "signed integer"}, "services.clamsmtp.instances.*.transparentProxy": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable clamsmtp's transparent proxy support."}, "loc": ["services", "clamsmtp", "instances", "*", "transparentProxy"], "readOnly": false, "type": "boolean"}, "services.clamsmtp.instances.*.virusAction": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Command to run when a virus is found. Please see VIRUS ACTION in\nclamsmtpd(8) for a discussion of this option and its safe use.\n"}, "loc": ["services", "clamsmtp", "instances", "*", "virusAction"], "readOnly": false, "type": "null or path"}, "services.clamsmtp.instances.*.xClient": {"declarations": ["nixos/modules/services/mail/clamsmtp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Send the XCLIENT command to the receiving server, for forwarding\nclient addresses and connection information if the receiving\nserver supports this feature.\n"}, "loc": ["services", "clamsmtp", "instances", "*", "xClient"], "readOnly": false, "type": "boolean"}, "services.clickhouse.enable": {"declarations": ["nixos/modules/services/databases/clickhouse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ClickHouse database server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "clickhouse", "enable"], "readOnly": false, "type": "boolean"}, "services.clickhouse.package": {"declarations": ["nixos/modules/services/databases/clickhouse.nix"], "default": {"_type": "literalExpression", "text": "pkgs.clickhouse"}, "description": {"_type": "mdDoc", "text": "ClickHouse package to use.\n"}, "loc": ["services", "clickhouse", "package"], "readOnly": false, "type": "package"}, "services.clight.enable": {"declarations": ["nixos/modules/services/x11/clight.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable clight."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "clight", "enable"], "readOnly": false, "type": "boolean"}, "services.clight.settings": {"declarations": ["nixos/modules/services/x11/clight.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional configuration to extend clight.conf. See\n<https://github.com/FedeDP/Clight/blob/master/Extra/clight.conf> for a\nsample configuration file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ac_capture_timeouts = [\n    120\n    300\n    60\n  ];\n  captures = 20;\n  gamma_long_transition = true;\n}"}, "loc": ["services", "clight", "settings"], "readOnly": false, "type": "attribute set of (null or signed integer or string or boolean or floating point number or list of (signed integer or string or boolean or floating point number) or attribute set of (signed integer or string or boolean or floating point number or list of (signed integer or string or boolean or floating point number)))"}, "services.clight.temperature.day": {"declarations": ["nixos/modules/services/x11/clight.nix"], "default": {"_type": "literalExpression", "text": "5500"}, "description": {"_type": "mdDoc", "text": "Colour temperature to use during the day, between\n`1000` and `25000` K.\n"}, "loc": ["services", "clight", "temperature", "day"], "readOnly": false, "type": "signed integer"}, "services.clight.temperature.night": {"declarations": ["nixos/modules/services/x11/clight.nix"], "default": {"_type": "literalExpression", "text": "3700"}, "description": {"_type": "mdDoc", "text": "Colour temperature to use at night, between\n`1000` and `25000` K.\n"}, "loc": ["services", "clight", "temperature", "night"], "readOnly": false, "type": "signed integer"}, "services.clipcat.enable": {"declarations": ["nixos/modules/services/misc/clipcat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Clipcat clipboard daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "clipcat", "enable"], "readOnly": false, "type": "boolean"}, "services.clipcat.package": {"declarations": ["nixos/modules/services/misc/clipcat.nix"], "default": {"_type": "literalExpression", "text": "pkgs.clipcat"}, "description": {"_type": "mdDoc", "text": "clipcat derivation to use."}, "loc": ["services", "clipcat", "package"], "readOnly": false, "type": "package"}, "services.clipmenu.enable": {"declarations": ["nixos/modules/services/misc/clipmenu.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable clipmenu, the clipboard management daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "clipmenu", "enable"], "readOnly": false, "type": "boolean"}, "services.clipmenu.package": {"declarations": ["nixos/modules/services/misc/clipmenu.nix"], "default": {"_type": "literalExpression", "text": "pkgs.clipmenu"}, "description": {"_type": "mdDoc", "text": "clipmenu derivation to use."}, "loc": ["services", "clipmenu", "package"], "readOnly": false, "type": "package"}, "services.cloud-init.btrfs.enable": {"declarations": ["nixos/modules/services/system/cloud-init.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow the cloud-init service to operate `btrfs` filesystem.\n"}, "loc": ["services", "cloud-init", "btrfs", "enable"], "readOnly": false, "type": "boolean"}, "services.cloud-init.config": {"declarations": ["nixos/modules/services/system/cloud-init.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "raw cloud-init configuration.\n\nTakes precedence over the `settings` option if set.\n"}, "loc": ["services", "cloud-init", "config"], "readOnly": false, "type": "string"}, "services.cloud-init.enable": {"declarations": ["nixos/modules/services/system/cloud-init.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the cloud-init service. This services reads\nconfiguration metadata in a cloud environment and configures\nthe machine according to this metadata.\n\nThis configuration is not completely compatible with the\nNixOS way of doing configuration, as configuration done by\ncloud-init might be overridden by a subsequent nixos-rebuild\ncall. However, some parts of cloud-init fall outside of\nNixOS's responsibility, like filesystem resizing and ssh\npublic key provisioning, and cloud-init is useful for that\nparts. Thus, be wary that using cloud-init in NixOS might\ncome as some cost.\n"}, "loc": ["services", "cloud-init", "enable"], "readOnly": false, "type": "boolean"}, "services.cloud-init.ext4.enable": {"declarations": ["nixos/modules/services/system/cloud-init.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow the cloud-init service to operate `ext4` filesystem.\n"}, "loc": ["services", "cloud-init", "ext4", "enable"], "readOnly": false, "type": "boolean"}, "services.cloud-init.network.enable": {"declarations": ["nixos/modules/services/system/cloud-init.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow the cloud-init service to configure network interfaces\nthrough systemd-networkd.\n"}, "loc": ["services", "cloud-init", "network", "enable"], "readOnly": false, "type": "boolean"}, "services.cloud-init.settings": {"declarations": ["nixos/modules/services/system/cloud-init.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Structured cloud-init configuration.\n"}, "loc": ["services", "cloud-init", "settings"], "readOnly": false, "type": "YAML value"}, "services.cloudflare-dyndns.apiTokenFile": {"declarations": ["nixos/modules/services/networking/cloudflare-dyndns.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to a file containing the CloudFlare API token.\n\nThe file must have the form `CLOUDFLARE_API_TOKEN=...`\n"}, "loc": ["services", "cloudflare-dyndns", "apiTokenFile"], "readOnly": false, "type": "null or string"}, "services.cloudflare-dyndns.deleteMissing": {"declarations": ["nixos/modules/services/networking/cloudflare-dyndns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to delete the record when no IP address is found.\n"}, "loc": ["services", "cloudflare-dyndns", "deleteMissing"], "readOnly": false, "type": "boolean"}, "services.cloudflare-dyndns.domains": {"declarations": ["nixos/modules/services/networking/cloudflare-dyndns.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of domain names to update records for.\n"}, "loc": ["services", "cloudflare-dyndns", "domains"], "readOnly": false, "type": "list of string"}, "services.cloudflare-dyndns.enable": {"declarations": ["nixos/modules/services/networking/cloudflare-dyndns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Cloudflare Dynamic DNS Client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cloudflare-dyndns", "enable"], "readOnly": false, "type": "boolean"}, "services.cloudflare-dyndns.ipv4": {"declarations": ["nixos/modules/services/networking/cloudflare-dyndns.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable setting IPv4 A records.\n"}, "loc": ["services", "cloudflare-dyndns", "ipv4"], "readOnly": false, "type": "boolean"}, "services.cloudflare-dyndns.ipv6": {"declarations": ["nixos/modules/services/networking/cloudflare-dyndns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable setting IPv6 AAAA records.\n"}, "loc": ["services", "cloudflare-dyndns", "ipv6"], "readOnly": false, "type": "boolean"}, "services.cloudflare-dyndns.proxied": {"declarations": ["nixos/modules/services/networking/cloudflare-dyndns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether this is a DNS-only record, or also being proxied through CloudFlare.\n"}, "loc": ["services", "cloudflare-dyndns", "proxied"], "readOnly": false, "type": "boolean"}, "services.cloudflared.enable": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Cloudflare Tunnel client daemon (formerly Argo Tunnel)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cloudflared", "enable"], "readOnly": false, "type": "boolean"}, "services.cloudflared.group": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "\"cloudflared\""}, "description": {"_type": "mdDoc", "text": "Group under which cloudflared runs."}, "loc": ["services", "cloudflared", "group"], "readOnly": false, "type": "string"}, "services.cloudflared.package": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "\"pkgs.cloudflared\""}, "description": {"_type": "mdDoc", "text": "The package to use for Cloudflared."}, "loc": ["services", "cloudflared", "package"], "readOnly": false, "type": "package"}, "services.cloudflared.tunnels": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Cloudflare tunnels.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"00000000-0000-0000-0000-000000000000\" = {\n    credentialsFile = \"/tmp/test\";\n    default = \"http_status:404\";\n    ingress = {\n      \"*.domain1.com\" = {\n        service = \"http://localhost:80\";\n      };\n    };\n  };\n}"}, "loc": ["services", "cloudflared", "tunnels"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.cloudflared.tunnels.<name>.credentialsFile": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "description": {"_type": "mdDoc", "text": "Credential file.\n\nSee [https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/install-and-setup/tunnel-useful-terms/#credentials-file](Credentials file).\n"}, "loc": ["services", "cloudflared", "tunnels", "<name>", "credentialsFile"], "readOnly": false, "type": "string"}, "services.cloudflared.tunnels.<name>.default": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "description": {"_type": "mdDoc", "text": "Catch-all service if no ingress matches.\n\nSee `service`.\n"}, "example": {"_type": "literalExpression", "text": "\"http_status:404\""}, "loc": ["services", "cloudflared", "tunnels", "<name>", "default"], "readOnly": false, "type": "string"}, "services.cloudflared.tunnels.<name>.ingress": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Ingress rules.\n\nSee [https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/configuration/local-management/ingress/](Ingress rules).\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"*.anotherone.com\" = \"http://localhost:80\";\n  \"*.domain.com\" = \"http://localhost:80\";\n}"}, "loc": ["services", "cloudflared", "tunnels", "<name>", "ingress"], "readOnly": false, "type": "attribute set of (string or (submodule))"}, "services.cloudflared.tunnels.<name>.originRequest.caPool": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the certificate authority (CA) for the certificate of your origin. This option should be used only if your certificate is not signed by Cloudflare.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "caPool"], "readOnly": false, "type": "null or string or path"}, "services.cloudflared.tunnels.<name>.originRequest.connectTimeout": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Timeout for establishing a new TCP connection to your origin server. This excludes the time taken to establish TLS, which is controlled by [https://developers.cloudflare.com/cloudflare-one/connections/connect-apps/configuration/local-management/ingress/#tlstimeout](tlsTimeout).\n"}, "example": {"_type": "literalExpression", "text": "\"30s\""}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "connectTimeout"], "readOnly": false, "type": "null or string"}, "services.cloudflared.tunnels.<name>.originRequest.disableChunkedEncoding": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disables chunked transfer encoding. Useful if you are running a WSGI server.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "disableChunkedEncoding"], "readOnly": false, "type": "null or boolean"}, "services.cloudflared.tunnels.<name>.originRequest.httpHostHeader": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the HTTP `Host` header on requests sent to the local service.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "httpHostHeader"], "readOnly": false, "type": "null or string"}, "services.cloudflared.tunnels.<name>.originRequest.keepAliveConnections": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum number of idle keepalive connections between Tunnel and your origin. This does not restrict the total number of concurrent connections.\n"}, "example": {"_type": "literalExpression", "text": "100"}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "keepAliveConnections"], "readOnly": false, "type": "null or signed integer"}, "services.cloudflared.tunnels.<name>.originRequest.keepAliveTimeout": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Timeout after which an idle keepalive connection can be discarded.\n"}, "example": {"_type": "literalExpression", "text": "\"1m30s\""}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "keepAliveTimeout"], "readOnly": false, "type": "null or string"}, "services.cloudflared.tunnels.<name>.originRequest.noHappyEyeballs": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable the \u201chappy eyeballs\u201d algorithm for IPv4/IPv6 fallback if your local network has misconfigured one of the protocols.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "noHappyEyeballs"], "readOnly": false, "type": "null or boolean"}, "services.cloudflared.tunnels.<name>.originRequest.noTLSVerify": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disables TLS verification of the certificate presented by your origin. Will allow any certificate from the origin to be accepted.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "noTLSVerify"], "readOnly": false, "type": "null or boolean"}, "services.cloudflared.tunnels.<name>.originRequest.originServerName": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hostname that `cloudflared` should expect from your origin server certificate.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "originServerName"], "readOnly": false, "type": "null or string"}, "services.cloudflared.tunnels.<name>.originRequest.proxyAddress": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "`cloudflared` starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen address for that proxy.\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "proxyAddress"], "readOnly": false, "type": "null or string"}, "services.cloudflared.tunnels.<name>.originRequest.proxyPort": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "`cloudflared` starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures the listen port for that proxy. If set to zero, an unused port will randomly be chosen.\n"}, "example": {"_type": "literalExpression", "text": "0"}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "proxyPort"], "readOnly": false, "type": "null or signed integer"}, "services.cloudflared.tunnels.<name>.originRequest.proxyType": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "`cloudflared` starts a proxy server to translate HTTP traffic into TCP when proxying, for example, SSH or RDP. This configures what type of proxy will be started. Valid options are:\n\n- `\"\"` for the regular proxy\n- `\"socks\"` for a SOCKS5 proxy. Refer to the [https://developers.cloudflare.com/cloudflare-one/tutorials/kubectl/](tutorial on connecting through Cloudflare Access using kubectl) for more information.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "proxyType"], "readOnly": false, "type": "null or one of \"\", \"socks\""}, "services.cloudflared.tunnels.<name>.originRequest.tcpKeepAlive": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The timeout after which a TCP keepalive packet is sent on a connection between Tunnel and the origin server.\n"}, "example": {"_type": "literalExpression", "text": "\"30s\""}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "tcpKeepAlive"], "readOnly": false, "type": "null or string"}, "services.cloudflared.tunnels.<name>.originRequest.tlsTimeout": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Timeout for completing a TLS handshake to your origin server, if you have chosen to connect Tunnel to an HTTPS server.\n"}, "example": {"_type": "literalExpression", "text": "\"10s\""}, "loc": ["services", "cloudflared", "tunnels", "<name>", "originRequest", "tlsTimeout"], "readOnly": false, "type": "null or string"}, "services.cloudflared.tunnels.<name>.warp-routing.enabled": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Enable warp routing.\n\nSee [https://developers.cloudflare.com/cloudflare-one/tutorials/warp-to-tunnel/](Connect from WARP to a private network on Cloudflare using Cloudflare Tunnel).\n"}, "loc": ["services", "cloudflared", "tunnels", "<name>", "warp-routing", "enabled"], "readOnly": false, "type": "null or boolean"}, "services.cloudflared.user": {"declarations": ["nixos/modules/services/networking/cloudflared.nix"], "default": {"_type": "literalExpression", "text": "\"cloudflared\""}, "description": {"_type": "mdDoc", "text": "User account under which Cloudflared runs."}, "loc": ["services", "cloudflared", "user"], "readOnly": false, "type": "string"}, "services.cloudlog.baseUrl": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost\""}, "description": {"_type": "mdDoc", "text": "Cloudlog base URL"}, "loc": ["services", "cloudlog", "baseUrl"], "readOnly": false, "type": "string"}, "services.cloudlog.dataDir": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/cloudlog\""}, "description": {"_type": "mdDoc", "text": "Cloudlog data directory."}, "loc": ["services", "cloudlog", "dataDir"], "readOnly": false, "type": "string"}, "services.cloudlog.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally."}, "loc": ["services", "cloudlog", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.cloudlog.database.host": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "MySQL database host"}, "loc": ["services", "cloudlog", "database", "host"], "readOnly": false, "type": "string"}, "services.cloudlog.database.name": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"cloudlog\""}, "description": {"_type": "mdDoc", "text": "MySQL database name."}, "loc": ["services", "cloudlog", "database", "name"], "readOnly": false, "type": "string"}, "services.cloudlog.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "MySQL user password file."}, "loc": ["services", "cloudlog", "database", "passwordFile"], "readOnly": false, "type": "null or string"}, "services.cloudlog.database.user": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"cloudlog\""}, "description": {"_type": "mdDoc", "text": "MySQL user name."}, "loc": ["services", "cloudlog", "database", "user"], "readOnly": false, "type": "string"}, "services.cloudlog.enable": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Whether to enable Cloudlog."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cloudlog", "enable"], "readOnly": false, "type": "boolean"}, "services.cloudlog.extraConfig": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Any additional text to be appended to the config.php\nconfiguration file. This is a PHP script. For configuration\nsettings, see <https://github.com/magicbug/Cloudlog/wiki/Cloudlog.php-Configuration-File>.\n"}, "example": {"_type": "literalExpression", "text": "''\n  $config['show_time'] = TRUE;\n''"}, "loc": ["services", "cloudlog", "extraConfig"], "readOnly": false, "type": "string"}, "services.cloudlog.poolConfig": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = 32;\n  \"pm.max_requests\" = 500;\n  \"pm.max_spare_servers\" = 4;\n  \"pm.min_spare_servers\" = 2;\n  \"pm.start_servers\" = 2;\n}"}, "description": {"_type": "mdDoc", "text": "Options for Cloudlog's PHP-FPM pool.\n"}, "loc": ["services", "cloudlog", "poolConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.cloudlog.update-clublog-scp.enable": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to periodically update the Clublog SCP database. If enabled,\na systemd timer will run the update task as specified by the interval\noption.\n"}, "loc": ["services", "cloudlog", "update-clublog-scp", "enable"], "readOnly": false, "type": "boolean"}, "services.cloudlog.update-clublog-scp.interval": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"monthly\""}, "description": {"_type": "mdDoc", "text": "Specification (in the format described by systemd.time(7)) of the time\nat which the Clublog SCP update will occur.\n"}, "loc": ["services", "cloudlog", "update-clublog-scp", "interval"], "readOnly": false, "type": "string"}, "services.cloudlog.update-dok.enable": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to periodically update the DOK resource file. If enabled, a\nsystemd timer will run the update task as specified by the interval option.\n"}, "loc": ["services", "cloudlog", "update-dok", "enable"], "readOnly": false, "type": "boolean"}, "services.cloudlog.update-dok.interval": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"monthly\""}, "description": {"_type": "mdDoc", "text": "Specification (in the format described by systemd.time(7)) of the\ntime at which the DOK update will occur.\n"}, "loc": ["services", "cloudlog", "update-dok", "interval"], "readOnly": false, "type": "string"}, "services.cloudlog.update-lotw-users.enable": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to periodically update the list of LoTW users. If enabled, a\nsystemd timer will run the update task as specified by the interval\noption.\n"}, "loc": ["services", "cloudlog", "update-lotw-users", "enable"], "readOnly": false, "type": "boolean"}, "services.cloudlog.update-lotw-users.interval": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"weekly\""}, "description": {"_type": "mdDoc", "text": "Specification (in the format described by systemd.time(7)) of the\ntime at which the LoTW user update will occur.\n"}, "loc": ["services", "cloudlog", "update-lotw-users", "interval"], "readOnly": false, "type": "string"}, "services.cloudlog.update-sota.enable": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to periodically update the SOTA database. If enabled, a\nsystemd timer will run the update task as specified by the interval option.\n"}, "loc": ["services", "cloudlog", "update-sota", "enable"], "readOnly": false, "type": "boolean"}, "services.cloudlog.update-sota.interval": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"monthly\""}, "description": {"_type": "mdDoc", "text": "Specification (in the format described by systemd.time(7)) of the time\nat which the SOTA update will occur.\n"}, "loc": ["services", "cloudlog", "update-sota", "interval"], "readOnly": false, "type": "string"}, "services.cloudlog.update-wwff.enable": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to periodically update the WWFF database. If enabled, a\nsystemd timer will run the update task as specified by the interval\noption.\n"}, "loc": ["services", "cloudlog", "update-wwff", "enable"], "readOnly": false, "type": "boolean"}, "services.cloudlog.update-wwff.interval": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"monthly\""}, "description": {"_type": "mdDoc", "text": "Specification (in the format described by systemd.time(7)) of the time\nat which the WWFF update will occur.\n"}, "loc": ["services", "cloudlog", "update-wwff", "interval"], "readOnly": false, "type": "string"}, "services.cloudlog.upload-clublog.enable": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to periodically upload logs to Clublog. If enabled, a systemd\ntimer will run the log upload task as specified by the interval option.\n"}, "loc": ["services", "cloudlog", "upload-clublog", "enable"], "readOnly": false, "type": "boolean"}, "services.cloudlog.upload-clublog.interval": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"daily\""}, "description": {"_type": "mdDoc", "text": "Specification (in the format described by systemd.time(7)) of the time\nat which the Clublog upload will occur.\n"}, "loc": ["services", "cloudlog", "upload-clublog", "interval"], "readOnly": false, "type": "string"}, "services.cloudlog.upload-lotw.enable": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to periodically upload logs to LoTW. If enabled, a systemd\ntimer will run the log upload task as specified by the interval\n option.\n"}, "loc": ["services", "cloudlog", "upload-lotw", "enable"], "readOnly": false, "type": "boolean"}, "services.cloudlog.upload-lotw.interval": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"daily\""}, "description": {"_type": "mdDoc", "text": "Specification (in the format described by systemd.time(7)) of the\ntime at which the LoTW upload will occur.\n"}, "loc": ["services", "cloudlog", "upload-lotw", "interval"], "readOnly": false, "type": "string"}, "services.cloudlog.upload-qrz.enable": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to periodically upload logs to QRZ. If enabled, a systemd\ntimer will run the update task as specified by the interval option.\n"}, "loc": ["services", "cloudlog", "upload-qrz", "enable"], "readOnly": false, "type": "boolean"}, "services.cloudlog.upload-qrz.interval": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"daily\""}, "description": {"_type": "mdDoc", "text": "Specification (in the format described by systemd.time(7)) of the\ntime at which the QRZ upload will occur.\n"}, "loc": ["services", "cloudlog", "upload-qrz", "interval"], "readOnly": false, "type": "string"}, "services.cloudlog.user": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"cloudlog\""}, "description": {"_type": "mdDoc", "text": "User account under which Cloudlog runs."}, "loc": ["services", "cloudlog", "user"], "readOnly": false, "type": "string"}, "services.cloudlog.virtualHost": {"declarations": ["nixos/modules/services/web-apps/cloudlog.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Name of the nginx virtualhost to use and setup. If null, do not setup\n any virtualhost.\n"}, "loc": ["services", "cloudlog", "virtualHost"], "readOnly": false, "type": "null or string"}, "services.cntlm.configText": {"declarations": ["nixos/modules/services/networking/cntlm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim contents of {file}`cntlm.conf`."}, "loc": ["services", "cntlm", "configText"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.cntlm.domain": {"declarations": ["nixos/modules/services/networking/cntlm.nix"], "description": {"_type": "mdDoc", "text": "Proxy account domain/workgroup name."}, "loc": ["services", "cntlm", "domain"], "readOnly": false, "type": "string"}, "services.cntlm.enable": {"declarations": ["nixos/modules/services/networking/cntlm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable cntlm, which starts a local proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cntlm", "enable"], "readOnly": false, "type": "boolean"}, "services.cntlm.extraConfig": {"declarations": ["nixos/modules/services/networking/cntlm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional config appended to the end of the generated {file}`cntlm.conf`."}, "loc": ["services", "cntlm", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.cntlm.netbios_hostname": {"declarations": ["nixos/modules/services/networking/cntlm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The hostname of your machine.\n"}, "loc": ["services", "cntlm", "netbios_hostname"], "readOnly": false, "type": "string"}, "services.cntlm.noproxy": {"declarations": ["nixos/modules/services/networking/cntlm.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of domains where the proxy is skipped.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"*.example.com\"\n  \"example.com\"\n]"}, "loc": ["services", "cntlm", "noproxy"], "readOnly": false, "type": "list of string"}, "services.cntlm.password": {"declarations": ["nixos/modules/services/networking/cntlm.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/cntlm.password\""}, "description": {"_type": "mdDoc", "text": "Proxy account password. Note: use chmod 0600 on /etc/cntlm.password for security."}, "loc": ["services", "cntlm", "password"], "readOnly": false, "type": "string"}, "services.cntlm.port": {"declarations": ["nixos/modules/services/networking/cntlm.nix"], "default": {"_type": "literalExpression", "text": "[\n  3128\n]"}, "description": {"_type": "mdDoc", "text": "Specifies on which ports the cntlm daemon listens."}, "loc": ["services", "cntlm", "port"], "readOnly": false, "type": "list of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.cntlm.proxy": {"declarations": ["nixos/modules/services/networking/cntlm.nix"], "description": {"_type": "mdDoc", "text": "A list of NTLM/NTLMv2 authenticating HTTP proxies.\n\nParent proxy, which requires authentication. The same as proxy on the command-line, can be used more than  once  to  specify  unlimited\nnumber  of  proxies.  Should  one proxy fail, cntlm automatically moves on to the next one. The connect request fails only if the whole\nlist of proxies is scanned and (for each request) and found to be invalid. Command-line takes precedence over the configuration file.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"proxy.example.com:81\"\n]"}, "loc": ["services", "cntlm", "proxy"], "readOnly": false, "type": "list of string"}, "services.cntlm.username": {"declarations": ["nixos/modules/services/networking/cntlm.nix"], "description": {"_type": "mdDoc", "text": "Proxy account name, without the possibility to include domain name ('at' sign is interpreted literally).\n"}, "loc": ["services", "cntlm", "username"], "readOnly": false, "type": "string"}, "services.cockpit.enable": {"declarations": ["nixos/modules/services/monitoring/cockpit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Cockpit."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cockpit", "enable"], "readOnly": false, "type": "boolean"}, "services.cockpit.openFirewall": {"declarations": ["nixos/modules/services/monitoring/cockpit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port for cockpit."}, "loc": ["services", "cockpit", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.cockpit.package": {"declarations": ["nixos/modules/services/monitoring/cockpit.nix"], "default": {"_type": "literalExpression", "text": "pkgs.cockpit"}, "description": {"_type": "mdDoc", "text": "The Cockpit package to use."}, "loc": ["services", "cockpit", "package"], "readOnly": false, "type": "package"}, "services.cockpit.port": {"declarations": ["nixos/modules/services/monitoring/cockpit.nix"], "default": {"_type": "literalExpression", "text": "9090"}, "description": {"_type": "mdDoc", "text": "Port where cockpit will listen."}, "loc": ["services", "cockpit", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.cockpit.settings": {"declarations": ["nixos/modules/services/monitoring/cockpit.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings for cockpit that will be saved in /etc/cockpit/cockpit.conf.\n\nSee the [documentation](https://cockpit-project.org/guide/latest/cockpit.conf.5.html), that is also available with `man cockpit.conf.5` for details.\n"}, "loc": ["services", "cockpit", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.cockroachdb.cache": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "\"25%\""}, "description": {"_type": "mdDoc", "text": "The total size for caches.\n\nThis can be a percentage, expressed with a fraction sign or as a\ndecimal-point number, or any bytes-based unit. For example,\n`\"25%\"`, `\"0.25\"` both represent\n25% of the available system memory. The values\n`\"1000000000\"` and `\"1GB\"` both\nrepresent 1 gigabyte of memory.\n\n"}, "loc": ["services", "cockroachdb", "cache"], "readOnly": false, "type": "string"}, "services.cockroachdb.certsDir": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the certificate directory."}, "loc": ["services", "cockroachdb", "certsDir"], "readOnly": false, "type": "null or path"}, "services.cockroachdb.enable": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable CockroachDB Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cockroachdb", "enable"], "readOnly": false, "type": "boolean"}, "services.cockroachdb.extraArgs": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra CLI arguments passed to {command}`cockroach start`.\nFor the full list of supported arguments, check <https://www.cockroachlabs.com/docs/stable/cockroach-start.html#flags>\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--advertise-addr\"\n  \"[fe80::f6f2:::]\"\n]"}, "loc": ["services", "cockroachdb", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.cockroachdb.group": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "\"cockroachdb\""}, "description": {"_type": "mdDoc", "text": "User account under which CockroachDB runs"}, "loc": ["services", "cockroachdb", "group"], "readOnly": false, "type": "string"}, "services.cockroachdb.http.address": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for http-based Admin UI"}, "loc": ["services", "cockroachdb", "http", "address"], "readOnly": false, "type": "string"}, "services.cockroachdb.http.port": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Port to bind to for http-based Admin UI"}, "loc": ["services", "cockroachdb", "http", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.cockroachdb.insecure": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Run in insecure mode."}, "loc": ["services", "cockroachdb", "insecure"], "readOnly": false, "type": "boolean"}, "services.cockroachdb.join": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The addresses for connecting the node to a cluster."}, "loc": ["services", "cockroachdb", "join"], "readOnly": false, "type": "null or string"}, "services.cockroachdb.listen.address": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for intra-cluster communication"}, "loc": ["services", "cockroachdb", "listen", "address"], "readOnly": false, "type": "string"}, "services.cockroachdb.listen.port": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "26257"}, "description": {"_type": "mdDoc", "text": "Port to bind to for intra-cluster communication"}, "loc": ["services", "cockroachdb", "listen", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.cockroachdb.locality": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "An ordered, comma-separated list of key-value pairs that describe the\ntopography of the machine. Topography might include country,\ndatacenter or rack designations. Data is automatically replicated to\nmaximize diversities of each tier. The order of tiers is used to\ndetermine the priority of the diversity, so the more inclusive\nlocalities like country should come before less inclusive localities\nlike datacenter.  The tiers and order must be the same on all nodes.\nIncluding more tiers is better than including fewer. For example:\n\n```\n    country=us,region=us-west,datacenter=us-west-1b,rack=12\n    country=ca,region=ca-east,datacenter=ca-east-2,rack=4\n\n    planet=earth,province=manitoba,colo=secondary,power=3\n```\n"}, "loc": ["services", "cockroachdb", "locality"], "readOnly": false, "type": "null or string"}, "services.cockroachdb.maxSqlMemory": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "\"25%\""}, "description": {"_type": "mdDoc", "text": "The maximum in-memory storage capacity available to store temporary\ndata for SQL queries.\n\nThis can be a percentage, expressed with a fraction sign or as a\ndecimal-point number, or any bytes-based unit. For example,\n`\"25%\"`, `\"0.25\"` both represent\n25% of the available system memory. The values\n`\"1000000000\"` and `\"1GB\"` both\nrepresent 1 gigabyte of memory.\n"}, "loc": ["services", "cockroachdb", "maxSqlMemory"], "readOnly": false, "type": "string"}, "services.cockroachdb.openPorts": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open firewall ports for cluster communication by default"}, "loc": ["services", "cockroachdb", "openPorts"], "readOnly": false, "type": "boolean"}, "services.cockroachdb.package": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "pkgs.cockroachdb"}, "description": {"_type": "mdDoc", "text": "The CockroachDB derivation to use for running the service.\n\nThis would primarily be useful to enable Enterprise Edition features\nin your own custom CockroachDB build (Nixpkgs CockroachDB binaries\nonly contain open source features and open source code).\n"}, "loc": ["services", "cockroachdb", "package"], "readOnly": false, "type": "package"}, "services.cockroachdb.user": {"declarations": ["nixos/modules/services/databases/cockroachdb.nix"], "default": {"_type": "literalExpression", "text": "\"cockroachdb\""}, "description": {"_type": "mdDoc", "text": "User account under which CockroachDB runs"}, "loc": ["services", "cockroachdb", "user"], "readOnly": false, "type": "string"}, "services.code-server.auth": {"declarations": ["nixos/modules/services/web-apps/code-server.nix"], "default": {"_type": "literalExpression", "text": "\"password\""}, "description": {"_type": "mdDoc", "text": "The type of authentication to use."}, "loc": ["services", "code-server", "auth"], "readOnly": false, "type": "one of \"none\", \"password\""}, "services.code-server.enable": {"declarations": ["nixos/modules/services/web-apps/code-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable code-server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "code-server", "enable"], "readOnly": false, "type": "boolean"}, "services.code-server.extraArguments": {"declarations": ["nixos/modules/services/web-apps/code-server.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"--disable-telemetry\"\n]"}, "description": {"_type": "mdDoc", "text": "Additional arguments that passed to code-server"}, "example": {"_type": "literalExpression", "text": "\"[ \\\"--verbose\\\" ]\""}, "loc": ["services", "code-server", "extraArguments"], "readOnly": false, "type": "list of string"}, "services.code-server.extraEnvironment": {"declarations": ["nixos/modules/services/web-apps/code-server.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional environment variables to passed to code-server."}, "example": {"_type": "literalExpression", "text": "{\n  PKG_CONFIG_PATH = \"/run/current-system/sw/lib/pkgconfig\";\n}"}, "loc": ["services", "code-server", "extraEnvironment"], "readOnly": false, "type": "attribute set of string"}, "services.code-server.extraGroups": {"declarations": ["nixos/modules/services/web-apps/code-server.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An array of additional groups for the `code-server` user."}, "example": {"_type": "literalExpression", "text": "[\n  \"docker\"\n]"}, "loc": ["services", "code-server", "extraGroups"], "readOnly": false, "type": "list of string"}, "services.code-server.extraPackages": {"declarations": ["nixos/modules/services/web-apps/code-server.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages that are available in the PATH of code-server."}, "example": {"_type": "literalExpression", "text": "\"[ pkgs.go ]\""}, "loc": ["services", "code-server", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.code-server.group": {"declarations": ["nixos/modules/services/web-apps/code-server.nix"], "default": {"_type": "literalExpression", "text": "\"code-server\""}, "description": {"_type": "mdDoc", "text": "The group to run code-server under.\nBy default, a group named `code-server` will be created.\n"}, "example": {"_type": "literalExpression", "text": "\"yourGroup\""}, "loc": ["services", "code-server", "group"], "readOnly": false, "type": "string"}, "services.code-server.hashedPassword": {"declarations": ["nixos/modules/services/web-apps/code-server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Create the password with: `echo -n 'thisismypassword' | npx argon2-cli -e`."}, "loc": ["services", "code-server", "hashedPassword"], "readOnly": false, "type": "string"}, "services.code-server.host": {"declarations": ["nixos/modules/services/web-apps/code-server.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The host-ip to bind to."}, "loc": ["services", "code-server", "host"], "readOnly": false, "type": "string"}, "services.code-server.package": {"declarations": ["nixos/modules/services/web-apps/code-server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.code-server"}, "description": {"_type": "mdDoc", "text": "Which code-server derivation to use."}, "loc": ["services", "code-server", "package"], "readOnly": false, "type": "package"}, "services.code-server.port": {"declarations": ["nixos/modules/services/web-apps/code-server.nix"], "default": {"_type": "literalExpression", "text": "4444"}, "description": {"_type": "mdDoc", "text": "The port where code-server runs."}, "loc": ["services", "code-server", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.code-server.user": {"declarations": ["nixos/modules/services/web-apps/code-server.nix"], "default": {"_type": "literalExpression", "text": "\"code-server\""}, "description": {"_type": "mdDoc", "text": "The user to run code-server as.\nBy default, a user named `code-server` will be created.\n"}, "example": {"_type": "literalExpression", "text": "\"yourUser\""}, "loc": ["services", "code-server", "user"], "readOnly": false, "type": "string"}, "services.coder.accessUrl": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Access URL should be a external IP address or domain with DNS records pointing to Coder.\n"}, "example": {"_type": "literalExpression", "text": "\"https://coder.example.com\""}, "loc": ["services", "coder", "accessUrl"], "readOnly": false, "type": "null or string"}, "services.coder.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally.\n"}, "loc": ["services", "coder", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.coder.database.database": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "\"coder\""}, "description": {"_type": "mdDoc", "text": "Name of database.\n"}, "loc": ["services", "coder", "database", "database"], "readOnly": false, "type": "string"}, "services.coder.database.host": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "\"/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "Hostname hosting the database.\n"}, "loc": ["services", "coder", "database", "host"], "readOnly": false, "type": "string"}, "services.coder.database.password": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password for accessing the database.\n"}, "loc": ["services", "coder", "database", "password"], "readOnly": false, "type": "null or string"}, "services.coder.database.sslmode": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "\"disable\""}, "description": {"_type": "mdDoc", "text": "Password for accessing the database.\n"}, "loc": ["services", "coder", "database", "sslmode"], "readOnly": false, "type": "null or string"}, "services.coder.database.username": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "\"coder\""}, "description": {"_type": "mdDoc", "text": "Username for accessing the database.\n"}, "loc": ["services", "coder", "database", "username"], "readOnly": false, "type": "string"}, "services.coder.enable": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Coder service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "coder", "enable"], "readOnly": false, "type": "boolean"}, "services.coder.group": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "\"coder\""}, "description": {"_type": "mdDoc", "text": "Group under which the coder service runs.\n\n::: {.note}\nIf left as the default value this group will automatically be created\non system activation, otherwise it needs to be configured manually.\n:::\n"}, "loc": ["services", "coder", "group"], "readOnly": false, "type": "string"}, "services.coder.homeDir": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/coder\""}, "description": {"_type": "mdDoc", "text": "Home directory for coder user.\n"}, "loc": ["services", "coder", "homeDir"], "readOnly": false, "type": "string"}, "services.coder.listenAddress": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:3000\""}, "description": {"_type": "mdDoc", "text": "Listen address.\n"}, "loc": ["services", "coder", "listenAddress"], "readOnly": false, "type": "string"}, "services.coder.package": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "pkgs.coder"}, "description": {"_type": "mdDoc", "text": "Package to use for the service.\n"}, "loc": ["services", "coder", "package"], "readOnly": false, "type": "package"}, "services.coder.tlsCert": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the TLS certificate.\n"}, "loc": ["services", "coder", "tlsCert"], "readOnly": false, "type": "null or path"}, "services.coder.tlsKey": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the TLS key.\n"}, "loc": ["services", "coder", "tlsKey"], "readOnly": false, "type": "null or path"}, "services.coder.user": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "\"coder\""}, "description": {"_type": "mdDoc", "text": "User under which the coder service runs.\n\n::: {.note}\nIf left as the default value this user will automatically be created\non system activation, otherwise it needs to be configured manually.\n:::\n"}, "loc": ["services", "coder", "user"], "readOnly": false, "type": "string"}, "services.coder.wildcardAccessUrl": {"declarations": ["nixos/modules/services/web-apps/coder.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If you are providing TLS certificates directly to the Coder server, you must use a single certificate for the root and wildcard domains.\n"}, "example": {"_type": "literalExpression", "text": "\"*.coder.example.com\""}, "loc": ["services", "coder", "wildcardAccessUrl"], "readOnly": false, "type": "null or string"}, "services.collectd.autoLoadPlugin": {"declarations": ["nixos/modules/services/monitoring/collectd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable plugin autoloading.\n"}, "loc": ["services", "collectd", "autoLoadPlugin"], "readOnly": false, "type": "boolean"}, "services.collectd.buildMinimalPackage": {"declarations": ["nixos/modules/services/monitoring/collectd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Build a minimal collectd package with only the configured `services.collectd.plugins`\n"}, "loc": ["services", "collectd", "buildMinimalPackage"], "readOnly": false, "type": "boolean"}, "services.collectd.dataDir": {"declarations": ["nixos/modules/services/monitoring/collectd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/collectd\""}, "description": {"_type": "mdDoc", "text": "Data directory for collectd agent.\n"}, "loc": ["services", "collectd", "dataDir"], "readOnly": false, "type": "path"}, "services.collectd.enable": {"declarations": ["nixos/modules/services/monitoring/collectd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable collectd agent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "collectd", "enable"], "readOnly": false, "type": "boolean"}, "services.collectd.extraConfig": {"declarations": ["nixos/modules/services/monitoring/collectd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration for collectd. Use mkBefore to add lines before the\ndefault config, and mkAfter to add them below.\n"}, "loc": ["services", "collectd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.collectd.include": {"declarations": ["nixos/modules/services/monitoring/collectd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional paths to load config from.\n"}, "loc": ["services", "collectd", "include"], "readOnly": false, "type": "list of string"}, "services.collectd.package": {"declarations": ["nixos/modules/services/monitoring/collectd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.collectd"}, "description": {"_type": "mdDoc", "text": "Which collectd package to use.\n"}, "loc": ["services", "collectd", "package"], "readOnly": false, "type": "package"}, "services.collectd.plugins": {"declarations": ["nixos/modules/services/monitoring/collectd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute set of plugin names to plugin config segments\n"}, "example": {"_type": "literalExpression", "text": "{\n  cpu = \"\";\n  memory = \"\";\n  network = \"Server 192.168.1.1 25826\";\n}"}, "loc": ["services", "collectd", "plugins"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.collectd.user": {"declarations": ["nixos/modules/services/monitoring/collectd.nix"], "default": {"_type": "literalExpression", "text": "\"collectd\""}, "description": {"_type": "mdDoc", "text": "User under which to run collectd.\n"}, "loc": ["services", "collectd", "user"], "readOnly": false, "type": "null or string"}, "services.collectd.validateConfig": {"declarations": ["nixos/modules/services/monitoring/collectd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Validate the syntax of collectd configuration file at build time.\nDisable this if you use the Include directive on files unavailable in\nthe build sandbox, or when cross-compiling.\n"}, "loc": ["services", "collectd", "validateConfig"], "readOnly": false, "type": "boolean"}, "services.colord.enable": {"declarations": ["nixos/modules/services/x11/colord.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable colord, the color management daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "colord", "enable"], "readOnly": false, "type": "boolean"}, "services.compton": {"declarations": ["nixos/modules/services/x11/picom.nix"], "description": {"_type": "mdDoc", "text": "Alias of {option}`services.picom`."}, "loc": ["services", "compton"], "readOnly": false, "type": "submodule"}, "services.confd.backend": {"declarations": ["nixos/modules/services/misc/confd.nix"], "default": {"_type": "literalExpression", "text": "\"etcd\""}, "description": {"_type": "mdDoc", "text": "Confd config storage backend to use."}, "loc": ["services", "confd", "backend"], "readOnly": false, "type": "one of \"etcd\", \"consul\", \"redis\", \"zookeeper\""}, "services.confd.confDir": {"declarations": ["nixos/modules/services/misc/confd.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/confd\""}, "description": {"_type": "mdDoc", "text": "The path to the confd configs."}, "loc": ["services", "confd", "confDir"], "readOnly": false, "type": "path"}, "services.confd.enable": {"declarations": ["nixos/modules/services/misc/confd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable confd service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "confd", "enable"], "readOnly": false, "type": "boolean"}, "services.confd.interval": {"declarations": ["nixos/modules/services/misc/confd.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Confd check interval."}, "loc": ["services", "confd", "interval"], "readOnly": false, "type": "signed integer"}, "services.confd.logLevel": {"declarations": ["nixos/modules/services/misc/confd.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Confd log level."}, "loc": ["services", "confd", "logLevel"], "readOnly": false, "type": "one of \"info\", \"debug\""}, "services.confd.nodes": {"declarations": ["nixos/modules/services/misc/confd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"http://127.0.0.1:2379\"\n]"}, "description": {"_type": "mdDoc", "text": "Confd list of nodes to connect to."}, "loc": ["services", "confd", "nodes"], "readOnly": false, "type": "list of string"}, "services.confd.package": {"declarations": ["nixos/modules/services/misc/confd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.confd"}, "description": {"_type": "mdDoc", "text": "Confd package to use."}, "loc": ["services", "confd", "package"], "readOnly": false, "type": "package"}, "services.confd.prefix": {"declarations": ["nixos/modules/services/misc/confd.nix"], "default": {"_type": "literalExpression", "text": "\"/\""}, "description": {"_type": "mdDoc", "text": "The string to prefix to keys."}, "loc": ["services", "confd", "prefix"], "readOnly": false, "type": "path"}, "services.confd.watch": {"declarations": ["nixos/modules/services/misc/confd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Confd, whether to watch etcd config for changes."}, "loc": ["services", "confd", "watch"], "readOnly": false, "type": "boolean"}, "services.confluence.catalinaOptions": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Java options to pass to catalina/tomcat."}, "example": {"_type": "literalExpression", "text": "[\n  \"-Xms1024m\"\n  \"-Xmx2048m\"\n  \"-Dconfluence.disable.peopledirectory.all=true\"\n]"}, "loc": ["services", "confluence", "catalinaOptions"], "readOnly": false, "type": "list of string"}, "services.confluence.enable": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Atlassian Confluence service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "confluence", "enable"], "readOnly": false, "type": "boolean"}, "services.confluence.group": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "\"confluence\""}, "description": {"_type": "mdDoc", "text": "Group which runs confluence."}, "loc": ["services", "confluence", "group"], "readOnly": false, "type": "string"}, "services.confluence.home": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/confluence\""}, "description": {"_type": "mdDoc", "text": "Home directory of the confluence instance."}, "loc": ["services", "confluence", "home"], "readOnly": false, "type": "string"}, "services.confluence.jrePackage": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "pkgs.oraclejre8"}, "description": {"_type": "mdDoc", "text": "Note that Atlassian only support the Oracle JRE (JRASERVER-46152)."}, "loc": ["services", "confluence", "jrePackage"], "readOnly": false, "type": "package"}, "services.confluence.listenAddress": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address to listen on."}, "loc": ["services", "confluence", "listenAddress"], "readOnly": false, "type": "string"}, "services.confluence.listenPort": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "8090"}, "description": {"_type": "mdDoc", "text": "Port to listen on."}, "loc": ["services", "confluence", "listenPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.confluence.package": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "pkgs.atlassian-confluence"}, "description": {"_type": "mdDoc", "text": "Atlassian Confluence package to use."}, "loc": ["services", "confluence", "package"], "readOnly": false, "type": "package"}, "services.confluence.proxy.enable": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable proxy support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "confluence", "proxy", "enable"], "readOnly": false, "type": "boolean"}, "services.confluence.proxy.name": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "description": {"_type": "mdDoc", "text": "Virtual hostname at the proxy"}, "example": {"_type": "literalExpression", "text": "\"confluence.example.com\""}, "loc": ["services", "confluence", "proxy", "name"], "readOnly": false, "type": "string"}, "services.confluence.proxy.port": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "443"}, "description": {"_type": "mdDoc", "text": "Port used at the proxy"}, "example": {"_type": "literalExpression", "text": "80"}, "loc": ["services", "confluence", "proxy", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.confluence.proxy.scheme": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "\"https\""}, "description": {"_type": "mdDoc", "text": "Protocol used at the proxy."}, "example": {"_type": "literalExpression", "text": "\"http\""}, "loc": ["services", "confluence", "proxy", "scheme"], "readOnly": false, "type": "string"}, "services.confluence.sso.applicationName": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "description": {"_type": "mdDoc", "text": "Exact name of this Confluence instance in Crowd"}, "example": {"_type": "literalExpression", "text": "\"jira\""}, "loc": ["services", "confluence", "sso", "applicationName"], "readOnly": false, "type": "string"}, "services.confluence.sso.applicationPassword": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Application password of this Confluence instance in Crowd"}, "loc": ["services", "confluence", "sso", "applicationPassword"], "readOnly": false, "type": "null or string"}, "services.confluence.sso.applicationPasswordFile": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the application password for Crowd of Confluence."}, "loc": ["services", "confluence", "sso", "applicationPasswordFile"], "readOnly": false, "type": "null or string"}, "services.confluence.sso.crowd": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "description": {"_type": "mdDoc", "text": "Crowd Base URL without trailing slash"}, "example": {"_type": "literalExpression", "text": "\"http://localhost:8095/crowd\""}, "loc": ["services", "confluence", "sso", "crowd"], "readOnly": false, "type": "string"}, "services.confluence.sso.enable": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SSO with Atlassian Crowd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "confluence", "sso", "enable"], "readOnly": false, "type": "boolean"}, "services.confluence.sso.validationInterval": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Set to 0, if you want authentication checks to occur on each\nrequest. Otherwise set to the number of minutes between request\nto validate if the user is logged in or out of the Crowd SSO\nserver. Setting this value to 1 or higher will increase the\nperformance of Crowd's integration.\n"}, "example": {"_type": "literalExpression", "text": "0"}, "loc": ["services", "confluence", "sso", "validationInterval"], "readOnly": false, "type": "signed integer"}, "services.confluence.user": {"declarations": ["nixos/modules/services/web-apps/atlassian/confluence.nix"], "default": {"_type": "literalExpression", "text": "\"confluence\""}, "description": {"_type": "mdDoc", "text": "User which runs confluence."}, "loc": ["services", "confluence", "user"], "readOnly": false, "type": "string"}, "services.connman.enable": {"declarations": ["nixos/modules/services/networking/connman.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use ConnMan for managing your network connections.\n"}, "loc": ["services", "connman", "enable"], "readOnly": false, "type": "boolean"}, "services.connman.enableVPN": {"declarations": ["nixos/modules/services/networking/connman.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable ConnMan VPN service.\n"}, "loc": ["services", "connman", "enableVPN"], "readOnly": false, "type": "boolean"}, "services.connman.extraConfig": {"declarations": ["nixos/modules/services/networking/connman.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration lines appended to the generated connman configuration file.\n"}, "loc": ["services", "connman", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.connman.extraFlags": {"declarations": ["nixos/modules/services/networking/connman.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags to pass to connmand\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--nodnsproxy\"\n]"}, "loc": ["services", "connman", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.connman.networkInterfaceBlacklist": {"declarations": ["nixos/modules/services/networking/connman.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"vmnet\"\n  \"vboxnet\"\n  \"virbr\"\n  \"ifb\"\n  \"ve\"\n]"}, "description": {"_type": "mdDoc", "text": "Default blacklisted interfaces, this includes NixOS containers interfaces (ve).\n"}, "loc": ["services", "connman", "networkInterfaceBlacklist"], "readOnly": false, "type": "list of string"}, "services.connman.package": {"declarations": ["nixos/modules/services/networking/connman.nix"], "default": {"_type": "literalExpression", "text": "pkgs.connman"}, "description": {"_type": "mdDoc", "text": "The connman package / build flavor"}, "example": {"_type": "literalExpression", "text": "pkgs.connmanFull"}, "loc": ["services", "connman", "package"], "readOnly": false, "type": "package"}, "services.connman.wifi.backend": {"declarations": ["nixos/modules/services/networking/connman.nix"], "default": {"_type": "literalExpression", "text": "\"wpa_supplicant\""}, "description": {"_type": "mdDoc", "text": "Specify the Wi-Fi backend used.\nCurrently supported are {option}`wpa_supplicant` or {option}`iwd`.\n"}, "loc": ["services", "connman", "wifi", "backend"], "readOnly": false, "type": "one of \"wpa_supplicant\", \"iwd\""}, "services.consul-template.instances": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute set of consul-template instances.\nCreates independent `consul-template-${name}.service` systemd units for each instance defined here.\n"}, "loc": ["services", "consul-template", "instances"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.consul-template.instances.<name>.enable": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable this consul-template instance."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "consul-template", "instances", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.consul-template.instances.<name>.group": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "Group under which this instance runs.\n"}, "loc": ["services", "consul-template", "instances", "<name>", "group"], "readOnly": false, "type": "string"}, "services.consul-template.instances.<name>.package": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "pkgs.consul-template"}, "description": {"_type": "mdDoc", "text": "The consul-template package to use."}, "loc": ["services", "consul-template", "instances", "<name>", "package"], "readOnly": false, "type": "package"}, "services.consul-template.instances.<name>.settings": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Free-form settings written directly to the `config.json` file.\nRefer to <https://github.com/hashicorp/consul-template/blob/main/docs/configuration.md#configuration-file> for supported values.\n\n::: {.note}\nResulting format is JSON not HCL.\nRefer to <https://www.hcl2json.com/> if you are unsure how to convert HCL options to JSON.\n:::\n"}, "loc": ["services", "consul-template", "instances", "<name>", "settings"], "readOnly": false, "type": "JSON value"}, "services.consul-template.instances.<name>.settings.pid_file": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "\"/run/consul-template/\u2039name\u203a.pid\""}, "description": {"_type": "mdDoc", "text": "Path to use for the pid file.\n"}, "loc": ["services", "consul-template", "instances", "<name>", "settings", "pid_file"], "readOnly": false, "type": "string"}, "services.consul-template.instances.<name>.settings.template": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Template section of consul-template.\nRefer to <https://github.com/hashicorp/consul-template/blob/main/docs/configuration.md#templates> for supported values.\n"}, "loc": ["services", "consul-template", "instances", "<name>", "settings", "template"], "readOnly": false, "type": "list of attribute set of anything"}, "services.consul-template.instances.<name>.user": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "User under which this instance runs.\n"}, "loc": ["services", "consul-template", "instances", "<name>", "user"], "readOnly": false, "type": "string"}, "services.consul.alerts.consulAddr": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:8500\""}, "description": {"_type": "mdDoc", "text": "Consul api listening address"}, "loc": ["services", "consul", "alerts", "consulAddr"], "readOnly": false, "type": "string"}, "services.consul.alerts.enable": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable consul-alerts."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "consul", "alerts", "enable"], "readOnly": false, "type": "boolean"}, "services.consul.alerts.listenAddr": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:9000\""}, "description": {"_type": "mdDoc", "text": "Api listening address."}, "loc": ["services", "consul", "alerts", "listenAddr"], "readOnly": false, "type": "string"}, "services.consul.alerts.package": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "pkgs.consul-alerts"}, "description": {"_type": "mdDoc", "text": "Package to use for consul-alerts."}, "loc": ["services", "consul", "alerts", "package"], "readOnly": false, "type": "package"}, "services.consul.alerts.watchChecks": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable check watcher."}, "loc": ["services", "consul", "alerts", "watchChecks"], "readOnly": false, "type": "boolean"}, "services.consul.alerts.watchEvents": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable event watcher."}, "loc": ["services", "consul", "alerts", "watchEvents"], "readOnly": false, "type": "boolean"}, "services.consul.dropPrivileges": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the consul agent should be run as a non-root consul user.\n"}, "loc": ["services", "consul", "dropPrivileges"], "readOnly": false, "type": "boolean"}, "services.consul.enable": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables the consul daemon.\n"}, "loc": ["services", "consul", "enable"], "readOnly": false, "type": "boolean"}, "services.consul.extraConfig": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration options which are serialized to json and added\nto the config.json file.\n"}, "loc": ["services", "consul", "extraConfig"], "readOnly": false, "type": "attribute set of anything"}, "services.consul.extraConfigFiles": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional configuration files to pass to consul\nNOTE: These will not trigger the service to be restarted when altered.\n"}, "loc": ["services", "consul", "extraConfigFiles"], "readOnly": false, "type": "list of string"}, "services.consul.forceAddrFamily": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "\"any\""}, "description": {"_type": "mdDoc", "text": "Whether to bind ipv4/ipv6 or both kind of addresses.\n"}, "loc": ["services", "consul", "forceAddrFamily"], "readOnly": false, "type": "one of \"any\", \"ipv4\", \"ipv6\""}, "services.consul.forceIpv4": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Deprecated: Use consul.forceAddrFamily instead.\nWhether we should force the interfaces to only pull ipv4 addresses.\n"}, "loc": ["services", "consul", "forceIpv4"], "readOnly": false, "type": "null or boolean"}, "services.consul.interface.advertise": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the interface to pull the advertise_addr from.\n"}, "loc": ["services", "consul", "interface", "advertise"], "readOnly": false, "type": "null or string"}, "services.consul.interface.bind": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the interface to pull the bind_addr from.\n"}, "loc": ["services", "consul", "interface", "bind"], "readOnly": false, "type": "null or string"}, "services.consul.leaveOnStop": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, causes a leave action to be sent when closing consul.\nThis allows a clean termination of the node, but permanently removes\nit from the cluster. You probably don't want this option unless you\nare running a node which going offline in a permanent / semi-permanent\nfashion.\n"}, "loc": ["services", "consul", "leaveOnStop"], "readOnly": false, "type": "boolean"}, "services.consul.package": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "pkgs.consul"}, "description": {"_type": "mdDoc", "text": "The package used for the Consul agent and CLI.\n"}, "loc": ["services", "consul", "package"], "readOnly": false, "type": "package"}, "services.consul.webUi": {"declarations": ["nixos/modules/services/networking/consul.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables the web interface on the consul http port.\n"}, "loc": ["services", "consul", "webUi"], "readOnly": false, "type": "boolean"}, "services.convos.enable": {"declarations": ["nixos/modules/services/web-apps/convos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Convos."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "convos", "enable"], "readOnly": false, "type": "boolean"}, "services.convos.listenAddress": {"declarations": ["nixos/modules/services/web-apps/convos.nix"], "default": {"_type": "literalExpression", "text": "\"*\""}, "description": {"_type": "mdDoc", "text": "Address or host the web interface should listen on"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "convos", "listenAddress"], "readOnly": false, "type": "string"}, "services.convos.listenPort": {"declarations": ["nixos/modules/services/web-apps/convos.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Port the web interface should listen on"}, "example": {"_type": "literalExpression", "text": "8080"}, "loc": ["services", "convos", "listenPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.convos.reverseProxy": {"declarations": ["nixos/modules/services/web-apps/convos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables reverse proxy support. This will allow Convos to automatically\npick up the `X-Forwarded-For` and\n`X-Request-Base` HTTP headers set in your reverse proxy\nweb server. Note that enabling this option without a reverse proxy in\nfront will be a security issue.\n"}, "loc": ["services", "convos", "reverseProxy"], "readOnly": false, "type": "boolean"}, "services.coredns.config": {"declarations": ["nixos/modules/services/networking/coredns.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim Corefile to use.\nSee <https://coredns.io/manual/toc/#configuration> for details.\n"}, "example": {"_type": "literalExpression", "text": "''\n  . {\n    whoami\n  }\n''"}, "loc": ["services", "coredns", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.coredns.enable": {"declarations": ["nixos/modules/services/networking/coredns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Coredns dns server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "coredns", "enable"], "readOnly": false, "type": "boolean"}, "services.coredns.package": {"declarations": ["nixos/modules/services/networking/coredns.nix"], "default": {"_type": "literalExpression", "text": "pkgs.coredns"}, "description": {"_type": "mdDoc", "text": "Coredns package to use."}, "loc": ["services", "coredns", "package"], "readOnly": false, "type": "package"}, "services.corerad.configFile": {"declarations": ["nixos/modules/services/networking/corerad.nix"], "description": {"_type": "mdDoc", "text": "Path to CoreRAD TOML configuration file."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.corerad}/etc/corerad/corerad.toml\""}, "loc": ["services", "corerad", "configFile"], "readOnly": false, "type": "path"}, "services.corerad.enable": {"declarations": ["nixos/modules/services/networking/corerad.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable CoreRAD IPv6 NDP RA daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "corerad", "enable"], "readOnly": false, "type": "boolean"}, "services.corerad.package": {"declarations": ["nixos/modules/services/networking/corerad.nix"], "default": {"_type": "literalExpression", "text": "pkgs.corerad"}, "description": {"_type": "mdDoc", "text": "CoreRAD package to use."}, "loc": ["services", "corerad", "package"], "readOnly": false, "type": "package"}, "services.corerad.settings": {"declarations": ["nixos/modules/services/networking/corerad.nix"], "description": {"_type": "mdDoc", "text": "Configuration for CoreRAD, see <https://github.com/mdlayher/corerad/blob/main/internal/config/reference.toml>\nfor supported values. Ignored if configFile is set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  interfaces = [\n    # eth0 is an upstream interface monitoring for IPv6 router advertisements.\n    {\n      name = \"eth0\";\n      monitor = true;\n    }\n    # eth1 is a downstream interface advertising IPv6 prefixes for SLAAC.\n    {\n      name = \"eth1\";\n      advertise = true;\n      prefix = [{ prefix = \"::/64\"; }];\n    }\n  ];\n  # Optionally enable Prometheus metrics.\n  debug = {\n    address = \"localhost:9430\";\n    prometheus = true;\n  };\n}\n"}, "loc": ["services", "corerad", "settings"], "readOnly": false, "type": "TOML value"}, "services.corosync.clusterName": {"declarations": ["nixos/modules/services/cluster/corosync/default.nix"], "default": {"_type": "literalExpression", "text": "\"nixcluster\""}, "description": {"_type": "mdDoc", "text": "Name of the corosync cluster."}, "loc": ["services", "corosync", "clusterName"], "readOnly": false, "type": "string"}, "services.corosync.enable": {"declarations": ["nixos/modules/services/cluster/corosync/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable corosync."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "corosync", "enable"], "readOnly": false, "type": "boolean"}, "services.corosync.extraOptions": {"declarations": ["nixos/modules/services/cluster/corosync/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional options with which to start corosync."}, "loc": ["services", "corosync", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.corosync.nodelist": {"declarations": ["nixos/modules/services/cluster/corosync/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Corosync nodelist: all cluster members."}, "loc": ["services", "corosync", "nodelist"], "readOnly": false, "type": "list of (submodule)"}, "services.corosync.nodelist.*.name": {"declarations": ["nixos/modules/services/cluster/corosync/default.nix"], "description": {"_type": "mdDoc", "text": "Node name"}, "loc": ["services", "corosync", "nodelist", "*", "name"], "readOnly": false, "type": "string"}, "services.corosync.nodelist.*.nodeid": {"declarations": ["nixos/modules/services/cluster/corosync/default.nix"], "description": {"_type": "mdDoc", "text": "Node ID number"}, "loc": ["services", "corosync", "nodelist", "*", "nodeid"], "readOnly": false, "type": "signed integer"}, "services.corosync.nodelist.*.ring_addrs": {"declarations": ["nixos/modules/services/cluster/corosync/default.nix"], "description": {"_type": "mdDoc", "text": "List of addresses, one for each ring."}, "loc": ["services", "corosync", "nodelist", "*", "ring_addrs"], "readOnly": false, "type": "list of string"}, "services.corosync.package": {"declarations": ["nixos/modules/services/cluster/corosync/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.corosync"}, "description": {"_type": "mdDoc", "text": "Package that should be used for corosync."}, "loc": ["services", "corosync", "package"], "readOnly": false, "type": "package"}, "services.coturn.alt-listening-port": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "listening-port + 1"}, "description": {"_type": "mdDoc", "text": "Alternative listening port for UDP and TCP listeners;\ndefault (or zero) value means \"listening port plus one\".\nThis is needed for RFC 5780 support\n(STUN extension specs, NAT behavior discovery). The TURN Server\nsupports RFC 5780 only if it is started with more than one\nlistening IP address of the same family (IPv4 or IPv6).\nRFC 5780 is supported only by UDP protocol, other protocols\nare listening to that endpoint only for \"symmetry\".\n"}, "loc": ["services", "coturn", "alt-listening-port"], "readOnly": false, "type": "signed integer"}, "services.coturn.alt-tls-listening-port": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "tls-listening-port + 1"}, "description": {"_type": "mdDoc", "text": "Alternative listening port for TLS and DTLS protocols.\n"}, "loc": ["services", "coturn", "alt-tls-listening-port"], "readOnly": false, "type": "signed integer"}, "services.coturn.cert": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file in PEM format.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/acme/example.com/fullchain.pem\""}, "loc": ["services", "coturn", "cert"], "readOnly": false, "type": "null or string"}, "services.coturn.cli-ip": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Local system IP address to be used for CLI server endpoint.\n"}, "loc": ["services", "coturn", "cli-ip"], "readOnly": false, "type": "string"}, "services.coturn.cli-password": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CLI access password.\nFor the security reasons, it is recommended to use the encrypted\nfor of the password (see the -P command in the turnadmin utility).\n"}, "loc": ["services", "coturn", "cli-password"], "readOnly": false, "type": "null or string"}, "services.coturn.cli-port": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "5766"}, "description": {"_type": "mdDoc", "text": "CLI server port.\n"}, "loc": ["services", "coturn", "cli-port"], "readOnly": false, "type": "signed integer"}, "services.coturn.dh-file": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use custom DH TLS key, stored in PEM format in the file.\n"}, "loc": ["services", "coturn", "dh-file"], "readOnly": false, "type": "null or string"}, "services.coturn.enable": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable coturn TURN server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "coturn", "enable"], "readOnly": false, "type": "boolean"}, "services.coturn.extraConfig": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional configuration options"}, "loc": ["services", "coturn", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.coturn.listening-ips": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listener IP addresses of relay server.\nIf no IP(s) specified in the config file or in the command line options,\nthen all IPv4 and IPv6 system IPs will be used for listening.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"203.0.113.42\"\n  \"2001:DB8::42\"\n]"}, "loc": ["services", "coturn", "listening-ips"], "readOnly": false, "type": "list of string"}, "services.coturn.listening-port": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "3478"}, "description": {"_type": "mdDoc", "text": "TURN listener port for UDP and TCP.\nNote: actually, TLS and DTLS sessions can connect to the\n\"plain\" TCP and UDP port(s), too - if allowed by configuration.\n"}, "loc": ["services", "coturn", "listening-port"], "readOnly": false, "type": "signed integer"}, "services.coturn.lt-cred-mech": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use long-term credential mechanism.\n"}, "loc": ["services", "coturn", "lt-cred-mech"], "readOnly": false, "type": "boolean"}, "services.coturn.max-port": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "65535"}, "description": {"_type": "mdDoc", "text": "Upper bound of UDP relay endpoints\n"}, "loc": ["services", "coturn", "max-port"], "readOnly": false, "type": "signed integer"}, "services.coturn.min-port": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "49152"}, "description": {"_type": "mdDoc", "text": "Lower bound of UDP relay endpoints\n"}, "loc": ["services", "coturn", "min-port"], "readOnly": false, "type": "signed integer"}, "services.coturn.no-auth": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This option is opposite to lt-cred-mech.\n(TURN Server with no-auth option allows anonymous access).\nIf neither option is defined, and no users are defined,\nthen no-auth is default. If at least one user is defined,\nin this file or in command line or in usersdb file, then\nlt-cred-mech is default.\n"}, "loc": ["services", "coturn", "no-auth"], "readOnly": false, "type": "boolean"}, "services.coturn.no-cli": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Turn OFF the CLI support.\n"}, "loc": ["services", "coturn", "no-cli"], "readOnly": false, "type": "boolean"}, "services.coturn.no-dtls": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable DTLS client listener"}, "loc": ["services", "coturn", "no-dtls"], "readOnly": false, "type": "boolean"}, "services.coturn.no-tcp": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable TCP client listener"}, "loc": ["services", "coturn", "no-tcp"], "readOnly": false, "type": "boolean"}, "services.coturn.no-tcp-relay": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable TCP relay endpoints"}, "loc": ["services", "coturn", "no-tcp-relay"], "readOnly": false, "type": "boolean"}, "services.coturn.no-tls": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable TLS client listener"}, "loc": ["services", "coturn", "no-tls"], "readOnly": false, "type": "boolean"}, "services.coturn.no-udp": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable UDP client listener"}, "loc": ["services", "coturn", "no-udp"], "readOnly": false, "type": "boolean"}, "services.coturn.no-udp-relay": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable UDP relay endpoints"}, "loc": ["services", "coturn", "no-udp-relay"], "readOnly": false, "type": "boolean"}, "services.coturn.pkey": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Private key file in PEM format.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/acme/example.com/key.pem\""}, "loc": ["services", "coturn", "pkey"], "readOnly": false, "type": "null or string"}, "services.coturn.realm": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "The default realm to be used for the users when no explicit\norigin/realm relationship was found in the database, or if the TURN\nserver is not using any database (just the commands-line settings\nand the userdb file). Must be used with long-term credentials\nmechanism or with TURN REST API.\n"}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "coturn", "realm"], "readOnly": false, "type": "string"}, "services.coturn.relay-ips": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Relay address (the local IP address that will be used to relay the\npackets to the peer).\nMultiple relay addresses may be used.\nThe same IP(s) can be used as both listening IP(s) and relay IP(s).\n\nIf no relay IP(s) specified, then the turnserver will apply the default\npolicy: it will decide itself which relay addresses to be used, and it\nwill always be using the client socket IP address as the relay IP address\nof the TURN session (if the requested relay address family is the same\nas the family of the client socket).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"203.0.113.42\"\n  \"2001:DB8::42\"\n]"}, "loc": ["services", "coturn", "relay-ips"], "readOnly": false, "type": "list of string"}, "services.coturn.secure-stun": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Require authentication of the STUN Binding request.\nBy default, the clients are allowed anonymous access to the STUN Binding functionality.\n"}, "loc": ["services", "coturn", "secure-stun"], "readOnly": false, "type": "boolean"}, "services.coturn.static-auth-secret": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "'Static' authentication secret value (a string) for TURN REST API only.\nIf not set, then the turn server\nwill try to use the 'dynamic' value in turn_secret table\nin user database (if present). The database-stored  value can be changed on-the-fly\nby a separate program, so this is why that other mode is 'dynamic'.\n"}, "loc": ["services", "coturn", "static-auth-secret"], "readOnly": false, "type": "null or string"}, "services.coturn.static-auth-secret-file": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the file containing the static authentication secret.\n"}, "loc": ["services", "coturn", "static-auth-secret-file"], "readOnly": false, "type": "null or string"}, "services.coturn.tls-listening-port": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "5349"}, "description": {"_type": "mdDoc", "text": "TURN listener port for TLS.\nNote: actually, \"plain\" TCP and UDP sessions can connect to the TLS and\nDTLS port(s), too - if allowed by configuration. The TURN server\n\"automatically\" recognizes the type of traffic. Actually, two listening\nendpoints (the \"plain\" one and the \"tls\" one) are equivalent in terms of\nfunctionality; but we keep both endpoints to satisfy the RFC 5766 specs.\nFor secure TCP connections, we currently support SSL version 3 and\nTLS version 1.0, 1.1 and 1.2.\nFor secure UDP connections, we support DTLS version 1.\n"}, "loc": ["services", "coturn", "tls-listening-port"], "readOnly": false, "type": "signed integer"}, "services.coturn.use-auth-secret": {"declarations": ["nixos/modules/services/networking/coturn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "TURN REST API flag.\nFlag that sets a special authorization option that is based upon authentication secret.\nThis feature can be used with the long-term authentication mechanism, only.\nThis feature purpose is to support \"TURN Server REST API\", see\n\"TURN REST API\" link in the project's page\nhttps://github.com/coturn/coturn/\n\nThis option is used with timestamp:\n\nusercombo -> \"timestamp:userid\"\nturn user -> usercombo\nturn password -> base64(hmac(secret key, usercombo))\n\nThis allows TURN credentials to be accounted for a specific user id.\nIf you don't have a suitable id, the timestamp alone can be used.\nThis option is just turning on secret-based authentication.\nThe actual value of the secret is defined either by option static-auth-secret,\nor can be found in the turn_secret table in the database.\n"}, "loc": ["services", "coturn", "use-auth-secret"], "readOnly": false, "type": "boolean"}, "services.couchdb.adminPass": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Couchdb (i.e. fauxton) account with permission for all dbs and\ntasks.\n"}, "loc": ["services", "couchdb", "adminPass"], "readOnly": false, "type": "null or string"}, "services.couchdb.adminUser": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "\"admin\""}, "description": {"_type": "mdDoc", "text": "Couchdb (i.e. fauxton) account with permission for all dbs and\ntasks.\n"}, "loc": ["services", "couchdb", "adminUser"], "readOnly": false, "type": "string"}, "services.couchdb.argsFile": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "\"config.services.couchdb.package/etc/vm.args\""}, "description": {"_type": "mdDoc", "text": "vm.args configuration. Overrides Couchdb's Erlang VM parameters file.\n"}, "loc": ["services", "couchdb", "argsFile"], "readOnly": false, "type": "path"}, "services.couchdb.bindAddress": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Defines the IP address by which CouchDB will be accessible.\n"}, "loc": ["services", "couchdb", "bindAddress"], "readOnly": false, "type": "string"}, "services.couchdb.configFile": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "description": {"_type": "mdDoc", "text": "Configuration file for persisting runtime changes. File\nneeds to be readable and writable from couchdb user/group.\n"}, "loc": ["services", "couchdb", "configFile"], "readOnly": false, "type": "path"}, "services.couchdb.databaseDir": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/couchdb\""}, "description": {"_type": "mdDoc", "text": "Specifies location of CouchDB database files (*.couch named). This\nlocation should be writable and readable for the user the CouchDB\nservice runs as (couchdb by default).\n"}, "loc": ["services", "couchdb", "databaseDir"], "readOnly": false, "type": "path"}, "services.couchdb.enable": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable CouchDB Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "couchdb", "enable"], "readOnly": false, "type": "boolean"}, "services.couchdb.extraConfig": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration. Overrides any other configuration.\n"}, "loc": ["services", "couchdb", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.couchdb.group": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "\"couchdb\""}, "description": {"_type": "mdDoc", "text": "Group account under which couchdb runs.\n"}, "loc": ["services", "couchdb", "group"], "readOnly": false, "type": "string"}, "services.couchdb.logFile": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "\"/var/log/couchdb.log\""}, "description": {"_type": "mdDoc", "text": "Specifies the location of file for logging output.\n"}, "loc": ["services", "couchdb", "logFile"], "readOnly": false, "type": "path"}, "services.couchdb.package": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "pkgs.couchdb3"}, "description": {"_type": "mdDoc", "text": "CouchDB package to use.\n"}, "loc": ["services", "couchdb", "package"], "readOnly": false, "type": "package"}, "services.couchdb.port": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "5984"}, "description": {"_type": "mdDoc", "text": "Defined the port number to listen.\n"}, "loc": ["services", "couchdb", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.couchdb.uriFile": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "\"/run/couchdb/couchdb.uri\""}, "description": {"_type": "mdDoc", "text": "This file contains the full URI that can be used to access this\ninstance of CouchDB. It is used to help discover the port CouchDB is\nrunning on (if it was set to 0 (e.g. automatically assigned any free\none). This file should be writable and readable for the user that\nruns the CouchDB service (couchdb by default).\n"}, "loc": ["services", "couchdb", "uriFile"], "readOnly": false, "type": "path"}, "services.couchdb.user": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "\"couchdb\""}, "description": {"_type": "mdDoc", "text": "User account under which couchdb runs.\n"}, "loc": ["services", "couchdb", "user"], "readOnly": false, "type": "string"}, "services.couchdb.viewIndexDir": {"declarations": ["nixos/modules/services/databases/couchdb.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/couchdb\""}, "description": {"_type": "mdDoc", "text": "Specifies location of CouchDB view index files. This location should\nbe writable and readable for the user that runs the CouchDB service\n(couchdb by default).\n"}, "loc": ["services", "couchdb", "viewIndexDir"], "readOnly": false, "type": "path"}, "services.cpuminer-cryptonight.enable": {"declarations": ["nixos/modules/services/misc/cpuminer-cryptonight.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the cpuminer cryptonight miner.\n"}, "loc": ["services", "cpuminer-cryptonight", "enable"], "readOnly": false, "type": "boolean"}, "services.cpuminer-cryptonight.pass": {"declarations": ["nixos/modules/services/misc/cpuminer-cryptonight.nix"], "default": {"_type": "literalExpression", "text": "\"x\""}, "description": {"_type": "mdDoc", "text": "Password for mining server"}, "loc": ["services", "cpuminer-cryptonight", "pass"], "readOnly": false, "type": "string"}, "services.cpuminer-cryptonight.threads": {"declarations": ["nixos/modules/services/misc/cpuminer-cryptonight.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Number of miner threads, defaults to available processors"}, "loc": ["services", "cpuminer-cryptonight", "threads"], "readOnly": false, "type": "signed integer"}, "services.cpuminer-cryptonight.url": {"declarations": ["nixos/modules/services/misc/cpuminer-cryptonight.nix"], "description": {"_type": "mdDoc", "text": "URL of mining server"}, "loc": ["services", "cpuminer-cryptonight", "url"], "readOnly": false, "type": "string"}, "services.cpuminer-cryptonight.user": {"declarations": ["nixos/modules/services/misc/cpuminer-cryptonight.nix"], "description": {"_type": "mdDoc", "text": "Username for mining server"}, "loc": ["services", "cpuminer-cryptonight", "user"], "readOnly": false, "type": "string"}, "services.cpupower-gui.enable": {"declarations": ["nixos/modules/services/desktops/cpupower-gui.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables dbus/systemd service needed by cpupower-gui.\nThese services are responsible for retrieving and modifying cpu power\nsaving settings.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "cpupower-gui", "enable"], "readOnly": false, "type": "boolean"}, "services.create_ap.enable": {"declarations": ["nixos/modules/services/networking/create_ap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable setup wifi hotspots using create_ap."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "create_ap", "enable"], "readOnly": false, "type": "boolean"}, "services.create_ap.settings": {"declarations": ["nixos/modules/services/networking/create_ap.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for `create_ap`.\nSee [upstream example configuration](https://raw.githubusercontent.com/lakinduakash/linux-wifi-hotspot/master/src/scripts/create_ap.conf)\nfor supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  INTERNET_IFACE = \"eth0\";\n  PASSPHRASE = \"12345678\";\n  SSID = \"My Wifi Hotspot\";\n  WIFI_IFACE = \"wlan0\";\n}"}, "loc": ["services", "create_ap", "settings"], "readOnly": false, "type": "attribute set of (signed integer or boolean or string)"}, "services.croc.debug": {"declarations": ["nixos/modules/services/networking/croc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable debug logs."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "croc", "debug"], "readOnly": false, "type": "boolean"}, "services.croc.enable": {"declarations": ["nixos/modules/services/networking/croc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable croc relay."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "croc", "enable"], "readOnly": false, "type": "boolean"}, "services.croc.openFirewall": {"declarations": ["nixos/modules/services/networking/croc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable opening of the peer port(s) in the firewall."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "croc", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.croc.pass": {"declarations": ["nixos/modules/services/networking/croc.nix"], "default": {"_type": "literalExpression", "text": "\"pass123\""}, "description": {"_type": "mdDoc", "text": "Password or passwordfile for the relay."}, "loc": ["services", "croc", "pass"], "readOnly": false, "type": "path or string"}, "services.croc.ports": {"declarations": ["nixos/modules/services/networking/croc.nix"], "default": {"_type": "literalExpression", "text": "[\n  9009\n  9010\n  9011\n  9012\n  9013\n]"}, "description": {"_type": "mdDoc", "text": "Ports of the relay."}, "loc": ["services", "croc", "ports"], "readOnly": false, "type": "list of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.cron.cronFiles": {"declarations": ["nixos/modules/services/scheduling/cron.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of extra crontab files that will be read and appended to the main\ncrontab file when the cron service starts.\n"}, "loc": ["services", "cron", "cronFiles"], "readOnly": false, "type": "list of path"}, "services.cron.enable": {"declarations": ["nixos/modules/services/scheduling/cron.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Vixie cron daemon."}, "loc": ["services", "cron", "enable"], "readOnly": false, "type": "boolean"}, "services.cron.mailto": {"declarations": ["nixos/modules/services/scheduling/cron.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Email address to which job output will be mailed."}, "loc": ["services", "cron", "mailto"], "readOnly": false, "type": "null or string"}, "services.cron.systemCronJobs": {"declarations": ["nixos/modules/services/scheduling/cron.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of Cron jobs to be appended to the system-wide\ncrontab.  See the manual page for crontab for the expected\nformat. If you want to get the results mailed you must setuid\nsendmail. See {option}`security.wrappers`\n\nIf neither /var/cron/cron.deny nor /var/cron/cron.allow exist only root\nis allowed to have its own crontab file. The /var/cron/cron.deny file\nis created automatically for you, so every user can use a crontab.\n\nMany nixos modules set systemCronJobs, so if you decide to disable vixie cron\nand enable another cron daemon, you may want it to get its system crontab\nbased on systemCronJobs.\n"}, "example": {"_type": "literalExpression", "text": "[ \"* * * * *  test   ls -l / > /tmp/cronout 2>&1\"\n  \"* * * * *  eelco  echo Hello World > /home/eelco/cronout\"\n]\n"}, "loc": ["services", "cron", "systemCronJobs"], "readOnly": false, "type": "list of string"}, "services.crossfire-server.configFiles": {"declarations": ["nixos/modules/services/games/crossfire-server.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Text to append to the corresponding configuration files. Note that the\nfiles given in the example are *not* the complete set of files available\nto customize; look in /etc/crossfire after enabling the server to see\nthe available files, and read the comments in each file for detailed\ndocumentation on the format and what settings are available.\n\nNote that the motd, rules, and news files, if configured here, will\noverwrite the example files that come with the server, rather than being\nappended to them as the other configuration files are.\n"}, "example": {"_type": "literalExpression", "text": "{\n  dm_file = ''\n    admin:secret_password:localhost\n    alice:xyzzy:*\n  '';\n  ban_file = ''\n    # Bob is a jerk\n    bob@*\n    # So is everyone on 192.168.86.255/24\n    *@192.168.86.\n  '';\n  metaserver2 = ''\n    metaserver2_notification on\n    localhostname crossfire.example.net\n  '';\n  motd = \"Welcome to CrossFire!\";\n  news = \"No news yet.\";\n  rules = \"Don't be a jerk.\";\n  settings = ''\n    # be nicer to newbies and harsher to experienced players\n    balanced_stat_loss true\n    # don't let players pick up and use admin-created items\n    real_wiz false\n  '';\n}\n"}, "loc": ["services", "crossfire-server", "configFiles"], "readOnly": false, "type": "attribute set of string"}, "services.crossfire-server.dataDir": {"declarations": ["nixos/modules/services/games/crossfire-server.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.crossfire.package}/share/crossfire\""}, "description": {"_type": "mdDoc", "text": "Where to load readonly data from -- maps, archetypes, treasure tables,\nand the like. If you plan to edit the data on the live server (rather\nthan overlaying the crossfire-maps and crossfire-arch packages and\nnixos-rebuilding), point this somewhere read-write and copy the data\nthere before starting the server.\n"}, "loc": ["services", "crossfire-server", "dataDir"], "readOnly": false, "type": "string"}, "services.crossfire-server.enable": {"declarations": ["nixos/modules/services/games/crossfire-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, the Crossfire game server will be started at boot.\n"}, "loc": ["services", "crossfire-server", "enable"], "readOnly": false, "type": "boolean"}, "services.crossfire-server.openFirewall": {"declarations": ["nixos/modules/services/games/crossfire-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open ports in the firewall for the server.\n"}, "loc": ["services", "crossfire-server", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.crossfire-server.package": {"declarations": ["nixos/modules/services/games/crossfire-server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.crossfire-server"}, "description": {"_type": "mdDoc", "text": "The package to use for the Crossfire server (and map/arch data, if you\ndon't change dataDir).\n"}, "loc": ["services", "crossfire-server", "package"], "readOnly": false, "type": "package"}, "services.crossfire-server.stateDir": {"declarations": ["nixos/modules/services/games/crossfire-server.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/crossfire\""}, "description": {"_type": "mdDoc", "text": "Where to store runtime data (save files, persistent items, etc).\n\nIf left at the default, this will be automatically created on server\nstartup if it does not already exist. If changed, it is the admin's\nresponsibility to make sure that the directory exists and is writeable\nby the `crossfire` user.\n"}, "loc": ["services", "crossfire-server", "stateDir"], "readOnly": false, "type": "string"}, "services.crowd.catalinaOptions": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Java options to pass to catalina/tomcat."}, "example": {"_type": "literalExpression", "text": "[\n  \"-Xms1024m\"\n  \"-Xmx2048m\"\n]"}, "loc": ["services", "crowd", "catalinaOptions"], "readOnly": false, "type": "list of string"}, "services.crowd.enable": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Atlassian Crowd service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "crowd", "enable"], "readOnly": false, "type": "boolean"}, "services.crowd.group": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "\"crowd\""}, "description": {"_type": "mdDoc", "text": "Group which runs Crowd."}, "loc": ["services", "crowd", "group"], "readOnly": false, "type": "string"}, "services.crowd.home": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/crowd\""}, "description": {"_type": "mdDoc", "text": "Home directory of the Crowd instance."}, "loc": ["services", "crowd", "home"], "readOnly": false, "type": "string"}, "services.crowd.jrePackage": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.oraclejre8"}, "description": {"_type": "mdDoc", "text": "Note that Atlassian only support the Oracle JRE (JRASERVER-46152)."}, "loc": ["services", "crowd", "jrePackage"], "readOnly": false, "type": "package"}, "services.crowd.listenAddress": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address to listen on."}, "loc": ["services", "crowd", "listenAddress"], "readOnly": false, "type": "string"}, "services.crowd.listenPort": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "8092"}, "description": {"_type": "mdDoc", "text": "Port to listen on."}, "loc": ["services", "crowd", "listenPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.crowd.openidPassword": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "\"WILL_NEVER_BE_SET\""}, "description": {"_type": "mdDoc", "text": "Application password for OpenID server."}, "loc": ["services", "crowd", "openidPassword"], "readOnly": false, "type": "string"}, "services.crowd.openidPasswordFile": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the file containing the application password for OpenID server."}, "loc": ["services", "crowd", "openidPasswordFile"], "readOnly": false, "type": "null or string"}, "services.crowd.package": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.atlassian-crowd"}, "description": {"_type": "mdDoc", "text": "Atlassian Crowd package to use."}, "loc": ["services", "crowd", "package"], "readOnly": false, "type": "package"}, "services.crowd.proxy.enable": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable reverse proxy support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "crowd", "proxy", "enable"], "readOnly": false, "type": "boolean"}, "services.crowd.proxy.name": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "description": {"_type": "mdDoc", "text": "Virtual hostname at the proxy"}, "example": {"_type": "literalExpression", "text": "\"crowd.example.com\""}, "loc": ["services", "crowd", "proxy", "name"], "readOnly": false, "type": "string"}, "services.crowd.proxy.port": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "443"}, "description": {"_type": "mdDoc", "text": "Port used at the proxy"}, "example": {"_type": "literalExpression", "text": "80"}, "loc": ["services", "crowd", "proxy", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.crowd.proxy.scheme": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "\"https\""}, "description": {"_type": "mdDoc", "text": "Protocol used at the proxy."}, "example": {"_type": "literalExpression", "text": "\"http\""}, "loc": ["services", "crowd", "proxy", "scheme"], "readOnly": false, "type": "string"}, "services.crowd.proxy.secure": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the connections to the proxy should be considered secure."}, "loc": ["services", "crowd", "proxy", "secure"], "readOnly": false, "type": "boolean"}, "services.crowd.user": {"declarations": ["nixos/modules/services/web-apps/atlassian/crowd.nix"], "default": {"_type": "literalExpression", "text": "\"crowd\""}, "description": {"_type": "mdDoc", "text": "User which runs Crowd."}, "loc": ["services", "crowd", "user"], "readOnly": false, "type": "string"}, "services.dante.config": {"declarations": ["nixos/modules/services/networking/dante.nix"], "description": {"_type": "mdDoc", "text": "Contents of Dante's configuration file.\nNOTE: user.privileged, user.unprivileged and logoutput are set by the service.\n"}, "loc": ["services", "dante", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.dante.enable": {"declarations": ["nixos/modules/services/networking/dante.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Dante SOCKS proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dante", "enable"], "readOnly": false, "type": "boolean"}, "services.darkhttpd.address": {"declarations": ["nixos/modules/services/web-servers/darkhttpd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\nPass `all` to listen on all interfaces.\n"}, "loc": ["services", "darkhttpd", "address"], "readOnly": false, "type": "string"}, "services.darkhttpd.enable": {"declarations": ["nixos/modules/services/web-servers/darkhttpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable DarkHTTPd web server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "darkhttpd", "enable"], "readOnly": false, "type": "boolean"}, "services.darkhttpd.extraArgs": {"declarations": ["nixos/modules/services/web-servers/darkhttpd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional configuration passed to the executable.\n"}, "loc": ["services", "darkhttpd", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.darkhttpd.hideServerId": {"declarations": ["nixos/modules/services/web-servers/darkhttpd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Don't identify the server type in headers or directory listings.\n"}, "loc": ["services", "darkhttpd", "hideServerId"], "readOnly": false, "type": "boolean"}, "services.darkhttpd.port": {"declarations": ["nixos/modules/services/web-servers/darkhttpd.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\nPass 0 to let the system choose any free port for you.\n"}, "loc": ["services", "darkhttpd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.darkhttpd.rootDir": {"declarations": ["nixos/modules/services/web-servers/darkhttpd.nix"], "description": {"_type": "mdDoc", "text": "Path from which to serve files.\n"}, "loc": ["services", "darkhttpd", "rootDir"], "readOnly": false, "type": "path"}, "services.das_watchdog.enable": {"declarations": ["nixos/modules/services/monitoring/das_watchdog.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable realtime watchdog."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "das_watchdog", "enable"], "readOnly": false, "type": "boolean"}, "services.datadog-agent.apiKeyFile": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "description": {"_type": "mdDoc", "text": "Path to a file containing the Datadog API key to associate the\nagent with your account.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/datadog_api_key\""}, "loc": ["services", "datadog-agent", "apiKeyFile"], "readOnly": false, "type": "path"}, "services.datadog-agent.checks": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for all Datadog checks. Keys of this attribute\nset will be used as the name of the check to create the\nappropriate configuration in `conf.d/$check.d/conf.yaml`.\n\nThe configuration is converted into JSON from the plain Nix\nlanguage configuration, meaning that you should write\nconfiguration adhering to Datadog's documentation - but in Nix\nlanguage.\n\nRefer to the implementation of this module (specifically the\ndefinition of `defaultChecks`) for an example.\n\nNote: The 'disk' and 'network' check are configured in\nseparate options because they exist by default. Attempting to\noverride their configuration here will have no effect.\n"}, "example": {"_type": "literalExpression", "text": "{\n  http_check = {\n    init_config = null;\n    instances = [\n      {\n        name = \"some-service\";\n        tags = [\n          \"some-service\"\n        ];\n        url = \"http://localhost:1337/healthz\";\n      }\n    ];\n  };\n}"}, "loc": ["services", "datadog-agent", "checks"], "readOnly": false, "type": "attribute set of (attribute set)"}, "services.datadog-agent.ddUrl": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Custom dd_url to configure the agent with. Useful if traffic to datadog\nneeds to go through a proxy.\nDon't use this to point to another datadog site (EU) - use site instead.\n"}, "example": {"_type": "literalExpression", "text": "\"http://haproxy.example.com:3834\""}, "loc": ["services", "datadog-agent", "ddUrl"], "readOnly": false, "type": "null or string"}, "services.datadog-agent.diskCheck": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "{\n  init_config = { };\n  instances = [\n    {\n      use_mount = \"false\";\n    }\n  ];\n}"}, "description": {"_type": "mdDoc", "text": "Disk check config"}, "loc": ["services", "datadog-agent", "diskCheck"], "readOnly": false, "type": "attribute set"}, "services.datadog-agent.enable": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Datadog-agent v7 monitoring service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "datadog-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.datadog-agent.enableLiveProcessCollection": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the live process collection agent.\n"}, "loc": ["services", "datadog-agent", "enableLiveProcessCollection"], "readOnly": false, "type": "boolean"}, "services.datadog-agent.enableTraceAgent": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the trace agent.\n"}, "loc": ["services", "datadog-agent", "enableTraceAgent"], "readOnly": false, "type": "boolean"}, "services.datadog-agent.extraConfig": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration options that will be merged into the\nmain config file {file}`datadog.yaml`.\n"}, "loc": ["services", "datadog-agent", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.datadog-agent.extraIntegrations": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra integrations from the Datadog core-integrations\nrepository that should be built and included.\n\nBy default the included integrations are disk, mongo, network,\nnginx and postgres.\n\nTo include additional integrations the name of the derivation\nand a function to filter its dependencies from the Python\npackage set must be provided.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ntp = pythonPackages: [ pythonPackages.ntplib ];\n}\n"}, "loc": ["services", "datadog-agent", "extraIntegrations"], "readOnly": false, "type": "attribute set"}, "services.datadog-agent.hostname": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The hostname to show in the Datadog dashboard (optional)"}, "example": {"_type": "literalExpression", "text": "\"mymachine.mydomain\""}, "loc": ["services", "datadog-agent", "hostname"], "readOnly": false, "type": "null or string"}, "services.datadog-agent.logLevel": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Logging verbosity."}, "loc": ["services", "datadog-agent", "logLevel"], "readOnly": false, "type": "null or one of \"DEBUG\", \"INFO\", \"WARN\", \"ERROR\""}, "services.datadog-agent.networkCheck": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "{\n  init_config = { };\n  instances = [\n    {\n      collect_connection_state = false;\n      excluded_interfaces = [\n        \"lo\"\n        \"lo0\"\n      ];\n    }\n  ];\n}"}, "description": {"_type": "mdDoc", "text": "Network check config"}, "loc": ["services", "datadog-agent", "networkCheck"], "readOnly": false, "type": "attribute set"}, "services.datadog-agent.package": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "pkgs.datadog-agent"}, "description": {"_type": "mdDoc", "text": "Which DataDog v7 agent package to use. Note that the provided\npackage is expected to have an overridable `pythonPackages`-attribute\nwhich configures the Python environment with the Datadog\nchecks.\n"}, "loc": ["services", "datadog-agent", "package"], "readOnly": false, "type": "package"}, "services.datadog-agent.site": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The datadog site to point the agent towards.\nSet to datadoghq.eu to point it to their EU site.\n"}, "example": {"_type": "literalExpression", "text": "\"datadoghq.eu\""}, "loc": ["services", "datadog-agent", "site"], "readOnly": false, "type": "null or string"}, "services.datadog-agent.tags": {"declarations": ["nixos/modules/services/monitoring/datadog-agent.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The tags to mark this Datadog agent"}, "example": {"_type": "literalExpression", "text": "[\n  \"test\"\n  \"service\"\n]"}, "loc": ["services", "datadog-agent", "tags"], "readOnly": false, "type": "null or (list of string)"}, "services.davfs2.davGroup": {"declarations": ["nixos/modules/services/network-filesystems/davfs2.nix"], "default": {"_type": "literalExpression", "text": "\"davfs2\""}, "description": {"_type": "mdDoc", "text": "The group of the running mount.davfs daemon. Ordinary users must be\nmember of this group in order to mount a davfs2 file system. Value must\nbe given as name, not as numerical id.\n"}, "loc": ["services", "davfs2", "davGroup"], "readOnly": false, "type": "string"}, "services.davfs2.davUser": {"declarations": ["nixos/modules/services/network-filesystems/davfs2.nix"], "default": {"_type": "literalExpression", "text": "\"davfs2\""}, "description": {"_type": "mdDoc", "text": "When invoked by root the mount.davfs daemon will run as this user.\nValue must be given as name, not as numerical id.\n"}, "loc": ["services", "davfs2", "davUser"], "readOnly": false, "type": "string"}, "services.davfs2.enable": {"declarations": ["nixos/modules/services/network-filesystems/davfs2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable davfs2.\n"}, "loc": ["services", "davfs2", "enable"], "readOnly": false, "type": "boolean"}, "services.davfs2.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/davfs2.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines appended to the configuration of davfs2.\n"}, "example": {"_type": "literalExpression", "text": "''\n  kernel_fs coda\n  proxy foo.bar:8080\n  use_locks 0\n''"}, "loc": ["services", "davfs2", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.davmail.config": {"declarations": ["nixos/modules/services/mail/davmail.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Davmail configuration. Refer to\n<http://davmail.sourceforge.net/serversetup.html>\nand <http://davmail.sourceforge.net/advanced.html>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  davmail.allowRemote = true;\n  davmail.imapPort = 55555;\n  davmail.bindAddress = \"10.0.1.2\";\n  davmail.smtpSaveInSent = true;\n  davmail.folderSizeLimit = 10;\n  davmail.caldavAutoSchedule = false;\n  log4j.logger.rootLogger = \"DEBUG\";\n}\n"}, "loc": ["services", "davmail", "config"], "readOnly": false, "type": "davmail config type (str, int, bool or attribute set thereof)"}, "services.davmail.enable": {"declarations": ["nixos/modules/services/mail/davmail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable davmail, an MS Exchange gateway."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "davmail", "enable"], "readOnly": false, "type": "boolean"}, "services.davmail.url": {"declarations": ["nixos/modules/services/mail/davmail.nix"], "description": {"_type": "mdDoc", "text": "Outlook Web Access URL to access the exchange server, i.e. the base webmail URL."}, "example": {"_type": "literalExpression", "text": "\"https://outlook.office365.com/EWS/Exchange.asmx\""}, "loc": ["services", "davmail", "url"], "readOnly": false, "type": "string"}, "services.dbus.apparmor": {"declarations": ["nixos/modules/services/system/dbus.nix"], "default": {"_type": "literalExpression", "text": "\"disabled\""}, "description": {"_type": "mdDoc", "text": "AppArmor mode for dbus.\n\n`enabled` enables mediation when it's\nsupported in the kernel, `disabled`\nalways disables AppArmor even with kernel support, and\n`required` fails when AppArmor was not found\nin the kernel.\n"}, "loc": ["services", "dbus", "apparmor"], "readOnly": false, "type": "one of \"enabled\", \"disabled\", \"required\""}, "services.dbus.implementation": {"declarations": ["nixos/modules/services/system/dbus.nix"], "default": {"_type": "literalExpression", "text": "\"dbus\""}, "description": {"_type": "mdDoc", "text": "The implementation to use for the message bus defined by the D-Bus specification.\nCan be either the classic dbus daemon or dbus-broker, which aims to provide high\nperformance and reliability, while keeping compatibility to the D-Bus\nreference implementation.\n"}, "loc": ["services", "dbus", "implementation"], "readOnly": false, "type": "one of \"dbus\", \"broker\""}, "services.dbus.packages": {"declarations": ["nixos/modules/services/system/dbus.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages whose D-Bus configuration files should be included in\nthe configuration of the D-Bus system-wide or session-wide\nmessage bus.  Specifically, files in the following directories\nwill be included into their respective DBus configuration paths:\n{file}`\u00abpkg\u00bb/etc/dbus-1/system.d`\n{file}`\u00abpkg\u00bb/share/dbus-1/system.d`\n{file}`\u00abpkg\u00bb/share/dbus-1/system-services`\n{file}`\u00abpkg\u00bb/etc/dbus-1/session.d`\n{file}`\u00abpkg\u00bb/share/dbus-1/session.d`\n{file}`\u00abpkg\u00bb/share/dbus-1/services`\n"}, "loc": ["services", "dbus", "packages"], "readOnly": false, "type": "list of path"}, "services.ddccontrol.enable": {"declarations": ["nixos/modules/services/hardware/ddccontrol.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ddccontrol for controlling displays."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ddccontrol", "enable"], "readOnly": false, "type": "boolean"}, "services.ddclient.configFile": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to configuration file.\nWhen set this overrides the generated configuration from module options.\n"}, "example": {"_type": "literalExpression", "text": "\"/root/nixos/secrets/ddclient.conf\""}, "loc": ["services", "ddclient", "configFile"], "readOnly": false, "type": "null or path"}, "services.ddclient.domains": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"\"\n]"}, "description": {"_type": "mdDoc", "text": "Domain name(s) to synchronize.\n"}, "loc": ["services", "ddclient", "domains"], "readOnly": false, "type": "list of string"}, "services.ddclient.enable": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to synchronise your machine's IP address with a dynamic DNS provider (e.g. dyndns.org).\n"}, "loc": ["services", "ddclient", "enable"], "readOnly": false, "type": "boolean"}, "services.ddclient.extraConfig": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration. Contents will be added verbatim to the configuration file.\n\n::: {.note}\n`daemon` should not be added here because it does not work great with the systemd-timer approach the service uses.\n:::\n"}, "loc": ["services", "ddclient", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.ddclient.interval": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "\"10min\""}, "description": {"_type": "mdDoc", "text": "The interval at which to run the check and update.\nSee {command}`man 7 systemd.time` for the format.\n"}, "loc": ["services", "ddclient", "interval"], "readOnly": false, "type": "string"}, "services.ddclient.ipv6": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use IPv6.\n"}, "loc": ["services", "ddclient", "ipv6"], "readOnly": false, "type": "boolean"}, "services.ddclient.package": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ddclient"}, "description": {"_type": "mdDoc", "text": "The ddclient executable package run by the service.\n"}, "loc": ["services", "ddclient", "package"], "readOnly": false, "type": "package"}, "services.ddclient.passwordFile": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password or a TSIG key in named format when using the nsupdate protocol.\n"}, "loc": ["services", "ddclient", "passwordFile"], "readOnly": false, "type": "null or string"}, "services.ddclient.protocol": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "\"dyndns2\""}, "description": {"_type": "mdDoc", "text": "Protocol to use with dynamic DNS provider (see https://sourceforge.net/p/ddclient/wiki/protocols).\n"}, "loc": ["services", "ddclient", "protocol"], "readOnly": false, "type": "string"}, "services.ddclient.quiet": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Print no messages for unnecessary updates.\n"}, "loc": ["services", "ddclient", "quiet"], "readOnly": false, "type": "boolean"}, "services.ddclient.script": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "script as required by some providers.\n"}, "loc": ["services", "ddclient", "script"], "readOnly": false, "type": "string"}, "services.ddclient.server": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Server address.\n"}, "loc": ["services", "ddclient", "server"], "readOnly": false, "type": "string"}, "services.ddclient.ssl": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to use SSL/TLS to connect to dynamic DNS provider.\n"}, "loc": ["services", "ddclient", "ssl"], "readOnly": false, "type": "boolean"}, "services.ddclient.use": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "\"web, web=checkip.dyndns.com/, web-skip='Current IP Address: '\""}, "description": {"_type": "mdDoc", "text": "Method to determine the IP address to send to the dynamic DNS provider.\n"}, "loc": ["services", "ddclient", "use"], "readOnly": false, "type": "string"}, "services.ddclient.username": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "User name.\n"}, "loc": ["services", "ddclient", "username"], "readOnly": false, "type": "string"}, "services.ddclient.verbose": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Print verbose information.\n"}, "loc": ["services", "ddclient", "verbose"], "readOnly": false, "type": "boolean"}, "services.ddclient.zone": {"declarations": ["nixos/modules/services/networking/ddclient.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "zone as required by some providers.\n"}, "loc": ["services", "ddclient", "zone"], "readOnly": false, "type": "string"}, "services.deepin.app-services.enable": {"declarations": ["nixos/modules/services/desktops/deepin/app-services.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Service collection of DDE applications, including dconfig-center."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "deepin", "app-services", "enable"], "readOnly": false, "type": "boolean"}, "services.deepin.dde-api.enable": {"declarations": ["nixos/modules/services/desktops/deepin/dde-api.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Provides some dbus interfaces that is used for screen zone detecting,\nthumbnail generating, and sound playing in Deepin Desktop Environment.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "deepin", "dde-api", "enable"], "readOnly": false, "type": "boolean"}, "services.deepin.dde-daemon.enable": {"declarations": ["nixos/modules/services/desktops/deepin/dde-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Daemon for handling the deepin session settings."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "deepin", "dde-daemon", "enable"], "readOnly": false, "type": "boolean"}, "services.deliantra-server.configFiles": {"declarations": ["nixos/modules/services/games/deliantra-server.nix"], "default": {"_type": "literalExpression", "text": "{\n  motd = \"\";\n}"}, "description": {"_type": "mdDoc", "text": "Contents of the server configuration files. These will be appended to\nthe example configurations the server comes with and overwrite any\ndefault settings defined therein.\n\nThe example here is not comprehensive. See the files in\n/etc/deliantra-server after enabling this module for full documentation.\n"}, "example": {"_type": "literalExpression", "text": "{\n  dm_file = ''\n    admin:secret_password:localhost\n    alice:xyzzy:*\n  '';\n  motd = \"Welcome to Deliantra!\";\n  settings = ''\n    # Settings for game mechanics.\n    stat_loss_on_death true\n    armor_max_enchant 7\n  '';\n  config = ''\n    # Settings for the server daemon.\n    hiscore_url https://deliantra.example.net/scores/\n    max_map_reset 86400\n  '';\n}\n"}, "loc": ["services", "deliantra-server", "configFiles"], "readOnly": false, "type": "attribute set of string"}, "services.deliantra-server.dataDir": {"declarations": ["nixos/modules/services/games/deliantra-server.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.deliantra-data}\""}, "description": {"_type": "mdDoc", "text": "Where to store readonly data (maps, archetypes, sprites, etc).\nNote that if you plan to use the live map editor (rather than editing\nthe maps offline and then nixos-rebuilding), THIS MUST BE WRITEABLE --\ncopy the deliantra-data someplace writeable (say,\n/var/lib/deliantra/data) and update this option accordingly.\n"}, "loc": ["services", "deliantra-server", "dataDir"], "readOnly": false, "type": "string"}, "services.deliantra-server.enable": {"declarations": ["nixos/modules/services/games/deliantra-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, the Deliantra game server will be started at boot.\n"}, "loc": ["services", "deliantra-server", "enable"], "readOnly": false, "type": "boolean"}, "services.deliantra-server.openFirewall": {"declarations": ["nixos/modules/services/games/deliantra-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open ports in the firewall for the server.\n"}, "loc": ["services", "deliantra-server", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.deliantra-server.package": {"declarations": ["nixos/modules/services/games/deliantra-server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.deliantra-server"}, "description": {"_type": "mdDoc", "text": "The package to use for the Deliantra server (and map/arch data, if you\ndon't change dataDir).\n"}, "loc": ["services", "deliantra-server", "package"], "readOnly": false, "type": "package"}, "services.deliantra-server.stateDir": {"declarations": ["nixos/modules/services/games/deliantra-server.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/deliantra\""}, "description": {"_type": "mdDoc", "text": "Where to store runtime data (save files, persistent items, etc).\n\nIf left at the default, this will be automatically created on server\nstartup if it does not already exist. If changed, it is the admin's\nresponsibility to make sure that the directory exists and is writeable\nby the `crossfire` user.\n"}, "loc": ["services", "deliantra-server", "stateDir"], "readOnly": false, "type": "string"}, "services.deluge.authFile": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "description": {"_type": "mdDoc", "text": "The file managing the authentication for deluge, the format of this\nfile is straightforward, each line contains a\nusername:password:level tuple in plaintext. It only has an effect\nwhen {option}`services.deluge.declarative` is set to\n`true`.\nSee <https://dev.deluge-torrent.org/wiki/UserGuide/Authentication> for\nmore information.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/deluge-auth\""}, "loc": ["services", "deluge", "authFile"], "readOnly": false, "type": "path"}, "services.deluge.config": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Deluge core configuration for the core.conf file. Only has an effect\nwhen {option}`services.deluge.declarative` is set to\n`true`. String values must be quoted, integer and\nboolean values must not. See\n<https://git.deluge-torrent.org/deluge/tree/deluge/core/preferencesmanager.py#n41>\nfor the available options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  download_location = \"/srv/torrents/\";\n  max_upload_speed = \"1000.0\";\n  share_ratio_limit = \"2.0\";\n  allow_remote = true;\n  daemon_port = 58846;\n  listen_ports = [ 6881 6889 ];\n}\n"}, "loc": ["services", "deluge", "config"], "readOnly": false, "type": "attribute set"}, "services.deluge.dataDir": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/deluge\""}, "description": {"_type": "mdDoc", "text": "The directory where deluge will create files.\n"}, "loc": ["services", "deluge", "dataDir"], "readOnly": false, "type": "path"}, "services.deluge.declarative": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use a declarative deluge configuration.\nOnly if set to `true`, the options\n{option}`services.deluge.config`,\n{option}`services.deluge.openFirewall` and\n{option}`services.deluge.authFile` will be\napplied.\n"}, "loc": ["services", "deluge", "declarative"], "readOnly": false, "type": "boolean"}, "services.deluge.enable": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Deluge daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "deluge", "enable"], "readOnly": false, "type": "boolean"}, "services.deluge.extraPackages": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra packages available at runtime to enable Deluge's plugins. For example,\nextraction utilities are required for the built-in \"Extractor\" plugin.\nThis always contains unzip, gnutar, xz and bzip2.\n"}, "loc": ["services", "deluge", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.deluge.group": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "default": {"_type": "literalExpression", "text": "\"deluge\""}, "description": {"_type": "mdDoc", "text": "Group under which deluge runs.\n"}, "loc": ["services", "deluge", "group"], "readOnly": false, "type": "string"}, "services.deluge.openFilesLimit": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "default": {"_type": "literalExpression", "text": "4096"}, "description": {"_type": "mdDoc", "text": "Number of files to allow deluged to open.\n"}, "loc": ["services", "deluge", "openFilesLimit"], "readOnly": false, "type": "signed integer or string"}, "services.deluge.openFirewall": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the firewall for the ports in\n{option}`services.deluge.config.listen_ports`. It only takes effet if\n{option}`services.deluge.declarative` is set to\n`true`.\n\nIt does NOT apply to the daemon port nor the web UI port. To access those\nports securely check the documentation\n<https://dev.deluge-torrent.org/wiki/UserGuide/ThinClient#CreateSSHTunnel>\nor use a VPN or configure certificates for deluge.\n"}, "loc": ["services", "deluge", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.deluge.package": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "description": {"_type": "mdDoc", "text": "Deluge package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.deluge-2_x"}, "loc": ["services", "deluge", "package"], "readOnly": false, "type": "package"}, "services.deluge.user": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "default": {"_type": "literalExpression", "text": "\"deluge\""}, "description": {"_type": "mdDoc", "text": "User account under which deluge runs.\n"}, "loc": ["services", "deluge", "user"], "readOnly": false, "type": "string"}, "services.deluge.web.enable": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Deluge Web daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "deluge", "web", "enable"], "readOnly": false, "type": "boolean"}, "services.deluge.web.openFirewall": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for deluge web daemon\n"}, "loc": ["services", "deluge", "web", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.deluge.web.port": {"declarations": ["nixos/modules/services/torrent/deluge.nix"], "default": {"_type": "literalExpression", "text": "8112"}, "description": {"_type": "mdDoc", "text": "Deluge web UI port.\n"}, "loc": ["services", "deluge", "web", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.dendrite.enable": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable matrix.org dendrite."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dendrite", "enable"], "readOnly": false, "type": "boolean"}, "services.dendrite.environmentFile": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file as defined in {manpage}`systemd.exec(5)`.\nSecrets may be passed to the service without adding them to the world-readable\nNix store, by specifying placeholder variables as the option value in Nix and\nsetting these variables accordingly in the environment file. Currently only used\nfor the registration secret to allow secure registration when\nclient_api.registration_disabled is true.\n\n```\n  # snippet of dendrite-related config\n  services.dendrite.settings.client_api.registration_shared_secret = \"$REGISTRATION_SHARED_SECRET\";\n```\n\n```\n  # content of the environment file\n  REGISTRATION_SHARED_SECRET=verysecretpassword\n```\n\nNote that this file needs to be available on the host on which\n`dendrite` is running.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/dendrite/registration_secret\""}, "loc": ["services", "dendrite", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.dendrite.httpPort": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "8008"}, "description": {"_type": "mdDoc", "text": "The port to listen for HTTP requests on.\n"}, "loc": ["services", "dendrite", "httpPort"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.dendrite.httpsPort": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to listen for HTTPS requests on.\n"}, "loc": ["services", "dendrite", "httpsPort"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.dendrite.loadCredential": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This can be used to pass secrets to the systemd service without adding them to\nthe nix store.\nTo use the example setting, see the example of\n{option}`services.dendrite.settings.global.private_key`.\nSee the LoadCredential section of systemd.exec manual for more information.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"private_key:/path/to/my_private_key\"\n]"}, "loc": ["services", "dendrite", "loadCredential"], "readOnly": false, "type": "list of string"}, "services.dendrite.openRegistration": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow open registration without secondary verification (reCAPTCHA).\n"}, "loc": ["services", "dendrite", "openRegistration"], "readOnly": false, "type": "boolean"}, "services.dendrite.settings": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for dendrite, see:\n<https://github.com/matrix-org/dendrite/blob/master/dendrite-config.yaml>\nfor available options with which to populate settings.\n"}, "loc": ["services", "dendrite", "settings"], "readOnly": false, "type": "YAML value"}, "services.dendrite.settings.app_service_api.database.connection_string": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "\"file:federationapi.db\""}, "description": {"_type": "mdDoc", "text": "Database for the Appservice API.\n"}, "loc": ["services", "dendrite", "settings", "app_service_api", "database", "connection_string"], "readOnly": false, "type": "string"}, "services.dendrite.settings.client_api.registration_disabled": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to disable user registration to the server\nwithout the shared secret.\n"}, "loc": ["services", "dendrite", "settings", "client_api", "registration_disabled"], "readOnly": false, "type": "boolean"}, "services.dendrite.settings.federation_api.database.connection_string": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "\"file:federationapi.db\""}, "description": {"_type": "mdDoc", "text": "Database for the Federation API.\n"}, "loc": ["services", "dendrite", "settings", "federation_api", "database", "connection_string"], "readOnly": false, "type": "string"}, "services.dendrite.settings.global.private_key": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "description": {"_type": "mdDoc", "text": "The path to the signing private key file, used to sign\nrequests and events.\n\n```\n  nix-shell -p dendrite --command \"generate-keys --private-key matrix_key.pem\"\n```\n"}, "example": {"_type": "literalExpression", "text": "\"$CREDENTIALS_DIRECTORY/private_key\""}, "loc": ["services", "dendrite", "settings", "global", "private_key"], "readOnly": false, "type": "path or string matching the pattern ^\\$CREDENTIALS_DIRECTORY/.+"}, "services.dendrite.settings.global.server_name": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "description": {"_type": "mdDoc", "text": "The domain name of the server, with optional explicit port.\nThis is used by remote servers to connect to this server.\nThis is also the last part of your UserID.\n"}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "dendrite", "settings", "global", "server_name"], "readOnly": false, "type": "string"}, "services.dendrite.settings.global.trusted_third_party_id_servers": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"matrix.org\"\n  \"vector.im\"\n]"}, "description": {"_type": "mdDoc", "text": "Lists of domains that the server will trust as identity\nservers to verify third party identifiers such as phone\nnumbers and email addresses\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"matrix.org\"\n]"}, "loc": ["services", "dendrite", "settings", "global", "trusted_third_party_id_servers"], "readOnly": false, "type": "list of string"}, "services.dendrite.settings.key_server.database.connection_string": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "\"file:keyserver.db\""}, "description": {"_type": "mdDoc", "text": "Database for the Key Server (for end-to-end encryption).\n"}, "loc": ["services", "dendrite", "settings", "key_server", "database", "connection_string"], "readOnly": false, "type": "string"}, "services.dendrite.settings.media_api.base_path": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/dendrite/media_store\""}, "description": {"_type": "mdDoc", "text": "Storage path for uploaded media.\n"}, "loc": ["services", "dendrite", "settings", "media_api", "base_path"], "readOnly": false, "type": "string"}, "services.dendrite.settings.media_api.database.connection_string": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "\"file:mediaapi.db\""}, "description": {"_type": "mdDoc", "text": "Database for the Media API.\n"}, "loc": ["services", "dendrite", "settings", "media_api", "database", "connection_string"], "readOnly": false, "type": "string"}, "services.dendrite.settings.mscs.database.connection_string": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "\"file:mscs.db\""}, "description": {"_type": "mdDoc", "text": "Database for exerimental MSC's.\n"}, "loc": ["services", "dendrite", "settings", "mscs", "database", "connection_string"], "readOnly": false, "type": "string"}, "services.dendrite.settings.relay_api.database.connection_string": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "\"file:relayapi.db\""}, "description": {"_type": "mdDoc", "text": "Database for the Relay Server.\n"}, "loc": ["services", "dendrite", "settings", "relay_api", "database", "connection_string"], "readOnly": false, "type": "string"}, "services.dendrite.settings.room_server.database.connection_string": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "\"file:roomserver.db\""}, "description": {"_type": "mdDoc", "text": "Database for the Room Server.\n"}, "loc": ["services", "dendrite", "settings", "room_server", "database", "connection_string"], "readOnly": false, "type": "string"}, "services.dendrite.settings.sync_api.database.connection_string": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "\"file:syncserver.db\""}, "description": {"_type": "mdDoc", "text": "Database for the Sync API.\n"}, "loc": ["services", "dendrite", "settings", "sync_api", "database", "connection_string"], "readOnly": false, "type": "string"}, "services.dendrite.settings.sync_api.search.enable": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Dendrite's full-text search engine."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dendrite", "settings", "sync_api", "search", "enable"], "readOnly": false, "type": "boolean"}, "services.dendrite.settings.sync_api.search.index_path": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/dendrite/searchindex\""}, "description": {"_type": "mdDoc", "text": "The path the search index will be created in.\n"}, "loc": ["services", "dendrite", "settings", "sync_api", "search", "index_path"], "readOnly": false, "type": "string"}, "services.dendrite.settings.sync_api.search.language": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "\"en\""}, "description": {"_type": "mdDoc", "text": "The language most likely to be used on the server - used when indexing, to\nensure the returned results match expectations. A full list of possible languages\ncan be found at https://github.com/blevesearch/bleve/tree/master/analysis/lang\n"}, "loc": ["services", "dendrite", "settings", "sync_api", "search", "language"], "readOnly": false, "type": "string"}, "services.dendrite.settings.user_api.account_database.connection_string": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "\"file:userapi_accounts.db\""}, "description": {"_type": "mdDoc", "text": "Database for the User API, accounts.\n"}, "loc": ["services", "dendrite", "settings", "user_api", "account_database", "connection_string"], "readOnly": false, "type": "string"}, "services.dendrite.settings.user_api.device_database.connection_string": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "\"file:userapi_devices.db\""}, "description": {"_type": "mdDoc", "text": "Database for the User API, devices.\n"}, "loc": ["services", "dendrite", "settings", "user_api", "device_database", "connection_string"], "readOnly": false, "type": "string"}, "services.dendrite.tlsCert": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the TLS certificate.\n\n```\n  nix-shell -p dendrite --command \"generate-keys --tls-cert server.crt --tls-key server.key\"\n```\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/dendrite/server.cert\""}, "loc": ["services", "dendrite", "tlsCert"], "readOnly": false, "type": "null or path"}, "services.dendrite.tlsKey": {"declarations": ["nixos/modules/services/matrix/dendrite.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the TLS key.\n\n```\n  nix-shell -p dendrite --command \"generate-keys --tls-cert server.crt --tls-key server.key\"\n```\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/dendrite/server.key\""}, "loc": ["services", "dendrite", "tlsKey"], "readOnly": false, "type": "null or path"}, "services.devmon.enable": {"declarations": ["nixos/modules/services/misc/devmon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable devmon, an automatic device mounting daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "devmon", "enable"], "readOnly": false, "type": "boolean"}, "services.dgraph.alpha.host": {"declarations": ["nixos/modules/services/databases/dgraph.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The host which dgraph alpha will be run on.\n"}, "loc": ["services", "dgraph", "alpha", "host"], "readOnly": false, "type": "string"}, "services.dgraph.alpha.port": {"declarations": ["nixos/modules/services/databases/dgraph.nix"], "default": {"_type": "literalExpression", "text": "7080"}, "description": {"_type": "mdDoc", "text": "The port which to run dgraph alpha on.\n"}, "loc": ["services", "dgraph", "alpha", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.dgraph.enable": {"declarations": ["nixos/modules/services/databases/dgraph.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Dgraph native GraphQL database with a graph backend."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dgraph", "enable"], "readOnly": false, "type": "boolean"}, "services.dgraph.package": {"declarations": ["nixos/modules/services/databases/dgraph.nix"], "default": {"_type": "literalExpression", "text": "pkgs.dgraph"}, "description": {"_type": "mdDoc", "text": "The dgraph package to use."}, "loc": ["services", "dgraph", "package"], "readOnly": false, "type": "package"}, "services.dgraph.settings": {"declarations": ["nixos/modules/services/databases/dgraph.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Contents of the dgraph config. For more details see https://dgraph.io/docs/deploy/config\n"}, "loc": ["services", "dgraph", "settings"], "readOnly": false, "type": "JSON value"}, "services.dgraph.zero.host": {"declarations": ["nixos/modules/services/databases/dgraph.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The host which dgraph zero will be run on.\n"}, "loc": ["services", "dgraph", "zero", "host"], "readOnly": false, "type": "string"}, "services.dgraph.zero.port": {"declarations": ["nixos/modules/services/databases/dgraph.nix"], "default": {"_type": "literalExpression", "text": "5080"}, "description": {"_type": "mdDoc", "text": "The port which to run dgraph zero on.\n"}, "loc": ["services", "dgraph", "zero", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.dhcpd4.authoritative": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the DHCP server shall send DHCPNAK messages to misconfigured\nclients. If this is not done, clients may be unable to get a correct\nIP address after changing subnets until their old lease has expired.\n"}, "loc": ["services", "dhcpd4", "authoritative"], "readOnly": false, "type": "boolean"}, "services.dhcpd4.configFile": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of the DHCP server configuration file.  If no file\nis specified, a file is generated using the other options.\n"}, "loc": ["services", "dhcpd4", "configFile"], "readOnly": false, "type": "null or path"}, "services.dhcpd4.enable": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the DHCPv4 server.\n"}, "loc": ["services", "dhcpd4", "enable"], "readOnly": false, "type": "boolean"}, "services.dhcpd4.extraConfig": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra text to be appended to the DHCP server configuration\nfile. Currently, you almost certainly need to specify something\nthere, such as the options specifying the subnet mask, DNS servers,\netc.\n"}, "example": {"_type": "literalExpression", "text": "''\n  option subnet-mask 255.255.255.0;\n  option broadcast-address 192.168.1.255;\n  option routers 192.168.1.5;\n  option domain-name-servers 130.161.158.4, 130.161.33.17, 130.161.180.1;\n  option domain-name \"example.org\";\n  subnet 192.168.1.0 netmask 255.255.255.0 {\n    range 192.168.1.100 192.168.1.200;\n  }\n''"}, "loc": ["services", "dhcpd4", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.dhcpd4.extraFlags": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command line flags to be passed to the dhcpd daemon.\n"}, "loc": ["services", "dhcpd4", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.dhcpd4.interfaces": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"eth0\"\n]"}, "description": {"_type": "mdDoc", "text": "The interfaces on which the DHCP server should listen.\n"}, "loc": ["services", "dhcpd4", "interfaces"], "readOnly": false, "type": "list of string"}, "services.dhcpd4.machines": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list mapping Ethernet addresses to IPv4 addresses for the\nDHCP server.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    ethernetAddress = \"00:16:76:9a:32:1d\";\n    hostName = \"foo\";\n    ipAddress = \"192.168.1.10\";\n  }\n  {\n    ethernetAddress = \"00:19:d1:1d:c4:9a\";\n    hostName = \"bar\";\n    ipAddress = \"192.168.1.11\";\n  }\n]"}, "loc": ["services", "dhcpd4", "machines"], "readOnly": false, "type": "list of (submodule)"}, "services.dhcpd4.machines.*.ethernetAddress": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "description": {"_type": "mdDoc", "text": "MAC address of the machine.\n"}, "example": {"_type": "literalExpression", "text": "\"00:16:76:9a:32:1d\""}, "loc": ["services", "dhcpd4", "machines", "*", "ethernetAddress"], "readOnly": false, "type": "string"}, "services.dhcpd4.machines.*.hostName": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "description": {"_type": "mdDoc", "text": "Hostname which is assigned statically to the machine.\n"}, "example": {"_type": "literalExpression", "text": "\"foo\""}, "loc": ["services", "dhcpd4", "machines", "*", "hostName"], "readOnly": false, "type": "string"}, "services.dhcpd4.machines.*.ipAddress": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "description": {"_type": "mdDoc", "text": "IP address of the machine.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.1.10\""}, "loc": ["services", "dhcpd4", "machines", "*", "ipAddress"], "readOnly": false, "type": "string"}, "services.dhcpd6.authoritative": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the DHCP server shall send DHCPNAK messages to misconfigured\nclients. If this is not done, clients may be unable to get a correct\nIP address after changing subnets until their old lease has expired.\n"}, "loc": ["services", "dhcpd6", "authoritative"], "readOnly": false, "type": "boolean"}, "services.dhcpd6.configFile": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of the DHCP server configuration file.  If no file\nis specified, a file is generated using the other options.\n"}, "loc": ["services", "dhcpd6", "configFile"], "readOnly": false, "type": "null or path"}, "services.dhcpd6.enable": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the DHCPv6 server.\n"}, "loc": ["services", "dhcpd6", "enable"], "readOnly": false, "type": "boolean"}, "services.dhcpd6.extraConfig": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra text to be appended to the DHCP server configuration\nfile. Currently, you almost certainly need to specify something\nthere, such as the options specifying the subnet mask, DNS servers,\netc.\n"}, "example": {"_type": "literalExpression", "text": "''\n  option subnet-mask 255.255.255.0;\n  option broadcast-address 192.168.1.255;\n  option routers 192.168.1.5;\n  option domain-name-servers 130.161.158.4, 130.161.33.17, 130.161.180.1;\n  option domain-name \"example.org\";\n  subnet 192.168.1.0 netmask 255.255.255.0 {\n    range 192.168.1.100 192.168.1.200;\n  }\n''"}, "loc": ["services", "dhcpd6", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.dhcpd6.extraFlags": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command line flags to be passed to the dhcpd daemon.\n"}, "loc": ["services", "dhcpd6", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.dhcpd6.interfaces": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"eth0\"\n]"}, "description": {"_type": "mdDoc", "text": "The interfaces on which the DHCP server should listen.\n"}, "loc": ["services", "dhcpd6", "interfaces"], "readOnly": false, "type": "list of string"}, "services.dhcpd6.machines": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list mapping Ethernet addresses to IPv6 addresses for the\nDHCP server.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    ethernetAddress = \"00:16:76:9a:32:1d\";\n    hostName = \"foo\";\n    ipAddress = \"192.168.1.10\";\n  }\n  {\n    ethernetAddress = \"00:19:d1:1d:c4:9a\";\n    hostName = \"bar\";\n    ipAddress = \"192.168.1.11\";\n  }\n]"}, "loc": ["services", "dhcpd6", "machines"], "readOnly": false, "type": "list of (submodule)"}, "services.dhcpd6.machines.*.ethernetAddress": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "description": {"_type": "mdDoc", "text": "MAC address of the machine.\n"}, "example": {"_type": "literalExpression", "text": "\"00:16:76:9a:32:1d\""}, "loc": ["services", "dhcpd6", "machines", "*", "ethernetAddress"], "readOnly": false, "type": "string"}, "services.dhcpd6.machines.*.hostName": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "description": {"_type": "mdDoc", "text": "Hostname which is assigned statically to the machine.\n"}, "example": {"_type": "literalExpression", "text": "\"foo\""}, "loc": ["services", "dhcpd6", "machines", "*", "hostName"], "readOnly": false, "type": "string"}, "services.dhcpd6.machines.*.ipAddress": {"declarations": ["nixos/modules/services/networking/dhcpd.nix"], "description": {"_type": "mdDoc", "text": "IP address of the machine.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.1.10\""}, "loc": ["services", "dhcpd6", "machines", "*", "ipAddress"], "readOnly": false, "type": "string"}, "services.dictd.DBs": {"declarations": ["nixos/modules/services/misc/dictd.nix"], "default": {"_type": "literalExpression", "text": "with pkgs.dictdDBs; [ wiktionary wordnet ]"}, "description": {"_type": "mdDoc", "text": "List of databases to make available."}, "example": {"_type": "literalExpression", "text": "[ pkgs.dictdDBs.nld2eng ]"}, "loc": ["services", "dictd", "DBs"], "readOnly": false, "type": "list of package"}, "services.dictd.enable": {"declarations": ["nixos/modules/services/misc/dictd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the DICT.org dictionary server.\n"}, "loc": ["services", "dictd", "enable"], "readOnly": false, "type": "boolean"}, "services.diod.allsquash": {"declarations": ["nixos/modules/services/network-filesystems/diod.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Remap all users to \"nobody\". The attaching user need not be present in the\npassword file.\n"}, "loc": ["services", "diod", "allsquash"], "readOnly": false, "type": "boolean"}, "services.diod.authRequired": {"declarations": ["nixos/modules/services/network-filesystems/diod.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow clients to connect without authentication, i.e. without a valid MUNGE credential.\n"}, "loc": ["services", "diod", "authRequired"], "readOnly": false, "type": "boolean"}, "services.diod.enable": {"declarations": ["nixos/modules/services/network-filesystems/diod.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the diod 9P file server."}, "loc": ["services", "diod", "enable"], "readOnly": false, "type": "boolean"}, "services.diod.exportall": {"declarations": ["nixos/modules/services/network-filesystems/diod.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Export all file systems listed in /proc/mounts. If new file systems are mounted\nafter diod has started, they will become immediately mountable. If there is a\nduplicate entry for a file system in the exports list, any options listed in\nthe exports entry will apply.\n"}, "loc": ["services", "diod", "exportall"], "readOnly": false, "type": "boolean"}, "services.diod.exportopts": {"declarations": ["nixos/modules/services/network-filesystems/diod.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Establish a default set of export options. These are overridden, not appended\nto, by opts attributes in an \"exports\" entry.\n"}, "loc": ["services", "diod", "exportopts"], "readOnly": false, "type": "list of string"}, "services.diod.exports": {"declarations": ["nixos/modules/services/network-filesystems/diod.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List the file systems that clients will be allowed to mount. All paths should\nbe fully qualified. The exports table can include two types of element:\na string element (as above),\nor an alternate table element form { path=\"/path\", opts=\"ro\" }.\nIn the alternate form, the (optional) opts attribute is a comma-separated list\nof export options. The two table element forms can be mixed in the exports\ntable. Note that although diod will not traverse file system boundaries for a\ngiven mount due to inode uniqueness constraints, subdirectories of a file\nsystem can be separately exported.\n"}, "loc": ["services", "diod", "exports"], "readOnly": false, "type": "list of string"}, "services.diod.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/diod.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options for diod.conf."}, "loc": ["services", "diod", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.diod.listen": {"declarations": ["nixos/modules/services/network-filesystems/diod.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0:564\"\n]"}, "description": {"_type": "mdDoc", "text": "[ \"IP:PORT\" [,\"IP:PORT\",...] ]\nList the interfaces and ports that diod should listen on.\n"}, "loc": ["services", "diod", "listen"], "readOnly": false, "type": "list of string"}, "services.diod.logdest": {"declarations": ["nixos/modules/services/network-filesystems/diod.nix"], "default": {"_type": "literalExpression", "text": "\"syslog:daemon:err\""}, "description": {"_type": "mdDoc", "text": "Set the destination for logging.\nThe value has the form of \"syslog:facility:level\" or \"filename\".\n"}, "loc": ["services", "diod", "logdest"], "readOnly": false, "type": "string"}, "services.diod.nwthreads": {"declarations": ["nixos/modules/services/network-filesystems/diod.nix"], "default": {"_type": "literalExpression", "text": "16"}, "description": {"_type": "mdDoc", "text": "Sets the (fixed) number of worker threads created to handle 9P\nrequests for a unique aname.\n"}, "loc": ["services", "diod", "nwthreads"], "readOnly": false, "type": "signed integer"}, "services.diod.squashuser": {"declarations": ["nixos/modules/services/network-filesystems/diod.nix"], "default": {"_type": "literalExpression", "text": "\"nobody\""}, "description": {"_type": "mdDoc", "text": "Change the squash user. The squash user must be present in the password file.\n"}, "loc": ["services", "diod", "squashuser"], "readOnly": false, "type": "string"}, "services.diod.statfsPassthru": {"declarations": ["nixos/modules/services/network-filesystems/diod.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This option configures statfs to return the host file system's type\nrather than V9FS_MAGIC.\n"}, "loc": ["services", "diod", "statfsPassthru"], "readOnly": false, "type": "boolean"}, "services.diod.userdb": {"declarations": ["nixos/modules/services/network-filesystems/diod.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This option disables password/group lookups. It allows any uid to attach and\nassumes gid=uid, and supplementary groups contain only the primary gid.\n"}, "loc": ["services", "diod", "userdb"], "readOnly": false, "type": "boolean"}, "services.discourse.admin.email": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "description": {"_type": "mdDoc", "text": "The admin user email address.\n"}, "example": {"_type": "literalExpression", "text": "\"admin@example.com\""}, "loc": ["services", "discourse", "admin", "email"], "readOnly": false, "type": "string"}, "services.discourse.admin.fullName": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "description": {"_type": "mdDoc", "text": "The admin user's full name.\n"}, "loc": ["services", "discourse", "admin", "fullName"], "readOnly": false, "type": "string"}, "services.discourse.admin.passwordFile": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "description": {"_type": "mdDoc", "text": "A path to a file containing the admin user's password.\n\nThis should be a string, not a nix path, since nix paths are\ncopied into the world-readable nix store.\n"}, "loc": ["services", "discourse", "admin", "passwordFile"], "readOnly": false, "type": "path"}, "services.discourse.admin.skipCreate": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Do not create the admin account, instead rely on other\nexisting admin accounts.\n"}, "loc": ["services", "discourse", "admin", "skipCreate"], "readOnly": false, "type": "boolean"}, "services.discourse.admin.username": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "description": {"_type": "mdDoc", "text": "The admin user username.\n"}, "example": {"_type": "literalExpression", "text": "\"admin\""}, "loc": ["services", "discourse", "admin", "username"], "readOnly": false, "type": "string"}, "services.discourse.backendSettings": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional settings to put in the\n{file}`discourse.conf` file.\n\nLook in the\n[discourse_defaults.conf](https://github.com/discourse/discourse/blob/master/config/discourse_defaults.conf)\nfile in the upstream distribution to find available options.\n\nSetting an option to `null` means\n\u201cdefine variable, but leave right-hand side empty\u201d.\n"}, "example": {"_type": "literalExpression", "text": "{\n  max_reqs_per_ip_per_minute = 300;\n  max_reqs_per_ip_per_10_seconds = 60;\n  max_asset_reqs_per_ip_per_10_seconds = 250;\n  max_reqs_per_ip_mode = \"warn+block\";\n};\n"}, "loc": ["services", "discourse", "backendSettings"], "readOnly": false, "type": "attribute set of (null or string or signed integer or boolean or floating point number)"}, "services.discourse.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether a database should be automatically created on the\nlocal host. Set this to `false` if you plan\non provisioning a local database yourself. This has no effect\nif {option}`services.discourse.database.host` is customized.\n"}, "loc": ["services", "discourse", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.discourse.database.host": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Discourse database hostname. `null` means\n\u201cprefer local unix socket connection\u201d.\n"}, "loc": ["services", "discourse", "database", "host"], "readOnly": false, "type": "null or string"}, "services.discourse.database.ignorePostgresqlVersion": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow other versions of PostgreSQL than the\nrecommended one. Only effective when\n{option}`services.discourse.database.createLocally`\nis enabled.\n"}, "loc": ["services", "discourse", "database", "ignorePostgresqlVersion"], "readOnly": false, "type": "boolean"}, "services.discourse.database.name": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "\"discourse\""}, "description": {"_type": "mdDoc", "text": "Discourse database name.\n"}, "loc": ["services", "discourse", "database", "name"], "readOnly": false, "type": "string"}, "services.discourse.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing the Discourse database user password.\n\nThis should be a string, not a nix path, since nix paths are\ncopied into the world-readable nix store.\n"}, "loc": ["services", "discourse", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.discourse.database.pool": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "8"}, "description": {"_type": "mdDoc", "text": "Database connection pool size.\n"}, "loc": ["services", "discourse", "database", "pool"], "readOnly": false, "type": "signed integer"}, "services.discourse.database.username": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "\"discourse\""}, "description": {"_type": "mdDoc", "text": "Discourse database user.\n"}, "loc": ["services", "discourse", "database", "username"], "readOnly": false, "type": "string"}, "services.discourse.enable": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Discourse, an open source discussion platform."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "discourse", "enable"], "readOnly": false, "type": "boolean"}, "services.discourse.enableACME": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalMD", "text": "`true`, unless {option}`services.discourse.sslCertificate`\nand {option}`services.discourse.sslCertificateKey` are set.\n"}, "description": {"_type": "mdDoc", "text": "Whether an ACME certificate should be used to secure\nconnections to the server.\n"}, "loc": ["services", "discourse", "enableACME"], "readOnly": false, "type": "boolean"}, "services.discourse.hostname": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "config.networking.fqdnOrHostName"}, "description": {"_type": "mdDoc", "text": "The hostname to serve Discourse on.\n"}, "example": {"_type": "literalExpression", "text": "\"discourse.example.com\""}, "loc": ["services", "discourse", "hostname"], "readOnly": false, "type": "string"}, "services.discourse.mail.contactEmailAddress": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Email address of key contact responsible for this\nsite. Used for critical notifications, as well as on the\n`/about` contact form for urgent matters.\n"}, "loc": ["services", "discourse", "mail", "contactEmailAddress"], "readOnly": false, "type": "string"}, "services.discourse.mail.incoming.apiKeyFile": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the Discourse API key used to add\nposts and messages from mail. If left at its default\nvalue `null`, one will be automatically\ngenerated.\n\nThis should be a string, not a nix path, since nix paths\nare copied into the world-readable nix store.\n"}, "loc": ["services", "discourse", "mail", "incoming", "apiKeyFile"], "readOnly": false, "type": "null or path"}, "services.discourse.mail.incoming.enable": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to set up Postfix to receive incoming mail.\n"}, "loc": ["services", "discourse", "mail", "incoming", "enable"], "readOnly": false, "type": "boolean"}, "services.discourse.mail.incoming.mailReceiverPackage": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "pkgs.discourse-mail-receiver"}, "description": {"_type": "mdDoc", "text": "The discourse-mail-receiver package to use.\n"}, "loc": ["services", "discourse", "mail", "incoming", "mailReceiverPackage"], "readOnly": false, "type": "package"}, "services.discourse.mail.incoming.replyEmailAddress": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "\"%{reply_key}@${config.services.discourse.hostname}\""}, "description": {"_type": "mdDoc", "text": "Template for reply by email incoming email address, for\nexample: %{reply_key}@reply.example.com or\nreplies+%{reply_key}@example.com\n"}, "loc": ["services", "discourse", "mail", "incoming", "replyEmailAddress"], "readOnly": false, "type": "string"}, "services.discourse.mail.notificationEmailAddress": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "\"${if config.services.discourse.mail.incoming.enable then \"notifications\" else \"noreply\"}@${config.services.discourse.hostname}\"\n"}, "description": {"_type": "mdDoc", "text": "The `from:` email address used when\nsending all essential system emails. The domain specified\nhere must have SPF, DKIM and reverse PTR records set\ncorrectly for email to arrive.\n"}, "loc": ["services", "discourse", "mail", "notificationEmailAddress"], "readOnly": false, "type": "string"}, "services.discourse.mail.outgoing.authentication": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Authentication type to use, see http://api.rubyonrails.org/classes/ActionMailer/Base.html\n"}, "loc": ["services", "discourse", "mail", "outgoing", "authentication"], "readOnly": false, "type": "null or one of \"plain\", \"login\", \"cram_md5\""}, "services.discourse.mail.outgoing.domain": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "config.services.discourse.hostname"}, "description": {"_type": "mdDoc", "text": "HELO domain to use for outgoing mail.\n"}, "loc": ["services", "discourse", "mail", "outgoing", "domain"], "readOnly": false, "type": "string"}, "services.discourse.mail.outgoing.enableStartTLSAuto": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to try to use StartTLS.\n"}, "loc": ["services", "discourse", "mail", "outgoing", "enableStartTLSAuto"], "readOnly": false, "type": "boolean"}, "services.discourse.mail.outgoing.forceTLS": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Force implicit TLS as per RFC 8314 3.3.\n"}, "loc": ["services", "discourse", "mail", "outgoing", "forceTLS"], "readOnly": false, "type": "boolean"}, "services.discourse.mail.outgoing.opensslVerifyMode": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "\"peer\""}, "description": {"_type": "mdDoc", "text": "How OpenSSL checks the certificate, see http://api.rubyonrails.org/classes/ActionMailer/Base.html\n"}, "loc": ["services", "discourse", "mail", "outgoing", "opensslVerifyMode"], "readOnly": false, "type": "string"}, "services.discourse.mail.outgoing.passwordFile": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password of the SMTP server account.\n\nThis should be a string, not a nix path, since nix paths\nare copied into the world-readable nix store.\n"}, "loc": ["services", "discourse", "mail", "outgoing", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.discourse.mail.outgoing.port": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "25"}, "description": {"_type": "mdDoc", "text": "The port of the SMTP server Discourse should use to\nsend email.\n"}, "loc": ["services", "discourse", "mail", "outgoing", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.discourse.mail.outgoing.serverAddress": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The address of the SMTP server Discourse should use to\nsend email.\n"}, "loc": ["services", "discourse", "mail", "outgoing", "serverAddress"], "readOnly": false, "type": "string"}, "services.discourse.mail.outgoing.username": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The username of the SMTP server.\n"}, "loc": ["services", "discourse", "mail", "outgoing", "username"], "readOnly": false, "type": "null or string"}, "services.discourse.nginx.enable": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether an `nginx` virtual host should be\nset up to serve Discourse. Only disable if you're planning\nto use a different web server, which is not recommended.\n"}, "loc": ["services", "discourse", "nginx", "enable"], "readOnly": false, "type": "boolean"}, "services.discourse.package": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "pkgs.discourse"}, "description": {"_type": "mdDoc", "text": "The discourse package to use.\n"}, "loc": ["services", "discourse", "package"], "readOnly": false, "type": "package"}, "services.discourse.plugins": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Plugins to install as part of Discourse, expressed as a list of derivations.\n"}, "example": {"_type": "literalExpression", "text": "with config.services.discourse.package.plugins; [\n  discourse-canned-replies\n  discourse-github\n];\n"}, "loc": ["services", "discourse", "plugins"], "readOnly": false, "type": "list of package"}, "services.discourse.redis.dbNumber": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Redis database number.\n"}, "loc": ["services", "discourse", "redis", "dbNumber"], "readOnly": false, "type": "signed integer"}, "services.discourse.redis.host": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Redis server hostname.\n"}, "loc": ["services", "discourse", "redis", "host"], "readOnly": false, "type": "string"}, "services.discourse.redis.passwordFile": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing the Redis password.\n\nThis should be a string, not a nix path, since nix paths are\ncopied into the world-readable nix store.\n"}, "loc": ["services", "discourse", "redis", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.discourse.redis.useSSL": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "config.services.discourse.redis.host != \"localhost\""}, "description": {"_type": "mdDoc", "text": "Connect to Redis with SSL.\n"}, "loc": ["services", "discourse", "redis", "useSSL"], "readOnly": false, "type": "boolean"}, "services.discourse.secretKeyBaseFile": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to a file containing the\n`secret_key_base` secret.\n\nDiscourse uses `secret_key_base` to encrypt\nthe cookie store, which contains session data, and to digest\nuser auth tokens.\n\nNeeds to be a 64 byte long string of hexadecimal\ncharacters. You can generate one by running\n\n```\nopenssl rand -hex 64 >/path/to/secret_key_base_file\n```\n\nThis should be a string, not a nix path, since nix paths are\ncopied into the world-readable nix store.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/secret_key_base\""}, "loc": ["services", "discourse", "secretKeyBaseFile"], "readOnly": false, "type": "null or path"}, "services.discourse.sidekiqProcesses": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "How many Sidekiq processes should be spawned.\n"}, "loc": ["services", "discourse", "sidekiqProcesses"], "readOnly": false, "type": "signed integer"}, "services.discourse.siteSettings": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Discourse site settings. These are the settings that can be\nchanged from the UI. This only defines their default values:\nthey can still be overridden from the UI.\n\nAvailable settings can be found by looking in the\n[site_settings.yml](https://github.com/discourse/discourse/blob/master/config/site_settings.yml)\nfile of the upstream distribution. To find a setting's path,\nyou only need to care about the first two levels; i.e. its\ncategory and name. See the example.\n\nSettings containing secret data should be set to an\nattribute set containing the attribute\n`_secret` - a string pointing to a file\ncontaining the value the option should be set to. See the\nexample to get a better picture of this: in the resulting\n{file}`config/nixos_site_settings.json` file,\nthe `login.github_client_secret` key will\nbe set to the contents of the\n{file}`/run/keys/discourse_github_client_secret`\nfile.\n"}, "example": {"_type": "literalExpression", "text": "{\n  required = {\n    title = \"My Cats\";\n    site_description = \"Discuss My Cats (and be nice plz)\";\n  };\n  login = {\n    enable_github_logins = true;\n    github_client_id = \"a2f6dfe838cb3206ce20\";\n    github_client_secret._secret = /run/keys/discourse_github_client_secret;\n  };\n};\n"}, "loc": ["services", "discourse", "siteSettings"], "readOnly": false, "type": "JSON value"}, "services.discourse.sslCertificate": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the server SSL certificate. Set this to enable\nSSL.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/ssl.cert\""}, "loc": ["services", "discourse", "sslCertificate"], "readOnly": false, "type": "null or path"}, "services.discourse.sslCertificateKey": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the server SSL certificate key. Set this to\nenable SSL.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/ssl.key\""}, "loc": ["services", "discourse", "sslCertificateKey"], "readOnly": false, "type": "null or path"}, "services.discourse.unicornTimeout": {"declarations": ["nixos/modules/services/web-apps/discourse.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "Time in seconds before a request to Unicorn times out.\n\nThis can be raised if the system Discourse is running on is\ntoo slow to handle many requests within 30 seconds.\n"}, "loc": ["services", "discourse", "unicornTimeout"], "readOnly": false, "type": "signed integer"}, "services.disnix.enable": {"declarations": ["nixos/modules/services/misc/disnix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Disnix."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "disnix", "enable"], "readOnly": false, "type": "boolean"}, "services.disnix.enableMultiUser": {"declarations": ["nixos/modules/services/misc/disnix.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to support multi-user mode by enabling the Disnix D-Bus service"}, "loc": ["services", "disnix", "enableMultiUser"], "readOnly": false, "type": "boolean"}, "services.disnix.enableProfilePath": {"declarations": ["nixos/modules/services/misc/disnix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable exposing the Disnix profiles in the system's PATH."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "disnix", "enableProfilePath"], "readOnly": false, "type": "boolean"}, "services.disnix.package": {"declarations": ["nixos/modules/services/misc/disnix.nix"], "default": {"_type": "literalExpression", "text": "pkgs.disnix"}, "description": {"_type": "mdDoc", "text": "The Disnix package"}, "loc": ["services", "disnix", "package"], "readOnly": false, "type": "path"}, "services.disnix.profiles": {"declarations": ["nixos/modules/services/misc/disnix.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"default\"\n]"}, "description": {"_type": "mdDoc", "text": "Names of the Disnix profiles to expose in the system's PATH"}, "loc": ["services", "disnix", "profiles"], "readOnly": false, "type": "list of string"}, "services.disnix.useWebServiceInterface": {"declarations": ["nixos/modules/services/misc/disnix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the DisnixWebService interface running on Apache Tomcat."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "disnix", "useWebServiceInterface"], "readOnly": false, "type": "boolean"}, "services.distccd.allowedClients": {"declarations": ["nixos/modules/services/development/distccd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "description": {"_type": "mdDoc", "text": "Client IPs which are allowed to connect to distccd in CIDR notation.\n\nAnyone who can connect to the distccd server can run arbitrary\ncommands on that system as the distcc user, therefore you should use\nthis judiciously.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"192.168.0.0/24\"\n  \"10.0.0.0/24\"\n]"}, "loc": ["services", "distccd", "allowedClients"], "readOnly": false, "type": "list of string"}, "services.distccd.enable": {"declarations": ["nixos/modules/services/development/distccd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable distccd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "distccd", "enable"], "readOnly": false, "type": "boolean"}, "services.distccd.jobTimeout": {"declarations": ["nixos/modules/services/development/distccd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum duration, in seconds, of a single compilation request.\n"}, "loc": ["services", "distccd", "jobTimeout"], "readOnly": false, "type": "null or signed integer"}, "services.distccd.logLevel": {"declarations": ["nixos/modules/services/development/distccd.nix"], "default": {"_type": "literalExpression", "text": "\"warning\""}, "description": {"_type": "mdDoc", "text": "Set the minimum severity of error that will be included in the log\nfile. Useful if you only want to see error messages rather than an\nentry for each connection.\n"}, "loc": ["services", "distccd", "logLevel"], "readOnly": false, "type": "null or one of \"critical\", \"error\", \"warning\", \"notice\", \"info\", \"debug\""}, "services.distccd.maxJobs": {"declarations": ["nixos/modules/services/development/distccd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum number of tasks distccd should execute at any time.\n"}, "loc": ["services", "distccd", "maxJobs"], "readOnly": false, "type": "null or signed integer"}, "services.distccd.nice": {"declarations": ["nixos/modules/services/development/distccd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Niceness of the compilation tasks.\n"}, "loc": ["services", "distccd", "nice"], "readOnly": false, "type": "null or signed integer"}, "services.distccd.openFirewall": {"declarations": ["nixos/modules/services/development/distccd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Opens the specified TCP port for distcc.\n"}, "loc": ["services", "distccd", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.distccd.package": {"declarations": ["nixos/modules/services/development/distccd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.distcc"}, "description": {"_type": "mdDoc", "text": "The distcc package to use.\n"}, "loc": ["services", "distccd", "package"], "readOnly": false, "type": "package"}, "services.distccd.port": {"declarations": ["nixos/modules/services/development/distccd.nix"], "default": {"_type": "literalExpression", "text": "3632"}, "description": {"_type": "mdDoc", "text": "The TCP port which distccd will listen on.\n"}, "loc": ["services", "distccd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.distccd.stats.enable": {"declarations": ["nixos/modules/services/development/distccd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable statistics reporting via HTTP server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "distccd", "stats", "enable"], "readOnly": false, "type": "boolean"}, "services.distccd.stats.port": {"declarations": ["nixos/modules/services/development/distccd.nix"], "default": {"_type": "literalExpression", "text": "3633"}, "description": {"_type": "mdDoc", "text": "The TCP port which the distccd statistics HTTP server will listen\non.\n"}, "loc": ["services", "distccd", "stats", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.distccd.zeroconf": {"declarations": ["nixos/modules/services/development/distccd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to register via mDNS/DNS-SD\n"}, "loc": ["services", "distccd", "zeroconf"], "readOnly": false, "type": "boolean"}, "services.dkimproxy-out.domains": {"declarations": ["nixos/modules/services/mail/dkimproxy-out.nix"], "description": {"_type": "mdDoc", "text": "List of domains DKIMproxy can sign for."}, "example": {"_type": "literalExpression", "text": "[\n  \"example.org\"\n  \"example.com\"\n]"}, "loc": ["services", "dkimproxy-out", "domains"], "readOnly": false, "type": "list of string"}, "services.dkimproxy-out.enable": {"declarations": ["nixos/modules/services/mail/dkimproxy-out.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable dkimproxy_out.\n\nNote that a key will be auto-generated, and can be found in\n/var/lib/dkimproxy-out.\n"}, "loc": ["services", "dkimproxy-out", "enable"], "readOnly": false, "type": "boolean"}, "services.dkimproxy-out.keySize": {"declarations": ["nixos/modules/services/mail/dkimproxy-out.nix"], "default": {"_type": "literalExpression", "text": "2048"}, "description": {"_type": "mdDoc", "text": "Size of the RSA key to use to sign outgoing emails. Note that the\nmaximum mandatorily verified as per RFC6376 is 2048.\n"}, "loc": ["services", "dkimproxy-out", "keySize"], "readOnly": false, "type": "signed integer"}, "services.dkimproxy-out.listen": {"declarations": ["nixos/modules/services/mail/dkimproxy-out.nix"], "description": {"_type": "mdDoc", "text": "Address:port DKIMproxy should listen on."}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1:10027\""}, "loc": ["services", "dkimproxy-out", "listen"], "readOnly": false, "type": "string"}, "services.dkimproxy-out.relay": {"declarations": ["nixos/modules/services/mail/dkimproxy-out.nix"], "description": {"_type": "mdDoc", "text": "Address:port DKIMproxy should forward mail to."}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1:10028\""}, "loc": ["services", "dkimproxy-out", "relay"], "readOnly": false, "type": "string"}, "services.dkimproxy-out.selector": {"declarations": ["nixos/modules/services/mail/dkimproxy-out.nix"], "description": {"_type": "mdDoc", "text": "The selector to use for DKIM key identification.\n\nFor example, if 'selector1' is used here, then for each domain\n'example.org' given in `domain`, 'selector1._domainkey.example.org'\nshould contain the TXT record indicating the public key is the one\nin /var/lib/dkimproxy-out/public.key: \"v=DKIM1; t=s; p=[THE PUBLIC KEY]\".\n"}, "example": {"_type": "literalExpression", "text": "\"selector1\""}, "loc": ["services", "dkimproxy-out", "selector"], "readOnly": false, "type": "string"}, "services.dleyna-renderer.enable": {"declarations": ["nixos/modules/services/desktops/dleyna-renderer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable dleyna-renderer service, a DBus service\nfor handling DLNA renderers.\n"}, "loc": ["services", "dleyna-renderer", "enable"], "readOnly": false, "type": "boolean"}, "services.dleyna-server.enable": {"declarations": ["nixos/modules/services/desktops/dleyna-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable dleyna-server service, a DBus service\nfor handling DLNA servers.\n"}, "loc": ["services", "dleyna-server", "enable"], "readOnly": false, "type": "boolean"}, "services.dnscache.clientIps": {"declarations": ["nixos/modules/services/networking/dnscache.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "description": {"_type": "mdDoc", "text": "Client IP addresses (or prefixes) from which to accept connections."}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168\"\n  \"172.23.75.82\"\n]"}, "loc": ["services", "dnscache", "clientIps"], "readOnly": false, "type": "list of string"}, "services.dnscache.domainServers": {"declarations": ["nixos/modules/services/networking/dnscache.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Table of {hostname: server} pairs to use as authoritative servers for hosts (and subhosts).\nIf entry for @ is not specified predefined list of root servers is used.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"@\" = [\"8.8.8.8\" \"8.8.4.4\"];\n  \"example.com\" = [\"192.168.100.100\"];\n}\n"}, "loc": ["services", "dnscache", "domainServers"], "readOnly": false, "type": "attribute set of list of string"}, "services.dnscache.enable": {"declarations": ["nixos/modules/services/networking/dnscache.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the dnscache caching dns server."}, "loc": ["services", "dnscache", "enable"], "readOnly": false, "type": "boolean"}, "services.dnscache.forwardOnly": {"declarations": ["nixos/modules/services/networking/dnscache.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to treat root servers (for @) as caching\nservers, requesting addresses the same way a client does. This is\nneeded if you want to use e.g. Google DNS as your upstream DNS.\n"}, "loc": ["services", "dnscache", "forwardOnly"], "readOnly": false, "type": "boolean"}, "services.dnscache.ip": {"declarations": ["nixos/modules/services/networking/dnscache.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IP address on which to listen for connections."}, "loc": ["services", "dnscache", "ip"], "readOnly": false, "type": "string"}, "services.dnscrypt-wrapper.address": {"declarations": ["nixos/modules/services/networking/dnscrypt-wrapper.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The DNSCrypt wrapper will bind to this IP address.\n"}, "loc": ["services", "dnscrypt-wrapper", "address"], "readOnly": false, "type": "string"}, "services.dnscrypt-wrapper.enable": {"declarations": ["nixos/modules/services/networking/dnscrypt-wrapper.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable DNSCrypt wrapper."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dnscrypt-wrapper", "enable"], "readOnly": false, "type": "boolean"}, "services.dnscrypt-wrapper.keys.checkInterval": {"declarations": ["nixos/modules/services/networking/dnscrypt-wrapper.nix"], "default": {"_type": "literalExpression", "text": "1440"}, "description": {"_type": "mdDoc", "text": "The time interval (in minutes) between key expiration checks.\n"}, "loc": ["services", "dnscrypt-wrapper", "keys", "checkInterval"], "readOnly": false, "type": "signed integer"}, "services.dnscrypt-wrapper.keys.expiration": {"declarations": ["nixos/modules/services/networking/dnscrypt-wrapper.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "The duration (in days) of the time-limited secret key.\nThis will be automatically rotated before expiration.\n"}, "loc": ["services", "dnscrypt-wrapper", "keys", "expiration"], "readOnly": false, "type": "signed integer"}, "services.dnscrypt-wrapper.port": {"declarations": ["nixos/modules/services/networking/dnscrypt-wrapper.nix"], "default": {"_type": "literalExpression", "text": "5353"}, "description": {"_type": "mdDoc", "text": "The DNSCrypt wrapper will listen for DNS queries on this port.\n"}, "loc": ["services", "dnscrypt-wrapper", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.dnscrypt-wrapper.providerKey.public": {"declarations": ["nixos/modules/services/networking/dnscrypt-wrapper.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The filepath to the provider public key. If not given a new\nprovider key pair will be generated on the first run.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/secrets/public.key\""}, "loc": ["services", "dnscrypt-wrapper", "providerKey", "public"], "readOnly": false, "type": "null or path"}, "services.dnscrypt-wrapper.providerKey.secret": {"declarations": ["nixos/modules/services/networking/dnscrypt-wrapper.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The filepath to the provider secret key. If not given a new\nprovider key pair will be generated on the first run.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/secrets/secret.key\""}, "loc": ["services", "dnscrypt-wrapper", "providerKey", "secret"], "readOnly": false, "type": "null or path"}, "services.dnscrypt-wrapper.providerName": {"declarations": ["nixos/modules/services/networking/dnscrypt-wrapper.nix"], "default": {"_type": "literalExpression", "text": "\"2.dnscrypt-cert.${config.networking.hostName}\""}, "description": {"_type": "mdDoc", "text": "The name that will be given to this DNSCrypt resolver.\nNote: the resolver name must start with `2.dnscrypt-cert.`.\n"}, "example": {"_type": "literalExpression", "text": "\"2.dnscrypt-cert.myresolver\""}, "loc": ["services", "dnscrypt-wrapper", "providerName"], "readOnly": false, "type": "string"}, "services.dnscrypt-wrapper.upstream.address": {"declarations": ["nixos/modules/services/networking/dnscrypt-wrapper.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The IP address of the upstream DNS server DNSCrypt will \"wrap\".\n"}, "loc": ["services", "dnscrypt-wrapper", "upstream", "address"], "readOnly": false, "type": "string"}, "services.dnscrypt-wrapper.upstream.port": {"declarations": ["nixos/modules/services/networking/dnscrypt-wrapper.nix"], "default": {"_type": "literalExpression", "text": "53"}, "description": {"_type": "mdDoc", "text": "The port of the upstream DNS server DNSCrypt will \"wrap\".\n"}, "loc": ["services", "dnscrypt-wrapper", "upstream", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.dnsdist.enable": {"declarations": ["nixos/modules/services/networking/dnsdist.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable dnsdist domain name server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dnsdist", "enable"], "readOnly": false, "type": "boolean"}, "services.dnsdist.extraConfig": {"declarations": ["nixos/modules/services/networking/dnsdist.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to dnsdist.conf.\n"}, "loc": ["services", "dnsdist", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.dnsdist.listenAddress": {"declarations": ["nixos/modules/services/networking/dnsdist.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Listen IP Address"}, "loc": ["services", "dnsdist", "listenAddress"], "readOnly": false, "type": "string"}, "services.dnsdist.listenPort": {"declarations": ["nixos/modules/services/networking/dnsdist.nix"], "default": {"_type": "literalExpression", "text": "53"}, "description": {"_type": "mdDoc", "text": "Listen port"}, "loc": ["services", "dnsdist", "listenPort"], "readOnly": false, "type": "signed integer"}, "services.dnsmasq.alwaysKeepRunning": {"declarations": ["nixos/modules/services/networking/dnsmasq.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, systemd will always respawn dnsmasq even if shut down manually. The default, disabled, will only restart it on error.\n"}, "loc": ["services", "dnsmasq", "alwaysKeepRunning"], "readOnly": false, "type": "boolean"}, "services.dnsmasq.enable": {"declarations": ["nixos/modules/services/networking/dnsmasq.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run dnsmasq.\n"}, "loc": ["services", "dnsmasq", "enable"], "readOnly": false, "type": "boolean"}, "services.dnsmasq.extraConfig": {"declarations": ["nixos/modules/services/networking/dnsmasq.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration directives that should be added to\n`dnsmasq.conf`.\n\nThis option is deprecated, please use {option}`settings` instead.\n"}, "loc": ["services", "dnsmasq", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.dnsmasq.resolveLocalQueries": {"declarations": ["nixos/modules/services/networking/dnsmasq.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether dnsmasq should resolve local queries (i.e. add 127.0.0.1 to\n/etc/resolv.conf).\n"}, "loc": ["services", "dnsmasq", "resolveLocalQueries"], "readOnly": false, "type": "boolean"}, "services.dnsmasq.settings": {"declarations": ["nixos/modules/services/networking/dnsmasq.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration of dnsmasq. Lists get added one value per line (empty\nlists and false values don't get added, though false values get\nturned to comments). Gets merged with\n\n    {\n      dhcp-leasefile = \"/var/lib/dnsmasq/dnsmasq.leases\";\n      conf-file = optional cfg.resolveLocalQueries \"/etc/dnsmasq-conf.conf\";\n      resolv-file = optional cfg.resolveLocalQueries \"/etc/dnsmasq-resolv.conf\";\n    }\n"}, "example": {"_type": "literalExpression", "text": "{\n  domain-needed = true;\n  dhcp-range = [ \"192.168.0.2,192.168.0.254\" ];\n}\n"}, "loc": ["services", "dnsmasq", "settings"], "readOnly": false, "type": "attribute set of (atom (null, bool, int, float or string) or a list of them for duplicate keys)"}, "services.dnsmasq.settings.server": {"declarations": ["nixos/modules/services/networking/dnsmasq.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The DNS servers which dnsmasq should query.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"8.8.8.8\"\n  \"8.8.4.4\"\n]"}, "loc": ["services", "dnsmasq", "settings", "server"], "readOnly": false, "type": "list of string"}, "services.do-agent.enable": {"declarations": ["nixos/modules/services/monitoring/do-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable do-agent, the DigitalOcean droplet metrics agent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "do-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.dockerRegistry.enable": {"declarations": ["nixos/modules/services/misc/docker-registry.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Docker Registry."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dockerRegistry", "enable"], "readOnly": false, "type": "boolean"}, "services.dockerRegistry.enableDelete": {"declarations": ["nixos/modules/services/misc/docker-registry.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable delete for manifests and blobs."}, "loc": ["services", "dockerRegistry", "enableDelete"], "readOnly": false, "type": "boolean"}, "services.dockerRegistry.enableGarbageCollect": {"declarations": ["nixos/modules/services/misc/docker-registry.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable garbage collect."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dockerRegistry", "enableGarbageCollect"], "readOnly": false, "type": "boolean"}, "services.dockerRegistry.enableRedisCache": {"declarations": ["nixos/modules/services/misc/docker-registry.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable redis as blob cache."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dockerRegistry", "enableRedisCache"], "readOnly": false, "type": "boolean"}, "services.dockerRegistry.extraConfig": {"declarations": ["nixos/modules/services/misc/docker-registry.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Docker extra registry configuration via environment variables.\n"}, "loc": ["services", "dockerRegistry", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.dockerRegistry.garbageCollectDates": {"declarations": ["nixos/modules/services/misc/docker-registry.nix"], "default": {"_type": "literalExpression", "text": "\"daily\""}, "description": {"_type": "mdDoc", "text": "Specification (in the format described by\n{manpage}`systemd.time(7)`) of the time at\nwhich the garbage collect will occur.\n"}, "loc": ["services", "dockerRegistry", "garbageCollectDates"], "readOnly": false, "type": "string"}, "services.dockerRegistry.listenAddress": {"declarations": ["nixos/modules/services/misc/docker-registry.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Docker registry host or ip to bind to."}, "loc": ["services", "dockerRegistry", "listenAddress"], "readOnly": false, "type": "string"}, "services.dockerRegistry.package": {"declarations": ["nixos/modules/services/misc/docker-registry.nix"], "default": {"_type": "literalExpression", "text": "pkgs.docker-distribution"}, "description": {"_type": "mdDoc", "text": "Which Docker registry package to use."}, "example": {"_type": "literalExpression", "text": "pkgs.gitlab-container-registry"}, "loc": ["services", "dockerRegistry", "package"], "readOnly": false, "type": "package"}, "services.dockerRegistry.port": {"declarations": ["nixos/modules/services/misc/docker-registry.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Docker registry port to bind to."}, "loc": ["services", "dockerRegistry", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.dockerRegistry.redisPassword": {"declarations": ["nixos/modules/services/misc/docker-registry.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Set redis password."}, "loc": ["services", "dockerRegistry", "redisPassword"], "readOnly": false, "type": "string"}, "services.dockerRegistry.redisUrl": {"declarations": ["nixos/modules/services/misc/docker-registry.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:6379\""}, "description": {"_type": "mdDoc", "text": "Set redis host and port."}, "loc": ["services", "dockerRegistry", "redisUrl"], "readOnly": false, "type": "string"}, "services.dockerRegistry.storagePath": {"declarations": ["nixos/modules/services/misc/docker-registry.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/docker-registry\""}, "description": {"_type": "mdDoc", "text": "Docker registry storage path for the filesystem storage backend. Set to\nnull to configure another backend via extraConfig.\n"}, "loc": ["services", "dockerRegistry", "storagePath"], "readOnly": false, "type": "null or path"}, "services.documize.cert": {"declarations": ["nixos/modules/services/web-apps/documize.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The {file}`cert.pem` file used for https.\n"}, "loc": ["services", "documize", "cert"], "readOnly": false, "type": "null or string"}, "services.documize.db": {"declarations": ["nixos/modules/services/web-apps/documize.nix"], "description": {"_type": "mdDoc", "text": "Database specific connection string for example:\n- MySQL/Percona/MariaDB:\n  `user:password@tcp(host:3306)/documize`\n- MySQLv8+:\n  `user:password@tcp(host:3306)/documize?allowNativePasswords=true`\n- PostgreSQL:\n  `host=localhost port=5432 dbname=documize user=admin password=secret sslmode=disable`\n- MSSQL:\n  `sqlserver://username:password@localhost:1433?database=Documize` or\n  `sqlserver://sa@localhost/SQLExpress?database=Documize`\n"}, "loc": ["services", "documize", "db"], "readOnly": false, "type": "string"}, "services.documize.dbtype": {"declarations": ["nixos/modules/services/web-apps/documize.nix"], "default": {"_type": "literalExpression", "text": "\"postgresql\""}, "description": {"_type": "mdDoc", "text": "Specify the database provider: `mysql`, `percona`, `mariadb`, `postgresql`, `sqlserver`\n"}, "loc": ["services", "documize", "dbtype"], "readOnly": false, "type": "one of \"mysql\", \"percona\", \"mariadb\", \"postgresql\", \"sqlserver\""}, "services.documize.enable": {"declarations": ["nixos/modules/services/web-apps/documize.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Documize Wiki."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "documize", "enable"], "readOnly": false, "type": "boolean"}, "services.documize.forcesslport": {"declarations": ["nixos/modules/services/web-apps/documize.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Redirect given http port number to TLS.\n"}, "loc": ["services", "documize", "forcesslport"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.documize.key": {"declarations": ["nixos/modules/services/web-apps/documize.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The {file}`key.pem` file used for https.\n"}, "loc": ["services", "documize", "key"], "readOnly": false, "type": "null or string"}, "services.documize.location": {"declarations": ["nixos/modules/services/web-apps/documize.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "reserved\n"}, "loc": ["services", "documize", "location"], "readOnly": false, "type": "null or string"}, "services.documize.offline": {"declarations": ["nixos/modules/services/web-apps/documize.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set `true` for offline mode.\n"}, "loc": ["services", "documize", "offline"], "readOnly": false, "type": "boolean"}, "services.documize.package": {"declarations": ["nixos/modules/services/web-apps/documize.nix"], "default": {"_type": "literalExpression", "text": "pkgs.documize-community"}, "description": {"_type": "mdDoc", "text": "Which package to use for documize.\n"}, "loc": ["services", "documize", "package"], "readOnly": false, "type": "package"}, "services.documize.port": {"declarations": ["nixos/modules/services/web-apps/documize.nix"], "default": {"_type": "literalExpression", "text": "5001"}, "description": {"_type": "mdDoc", "text": "The http/https port number.\n"}, "loc": ["services", "documize", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.documize.salt": {"declarations": ["nixos/modules/services/web-apps/documize.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The salt string used to encode JWT tokens, if not set a random value will be generated.\n"}, "example": {"_type": "literalExpression", "text": "\"3edIYV6c8B28b19fh\""}, "loc": ["services", "documize", "salt"], "readOnly": false, "type": "null or string"}, "services.documize.stateDirectoryName": {"declarations": ["nixos/modules/services/web-apps/documize.nix"], "default": {"_type": "literalExpression", "text": "\"documize\""}, "description": {"_type": "mdDoc", "text": "The name of the directory below {file}`/var/lib/private`\nwhere documize runs in and stores, for example, backups.\n"}, "loc": ["services", "documize", "stateDirectoryName"], "readOnly": false, "type": "string"}, "services.doh-proxy-rust.enable": {"declarations": ["nixos/modules/services/networking/doh-proxy-rust.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable doh-proxy-rust."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "doh-proxy-rust", "enable"], "readOnly": false, "type": "boolean"}, "services.doh-proxy-rust.flags": {"declarations": ["nixos/modules/services/networking/doh-proxy-rust.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of command-line flags to pass to doh-proxy. For details on the\navailable options, see <https://github.com/jedisct1/doh-server#usage>.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--server-address=9.9.9.9:53\"\n]"}, "loc": ["services", "doh-proxy-rust", "flags"], "readOnly": false, "type": "list of string"}, "services.dokuwiki.sites": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specification of one or more DokuWiki sites to serve"}, "loc": ["services", "dokuwiki", "sites"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.dokuwiki.sites.<name>.acl": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Access Control Lists: see <https://www.dokuwiki.org/acl>\nMutually exclusive with services.dokuwiki.aclFile\nSet this to a value other than null to take precedence over aclFile option.\n\nWarning: Consider using aclFile instead if you do not\nwant to store the ACL in the world-readable Nix store.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    page = \"start\";\n    actor = \"@external\";\n    level = \"read\";\n  }\n  {\n    page = \"*\";\n    actor = \"@users\";\n    level = \"upload\";\n  }\n]\n"}, "loc": ["services", "dokuwiki", "sites", "<name>", "acl"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.dokuwiki.sites.<name>.acl.*.actor": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "description": {"_type": "mdDoc", "text": "User or group to restrict"}, "example": {"_type": "literalExpression", "text": "\"@external\""}, "loc": ["services", "dokuwiki", "sites", "<name>", "acl", "*", "actor"], "readOnly": false, "type": "string"}, "services.dokuwiki.sites.<name>.acl.*.level": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "description": {"_type": "mdDoc", "text": "Permission level to restrict the actor(s) to.\nSee <https://www.dokuwiki.org/acl#background_info> for explanation\n"}, "example": {"_type": "literalExpression", "text": "\"read\""}, "loc": ["services", "dokuwiki", "sites", "<name>", "acl", "*", "level"], "readOnly": false, "type": "one of 4, 16, 2, 0, 1, 8, \"create\", \"delete\", \"edit\", \"none\", \"read\", \"upload\""}, "services.dokuwiki.sites.<name>.acl.*.page": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "description": {"_type": "mdDoc", "text": "Page or namespace to restrict"}, "example": {"_type": "literalExpression", "text": "\"start\""}, "loc": ["services", "dokuwiki", "sites", "<name>", "acl", "*", "page"], "readOnly": false, "type": "string"}, "services.dokuwiki.sites.<name>.aclFile": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/dokuwiki/\u2039name\u203a/acl.auth.php\""}, "description": {"_type": "mdDoc", "text": "Location of the dokuwiki acl rules. Mutually exclusive with services.dokuwiki.acl\nMutually exclusive with services.dokuwiki.acl which is preferred.\nConsult documentation <https://www.dokuwiki.org/acl> for further instructions.\nExample: <https://github.com/splitbrain/dokuwiki/blob/master/conf/acl.auth.php.dist>\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/dokuwiki/\u2039name\u203a/acl.auth.php\""}, "loc": ["services", "dokuwiki", "sites", "<name>", "aclFile"], "readOnly": false, "type": "null or string"}, "services.dokuwiki.sites.<name>.enable": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable DokuWiki web application."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dokuwiki", "sites", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.dokuwiki.sites.<name>.mergedConfig": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "{\n  useacl = true;\n}\n"}, "description": {"_type": "mdDoc", "text": "Read only representation of the final configuration.\n"}, "loc": ["services", "dokuwiki", "sites", "<name>", "mergedConfig"], "readOnly": true, "type": "unspecified value"}, "services.dokuwiki.sites.<name>.package": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "pkgs.dokuwiki"}, "description": {"_type": "mdDoc", "text": "Which DokuWiki package to use."}, "loc": ["services", "dokuwiki", "sites", "<name>", "package"], "readOnly": false, "type": "package"}, "services.dokuwiki.sites.<name>.phpOptions": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Options for PHP's php.ini file for this dokuwiki site.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"opcache.interned_strings_buffer\" = \"8\";\n  \"opcache.max_accelerated_files\" = \"10000\";\n  \"opcache.memory_consumption\" = \"128\";\n  \"opcache.revalidate_freq\" = \"15\";\n  \"opcache.fast_shutdown\" = \"1\";\n}\n"}, "loc": ["services", "dokuwiki", "sites", "<name>", "phpOptions"], "readOnly": false, "type": "attribute set of string"}, "services.dokuwiki.sites.<name>.phpPackage": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "\"pkgs.php81\""}, "description": {"_type": "mdDoc", "text": "PHP package to use for this dokuwiki site.\n"}, "loc": ["services", "dokuwiki", "sites", "<name>", "phpPackage"], "readOnly": false, "relatedPackages": "- [`pkgs.php80`](\n    https://search.nixos.org/packages?show=php80&sort=relevance&query=php80\n  )\n- [`pkgs.php81`](\n    https://search.nixos.org/packages?show=php81&sort=relevance&query=php81\n  )\n", "type": "package"}, "services.dokuwiki.sites.<name>.plugins": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of path(s) to respective plugin(s) which are copied from the 'plugin' directory.\n\n::: {.note}\nThese plugins need to be packaged before use, see example.\n:::\n"}, "example": {"_type": "literalExpression", "text": "let\n  plugin-icalevents = pkgs.stdenv.mkDerivation rec {\n    name = \"icalevents\";\n    version = \"2017-06-16\";\n    src = pkgs.fetchzip {\n      stripRoot = false;\n      url = \"https://github.com/real-or-random/dokuwiki-plugin-icalevents/releases/download/${version}/dokuwiki-plugin-icalevents-${version}.zip\";\n      hash = \"sha256-IPs4+qgEfe8AAWevbcCM9PnyI0uoyamtWeg4rEb+9Wc=\";\n    };\n    installPhase = \"mkdir -p $out; cp -R * $out/\";\n  };\n# And then pass this theme to the plugin list like this:\nin [ plugin-icalevents ]\n"}, "loc": ["services", "dokuwiki", "sites", "<name>", "plugins"], "readOnly": false, "type": "list of path"}, "services.dokuwiki.sites.<name>.pluginsConfig": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "{\n  authad = false;\n  authldap = false;\n  authmysql = false;\n  authpgsql = false;\n}"}, "description": {"_type": "mdDoc", "text": "List of the dokuwiki (un)loaded plugins.\n"}, "loc": ["services", "dokuwiki", "sites", "<name>", "pluginsConfig"], "readOnly": false, "type": "attribute set of boolean"}, "services.dokuwiki.sites.<name>.poolConfig": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = 32;\n  \"pm.max_requests\" = 500;\n  \"pm.max_spare_servers\" = 4;\n  \"pm.min_spare_servers\" = 2;\n  \"pm.start_servers\" = 2;\n}"}, "description": {"_type": "mdDoc", "text": "Options for the DokuWiki PHP pool. See the documentation on `php-fpm.conf`\nfor details on configuration directives.\n"}, "loc": ["services", "dokuwiki", "sites", "<name>", "poolConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.dokuwiki.sites.<name>.settings": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "{\n  superuser = \"admin\";\n  useacl = true;\n}"}, "description": {"_type": "mdDoc", "text": "Structural DokuWiki configuration.\nRefer to <https://www.dokuwiki.org/config>\nfor details and supported values.\nSettings can either be directly set from nix,\nloaded from a file using `._file` or obtained from any\nPHP function calls using `._raw`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  title = \"My Wiki\";\n  userewrite = 1;\n  disableactions = [ \"register\" ]; # Will be concatenated with commas\n  plugin.smtp = {\n    smtp_pass._file = \"/var/run/secrets/dokuwiki/smtp_pass\";\n    smtp_user._raw = \"getenv('DOKUWIKI_SMTP_USER')\";\n  };\n}\n"}, "loc": ["services", "dokuwiki", "sites", "<name>", "settings"], "readOnly": false, "type": "attribute set of anything"}, "services.dokuwiki.sites.<name>.stateDir": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/dokuwiki/\u2039name\u203a/data\""}, "description": {"_type": "mdDoc", "text": "Location of the DokuWiki state directory."}, "loc": ["services", "dokuwiki", "sites", "<name>", "stateDir"], "readOnly": false, "type": "path"}, "services.dokuwiki.sites.<name>.templates": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of path(s) to respective template(s) which are copied from the 'tpl' directory.\n\n::: {.note}\nThese templates need to be packaged before use, see example.\n:::\n"}, "example": {"_type": "literalExpression", "text": "let\n  template-bootstrap3 = pkgs.stdenv.mkDerivation rec {\n  name = \"bootstrap3\";\n  version = \"2022-07-27\";\n  src = pkgs.fetchFromGitHub {\n    owner = \"giterlizzi\";\n    repo = \"dokuwiki-template-bootstrap3\";\n    rev = \"v${version}\";\n    hash = \"sha256-B3Yd4lxdwqfCnfmZdp+i/Mzwn/aEuZ0ovagDxuR6lxo=\";\n  };\n  installPhase = \"mkdir -p $out; cp -R * $out/\";\n};\n# And then pass this theme to the template list like this:\nin [ template-bootstrap3 ]\n"}, "loc": ["services", "dokuwiki", "sites", "<name>", "templates"], "readOnly": false, "type": "list of path"}, "services.dokuwiki.sites.<name>.usersFile": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/dokuwiki/\u2039name\u203a/users.auth.php\""}, "description": {"_type": "mdDoc", "text": "Location of the dokuwiki users file. List of users. Format:\n\n    login:passwordhash:Real Name:email:groups,comma,separated\n\nCreate passwordHash easily by using:\n\n    mkpasswd -5 password `pwgen 8 1`\n\nExample: <https://github.com/splitbrain/dokuwiki/blob/master/conf/users.auth.php.dist>\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/dokuwiki/\u2039name\u203a/users.auth.php\""}, "loc": ["services", "dokuwiki", "sites", "<name>", "usersFile"], "readOnly": false, "type": "null or string"}, "services.dokuwiki.webserver": {"declarations": ["nixos/modules/services/web-apps/dokuwiki.nix"], "default": {"_type": "literalExpression", "text": "\"nginx\""}, "description": {"_type": "mdDoc", "text": "Whether to use nginx or caddy for virtual host management.\n\nFurther nginx configuration can be done by adapting `services.nginx.virtualHosts.<name>`.\nSee [](#opt-services.nginx.virtualHosts) for further information.\n\nFurther caddy configuration can be done by adapting `services.caddy.virtualHosts.<name>`.\nSee [](#opt-services.caddy.virtualHosts) for further information.\n"}, "loc": ["services", "dokuwiki", "webserver"], "readOnly": false, "type": "one of \"nginx\", \"caddy\""}, "services.dolibarr.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally."}, "loc": ["services", "dolibarr", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.dolibarr.database.host": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "dolibarr", "database", "host"], "readOnly": false, "type": "string"}, "services.dolibarr.database.name": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "\"dolibarr\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "dolibarr", "database", "name"], "readOnly": false, "type": "string"}, "services.dolibarr.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Database password file."}, "example": {"_type": "literalExpression", "text": "\"/run/keys/dolibarr-dbpassword\""}, "loc": ["services", "dolibarr", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.dolibarr.database.port": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "3306"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "dolibarr", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.dolibarr.database.user": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "\"dolibarr\""}, "description": {"_type": "mdDoc", "text": "Database username."}, "loc": ["services", "dolibarr", "database", "user"], "readOnly": false, "type": "string"}, "services.dolibarr.domain": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Domain name of your server.\n"}, "loc": ["services", "dolibarr", "domain"], "readOnly": false, "type": "string"}, "services.dolibarr.enable": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable dolibarr."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dolibarr", "enable"], "readOnly": false, "type": "boolean"}, "services.dolibarr.group": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "\"dolibarr\""}, "description": {"_type": "mdDoc", "text": "Group account under which dolibarr runs.\n\n::: {.note}\nIf left as the default value this group will automatically be created\non system activation, otherwise you are responsible for\nensuring the group exists before the dolibarr application starts.\n:::\n"}, "loc": ["services", "dolibarr", "group"], "readOnly": false, "type": "string"}, "services.dolibarr.nginx": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "With this option, you can customize an nginx virtual host which already has sensible defaults for Dolibarr.\nSet to {} if you do not need any customization to the virtual host.\nIf enabled, then by default, the {option}`serverName` is\n`${domain}`,\nSSL is active, and certificates are acquired via ACME.\nIf this is set to null (the default), no nginx virtualHost will be configured.\n"}, "example": {"_type": "literalExpression", "text": "{\n  serverAliases = [\n    \"dolibarr.${config.networking.domain}\"\n    \"erp.${config.networking.domain}\"\n  ];\n  enableACME = false;\n}\n"}, "loc": ["services", "dolibarr", "nginx"], "readOnly": false, "type": "null or (submodule)"}, "services.dolibarr.nginx.acmeFallbackHost": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host which to proxy requests to if ACME challenge is not found. Useful\nif you want multiple hosts to be able to verify the same domain name.\n\nWith this option, you could request certificates for the present domain\nwith an ACME client that is running on another host, which you would\nspecify here.\n"}, "loc": ["services", "dolibarr", "nginx", "acmeFallbackHost"], "readOnly": false, "type": "null or string"}, "services.dolibarr.nginx.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the ACME challenge, which is **public**. Don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "dolibarr", "nginx", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.dolibarr.nginx.addSSL": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "dolibarr", "nginx", "addSSL"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.basicAuth": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "dolibarr", "nginx", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.dolibarr.nginx.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "dolibarr", "nginx", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.dolibarr.nginx.default": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Makes this vhost the default.\n"}, "loc": ["services", "dolibarr", "nginx", "default"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.enableACME": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "dolibarr", "nginx", "enableACME"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.extraConfig": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the vhost verbatim.\n"}, "loc": ["services", "dolibarr", "nginx", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.dolibarr.nginx.forceSSL": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "dolibarr", "nginx", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given hostname.\n"}, "example": {"_type": "literalExpression", "text": "\"newserver.example.org\""}, "loc": ["services", "dolibarr", "nginx", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.dolibarr.nginx.http2": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/2 protocol.\nNote that (as of writing) due to nginx's implementation, to disable\nHTTP/2 you have to disable it on all vhosts that use a given\nIP address / port.\nIf there is one server block configured to enable http2, then it is\nenabled for all server blocks on this IP.\nSee https://stackoverflow.com/a/39466948/263061.\n"}, "loc": ["services", "dolibarr", "nginx", "http2"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.http3": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/3 protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that HTTP/3 support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "dolibarr", "nginx", "http3"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.http3_hq": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that special application protocol support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "dolibarr", "nginx", "http3_hq"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.kTLS": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kTLS support.\nImplementing TLS in the kernel (kTLS) improves performance by significantly\nreducing the need for copying operations between user space and the kernel.\nRequired Nginx version 1.21.4 or later.\n"}, "loc": ["services", "dolibarr", "nginx", "kTLS"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.listen": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\nIPv6 addresses must be enclosed in square brackets.\nNote: this option overrides `addSSL`\nand `onlySSL`.\n\nIf you only want to set the addresses manually and not\nthe ports, take a look at `listenAddresses`\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    addr = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    addr = \"192.154.1.1\";\n    port = 80;\n  }\n]"}, "loc": ["services", "dolibarr", "nginx", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.dolibarr.nginx.listen.*.addr": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "description": {"_type": "mdDoc", "text": "IP address."}, "loc": ["services", "dolibarr", "nginx", "listen", "*", "addr"], "readOnly": false, "type": "string"}, "services.dolibarr.nginx.listen.*.extraParameters": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters of this listen directive."}, "example": {"_type": "literalExpression", "text": "[\n  \"backlog=1024\"\n  \"deferred\"\n]"}, "loc": ["services", "dolibarr", "nginx", "listen", "*", "extraParameters"], "readOnly": false, "type": "list of string"}, "services.dolibarr.nginx.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Port number."}, "loc": ["services", "dolibarr", "nginx", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.dolibarr.nginx.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SSL."}, "loc": ["services", "dolibarr", "nginx", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n\nNote: This option overrides `enableIPv6`\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"[::1]\"\n]"}, "loc": ["services", "dolibarr", "nginx", "listenAddresses"], "readOnly": false, "type": "list of string"}, "services.dolibarr.nginx.locations": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n};\n"}, "loc": ["services", "dolibarr", "nginx", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.dolibarr.nginx.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "dolibarr", "nginx", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.dolibarr.nginx.locations.<name>.basicAuth": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "dolibarr", "nginx", "locations", "<name>", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.dolibarr.nginx.locations.<name>.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "dolibarr", "nginx", "locations", "<name>", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.dolibarr.nginx.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "dolibarr", "nginx", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.dolibarr.nginx.locations.<name>.fastcgiParams": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "FastCGI parameters to override.  Unlike in the Nginx\nconfiguration file, overriding only some default parameters\nwon't unset the default values for other parameters.\n"}, "loc": ["services", "dolibarr", "nginx", "locations", "<name>", "fastcgiParams"], "readOnly": false, "type": "attribute set of (string or path)"}, "services.dolibarr.nginx.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds index directive.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "dolibarr", "nginx", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.dolibarr.nginx.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "dolibarr", "nginx", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.dolibarr.nginx.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds proxy_pass directive and sets recommended proxy headers if\nrecommendedProxySettings is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "dolibarr", "nginx", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.dolibarr.nginx.locations.<name>.proxyWebsockets": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to support proxying websocket connections with HTTP/1.1.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dolibarr", "nginx", "locations", "<name>", "proxyWebsockets"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.locations.<name>.recommendedProxySettings": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "config.services.nginx.recommendedProxySettings"}, "description": {"_type": "mdDoc", "text": "Enable recommended proxy settings.\n"}, "loc": ["services", "dolibarr", "nginx", "locations", "<name>", "recommendedProxySettings"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.locations.<name>.return": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds a return directive, for e.g. redirections.\n"}, "example": {"_type": "literalExpression", "text": "\"301 http://example.com$request_uri\""}, "loc": ["services", "dolibarr", "nginx", "locations", "<name>", "return"], "readOnly": false, "type": "null or string"}, "services.dolibarr.nginx.locations.<name>.root": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Root directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/root/directory\""}, "loc": ["services", "dolibarr", "nginx", "locations", "<name>", "root"], "readOnly": false, "type": "null or path"}, "services.dolibarr.nginx.locations.<name>.tryFiles": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds try_files directive.\n"}, "example": {"_type": "literalExpression", "text": "\"$uri =404\""}, "loc": ["services", "dolibarr", "nginx", "locations", "<name>", "tryFiles"], "readOnly": false, "type": "null or string"}, "services.dolibarr.nginx.onlySSL": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "dolibarr", "nginx", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.quic": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the QUIC transport protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.\nNote that QUIC support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "dolibarr", "nginx", "quic"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.rejectSSL": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to listen for and reject all HTTPS connections to this vhost. Useful in\n[default](#opt-services.nginx.virtualHosts._name_.default)\nserver blocks to avoid serving the certificate for another vhost. Uses the\n`ssl_reject_handshake` directive available in nginx versions\n1.19.4 and above.\n"}, "loc": ["services", "dolibarr", "nginx", "rejectSSL"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.reuseport": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create an individual listening socket .\nIt is required to specify only once on one of the hosts.\n"}, "loc": ["services", "dolibarr", "nginx", "reuseport"], "readOnly": false, "type": "boolean"}, "services.dolibarr.nginx.root": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of the web root directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "dolibarr", "nginx", "root"], "readOnly": false, "type": "null or path"}, "services.dolibarr.nginx.serverAliases": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"example.org\"\n]"}, "loc": ["services", "dolibarr", "nginx", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.dolibarr.nginx.serverName": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of this virtual host. Defaults to attribute name in virtualHosts.\n"}, "example": {"_type": "literalExpression", "text": "\"example.org\""}, "loc": ["services", "dolibarr", "nginx", "serverName"], "readOnly": false, "type": "null or string"}, "services.dolibarr.nginx.sslCertificate": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "dolibarr", "nginx", "sslCertificate"], "readOnly": false, "type": "path"}, "services.dolibarr.nginx.sslCertificateKey": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "dolibarr", "nginx", "sslCertificateKey"], "readOnly": false, "type": "path"}, "services.dolibarr.nginx.sslTrustedCertificate": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to root SSL certificate for stapling and client certificates."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\""}, "loc": ["services", "dolibarr", "nginx", "sslTrustedCertificate"], "readOnly": false, "type": "null or path"}, "services.dolibarr.nginx.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "dolibarr", "nginx", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.dolibarr.poolConfig": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = 32;\n  \"pm.max_requests\" = 500;\n  \"pm.max_spare_servers\" = 4;\n  \"pm.min_spare_servers\" = 2;\n  \"pm.start_servers\" = 2;\n}"}, "description": {"_type": "mdDoc", "text": "Options for the Dolibarr PHP pool. See the documentation on [`php-fpm.conf`](https://www.php.net/manual/en/install.fpm.configuration.php)\nfor details on configuration directives.\n"}, "loc": ["services", "dolibarr", "poolConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.dolibarr.settings": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Dolibarr settings, see <https://github.com/Dolibarr/dolibarr/blob/develop/htdocs/conf/conf.php.example> for details."}, "loc": ["services", "dolibarr", "settings"], "readOnly": false, "type": "attribute set of (boolean or signed integer or string)"}, "services.dolibarr.stateDir": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/dolibarr\""}, "description": {"_type": "mdDoc", "text": "State and configuration directory dolibarr will use.\n"}, "loc": ["services", "dolibarr", "stateDir"], "readOnly": false, "type": "string"}, "services.dolibarr.user": {"declarations": ["nixos/modules/services/web-apps/dolibarr.nix"], "default": {"_type": "literalExpression", "text": "\"dolibarr\""}, "description": {"_type": "mdDoc", "text": "User account under which dolibarr runs.\n\n::: {.note}\nIf left as the default value this user will automatically be created\non system activation, otherwise you are responsible for\nensuring the user exists before the dolibarr application starts.\n:::\n"}, "loc": ["services", "dolibarr", "user"], "readOnly": false, "type": "string"}, "services.domoticz.bind": {"declarations": ["nixos/modules/services/misc/domoticz.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IP address to bind to."}, "loc": ["services", "domoticz", "bind"], "readOnly": false, "type": "string"}, "services.domoticz.enable": {"declarations": ["nixos/modules/services/misc/domoticz.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Domoticz home automation."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "domoticz", "enable"], "readOnly": false, "type": "boolean"}, "services.domoticz.port": {"declarations": ["nixos/modules/services/misc/domoticz.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Port to bind to for HTTP, set to 0 to disable HTTP."}, "loc": ["services", "domoticz", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.dovecot2.configFile": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Config file used for the whole dovecot configuration."}, "loc": ["services", "dovecot2", "configFile"], "readOnly": false, "type": "null or path"}, "services.dovecot2.createMailUser": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatically creating the user\n      given in {option}`services.dovecot.user` and the group\n      given in {option}`services.dovecot.group`.."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dovecot2", "createMailUser"], "readOnly": false, "type": "boolean"}, "services.dovecot2.enable": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the dovecot 2.x POP3/IMAP server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dovecot2", "enable"], "readOnly": false, "type": "boolean"}, "services.dovecot2.enableDHE": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable enable ssl_dh and generation of primes for the key exchange."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dovecot2", "enableDHE"], "readOnly": false, "type": "boolean"}, "services.dovecot2.enableImap": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable starting the IMAP listener (when Dovecot is enabled)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dovecot2", "enableImap"], "readOnly": false, "type": "boolean"}, "services.dovecot2.enableLmtp": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable starting the LMTP listener (when Dovecot is enabled)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dovecot2", "enableLmtp"], "readOnly": false, "type": "boolean"}, "services.dovecot2.enablePAM": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable creating a own Dovecot PAM service and configure PAM user logins."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dovecot2", "enablePAM"], "readOnly": false, "type": "boolean"}, "services.dovecot2.enablePop3": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable starting the POP3 listener (when Dovecot is enabled)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dovecot2", "enablePop3"], "readOnly": false, "type": "boolean"}, "services.dovecot2.enableQuota": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the dovecot quota service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dovecot2", "enableQuota"], "readOnly": false, "type": "boolean"}, "services.dovecot2.extraConfig": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional entries to put verbatim into Dovecot's config file."}, "example": {"_type": "literalExpression", "text": "\"mail_debug = yes\""}, "loc": ["services", "dovecot2", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.dovecot2.group": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "\"dovecot2\""}, "description": {"_type": "mdDoc", "text": "Dovecot group name."}, "loc": ["services", "dovecot2", "group"], "readOnly": false, "type": "string"}, "services.dovecot2.mailGroup": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Default group to store mail for virtual users."}, "loc": ["services", "dovecot2", "mailGroup"], "readOnly": false, "type": "null or string"}, "services.dovecot2.mailLocation": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "\"maildir:/var/spool/mail/%u\""}, "description": {"_type": "mdDoc", "text": "Location that dovecot will use for mail folders. Dovecot mail_location option.\n"}, "example": {"_type": "literalExpression", "text": "\"maildir:~/mail:INBOX=/var/spool/mail/%u\""}, "loc": ["services", "dovecot2", "mailLocation"], "readOnly": false, "type": "string"}, "services.dovecot2.mailPlugins": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "{\n  globally = {\n    enable = [ ];\n  };\n  perProtocol = { };\n}"}, "description": {"_type": "mdDoc", "text": "Additional entries to add to the mail_plugins variable, globally and per protocol"}, "example": {"_type": "literalExpression", "text": "{\n  globally = {\n    enable = [\n      \"acl\"\n    ];\n  };\n  perProtocol = {\n    imap = {\n      enable = [\n        \"imap_acl\"\n      ];\n    };\n  };\n}"}, "loc": ["services", "dovecot2", "mailPlugins"], "readOnly": false, "type": "submodule"}, "services.dovecot2.mailPlugins.globally": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "{\n  enable = [ ];\n}"}, "description": {"_type": "mdDoc", "text": "Additional entries to add to the mail_plugins variable for all protocols"}, "example": {"_type": "literalExpression", "text": "{\n  enable = [\n    \"virtual\"\n  ];\n}"}, "loc": ["services", "dovecot2", "mailPlugins", "globally"], "readOnly": false, "type": "submodule"}, "services.dovecot2.mailPlugins.globally.enable": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "mail plugins to enable as a list of strings to append to the top-level `$mail_plugins` configuration variable"}, "loc": ["services", "dovecot2", "mailPlugins", "globally", "enable"], "readOnly": false, "type": "list of string"}, "services.dovecot2.mailPlugins.perProtocol": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional entries to add to the mail_plugins variable, per protocol"}, "example": {"_type": "literalExpression", "text": "{\n  imap = [\n    \"imap_acl\"\n  ];\n}"}, "loc": ["services", "dovecot2", "mailPlugins", "perProtocol"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.dovecot2.mailPlugins.perProtocol.<name>.enable": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "mail plugins to enable as a list of strings to append to the corresponding per-protocol `$mail_plugins` configuration variable"}, "loc": ["services", "dovecot2", "mailPlugins", "perProtocol", "<name>", "enable"], "readOnly": false, "type": "list of string"}, "services.dovecot2.mailUser": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Default user to store mail for virtual users."}, "loc": ["services", "dovecot2", "mailUser"], "readOnly": false, "type": "null or string"}, "services.dovecot2.mailboxes": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configure mailboxes and auto create or subscribe them."}, "example": {"_type": "literalExpression", "text": "{\n  Spam = { specialUse = \"Junk\"; auto = \"create\"; };\n}\n"}, "loc": ["services", "dovecot2", "mailboxes"], "readOnly": false, "type": "(attribute set of (submodule)) or (list of unspecified value) convertible to it"}, "services.dovecot2.mailboxes.<name>.auto": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "\"no\""}, "description": {"_type": "mdDoc", "text": "Whether to automatically create or create and subscribe to the mailbox or not."}, "example": {"_type": "literalExpression", "text": "\"subscribe\""}, "loc": ["services", "dovecot2", "mailboxes", "<name>", "auto"], "readOnly": false, "type": "one of \"no\", \"create\", \"subscribe\""}, "services.dovecot2.mailboxes.<name>.autoexpunge": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "To automatically remove all email from the mailbox which is older than the\nspecified time.\n"}, "example": {"_type": "literalExpression", "text": "\"60d\""}, "loc": ["services", "dovecot2", "mailboxes", "<name>", "autoexpunge"], "readOnly": false, "type": "null or string"}, "services.dovecot2.mailboxes.<name>.name": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The name of the mailbox."}, "example": {"_type": "literalExpression", "text": "\"Spam\""}, "loc": ["services", "dovecot2", "mailboxes", "<name>", "name"], "readOnly": true, "type": "string matching the pattern [^\"]+"}, "services.dovecot2.mailboxes.<name>.specialUse": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Null if no special use flag is set. Other than that every use flag mentioned in the RFC is valid."}, "example": {"_type": "literalExpression", "text": "\"Junk\""}, "loc": ["services", "dovecot2", "mailboxes", "<name>", "specialUse"], "readOnly": false, "type": "null or one of \"All\", \"Archive\", \"Drafts\", \"Flagged\", \"Junk\", \"Sent\", \"Trash\""}, "services.dovecot2.modules": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Symlinks the contents of lib/dovecot of every given package into\n/etc/dovecot/modules. This will make the given modules available\nif a dovecot package with the module_dir patch applied is being used.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.dovecot_pigeonhole ]"}, "loc": ["services", "dovecot2", "modules"], "readOnly": false, "type": "list of package"}, "services.dovecot2.protocols": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional listeners to start when Dovecot is enabled."}, "loc": ["services", "dovecot2", "protocols"], "readOnly": false, "type": "list of string"}, "services.dovecot2.quotaGlobalPerUser": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "\"100G\""}, "description": {"_type": "mdDoc", "text": "Quota limit for the user in bytes. Supports suffixes b, k, M, G, T and %."}, "example": {"_type": "literalExpression", "text": "\"10G\""}, "loc": ["services", "dovecot2", "quotaGlobalPerUser"], "readOnly": false, "type": "string"}, "services.dovecot2.quotaPort": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "\"12340\""}, "description": {"_type": "mdDoc", "text": "The Port the dovecot quota service binds to.\nIf using postfix, add check_policy_service inet:localhost:12340 to your smtpd_recipient_restrictions in your postfix config.\n"}, "loc": ["services", "dovecot2", "quotaPort"], "readOnly": false, "type": "string"}, "services.dovecot2.showPAMFailure": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable showing the PAM failure message on authentication error (useful for OTPW)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dovecot2", "showPAMFailure"], "readOnly": false, "type": "boolean"}, "services.dovecot2.sieveScripts": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Sieve scripts to be executed. Key is a sequence, e.g. 'before2', 'after' etc."}, "loc": ["services", "dovecot2", "sieveScripts"], "readOnly": false, "type": "attribute set of path"}, "services.dovecot2.sslCACert": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the server's CA certificate key."}, "loc": ["services", "dovecot2", "sslCACert"], "readOnly": false, "type": "null or string"}, "services.dovecot2.sslServerCert": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the server's public key."}, "loc": ["services", "dovecot2", "sslServerCert"], "readOnly": false, "type": "null or string"}, "services.dovecot2.sslServerKey": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the server's private key."}, "loc": ["services", "dovecot2", "sslServerKey"], "readOnly": false, "type": "null or string"}, "services.dovecot2.user": {"declarations": ["nixos/modules/services/mail/dovecot.nix"], "default": {"_type": "literalExpression", "text": "\"dovecot2\""}, "description": {"_type": "mdDoc", "text": "Dovecot user name."}, "loc": ["services", "dovecot2", "user"], "readOnly": false, "type": "string"}, "services.dragonflydb.bind": {"declarations": ["nixos/modules/services/databases/dragonflydb.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The IP interface to bind to.\n`null` means \"all interfaces\".\n"}, "loc": ["services", "dragonflydb", "bind"], "readOnly": false, "type": "null or string"}, "services.dragonflydb.cacheMode": {"declarations": ["nixos/modules/services/databases/dragonflydb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Once this mode is on, Dragonfly will evict items least likely to be stumbled\nupon in the future but only when it is near maxmemory limit.\n"}, "loc": ["services", "dragonflydb", "cacheMode"], "readOnly": false, "type": "null or boolean"}, "services.dragonflydb.dbNum": {"declarations": ["nixos/modules/services/databases/dragonflydb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum number of supported databases for `select`"}, "loc": ["services", "dragonflydb", "dbNum"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "services.dragonflydb.enable": {"declarations": ["nixos/modules/services/databases/dragonflydb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable DragonflyDB."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dragonflydb", "enable"], "readOnly": false, "type": "boolean"}, "services.dragonflydb.keysOutputLimit": {"declarations": ["nixos/modules/services/databases/dragonflydb.nix"], "default": {"_type": "literalExpression", "text": "8192"}, "description": {"_type": "mdDoc", "text": "Maximum number of returned keys in keys command.\n`keys` is a dangerous command.\nWe truncate its result to avoid blowup in memory when fetching too many keys.\n"}, "loc": ["services", "dragonflydb", "keysOutputLimit"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.dragonflydb.maxMemory": {"declarations": ["nixos/modules/services/databases/dragonflydb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The maximum amount of memory to use for storage (in bytes).\n`null` means this will be automatically set.\n"}, "loc": ["services", "dragonflydb", "maxMemory"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "services.dragonflydb.memcachePort": {"declarations": ["nixos/modules/services/databases/dragonflydb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "To enable memcached compatible API on this port.\n`null` means disabled.\n"}, "loc": ["services", "dragonflydb", "memcachePort"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.dragonflydb.port": {"declarations": ["nixos/modules/services/databases/dragonflydb.nix"], "default": {"_type": "literalExpression", "text": "6379"}, "description": {"_type": "mdDoc", "text": "The TCP port to accept connections."}, "loc": ["services", "dragonflydb", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.dragonflydb.requirePass": {"declarations": ["nixos/modules/services/databases/dragonflydb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password for database"}, "example": {"_type": "literalExpression", "text": "\"letmein!\""}, "loc": ["services", "dragonflydb", "requirePass"], "readOnly": false, "type": "null or string"}, "services.dragonflydb.user": {"declarations": ["nixos/modules/services/databases/dragonflydb.nix"], "default": {"_type": "literalExpression", "text": "\"dragonfly\""}, "description": {"_type": "mdDoc", "text": "The user to run DragonflyDB as"}, "loc": ["services", "dragonflydb", "user"], "readOnly": false, "type": "string"}, "services.drbd.config": {"declarations": ["nixos/modules/services/network-filesystems/drbd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Contents of the {file}`drbd.conf` configuration file.\n"}, "loc": ["services", "drbd", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.drbd.enable": {"declarations": ["nixos/modules/services/network-filesystems/drbd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable support for DRBD, the Distributed Replicated\nBlock Device.\n"}, "loc": ["services", "drbd", "enable"], "readOnly": false, "type": "boolean"}, "services.dspam.domainSocket": {"declarations": ["nixos/modules/services/mail/dspam.nix"], "default": {"_type": "literalExpression", "text": "\"/run/dspam/dspam.sock\""}, "description": {"_type": "mdDoc", "text": "Path to local domain socket which is used for communication with the daemon. Set to null to disable UNIX socket."}, "loc": ["services", "dspam", "domainSocket"], "readOnly": false, "type": "null or path"}, "services.dspam.enable": {"declarations": ["nixos/modules/services/mail/dspam.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the dspam spam filter."}, "loc": ["services", "dspam", "enable"], "readOnly": false, "type": "boolean"}, "services.dspam.extraConfig": {"declarations": ["nixos/modules/services/mail/dspam.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional dspam configuration."}, "loc": ["services", "dspam", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.dspam.group": {"declarations": ["nixos/modules/services/mail/dspam.nix"], "default": {"_type": "literalExpression", "text": "\"dspam\""}, "description": {"_type": "mdDoc", "text": "Group for the dspam daemon."}, "loc": ["services", "dspam", "group"], "readOnly": false, "type": "string"}, "services.dspam.maintenanceInterval": {"declarations": ["nixos/modules/services/mail/dspam.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, maintenance script will be run at specified (in systemd.timer format) interval"}, "loc": ["services", "dspam", "maintenanceInterval"], "readOnly": false, "type": "null or string"}, "services.dspam.storageDriver": {"declarations": ["nixos/modules/services/mail/dspam.nix"], "default": {"_type": "literalExpression", "text": "\"hash\""}, "description": {"_type": "mdDoc", "text": "Storage driver backend to use for dspam."}, "loc": ["services", "dspam", "storageDriver"], "readOnly": false, "type": "string"}, "services.dspam.user": {"declarations": ["nixos/modules/services/mail/dspam.nix"], "default": {"_type": "literalExpression", "text": "\"dspam\""}, "description": {"_type": "mdDoc", "text": "User for the dspam daemon."}, "loc": ["services", "dspam", "user"], "readOnly": false, "type": "string"}, "services.duckling.enable": {"declarations": ["nixos/modules/services/misc/duckling.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable duckling."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "duckling", "enable"], "readOnly": false, "type": "boolean"}, "services.duckling.port": {"declarations": ["nixos/modules/services/misc/duckling.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Port on which duckling will run.\n"}, "loc": ["services", "duckling", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.duplicati.dataDir": {"declarations": ["nixos/modules/services/backup/duplicati.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/duplicati\""}, "description": {"_type": "mdDoc", "text": "The directory where Duplicati stores its data files.\n\n::: {.note}\nIf left as the default value this directory will automatically be created\nbefore the Duplicati server starts, otherwise you are responsible for ensuring\nthe directory exists with appropriate ownership and permissions.\n:::\n"}, "loc": ["services", "duplicati", "dataDir"], "readOnly": false, "type": "string"}, "services.duplicati.enable": {"declarations": ["nixos/modules/services/backup/duplicati.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Duplicati."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "duplicati", "enable"], "readOnly": false, "type": "boolean"}, "services.duplicati.interface": {"declarations": ["nixos/modules/services/backup/duplicati.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listening interface for the web UI\nSet it to \"any\" to listen on all available interfaces\n"}, "loc": ["services", "duplicati", "interface"], "readOnly": false, "type": "string"}, "services.duplicati.port": {"declarations": ["nixos/modules/services/backup/duplicati.nix"], "default": {"_type": "literalExpression", "text": "8200"}, "description": {"_type": "mdDoc", "text": "Port serving the web interface\n"}, "loc": ["services", "duplicati", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.duplicati.user": {"declarations": ["nixos/modules/services/backup/duplicati.nix"], "default": {"_type": "literalExpression", "text": "\"duplicati\""}, "description": {"_type": "mdDoc", "text": "Duplicati runs as it's own user. It will only be able to backup world-readable files.\nRun as root with special care.\n"}, "loc": ["services", "duplicati", "user"], "readOnly": false, "type": "string"}, "services.duplicity.cleanup.maxAge": {"declarations": ["nixos/modules/services/backup/duplicity.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If non-null, delete all backup sets older than the given time.  Old backup sets\nwill not be deleted if backup sets newer than time depend on them.\n"}, "example": {"_type": "literalExpression", "text": "\"6M\""}, "loc": ["services", "duplicity", "cleanup", "maxAge"], "readOnly": false, "type": "null or string"}, "services.duplicity.cleanup.maxFull": {"declarations": ["nixos/modules/services/backup/duplicity.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If non-null, delete all backups sets that are older than the count:th last full\nbackup (in other words, keep the last count full backups and\nassociated incremental sets).\n"}, "example": {"_type": "literalExpression", "text": "2"}, "loc": ["services", "duplicity", "cleanup", "maxFull"], "readOnly": false, "type": "null or signed integer"}, "services.duplicity.cleanup.maxIncr": {"declarations": ["nixos/modules/services/backup/duplicity.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If non-null, delete incremental sets of all backups sets that are\nolder than the count:th last full backup (in other words, keep only\nold full backups and not their increments).\n"}, "example": {"_type": "literalExpression", "text": "1"}, "loc": ["services", "duplicity", "cleanup", "maxIncr"], "readOnly": false, "type": "null or signed integer"}, "services.duplicity.enable": {"declarations": ["nixos/modules/services/backup/duplicity.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable backups with duplicity."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "duplicity", "enable"], "readOnly": false, "type": "boolean"}, "services.duplicity.exclude": {"declarations": ["nixos/modules/services/backup/duplicity.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of paths to exclude from backups. See the FILE SELECTION section in\n{manpage}`duplicity(1)` for details on the syntax.\n"}, "loc": ["services", "duplicity", "exclude"], "readOnly": false, "type": "list of string"}, "services.duplicity.extraFlags": {"declarations": ["nixos/modules/services/backup/duplicity.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command-line flags passed to duplicity. See\n{manpage}`duplicity(1)`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--backend-retry-delay\"\n  \"100\"\n]"}, "loc": ["services", "duplicity", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.duplicity.frequency": {"declarations": ["nixos/modules/services/backup/duplicity.nix"], "default": {"_type": "literalExpression", "text": "\"daily\""}, "description": {"_type": "mdDoc", "text": "Run duplicity with the given frequency (see\n{manpage}`systemd.time(7)` for the format).\nIf null, do not run automatically.\n"}, "loc": ["services", "duplicity", "frequency"], "readOnly": false, "type": "null or string"}, "services.duplicity.fullIfOlderThan": {"declarations": ["nixos/modules/services/backup/duplicity.nix"], "default": {"_type": "literalExpression", "text": "\"never\""}, "description": {"_type": "mdDoc", "text": "If `\"never\"` (the default) always do incremental\nbackups (the first backup will be a full backup, of course).  If\n`\"always\"` always do full backups.  Otherwise, this\nmust be a string representing a duration. Full backups will be made\nwhen the latest full backup is older than this duration. If this is not\nthe case, an incremental backup is performed.\n"}, "example": {"_type": "literalExpression", "text": "\"1M\""}, "loc": ["services", "duplicity", "fullIfOlderThan"], "readOnly": false, "type": "string"}, "services.duplicity.include": {"declarations": ["nixos/modules/services/backup/duplicity.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of paths to include into the backups. See the FILE SELECTION\nsection in {manpage}`duplicity(1)` for details on the syntax.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/home\"\n]"}, "loc": ["services", "duplicity", "include"], "readOnly": false, "type": "list of string"}, "services.duplicity.root": {"declarations": ["nixos/modules/services/backup/duplicity.nix"], "default": {"_type": "literalExpression", "text": "\"/\""}, "description": {"_type": "mdDoc", "text": "Root directory to backup.\n"}, "loc": ["services", "duplicity", "root"], "readOnly": false, "type": "path"}, "services.duplicity.secretFile": {"declarations": ["nixos/modules/services/backup/duplicity.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path of a file containing secrets (gpg passphrase, access key...) in\nthe format of EnvironmentFile as described by\n{manpage}`systemd.exec(5)`. For example:\n```\nPASSPHRASE=\u00ab...\u00bb\nAWS_ACCESS_KEY_ID=\u00ab...\u00bb\nAWS_SECRET_ACCESS_KEY=\u00ab...\u00bb\n```\n"}, "loc": ["services", "duplicity", "secretFile"], "readOnly": false, "type": "null or path"}, "services.duplicity.targetUrl": {"declarations": ["nixos/modules/services/backup/duplicity.nix"], "description": {"_type": "mdDoc", "text": "Target url to backup to. See the URL FORMAT section in\n{manpage}`duplicity(1)` for supported urls.\n"}, "example": {"_type": "literalExpression", "text": "\"s3://host:port/prefix\""}, "loc": ["services", "duplicity", "targetUrl"], "readOnly": false, "type": "string"}, "services.dwm-status.enable": {"declarations": ["nixos/modules/services/misc/dwm-status.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable dwm-status user service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dwm-status", "enable"], "readOnly": false, "type": "boolean"}, "services.dwm-status.extraConfig": {"declarations": ["nixos/modules/services/misc/dwm-status.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config in TOML format.\n"}, "loc": ["services", "dwm-status", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.dwm-status.order": {"declarations": ["nixos/modules/services/misc/dwm-status.nix"], "description": {"_type": "mdDoc", "text": "List of enabled features in order.\n"}, "loc": ["services", "dwm-status", "order"], "readOnly": false, "type": "list of (one of \"audio\", \"backlight\", \"battery\", \"cpu_load\", \"network\", \"time\")"}, "services.dwm-status.package": {"declarations": ["nixos/modules/services/misc/dwm-status.nix"], "default": {"_type": "literalExpression", "text": "pkgs.dwm-status"}, "description": {"_type": "mdDoc", "text": "Which dwm-status package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.dwm-status.override { enableAlsaUtils = false; }"}, "loc": ["services", "dwm-status", "package"], "readOnly": false, "type": "package"}, "services.earlyoom.enable": {"declarations": ["nixos/modules/services/system/earlyoom.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Early out of memory killing."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "earlyoom", "enable"], "readOnly": false, "type": "boolean"}, "services.earlyoom.enableDebugInfo": {"declarations": ["nixos/modules/services/system/earlyoom.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable debugging messages.\n"}, "loc": ["services", "earlyoom", "enableDebugInfo"], "readOnly": false, "type": "boolean"}, "services.earlyoom.enableNotifications": {"declarations": ["nixos/modules/services/system/earlyoom.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Send notifications about killed processes via the system d-bus.\n\nWARNING: enabling this option (while convenient) should *not* be done on a\nmachine where you do not trust the other users as it allows any other\nlocal user to DoS your session by spamming notifications.\n\nTo actually see the notifications in your GUI session, you need to have\n`systembus-notify` running as your user, which this\noption handles by enabling {option}`services.systembus-notify`.\n\nSee [README](https://github.com/rfjakob/earlyoom#notifications) for details.\n"}, "loc": ["services", "earlyoom", "enableNotifications"], "readOnly": false, "type": "boolean"}, "services.earlyoom.extraArgs": {"declarations": ["nixos/modules/services/system/earlyoom.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command-line arguments to be passed to earlyoom."}, "example": {"_type": "literalExpression", "text": "[\n  \"-g\"\n  \"--prefer '(^|/)(java|chromium)$'\"\n]"}, "loc": ["services", "earlyoom", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.earlyoom.freeMemKillThreshold": {"declarations": ["nixos/modules/services/system/earlyoom.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Minimum available memory (in percent) before sending SIGKILL.\nIf unset, this defaults to half of {option}`freeMemThreshold`.\n\nSee the description of [](#opt-services.earlyoom.freeMemThreshold).\n"}, "loc": ["services", "earlyoom", "freeMemKillThreshold"], "readOnly": false, "type": "null or integer between 1 and 100 (both inclusive)"}, "services.earlyoom.freeMemThreshold": {"declarations": ["nixos/modules/services/system/earlyoom.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Minimum available memory (in percent).\n\nIf the available memory falls below this threshold (and the analog is true for\n{option}`freeSwapThreshold`) the killing begins.\nSIGTERM is sent first to the process that uses the most memory; then, if the available\nmemory falls below {option}`freeMemKillThreshold` (and the analog is true for\n{option}`freeSwapKillThreshold`), SIGKILL is sent.\n\nSee [README](https://github.com/rfjakob/earlyoom#command-line-options) for details.\n"}, "loc": ["services", "earlyoom", "freeMemThreshold"], "readOnly": false, "type": "integer between 1 and 100 (both inclusive)"}, "services.earlyoom.freeSwapKillThreshold": {"declarations": ["nixos/modules/services/system/earlyoom.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Minimum free swap space (in percent) before sending SIGKILL.\nIf unset, this defaults to half of {option}`freeSwapThreshold`.\n\nSee the description of [](#opt-services.earlyoom.freeMemThreshold).\n"}, "loc": ["services", "earlyoom", "freeSwapKillThreshold"], "readOnly": false, "type": "null or integer between 1 and 100 (both inclusive)"}, "services.earlyoom.freeSwapThreshold": {"declarations": ["nixos/modules/services/system/earlyoom.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Minimum free swap space (in percent) before sending SIGTERM.\n\nSee the description of [](#opt-services.earlyoom.freeMemThreshold).\n"}, "loc": ["services", "earlyoom", "freeSwapThreshold"], "readOnly": false, "type": "integer between 1 and 100 (both inclusive)"}, "services.earlyoom.killHook": {"declarations": ["nixos/modules/services/system/earlyoom.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "An absolute path to an executable to be run for each process killed.\nSome environment variables are available, see\n[README](https://github.com/rfjakob/earlyoom#notifications) and\n[the man page](https://github.com/rfjakob/earlyoom/blob/master/MANPAGE.md#-n-pathtoscript)\nfor details.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.writeShellScript \"earlyoom-kill-hook\" ''\n  echo \"Process $EARLYOOM_NAME ($EARLYOOM_PID) was killed\" >> /path/to/log\n''\n"}, "loc": ["services", "earlyoom", "killHook"], "readOnly": false, "type": "null or path"}, "services.earlyoom.reportInterval": {"declarations": ["nixos/modules/services/system/earlyoom.nix"], "default": {"_type": "literalExpression", "text": "3600"}, "description": {"_type": "mdDoc", "text": "Interval (in seconds) at which a memory report is printed (set to 0 to disable)."}, "example": {"_type": "literalExpression", "text": "0"}, "loc": ["services", "earlyoom", "reportInterval"], "readOnly": false, "type": "signed integer"}, "services.ecs-agent.enable": {"declarations": ["nixos/modules/virtualisation/ecs-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Amazon ECS agent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ecs-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.ecs-agent.extra-environment": {"declarations": ["nixos/modules/virtualisation/ecs-agent.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The environment the ECS agent should run with. See the ECS agent documentation for keys that work here."}, "loc": ["services", "ecs-agent", "extra-environment"], "readOnly": false, "type": "attribute set of string"}, "services.ecs-agent.package": {"declarations": ["nixos/modules/virtualisation/ecs-agent.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ecs-agent"}, "description": {"_type": "mdDoc", "text": "The ECS agent package to use"}, "loc": ["services", "ecs-agent", "package"], "readOnly": false, "type": "path"}, "services.ejabberd.configFile": {"declarations": ["nixos/modules/services/networking/ejabberd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file for ejabberd in YAML format"}, "loc": ["services", "ejabberd", "configFile"], "readOnly": false, "type": "null or path"}, "services.ejabberd.ctlConfig": {"declarations": ["nixos/modules/services/networking/ejabberd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration of ejabberdctl"}, "loc": ["services", "ejabberd", "ctlConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.ejabberd.enable": {"declarations": ["nixos/modules/services/networking/ejabberd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ejabberd server"}, "loc": ["services", "ejabberd", "enable"], "readOnly": false, "type": "boolean"}, "services.ejabberd.group": {"declarations": ["nixos/modules/services/networking/ejabberd.nix"], "default": {"_type": "literalExpression", "text": "\"ejabberd\""}, "description": {"_type": "mdDoc", "text": "Group under which ejabberd is ran"}, "loc": ["services", "ejabberd", "group"], "readOnly": false, "type": "string"}, "services.ejabberd.imagemagick": {"declarations": ["nixos/modules/services/networking/ejabberd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Add ImageMagick to server's path; allows for image thumbnailing"}, "loc": ["services", "ejabberd", "imagemagick"], "readOnly": false, "type": "boolean"}, "services.ejabberd.loadDumps": {"declarations": ["nixos/modules/services/networking/ejabberd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Configuration dumps that should be loaded on the first startup"}, "example": {"_type": "literalExpression", "text": "[ ./myejabberd.dump ]"}, "loc": ["services", "ejabberd", "loadDumps"], "readOnly": false, "type": "list of path"}, "services.ejabberd.logsDir": {"declarations": ["nixos/modules/services/networking/ejabberd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/log/ejabberd\""}, "description": {"_type": "mdDoc", "text": "Location of the logfile directory of ejabberd"}, "loc": ["services", "ejabberd", "logsDir"], "readOnly": false, "type": "path"}, "services.ejabberd.package": {"declarations": ["nixos/modules/services/networking/ejabberd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ejabberd"}, "description": {"_type": "mdDoc", "text": "ejabberd server package to use"}, "loc": ["services", "ejabberd", "package"], "readOnly": false, "type": "package"}, "services.ejabberd.spoolDir": {"declarations": ["nixos/modules/services/networking/ejabberd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/ejabberd\""}, "description": {"_type": "mdDoc", "text": "Location of the spooldir of ejabberd"}, "loc": ["services", "ejabberd", "spoolDir"], "readOnly": false, "type": "path"}, "services.ejabberd.user": {"declarations": ["nixos/modules/services/networking/ejabberd.nix"], "default": {"_type": "literalExpression", "text": "\"ejabberd\""}, "description": {"_type": "mdDoc", "text": "User under which ejabberd is ran"}, "loc": ["services", "ejabberd", "user"], "readOnly": false, "type": "string"}, "services.elasticsearch-curator.actionYAML": {"declarations": ["nixos/modules/services/search/elasticsearch-curator.nix"], "description": {"_type": "mdDoc", "text": "curator action.yaml file contents, alternatively use curator-cli which takes a simple action command"}, "example": {"_type": "literalExpression", "text": "''\n  ---\n  actions:\n    1:\n      action: delete_indices\n      description: >-\n        Delete indices older than 45 days (based on index name), for logstash-\n        prefixed indices. Ignore the error if the filter does not result in an\n        actionable list of indices (ignore_empty_list) and exit cleanly.\n      options:\n        ignore_empty_list: True\n        disable_action: False\n      filters:\n      - filtertype: pattern\n        kind: prefix\n        value: logstash-\n      - filtertype: age\n        source: name\n        direction: older\n        timestring: '%Y.%m.%d'\n        unit: days\n        unit_count: 45\n''"}, "loc": ["services", "elasticsearch-curator", "actionYAML"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.elasticsearch-curator.enable": {"declarations": ["nixos/modules/services/search/elasticsearch-curator.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable elasticsearch curator."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "elasticsearch-curator", "enable"], "readOnly": false, "type": "boolean"}, "services.elasticsearch-curator.hosts": {"declarations": ["nixos/modules/services/search/elasticsearch-curator.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"localhost\"\n]"}, "description": {"_type": "mdDoc", "text": "a list of elasticsearch hosts to connect to"}, "loc": ["services", "elasticsearch-curator", "hosts"], "readOnly": false, "type": "list of string"}, "services.elasticsearch-curator.interval": {"declarations": ["nixos/modules/services/search/elasticsearch-curator.nix"], "default": {"_type": "literalExpression", "text": "\"hourly\""}, "description": {"_type": "mdDoc", "text": "The frequency to run curator, a systemd.time such as 'hourly'"}, "loc": ["services", "elasticsearch-curator", "interval"], "readOnly": false, "type": "string"}, "services.elasticsearch-curator.port": {"declarations": ["nixos/modules/services/search/elasticsearch-curator.nix"], "default": {"_type": "literalExpression", "text": "9200"}, "description": {"_type": "mdDoc", "text": "the port that elasticsearch is listening on"}, "loc": ["services", "elasticsearch-curator", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.elasticsearch.cluster_name": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "\"elasticsearch\""}, "description": {"_type": "mdDoc", "text": "Elasticsearch name that identifies your cluster for auto-discovery."}, "loc": ["services", "elasticsearch", "cluster_name"], "readOnly": false, "type": "string"}, "services.elasticsearch.dataDir": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/elasticsearch\""}, "description": {"_type": "mdDoc", "text": "Data directory for elasticsearch.\n"}, "loc": ["services", "elasticsearch", "dataDir"], "readOnly": false, "type": "path"}, "services.elasticsearch.enable": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable elasticsearch."}, "loc": ["services", "elasticsearch", "enable"], "readOnly": false, "type": "boolean"}, "services.elasticsearch.extraCmdLineOptions": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line options for the elasticsearch launcher."}, "loc": ["services", "elasticsearch", "extraCmdLineOptions"], "readOnly": false, "type": "list of string"}, "services.elasticsearch.extraConf": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration for elasticsearch."}, "example": {"_type": "literalExpression", "text": "''\n  node.name: \"elasticsearch\"\n  node.master: true\n  node.data: false\n''"}, "loc": ["services", "elasticsearch", "extraConf"], "readOnly": false, "type": "string"}, "services.elasticsearch.extraJavaOptions": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line options for Java."}, "example": {"_type": "literalExpression", "text": "[\n  \"-Djava.net.preferIPv4Stack=true\"\n]"}, "loc": ["services", "elasticsearch", "extraJavaOptions"], "readOnly": false, "type": "list of string"}, "services.elasticsearch.listenAddress": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Elasticsearch listen address."}, "loc": ["services", "elasticsearch", "listenAddress"], "readOnly": false, "type": "string"}, "services.elasticsearch.logging": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "''\n  logger.action.name = org.elasticsearch.action\n  logger.action.level = info\n  \n  appender.console.type = Console\n  appender.console.name = console\n  appender.console.layout.type = PatternLayout\n  appender.console.layout.pattern = [%d{ISO8601}][%-5p][%-25c{1.}] %marker%m%n\n  \n  rootLogger.level = info\n  rootLogger.appenderRef.console.ref = console\n''"}, "description": {"_type": "mdDoc", "text": "Elasticsearch logging configuration."}, "loc": ["services", "elasticsearch", "logging"], "readOnly": false, "type": "string"}, "services.elasticsearch.package": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "pkgs.elasticsearch"}, "description": {"_type": "mdDoc", "text": "Elasticsearch package to use."}, "loc": ["services", "elasticsearch", "package"], "readOnly": false, "type": "package"}, "services.elasticsearch.plugins": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra elasticsearch plugins"}, "example": {"_type": "literalExpression", "text": "[ pkgs.elasticsearchPlugins.discovery-ec2 ]"}, "loc": ["services", "elasticsearch", "plugins"], "readOnly": false, "type": "list of package"}, "services.elasticsearch.port": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "9200"}, "description": {"_type": "mdDoc", "text": "Elasticsearch port to listen for HTTP traffic."}, "loc": ["services", "elasticsearch", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.elasticsearch.restartIfChanged": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Automatically restart the service on config change.\nThis can be set to false to defer restarts on a server or cluster.\nPlease consider the security implications of inadvertently running an older version,\nand the possibility of unexpected behavior caused by inconsistent versions across a cluster when disabling this option.\n"}, "loc": ["services", "elasticsearch", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.elasticsearch.single_node": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Start a single-node cluster"}, "loc": ["services", "elasticsearch", "single_node"], "readOnly": false, "type": "boolean"}, "services.elasticsearch.tcp_port": {"declarations": ["nixos/modules/services/search/elasticsearch.nix"], "default": {"_type": "literalExpression", "text": "9300"}, "description": {"_type": "mdDoc", "text": "Elasticsearch port for the node to node communication."}, "loc": ["services", "elasticsearch", "tcp_port"], "readOnly": false, "type": "signed integer"}, "services.emacs.defaultEditor": {"declarations": ["nixos/modules/services/editors/emacs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When enabled, configures emacsclient to be the default editor\nusing the EDITOR environment variable.\n"}, "loc": ["services", "emacs", "defaultEditor"], "readOnly": false, "type": "boolean"}, "services.emacs.enable": {"declarations": ["nixos/modules/services/editors/emacs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable a user service for the Emacs daemon. Use `emacsclient` to connect to the\ndaemon. If `true`, {var}`services.emacs.install` is\nconsidered `true`, whatever its value.\n"}, "loc": ["services", "emacs", "enable"], "readOnly": false, "type": "boolean"}, "services.emacs.install": {"declarations": ["nixos/modules/services/editors/emacs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install a user service for the Emacs daemon. Once\nthe service is started, use emacsclient to connect to the\ndaemon.\n\nThe service must be manually started for each user with\n\"systemctl --user start emacs\" or globally through\n{var}`services.emacs.enable`.\n"}, "loc": ["services", "emacs", "install"], "readOnly": false, "type": "boolean"}, "services.emacs.package": {"declarations": ["nixos/modules/services/editors/emacs.nix"], "default": {"_type": "literalExpression", "text": "pkgs.emacs"}, "description": {"_type": "mdDoc", "text": "emacs derivation to use.\n"}, "loc": ["services", "emacs", "package"], "readOnly": false, "type": "package"}, "services.endlessh-go.enable": {"declarations": ["nixos/modules/services/security/endlessh-go.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable endlessh-go service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "endlessh-go", "enable"], "readOnly": false, "type": "boolean"}, "services.endlessh-go.extraOptions": {"declarations": ["nixos/modules/services/security/endlessh-go.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command line options to pass to the endlessh-go daemon.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-conn_type=tcp4\"\n  \"-max_clients=8192\"\n]"}, "loc": ["services", "endlessh-go", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.endlessh-go.listenAddress": {"declarations": ["nixos/modules/services/security/endlessh-go.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Interface address to bind the endlessh-go daemon to SSH connections.\n"}, "example": {"_type": "literalExpression", "text": "\"[::]\""}, "loc": ["services", "endlessh-go", "listenAddress"], "readOnly": false, "type": "string"}, "services.endlessh-go.openFirewall": {"declarations": ["nixos/modules/services/security/endlessh-go.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open a firewall port for the SSH listener.\n"}, "loc": ["services", "endlessh-go", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.endlessh-go.port": {"declarations": ["nixos/modules/services/security/endlessh-go.nix"], "default": {"_type": "literalExpression", "text": "2222"}, "description": {"_type": "mdDoc", "text": "Specifies on which port the endlessh-go daemon listens for SSH\nconnections.\n\nSetting this to `22` may conflict with {option}`services.openssh`.\n"}, "example": {"_type": "literalExpression", "text": "22"}, "loc": ["services", "endlessh-go", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.endlessh-go.prometheus.enable": {"declarations": ["nixos/modules/services/security/endlessh-go.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Prometheus integration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "endlessh-go", "prometheus", "enable"], "readOnly": false, "type": "boolean"}, "services.endlessh-go.prometheus.listenAddress": {"declarations": ["nixos/modules/services/security/endlessh-go.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Interface address to bind the endlessh-go daemon to answer Prometheus\nqueries.\n"}, "example": {"_type": "literalExpression", "text": "\"[::]\""}, "loc": ["services", "endlessh-go", "prometheus", "listenAddress"], "readOnly": false, "type": "string"}, "services.endlessh-go.prometheus.port": {"declarations": ["nixos/modules/services/security/endlessh-go.nix"], "default": {"_type": "literalExpression", "text": "2112"}, "description": {"_type": "mdDoc", "text": "Specifies on which port the endlessh-go daemon listens for Prometheus\nqueries.\n"}, "example": {"_type": "literalExpression", "text": "9119"}, "loc": ["services", "endlessh-go", "prometheus", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.endlessh.enable": {"declarations": ["nixos/modules/services/security/endlessh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable endlessh service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "endlessh", "enable"], "readOnly": false, "type": "boolean"}, "services.endlessh.extraOptions": {"declarations": ["nixos/modules/services/security/endlessh.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command line options to pass to the endlessh daemon.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-6\"\n  \"-d 9000\"\n  \"-v\"\n]"}, "loc": ["services", "endlessh", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.endlessh.openFirewall": {"declarations": ["nixos/modules/services/security/endlessh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open a firewall port for the SSH listener.\n"}, "loc": ["services", "endlessh", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.endlessh.port": {"declarations": ["nixos/modules/services/security/endlessh.nix"], "default": {"_type": "literalExpression", "text": "2222"}, "description": {"_type": "mdDoc", "text": "Specifies on which port the endlessh daemon listens for SSH\nconnections.\n\nSetting this to `22` may conflict with {option}`services.openssh`.\n"}, "example": {"_type": "literalExpression", "text": "22"}, "loc": ["services", "endlessh", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.engelsystem.config": {"declarations": ["nixos/modules/services/web-apps/engelsystem.nix"], "default": {"_type": "literalExpression", "text": "{\n  database = {\n    database = \"engelsystem\";\n    host = \"localhost\";\n    username = \"engelsystem\";\n  };\n}"}, "description": {"_type": "mdDoc", "text": "Options to be added to config.php, as a nix attribute set. Options containing secret data\nshould be set to an attribute set containing the attribute _secret - a string pointing to a\nfile containing the value the option should be set to. See the example to get a better\npicture of this: in the resulting config.php file, the email.password key will be set to\nthe contents of the /var/keys/engelsystem/mail file.\n\nSee https://engelsystem.de/doc/admin/configuration/ for available options.\n\nNote that the admin user login credentials cannot be set here - they always default to\nadmin:asdfasdf. Log in and change them immediately.\n"}, "example": {"_type": "literalExpression", "text": "{\n  autoarrive = true;\n  database = {\n    database = \"engelsystem\";\n    host = \"database.example.com\";\n    password = {\n      _secret = \"/var/keys/engelsystem/database\";\n    };\n    username = \"engelsystem\";\n  };\n  default_locale = \"de_DE\";\n  email = {\n    driver = \"smtp\";\n    encryption = \"tls\";\n    from = {\n      address = \"engelsystem@example.com\";\n      name = \"example engelsystem\";\n    };\n    host = \"smtp.example.com\";\n    password = {\n      _secret = \"/var/keys/engelsystem/mail\";\n    };\n    port = 587;\n    username = \"engelsystem@example.com\";\n  };\n  maintenance = false;\n  min_password_length = 6;\n}"}, "loc": ["services", "engelsystem", "config"], "readOnly": false, "type": "attribute set"}, "services.engelsystem.createDatabase": {"declarations": ["nixos/modules/services/web-apps/engelsystem.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to create a local database automatically.\nThis will override every database setting in {option}`services.engelsystem.config`.\n"}, "loc": ["services", "engelsystem", "createDatabase"], "readOnly": false, "type": "boolean"}, "services.engelsystem.domain": {"declarations": ["nixos/modules/services/web-apps/engelsystem.nix"], "description": {"_type": "mdDoc", "text": "Domain to serve on."}, "example": {"_type": "literalExpression", "text": "\"engelsystem.example.com\""}, "loc": ["services", "engelsystem", "domain"], "readOnly": false, "type": "string"}, "services.engelsystem.enable": {"declarations": ["nixos/modules/services/web-apps/engelsystem.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable engelsystem, an online tool for coordinating volunteers\nand shifts on large events.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "engelsystem", "enable"], "readOnly": false, "type": "boolean"}, "services.engelsystem.package": {"declarations": ["nixos/modules/services/web-apps/engelsystem.nix"], "default": {"_type": "literalExpression", "text": "pkgs.engelsystem"}, "description": {"_type": "mdDoc", "text": "Engelsystem package used for the service."}, "loc": ["services", "engelsystem", "package"], "readOnly": false, "type": "package"}, "services.envfs.enable": {"declarations": ["nixos/modules/tasks/filesystems/envfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Fuse filesystem that returns symlinks to executables based on the PATH\nof the requesting process. This is useful to execute shebangs on NixOS\nthat assume hard coded locations in locations like /bin or /usr/bin\netc.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "envfs", "enable"], "readOnly": false, "type": "boolean"}, "services.envfs.extraFallbackPathCommands": {"declarations": ["nixos/modules/tasks/filesystems/envfs.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra commands to run in the package that contains fallback executables in case not other executable is found"}, "example": {"_type": "literalExpression", "text": "\"ln -s $''{pkgs.bash}/bin/bash $out/bash\""}, "loc": ["services", "envfs", "extraFallbackPathCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.envfs.package": {"declarations": ["nixos/modules/tasks/filesystems/envfs.nix"], "default": {"_type": "literalExpression", "text": "pkgs.envfs"}, "description": {"_type": "mdDoc", "text": "Which package to use for the envfs."}, "loc": ["services", "envfs", "package"], "readOnly": false, "type": "package"}, "services.envoy.enable": {"declarations": ["nixos/modules/services/networking/envoy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Envoy reverse proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "envoy", "enable"], "readOnly": false, "type": "boolean"}, "services.envoy.package": {"declarations": ["nixos/modules/services/networking/envoy.nix"], "default": {"_type": "literalExpression", "text": "pkgs.envoy"}, "description": {"_type": "mdDoc", "text": "The envoy package to use."}, "loc": ["services", "envoy", "package"], "readOnly": false, "type": "package"}, "services.envoy.requireValidConfig": {"declarations": ["nixos/modules/services/networking/envoy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether a failure during config validation at build time is fatal.\nWhen the config can't be checked during build time, for example when it includes\nother files, disable this option.\n"}, "loc": ["services", "envoy", "requireValidConfig"], "readOnly": false, "type": "boolean"}, "services.envoy.settings": {"declarations": ["nixos/modules/services/networking/envoy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specify the configuration for Envoy in Nix.\n"}, "example": {"_type": "literalExpression", "text": "{\n  admin = {\n    access_log_path = \"/dev/null\";\n    address = {\n      socket_address = {\n        protocol = \"TCP\";\n        address = \"127.0.0.1\";\n        port_value = 9901;\n      };\n    };\n  };\n  static_resources = {\n    listeners = [];\n    clusters = [];\n  };\n}\n"}, "loc": ["services", "envoy", "settings"], "readOnly": false, "type": "JSON value"}, "services.epgstation.database.name": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "default": {"_type": "literalExpression", "text": "\"epgstation\""}, "description": {"_type": "mdDoc", "text": "Name of the MySQL database that holds EPGStation's data.\n"}, "loc": ["services", "epgstation", "database", "name"], "readOnly": false, "type": "string"}, "services.epgstation.database.passwordFile": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "description": {"_type": "mdDoc", "text": "A file containing the password for the database named\n{option}`database.name`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/epgstation-db-password\""}, "loc": ["services", "epgstation", "database", "passwordFile"], "readOnly": false, "type": "path"}, "services.epgstation.enable": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable EPGStation: DVR system for Mirakurun-managed TV tuners."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "epgstation", "enable"], "readOnly": false, "type": "boolean"}, "services.epgstation.openFirewall": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the EPGStation web interface.\n\n::: {.warning}\nExposing EPGStation to the open internet is generally advised\nagainst. Only use it inside a trusted local network, or consider\nputting it behind a VPN if you want remote access.\n:::\n"}, "loc": ["services", "epgstation", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.epgstation.package": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.epgstation"}, "description": {"_type": "mdDoc", "text": "epgstation package to use"}, "loc": ["services", "epgstation", "package"], "readOnly": false, "type": "package"}, "services.epgstation.settings": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Options to add to config.yml.\n\nDocumentation:\n<https://github.com/l3tnun/EPGStation/blob/master/doc/conf-manual.md>\n"}, "example": {"_type": "literalExpression", "text": "{\n  conflictPriority = 10;\n  recPriority = 20;\n}"}, "loc": ["services", "epgstation", "settings"], "readOnly": false, "type": "YAML value"}, "services.epgstation.settings.clientSocketioPort": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "default": {"_type": "literalExpression", "text": "config.services.epgstation.settings.socketioPort"}, "description": {"_type": "mdDoc", "text": "Socket.io port that the web client is going to connect to. This may\nbe different from {option}`services.epgstation.settings.socketioPort` if\nEPGStation is hidden behind a reverse proxy.\n"}, "loc": ["services", "epgstation", "settings", "clientSocketioPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.epgstation.settings.concurrentEncodeNum": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "The maximum number of encoding jobs that EPGStation would run at the\nsame time.\n"}, "loc": ["services", "epgstation", "settings", "concurrentEncodeNum"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.epgstation.settings.encode": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "default": {"_type": "literalExpression", "text": "[\n  {\n    name = \"H.264\";\n    cmd = \"%NODE% config.services.epgstation.package/libexec/enc.js\";\n    suffix = \".mp4\";\n  }\n]\n"}, "description": {"_type": "mdDoc", "text": "Encoding presets for recorded videos."}, "loc": ["services", "epgstation", "settings", "encode"], "readOnly": false, "type": "list of (attribute set)"}, "services.epgstation.settings.encodeProcessNum": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "default": {"_type": "literalExpression", "text": "4"}, "description": {"_type": "mdDoc", "text": "The maximum number of processes that EPGStation would allow to run\nat the same time for encoding or streaming videos.\n"}, "loc": ["services", "epgstation", "settings", "encodeProcessNum"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.epgstation.settings.mirakurunPath": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "default": {"_type": "literalExpression", "text": "\"http+unix://${lib.replaceStrings [\"/\"] [\"%2F\"] config.services.mirakurun.unixSocket}\"\n"}, "description": {"_type": "mdDoc", "text": "URL to connect to Mirakurun."}, "example": {"_type": "literalExpression", "text": "\"http://localhost:40772\""}, "loc": ["services", "epgstation", "settings", "mirakurunPath"], "readOnly": false, "type": "string"}, "services.epgstation.settings.port": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "default": {"_type": "literalExpression", "text": "20772"}, "description": {"_type": "mdDoc", "text": "HTTP port for EPGStation to listen on.\n"}, "loc": ["services", "epgstation", "settings", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.epgstation.settings.socketioPort": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "default": {"_type": "literalExpression", "text": "config.services.epgstation.settings.port + 1"}, "description": {"_type": "mdDoc", "text": "Socket.io port for EPGStation to listen on. It is valid to share\nports with {option}`services.epgstation.settings.port`.\n"}, "loc": ["services", "epgstation", "settings", "socketioPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.epgstation.usePreconfiguredStreaming": {"declarations": ["nixos/modules/services/video/epgstation/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Use preconfigured default streaming options.\n\nUpstream defaults:\n<https://github.com/l3tnun/EPGStation/blob/master/config/config.yml.template>\n"}, "loc": ["services", "epgstation", "usePreconfiguredStreaming"], "readOnly": false, "type": "boolean"}, "services.epmd.enable": {"declarations": ["nixos/modules/services/networking/epmd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable socket activation for Erlang Port Mapper Daemon (epmd),\nwhich acts as a name server on all hosts involved in distributed\nErlang computations.\n"}, "loc": ["services", "epmd", "enable"], "readOnly": false, "type": "boolean"}, "services.epmd.listenStream": {"declarations": ["nixos/modules/services/networking/epmd.nix"], "default": {"_type": "literalExpression", "text": "\"[::]:4369\""}, "description": {"_type": "mdDoc", "text": "the listenStream used by the systemd socket.\nsee https://www.freedesktop.org/software/systemd/man/systemd.socket.html#ListenStream= for more information.\nuse this to change the port epmd will run on.\nif not defined, epmd will use \"[::]:4369\"\n"}, "loc": ["services", "epmd", "listenStream"], "readOnly": false, "type": "string"}, "services.epmd.package": {"declarations": ["nixos/modules/services/networking/epmd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.erlang"}, "description": {"_type": "mdDoc", "text": "The Erlang package to use to get epmd binary. That way you can re-use\nan Erlang runtime that is already installed for other purposes.\n"}, "loc": ["services", "epmd", "package"], "readOnly": false, "type": "package"}, "services.ergo.api.keyHash": {"declarations": ["nixos/modules/services/networking/ergo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hex-encoded Blake2b256 hash of an API key as a 64-chars long Base16 string."}, "example": {"_type": "literalExpression", "text": "\"324dcf027dd4a30a932c441f365a25e86b173defa4b8e58948253471b81b72cf\""}, "loc": ["services", "ergo", "api", "keyHash"], "readOnly": false, "type": "null or string"}, "services.ergo.api.listen.ip": {"declarations": ["nixos/modules/services/networking/ergo.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IP address that the Ergo node API should listen on if {option}`api.keyHash` is defined."}, "loc": ["services", "ergo", "api", "listen", "ip"], "readOnly": false, "type": "string"}, "services.ergo.api.listen.port": {"declarations": ["nixos/modules/services/networking/ergo.nix"], "default": {"_type": "literalExpression", "text": "9052"}, "description": {"_type": "mdDoc", "text": "Listen port for the API endpoint if {option}`api.keyHash` is defined."}, "loc": ["services", "ergo", "api", "listen", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.ergo.dataDir": {"declarations": ["nixos/modules/services/networking/ergo.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/ergo\""}, "description": {"_type": "mdDoc", "text": "The data directory for the Ergo node."}, "loc": ["services", "ergo", "dataDir"], "readOnly": false, "type": "path"}, "services.ergo.enable": {"declarations": ["nixos/modules/services/networking/ergo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ergo service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ergo", "enable"], "readOnly": false, "type": "boolean"}, "services.ergo.group": {"declarations": ["nixos/modules/services/networking/ergo.nix"], "default": {"_type": "literalExpression", "text": "config.services.ergo.user"}, "description": {"_type": "mdDoc", "text": "The group as which to run the Ergo node."}, "loc": ["services", "ergo", "group"], "readOnly": false, "type": "string"}, "services.ergo.listen.ip": {"declarations": ["nixos/modules/services/networking/ergo.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IP address on which the Ergo node should listen."}, "loc": ["services", "ergo", "listen", "ip"], "readOnly": false, "type": "string"}, "services.ergo.listen.port": {"declarations": ["nixos/modules/services/networking/ergo.nix"], "default": {"_type": "literalExpression", "text": "9006"}, "description": {"_type": "mdDoc", "text": "Listen port for the Ergo node."}, "loc": ["services", "ergo", "listen", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.ergo.openFirewall": {"declarations": ["nixos/modules/services/networking/ergo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the Ergo node as well as the API."}, "loc": ["services", "ergo", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.ergo.testnet": {"declarations": ["nixos/modules/services/networking/ergo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Connect to testnet network instead of the default mainnet."}, "loc": ["services", "ergo", "testnet"], "readOnly": false, "type": "boolean"}, "services.ergo.user": {"declarations": ["nixos/modules/services/networking/ergo.nix"], "default": {"_type": "literalExpression", "text": "\"ergo\""}, "description": {"_type": "mdDoc", "text": "The user as which to run the Ergo node."}, "loc": ["services", "ergo", "user"], "readOnly": false, "type": "string"}, "services.ergochat.configFile": {"declarations": ["nixos/modules/services/networking/ergochat.nix"], "default": {"_type": "literalMD", "text": "generated config file from `settings`"}, "description": {"_type": "mdDoc", "text": "Path to configuration file.\nSetting this will skip any configuration done via `settings`\n"}, "loc": ["services", "ergochat", "configFile"], "readOnly": false, "type": "path"}, "services.ergochat.enable": {"declarations": ["nixos/modules/services/networking/ergochat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ergo IRC daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ergochat", "enable"], "readOnly": false, "type": "boolean"}, "services.ergochat.openFilesLimit": {"declarations": ["nixos/modules/services/networking/ergochat.nix"], "default": {"_type": "literalExpression", "text": "1024"}, "description": {"_type": "mdDoc", "text": "Maximum number of open files. Limits the clients and server connections.\n"}, "loc": ["services", "ergochat", "openFilesLimit"], "readOnly": false, "type": "signed integer"}, "services.ergochat.settings": {"declarations": ["nixos/modules/services/networking/ergochat.nix"], "default": {"_type": "literalExpression", "text": "{\n  accounts = {\n    authentication-enabled = true;\n    multiclient = {\n      allowed-by-default = true;\n      always-on = \"opt-out\";\n      auto-away = \"opt-out\";\n      enabled = true;\n    };\n    registration = {\n      allow-before-connect = true;\n      bcrypt-cost = 4;\n      email-verification = {\n        enabled = false;\n      };\n      enabled = true;\n      throttling = {\n        duration = \"10m\";\n        enabled = true;\n        max-attempts = 30;\n      };\n    };\n  };\n  channels = {\n    default-modes = \"+ntC\";\n    registration = {\n      enabled = true;\n    };\n  };\n  datastore = {\n    autoupgrade = true;\n    path = \"/var/lib/ergo/ircd.db\";\n  };\n  history = {\n    autoreplay-on-join = 0;\n    autoresize-window = \"3d\";\n    channel-length = 2048;\n    chathistory-maxmessages = 100;\n    client-length = 256;\n    enabled = true;\n    restrictions = {\n      expire-time = \"1w\";\n      grace-period = \"1h\";\n      query-cutoff = \"none\";\n    };\n    retention = {\n      allow-individual-delete = false;\n      enable-account-indexing = false;\n    };\n    tagmsg-storage = {\n      default = false;\n      whitelist = [\n        \"+draft/react\"\n        \"+react\"\n      ];\n    };\n    znc-maxmessages = 2048;\n  };\n  limits = {\n    awaylen = 390;\n    channellen = 64;\n    identlen = 20;\n    kicklen = 390;\n    nicklen = 32;\n    topiclen = 390;\n  };\n  network = {\n    name = \"testnetwork\";\n  };\n  server = {\n    casemapping = \"permissive\";\n    check-ident = false;\n    enforce-utf = true;\n    forward-confirm-hostnames = false;\n    ip-cloaking = {\n      enabled = false;\n    };\n    ip-limits = {\n      count = false;\n      throttle = false;\n    };\n    listeners = {\n      \":6667\" = { };\n    };\n    lookup-hostnames = false;\n    max-sendq = \"1M\";\n    name = \"example.com\";\n    relaymsg = {\n      enabled = false;\n    };\n  };\n}"}, "description": {"_type": "mdDoc", "text": "Ergo IRC daemon configuration file.\nhttps://raw.githubusercontent.com/ergochat/ergo/master/default.yaml\n"}, "loc": ["services", "ergochat", "settings"], "readOnly": false, "type": "YAML value"}, "services.erigon.enable": {"declarations": ["nixos/modules/services/blockchain/ethereum/erigon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ethereum implementation on the efficiency frontier."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "erigon", "enable"], "readOnly": false, "type": "boolean"}, "services.erigon.extraArgs": {"declarations": ["nixos/modules/services/blockchain/ethereum/erigon.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional arguments passed to Erigon"}, "loc": ["services", "erigon", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.erigon.secretJwtPath": {"declarations": ["nixos/modules/services/blockchain/ethereum/erigon.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Path to the secret jwt used for the http api authentication.\n"}, "example": {"_type": "literalExpression", "text": "\"config.age.secrets.ERIGON_JWT.path\""}, "loc": ["services", "erigon", "secretJwtPath"], "readOnly": false, "type": "path"}, "services.erigon.settings": {"declarations": ["nixos/modules/services/blockchain/ethereum/erigon.nix"], "default": {"_type": "literalExpression", "text": "{\n  datadir = \"/var/lib/erigon\";\n  chain = \"mainnet\";\n  http = true;\n  \"http.port\" = 8545;\n  \"http.api\" = [\"eth\" \"debug\" \"net\" \"trace\" \"web3\" \"erigon\"];\n  ws = true;\n  port = 30303;\n  \"authrpc.port\" = 8551;\n  \"torrent.port\" = 42069;\n  \"private.api.addr\" = \"localhost:9090\";\n  \"log.console.verbosity\" = 3; # info\n}\n"}, "description": {"_type": "mdDoc", "text": "Configuration for Erigon\nRefer to <https://github.com/ledgerwatch/erigon#usage> for details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"authrpc.port\" = 8551;\n  chain = \"mainnet\";\n  datadir = \"/var/lib/erigon\";\n  http = true;\n  \"http.api\" = [\n    \"eth\"\n    \"debug\"\n    \"net\"\n    \"trace\"\n    \"web3\"\n    \"erigon\"\n  ];\n  \"http.port\" = 8545;\n  \"log.console.verbosity\" = 3;\n  port = 30303;\n  \"private.api.addr\" = \"localhost:9090\";\n  \"torrent.port\" = 42069;\n  ws = true;\n}"}, "loc": ["services", "erigon", "settings"], "readOnly": false, "type": "TOML value"}, "services.errbot.instances": {"declarations": ["nixos/modules/services/misc/errbot.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Errbot instance configs"}, "loc": ["services", "errbot", "instances"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.errbot.instances.<name>.admins": {"declarations": ["nixos/modules/services/misc/errbot.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of identifiers of errbot admins."}, "loc": ["services", "errbot", "instances", "<name>", "admins"], "readOnly": false, "type": "list of string"}, "services.errbot.instances.<name>.backend": {"declarations": ["nixos/modules/services/misc/errbot.nix"], "default": {"_type": "literalExpression", "text": "\"XMPP\""}, "description": {"_type": "mdDoc", "text": "Errbot backend name."}, "loc": ["services", "errbot", "instances", "<name>", "backend"], "readOnly": false, "type": "string"}, "services.errbot.instances.<name>.dataDir": {"declarations": ["nixos/modules/services/misc/errbot.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Data directory for errbot instance."}, "loc": ["services", "errbot", "instances", "<name>", "dataDir"], "readOnly": false, "type": "null or path"}, "services.errbot.instances.<name>.extraConfig": {"declarations": ["nixos/modules/services/misc/errbot.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "String to be appended to the config verbatim"}, "loc": ["services", "errbot", "instances", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.errbot.instances.<name>.identity": {"declarations": ["nixos/modules/services/misc/errbot.nix"], "description": {"_type": "mdDoc", "text": "Errbot identity configuration"}, "loc": ["services", "errbot", "instances", "<name>", "identity"], "readOnly": false, "type": "attribute set"}, "services.errbot.instances.<name>.logLevel": {"declarations": ["nixos/modules/services/misc/errbot.nix"], "default": {"_type": "literalExpression", "text": "\"INFO\""}, "description": {"_type": "mdDoc", "text": "Errbot log level"}, "loc": ["services", "errbot", "instances", "<name>", "logLevel"], "readOnly": false, "type": "string"}, "services.errbot.instances.<name>.plugins": {"declarations": ["nixos/modules/services/misc/errbot.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of errbot plugin derivations."}, "loc": ["services", "errbot", "instances", "<name>", "plugins"], "readOnly": false, "type": "list of package"}, "services.espanso.enable": {"declarations": ["nixos/modules/services/desktops/espanso.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Espanso."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "espanso", "enable"], "readOnly": false, "type": "boolean"}, "services.esphome.address": {"declarations": ["nixos/modules/services/home-automation/esphome.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "esphome address"}, "loc": ["services", "esphome", "address"], "readOnly": false, "type": "string"}, "services.esphome.allowedDevices": {"declarations": ["nixos/modules/services/home-automation/esphome.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"char-ttyS\"\n  \"char-ttyUSB\"\n]"}, "description": {"_type": "mdDoc", "text": "A list of device nodes to which {command}`esphome` has access to.\nRefer to DeviceAllow in systemd.resource-control(5) for more information.\nBeware that if a device is referred to by an absolute path instead of a device category,\nit will only allow devices that already are plugged in when the service is started.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/dev/serial/by-id/usb-Silicon_Labs_CP2102_USB_to_UART_Bridge_Controller_0001-if00-port0\"\n]"}, "loc": ["services", "esphome", "allowedDevices"], "readOnly": false, "type": "list of string"}, "services.esphome.enable": {"declarations": ["nixos/modules/services/home-automation/esphome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable esphome."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "esphome", "enable"], "readOnly": false, "type": "boolean"}, "services.esphome.enableUnixSocket": {"declarations": ["nixos/modules/services/home-automation/esphome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Listen on a unix socket `/run/esphome/esphome.sock` instead of the TCP port."}, "loc": ["services", "esphome", "enableUnixSocket"], "readOnly": false, "type": "boolean"}, "services.esphome.openFirewall": {"declarations": ["nixos/modules/services/home-automation/esphome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the firewall for the specified port."}, "loc": ["services", "esphome", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.esphome.package": {"declarations": ["nixos/modules/services/home-automation/esphome.nix"], "default": {"_type": "literalExpression", "text": "pkgs.esphome"}, "description": {"_type": "mdDoc", "text": "The package to use for the esphome command."}, "loc": ["services", "esphome", "package"], "readOnly": false, "type": "package"}, "services.esphome.port": {"declarations": ["nixos/modules/services/home-automation/esphome.nix"], "default": {"_type": "literalExpression", "text": "6052"}, "description": {"_type": "mdDoc", "text": "esphome port"}, "loc": ["services", "esphome", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.etcd.advertiseClientUrls": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "config.services.etcd.listenClientUrls"}, "description": {"_type": "mdDoc", "text": "Etcd list of this member's client URLs to advertise to the rest of the cluster."}, "loc": ["services", "etcd", "advertiseClientUrls"], "readOnly": false, "type": "list of string"}, "services.etcd.certFile": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Cert file to use for clients"}, "loc": ["services", "etcd", "certFile"], "readOnly": false, "type": "null or path"}, "services.etcd.clientCertAuth": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use certs for client authentication"}, "loc": ["services", "etcd", "clientCertAuth"], "readOnly": false, "type": "boolean"}, "services.etcd.dataDir": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/etcd\""}, "description": {"_type": "mdDoc", "text": "Etcd data directory."}, "loc": ["services", "etcd", "dataDir"], "readOnly": false, "type": "path"}, "services.etcd.discovery": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Etcd discovery url"}, "loc": ["services", "etcd", "discovery"], "readOnly": false, "type": "string"}, "services.etcd.enable": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable etcd."}, "loc": ["services", "etcd", "enable"], "readOnly": false, "type": "boolean"}, "services.etcd.extraConf": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Etcd extra configuration. See\n<https://github.com/coreos/etcd/blob/master/Documentation/op-guide/configuration.md#configuration-flags>\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"CORS\" = \"*\";\n  \"NAME\" = \"default-name\";\n  \"MAX_RESULT_BUFFER\" = \"1024\";\n  \"MAX_CLUSTER_SIZE\" = \"9\";\n  \"MAX_RETRY_ATTEMPTS\" = \"3\";\n}\n"}, "loc": ["services", "etcd", "extraConf"], "readOnly": false, "type": "attribute set of string"}, "services.etcd.initialAdvertisePeerUrls": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "config.services.etcd.listenPeerUrls"}, "description": {"_type": "mdDoc", "text": "Etcd list of this member's peer URLs to advertise to rest of the cluster."}, "loc": ["services", "etcd", "initialAdvertisePeerUrls"], "readOnly": false, "type": "list of string"}, "services.etcd.initialCluster": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "[\"${config.services.etcd.name}=http://127.0.0.1:2380\"]"}, "description": {"_type": "mdDoc", "text": "Etcd initial cluster configuration for bootstrapping."}, "loc": ["services", "etcd", "initialCluster"], "readOnly": false, "type": "list of string"}, "services.etcd.initialClusterState": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "\"new\""}, "description": {"_type": "mdDoc", "text": "Etcd initial cluster configuration for bootstrapping."}, "loc": ["services", "etcd", "initialClusterState"], "readOnly": false, "type": "one of \"new\", \"existing\""}, "services.etcd.initialClusterToken": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "\"etcd-cluster\""}, "description": {"_type": "mdDoc", "text": "Etcd initial cluster token for etcd cluster during bootstrap."}, "loc": ["services", "etcd", "initialClusterToken"], "readOnly": false, "type": "string"}, "services.etcd.keyFile": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file to use for clients"}, "loc": ["services", "etcd", "keyFile"], "readOnly": false, "type": "null or path"}, "services.etcd.listenClientUrls": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"http://127.0.0.1:2379\"\n]"}, "description": {"_type": "mdDoc", "text": "Etcd list of URLs to listen on for client traffic."}, "loc": ["services", "etcd", "listenClientUrls"], "readOnly": false, "type": "list of string"}, "services.etcd.listenPeerUrls": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"http://127.0.0.1:2380\"\n]"}, "description": {"_type": "mdDoc", "text": "Etcd list of URLs to listen on for peer traffic."}, "loc": ["services", "etcd", "listenPeerUrls"], "readOnly": false, "type": "list of string"}, "services.etcd.name": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "Etcd unique node name."}, "loc": ["services", "etcd", "name"], "readOnly": false, "type": "string"}, "services.etcd.peerCertFile": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "config.services.etcd.certFile"}, "description": {"_type": "mdDoc", "text": "Cert file to use for peer to peer communication"}, "loc": ["services", "etcd", "peerCertFile"], "readOnly": false, "type": "null or path"}, "services.etcd.peerClientCertAuth": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to check all incoming peer requests from the cluster for valid client certificates signed by the supplied CA"}, "loc": ["services", "etcd", "peerClientCertAuth"], "readOnly": false, "type": "boolean"}, "services.etcd.peerKeyFile": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "config.services.etcd.keyFile"}, "description": {"_type": "mdDoc", "text": "Key file to use for peer to peer communication"}, "loc": ["services", "etcd", "peerKeyFile"], "readOnly": false, "type": "null or path"}, "services.etcd.peerTrustedCaFile": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "config.services.etcd.trustedCaFile"}, "description": {"_type": "mdDoc", "text": "Certificate authority file to use for peer to peer communication"}, "loc": ["services", "etcd", "peerTrustedCaFile"], "readOnly": false, "type": "null or path"}, "services.etcd.trustedCaFile": {"declarations": ["nixos/modules/services/misc/etcd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate authority file to use for clients"}, "loc": ["services", "etcd", "trustedCaFile"], "readOnly": false, "type": "null or path"}, "services.etebase-server.dataDir": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/etebase-server\""}, "description": {"_type": "mdDoc", "text": "Directory to store the Etebase server data."}, "loc": ["services", "etebase-server", "dataDir"], "readOnly": false, "type": "string"}, "services.etebase-server.enable": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Etebase server.\n\nOnce enabled you need to create an admin user by invoking the\nshell command `etebase-server createsuperuser` with\nthe user specified by the `user` option or a superuser.\nThen you can login and create accounts on your-etebase-server.com/admin\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "etebase-server", "enable"], "readOnly": false, "type": "boolean"}, "services.etebase-server.openFirewall": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open ports in the firewall for the server.\n"}, "loc": ["services", "etebase-server", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.etebase-server.port": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "8001"}, "description": {"_type": "mdDoc", "text": "Port to listen on."}, "loc": ["services", "etebase-server", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.etebase-server.settings": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for `etebase-server`. Refer to\n<https://github.com/etesync/server/blob/master/etebase-server.ini.example>\nand <https://github.com/etesync/server/wiki>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  allowed_hosts = {\n    allowed_host2 = \"localhost\";\n  };\n  global = {\n    debug = true;\n    media_root = \"/path/to/media\";\n  };\n}"}, "loc": ["services", "etebase-server", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.etebase-server.settings.allowed_hosts.allowed_host1": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "The main host that is allowed access.\n"}, "example": {"_type": "literalExpression", "text": "\"localhost\""}, "loc": ["services", "etebase-server", "settings", "allowed_hosts", "allowed_host1"], "readOnly": false, "type": "string"}, "services.etebase-server.settings.database.engine": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "\"django.db.backends.sqlite3\""}, "description": {"_type": "mdDoc", "text": "The database engine to use."}, "loc": ["services", "etebase-server", "settings", "database", "engine"], "readOnly": false, "type": "one of \"django.db.backends.sqlite3\", \"django.db.backends.postgresql\""}, "services.etebase-server.settings.database.name": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.etebase-server.dataDir}/db.sqlite3\""}, "description": {"_type": "mdDoc", "text": "The database name."}, "loc": ["services", "etebase-server", "settings", "database", "name"], "readOnly": false, "type": "string"}, "services.etebase-server.settings.global.debug": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to set django's DEBUG flag.\n"}, "loc": ["services", "etebase-server", "settings", "global", "debug"], "readOnly": false, "type": "boolean"}, "services.etebase-server.settings.global.media_root": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.etebase-server.dataDir}/media\""}, "description": {"_type": "mdDoc", "text": "The media directory."}, "loc": ["services", "etebase-server", "settings", "global", "media_root"], "readOnly": false, "type": "string"}, "services.etebase-server.settings.global.secret_file": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to a file containing the secret\nused as django's SECRET_KEY.\n"}, "loc": ["services", "etebase-server", "settings", "global", "secret_file"], "readOnly": false, "type": "null or string"}, "services.etebase-server.settings.global.static_root": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.etebase-server.dataDir}/static\""}, "description": {"_type": "mdDoc", "text": "The directory for static files."}, "loc": ["services", "etebase-server", "settings", "global", "static_root"], "readOnly": false, "type": "string"}, "services.etebase-server.unixSocket": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the socket to bind to."}, "example": {"_type": "literalExpression", "text": "\"/run/etebase-server/etebase-server.sock\""}, "loc": ["services", "etebase-server", "unixSocket"], "readOnly": false, "type": "null or string"}, "services.etebase-server.user": {"declarations": ["nixos/modules/services/misc/etebase-server.nix"], "default": {"_type": "literalExpression", "text": "\"etebase-server\""}, "description": {"_type": "mdDoc", "text": "User under which Etebase server runs."}, "loc": ["services", "etebase-server", "user"], "readOnly": false, "type": "string"}, "services.eternal-terminal.enable": {"declarations": ["nixos/modules/services/networking/eternal-terminal.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Eternal Terminal server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "eternal-terminal", "enable"], "readOnly": false, "type": "boolean"}, "services.eternal-terminal.logSize": {"declarations": ["nixos/modules/services/networking/eternal-terminal.nix"], "default": {"_type": "literalExpression", "text": "20971520"}, "description": {"_type": "mdDoc", "text": "The maximum log size.\n"}, "loc": ["services", "eternal-terminal", "logSize"], "readOnly": false, "type": "signed integer"}, "services.eternal-terminal.port": {"declarations": ["nixos/modules/services/networking/eternal-terminal.nix"], "default": {"_type": "literalExpression", "text": "2022"}, "description": {"_type": "mdDoc", "text": "The port the server should listen on. Will use the server's default (2022) if not specified.\n\nMake sure to open this port in the firewall if necessary.\n"}, "loc": ["services", "eternal-terminal", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.eternal-terminal.silent": {"declarations": ["nixos/modules/services/networking/eternal-terminal.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, disables all logging.\n"}, "loc": ["services", "eternal-terminal", "silent"], "readOnly": false, "type": "boolean"}, "services.eternal-terminal.verbosity": {"declarations": ["nixos/modules/services/networking/eternal-terminal.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "The verbosity level (0-9).\n"}, "loc": ["services", "eternal-terminal", "verbosity"], "readOnly": false, "type": "one of 0, 1, 2, 3, 4, 5, 6, 7, 8, 9"}, "services.etesync-dav.apiUrl": {"declarations": ["nixos/modules/services/misc/etesync-dav.nix"], "default": {"_type": "literalExpression", "text": "\"https://api.etesync.com/\""}, "description": {"_type": "mdDoc", "text": "The url to the etesync API."}, "loc": ["services", "etesync-dav", "apiUrl"], "readOnly": false, "type": "string"}, "services.etesync-dav.enable": {"declarations": ["nixos/modules/services/misc/etesync-dav.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable etesync-dav."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "etesync-dav", "enable"], "readOnly": false, "type": "boolean"}, "services.etesync-dav.host": {"declarations": ["nixos/modules/services/misc/etesync-dav.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The server host address."}, "loc": ["services", "etesync-dav", "host"], "readOnly": false, "type": "string"}, "services.etesync-dav.openFirewall": {"declarations": ["nixos/modules/services/misc/etesync-dav.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the firewall for the specified port."}, "loc": ["services", "etesync-dav", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.etesync-dav.port": {"declarations": ["nixos/modules/services/misc/etesync-dav.nix"], "default": {"_type": "literalExpression", "text": "37358"}, "description": {"_type": "mdDoc", "text": "The server host port."}, "loc": ["services", "etesync-dav", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.etesync-dav.sslCertificate": {"declarations": ["nixos/modules/services/misc/etesync-dav.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to server SSL certificate. It will be copied into\netesync-dav's data directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/etesync.crt\""}, "loc": ["services", "etesync-dav", "sslCertificate"], "readOnly": false, "type": "null or path"}, "services.etesync-dav.sslCertificateKey": {"declarations": ["nixos/modules/services/misc/etesync-dav.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key.  It will be copied into\netesync-dav's data directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/etesync.key\""}, "loc": ["services", "etesync-dav", "sslCertificateKey"], "readOnly": false, "type": "null or path"}, "services.ethercalc.enable": {"declarations": ["nixos/modules/services/web-apps/ethercalc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "ethercalc, an online collaborative spreadsheet server.\n\nPersistent state will be maintained under\n{file}`/var/lib/ethercalc`. Upstream supports using a\nredis server for storage and recommends the redis backend for\nintensive use; however, the Nix module doesn't currently support\nredis.\n\nNote that while ethercalc is a good and robust project with an active\nissue tracker, there haven't been new commits since the end of 2020.\n"}, "loc": ["services", "ethercalc", "enable"], "readOnly": false, "type": "boolean"}, "services.ethercalc.host": {"declarations": ["nixos/modules/services/web-apps/ethercalc.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on (use 0.0.0.0 to allow access from any address)."}, "loc": ["services", "ethercalc", "host"], "readOnly": false, "type": "string"}, "services.ethercalc.package": {"declarations": ["nixos/modules/services/web-apps/ethercalc.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ethercalc"}, "description": {"_type": "mdDoc", "text": "Ethercalc package to use."}, "loc": ["services", "ethercalc", "package"], "readOnly": false, "type": "package"}, "services.ethercalc.port": {"declarations": ["nixos/modules/services/web-apps/ethercalc.nix"], "default": {"_type": "literalExpression", "text": "8000"}, "description": {"_type": "mdDoc", "text": "Port to bind to."}, "loc": ["services", "ethercalc", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.exhibitor.autoManageInstances": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically manage ZooKeeper instances in the ensemble\n"}, "loc": ["services", "exhibitor", "autoManageInstances"], "readOnly": false, "type": "boolean"}, "services.exhibitor.baseDir": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "\"/var/exhibitor\""}, "description": {"_type": "mdDoc", "text": "Baseline directory for exhibitor runtime config.\n"}, "loc": ["services", "exhibitor", "baseDir"], "readOnly": false, "type": "string"}, "services.exhibitor.configCheckMs": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "30000"}, "description": {"_type": "mdDoc", "text": "Period (ms) to check for shared config updates.\n"}, "loc": ["services", "exhibitor", "configCheckMs"], "readOnly": false, "type": "signed integer"}, "services.exhibitor.configType": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "description": {"_type": "mdDoc", "text": "Which configuration type you want to use. Additional config will be\nrequired depending on which type you are using.\n"}, "loc": ["services", "exhibitor", "configType"], "readOnly": false, "type": "one of \"file\", \"s3\", \"zookeeper\", \"none\""}, "services.exhibitor.enable": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable exhibitor server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "exhibitor", "enable"], "readOnly": false, "type": "boolean"}, "services.exhibitor.extraConf": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra Exhibitor configuration to put in the ZooKeeper config file.\n"}, "loc": ["services", "exhibitor", "extraConf"], "readOnly": false, "type": "string"}, "services.exhibitor.fileSystemBackup": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables file system backup of ZooKeeper log files\n"}, "loc": ["services", "exhibitor", "fileSystemBackup"], "readOnly": false, "type": "boolean"}, "services.exhibitor.fsConfigDir": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "description": {"_type": "mdDoc", "text": "Directory to store Exhibitor properties (cannot be used with s3config).\nExhibitor uses file system locks so you can specify a shared location\nso as to enable complete ensemble management.\n"}, "loc": ["services", "exhibitor", "fsConfigDir"], "readOnly": false, "type": "path"}, "services.exhibitor.fsConfigLockPrefix": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "\"exhibitor-lock-\""}, "description": {"_type": "mdDoc", "text": "A prefix for a locking mechanism used in conjunction with fsconfigdir\n"}, "loc": ["services", "exhibitor", "fsConfigLockPrefix"], "readOnly": false, "type": "string"}, "services.exhibitor.fsConfigName": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "\"exhibitor.properties\""}, "description": {"_type": "mdDoc", "text": "The name of the file to store config in\n"}, "loc": ["services", "exhibitor", "fsConfigName"], "readOnly": false, "type": "string"}, "services.exhibitor.headingText": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Extra text to display in UI header\n"}, "loc": ["services", "exhibitor", "headingText"], "readOnly": false, "type": "null or string"}, "services.exhibitor.hostname": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hostname to use and advertise\n"}, "loc": ["services", "exhibitor", "hostname"], "readOnly": false, "type": "null or string"}, "services.exhibitor.jqueryStyle": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "\"red\""}, "description": {"_type": "mdDoc", "text": "Styling used for the JQuery-based UI.\n"}, "loc": ["services", "exhibitor", "jqueryStyle"], "readOnly": false, "type": "one of \"red\", \"black\", \"custom\""}, "services.exhibitor.logLines": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Max lines of logging to keep in memory for display.\n"}, "loc": ["services", "exhibitor", "logLines"], "readOnly": false, "type": "signed integer"}, "services.exhibitor.nodeModification": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the Explorer UI will allow nodes to be modified (use with caution).\n"}, "loc": ["services", "exhibitor", "nodeModification"], "readOnly": false, "type": "boolean"}, "services.exhibitor.port": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "The port for exhibitor to listen on and communicate with other exhibitors.\n"}, "loc": ["services", "exhibitor", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.exhibitor.s3Backup": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable backups to S3\n"}, "loc": ["services", "exhibitor", "s3Backup"], "readOnly": false, "type": "boolean"}, "services.exhibitor.s3Config.bucketName": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "description": {"_type": "mdDoc", "text": "Bucket name to store config\n"}, "loc": ["services", "exhibitor", "s3Config", "bucketName"], "readOnly": false, "type": "string"}, "services.exhibitor.s3Config.configPrefix": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "\"exhibitor-\""}, "description": {"_type": "mdDoc", "text": "When using AWS S3 shared config files, the prefix to use for values such as locks\n"}, "loc": ["services", "exhibitor", "s3Config", "configPrefix"], "readOnly": false, "type": "string"}, "services.exhibitor.s3Config.objectKey": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "description": {"_type": "mdDoc", "text": "S3 key name to store the config\n"}, "loc": ["services", "exhibitor", "s3Config", "objectKey"], "readOnly": false, "type": "string"}, "services.exhibitor.s3Credentials": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional credentials to use for s3backup or s3config. Argument is the path\nto an AWS credential properties file with two properties:\ncom.netflix.exhibitor.s3.access-key-id and com.netflix.exhibitor.s3.access-secret-key\n"}, "loc": ["services", "exhibitor", "s3Credentials"], "readOnly": false, "type": "null or path"}, "services.exhibitor.s3Region": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional region for S3 calls\n"}, "loc": ["services", "exhibitor", "s3Region"], "readOnly": false, "type": "null or string"}, "services.exhibitor.servo": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "ZooKeeper will be queried once a minute for its state via the 'mntr' four\nletter word (this requires ZooKeeper 3.4.x+). Servo will be used to publish\nthis data via JMX.\n"}, "loc": ["services", "exhibitor", "servo"], "readOnly": false, "type": "boolean"}, "services.exhibitor.timeout": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "30000"}, "description": {"_type": "mdDoc", "text": "Connection timeout (ms) for ZK connections.\n"}, "loc": ["services", "exhibitor", "timeout"], "readOnly": false, "type": "signed integer"}, "services.exhibitor.zkCleanupPeriod": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "How often (in milliseconds) to run the Zookeeper log cleanup task.\n"}, "loc": ["services", "exhibitor", "zkCleanupPeriod"], "readOnly": false, "type": "signed integer"}, "services.exhibitor.zkClientPort": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "2181"}, "description": {"_type": "mdDoc", "text": "Zookeeper client port\n"}, "loc": ["services", "exhibitor", "zkClientPort"], "readOnly": false, "type": "signed integer"}, "services.exhibitor.zkConfigConnect": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "description": {"_type": "mdDoc", "text": "The initial connection string for ZooKeeper shared config storage\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"host1:2181\"\n  \"host2:2181\"\n]"}, "loc": ["services", "exhibitor", "zkConfigConnect"], "readOnly": false, "type": "list of string"}, "services.exhibitor.zkConfigExhibitorPath": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "\"/\""}, "description": {"_type": "mdDoc", "text": "If the ZooKeeper shared config is also running Exhibitor, the URI path for the REST call\n"}, "loc": ["services", "exhibitor", "zkConfigExhibitorPath"], "readOnly": false, "type": "string"}, "services.exhibitor.zkConfigExhibitorPort": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "description": {"_type": "mdDoc", "text": "If the ZooKeeper shared config is also running Exhibitor, the port that\nExhibitor is listening on. IMPORTANT: if this value is not set it implies\nthat Exhibitor is not being used on the ZooKeeper shared config.\n"}, "loc": ["services", "exhibitor", "zkConfigExhibitorPort"], "readOnly": false, "type": "null or signed integer"}, "services.exhibitor.zkConfigPollMs": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "10000"}, "description": {"_type": "mdDoc", "text": "The period in ms to check for changes in the config ensemble\n"}, "loc": ["services", "exhibitor", "zkConfigPollMs"], "readOnly": false, "type": "signed integer"}, "services.exhibitor.zkConfigRetry.retryQuantity": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Retries connecting to the ZooKeeper config\n"}, "loc": ["services", "exhibitor", "zkConfigRetry", "retryQuantity"], "readOnly": false, "type": "signed integer"}, "services.exhibitor.zkConfigRetry.sleepMs": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Retry sleep time connecting to the ZooKeeper config\n"}, "loc": ["services", "exhibitor", "zkConfigRetry", "sleepMs"], "readOnly": false, "type": "signed integer"}, "services.exhibitor.zkConfigZPath": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "description": {"_type": "mdDoc", "text": "The base ZPath that Exhibitor should use\n"}, "example": {"_type": "literalExpression", "text": "\"/exhibitor/config\""}, "loc": ["services", "exhibitor", "zkConfigZPath"], "readOnly": false, "type": "string"}, "services.exhibitor.zkConnectPort": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "2888"}, "description": {"_type": "mdDoc", "text": "The port to use for followers to talk to each other.\n"}, "loc": ["services", "exhibitor", "zkConnectPort"], "readOnly": false, "type": "signed integer"}, "services.exhibitor.zkDataDir": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.exhibitor.baseDir}/zkData\""}, "description": {"_type": "mdDoc", "text": "The Zookeeper data directory\n"}, "loc": ["services", "exhibitor", "zkDataDir"], "readOnly": false, "type": "string"}, "services.exhibitor.zkElectionPort": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "3888"}, "description": {"_type": "mdDoc", "text": "The port for Zookeepers to use for leader election.\n"}, "loc": ["services", "exhibitor", "zkElectionPort"], "readOnly": false, "type": "signed integer"}, "services.exhibitor.zkExtraCfg": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "\"initLimit=5&syncLimit=2&tickTime=2000\""}, "description": {"_type": "mdDoc", "text": "Extra options to pass into Zookeeper\n"}, "loc": ["services", "exhibitor", "zkExtraCfg"], "readOnly": false, "type": "string"}, "services.exhibitor.zkLogDir": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.exhibitor.baseDir}/zkLogs\""}, "description": {"_type": "mdDoc", "text": "The Zookeeper logs directory\n"}, "loc": ["services", "exhibitor", "zkLogDir"], "readOnly": false, "type": "path"}, "services.exhibitor.zkServersSpec": {"declarations": ["nixos/modules/services/misc/exhibitor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Zookeeper server spec for all servers in the ensemble.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"S:1:zk1.example.com\"\n  \"S:2:zk2.example.com\"\n  \"S:3:zk3.example.com\"\n  \"O:4:zk-observer.example.com\"\n]"}, "loc": ["services", "exhibitor", "zkServersSpec"], "readOnly": false, "type": "list of string"}, "services.exim.config": {"declarations": ["nixos/modules/services/mail/exim.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim Exim configuration.  This should not contain exim_user,\nexim_group, exim_path, or spool_directory.\n"}, "loc": ["services", "exim", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.exim.enable": {"declarations": ["nixos/modules/services/mail/exim.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Exim mail transfer agent."}, "loc": ["services", "exim", "enable"], "readOnly": false, "type": "boolean"}, "services.exim.group": {"declarations": ["nixos/modules/services/mail/exim.nix"], "default": {"_type": "literalExpression", "text": "\"exim\""}, "description": {"_type": "mdDoc", "text": "Group to use when no root privileges are required.\n"}, "loc": ["services", "exim", "group"], "readOnly": false, "type": "string"}, "services.exim.package": {"declarations": ["nixos/modules/services/mail/exim.nix"], "default": {"_type": "literalExpression", "text": "pkgs.exim"}, "description": {"_type": "mdDoc", "text": "The Exim derivation to use.\nThis can be used to enable features such as LDAP or PAM support.\n"}, "loc": ["services", "exim", "package"], "readOnly": false, "type": "package"}, "services.exim.queueRunnerInterval": {"declarations": ["nixos/modules/services/mail/exim.nix"], "default": {"_type": "literalExpression", "text": "\"5m\""}, "description": {"_type": "mdDoc", "text": "How often to spawn a new queue runner.\n"}, "loc": ["services", "exim", "queueRunnerInterval"], "readOnly": false, "type": "string"}, "services.exim.spoolDir": {"declarations": ["nixos/modules/services/mail/exim.nix"], "default": {"_type": "literalExpression", "text": "\"/var/spool/exim\""}, "description": {"_type": "mdDoc", "text": "Location of the spool directory of exim.\n"}, "loc": ["services", "exim", "spoolDir"], "readOnly": false, "type": "path"}, "services.exim.user": {"declarations": ["nixos/modules/services/mail/exim.nix"], "default": {"_type": "literalExpression", "text": "\"exim\""}, "description": {"_type": "mdDoc", "text": "User to use when no root privileges are required.\nIn particular, this applies when receiving messages and when doing\nremote deliveries.  (Local deliveries run as various non-root users,\ntypically as the owner of a local mailbox.) Specifying this value\nas root is not supported.\n"}, "loc": ["services", "exim", "user"], "readOnly": false, "type": "string"}, "services.expressvpn.enable": {"declarations": ["nixos/modules/services/networking/expressvpn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the ExpressVPN daemon.\n"}, "loc": ["services", "expressvpn", "enable"], "readOnly": false, "type": "boolean"}, "services.factorio.admins": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of player names which will be admin.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"username\"\n]"}, "loc": ["services", "factorio", "admins"], "readOnly": false, "type": "list of string"}, "services.factorio.autosave-interval": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Autosave interval in minutes.\n"}, "example": {"_type": "literalExpression", "text": "10"}, "loc": ["services", "factorio", "autosave-interval"], "readOnly": false, "type": "null or signed integer"}, "services.factorio.bind": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "The address to which the service should bind.\n"}, "loc": ["services", "factorio", "bind"], "readOnly": false, "type": "string"}, "services.factorio.configFile": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "configFile"}, "description": {"_type": "mdDoc", "text": "The server's configuration file.\n\nThe default file generated by this module contains lines essential to\nthe server's operation. Use its contents as a basis for any\ncustomizations.\n"}, "loc": ["services", "factorio", "configFile"], "readOnly": false, "type": "path"}, "services.factorio.description": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of the game that will appear in the listing.\n"}, "loc": ["services", "factorio", "description"], "readOnly": false, "type": "null or string"}, "services.factorio.enable": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Factorio."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "factorio", "enable"], "readOnly": false, "type": "boolean"}, "services.factorio.extraSettings": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra game configuration that will go into server-settings.json\n"}, "example": {"_type": "literalExpression", "text": "{\n  admins = [\n    \"username\"\n  ];\n}"}, "loc": ["services", "factorio", "extraSettings"], "readOnly": false, "type": "attribute set"}, "services.factorio.game-name": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "\"Factorio Game\""}, "description": {"_type": "mdDoc", "text": "Name of the game as it will appear in the game listing.\n"}, "loc": ["services", "factorio", "game-name"], "readOnly": false, "type": "null or string"}, "services.factorio.game-password": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Game password.\n"}, "loc": ["services", "factorio", "game-password"], "readOnly": false, "type": "null or string"}, "services.factorio.lan": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Game will be broadcast on LAN.\n"}, "loc": ["services", "factorio", "lan"], "readOnly": false, "type": "boolean"}, "services.factorio.loadLatestSave": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Load the latest savegame on startup. This overrides saveName, in that the latest\nsave will always be used even if a saved game of the given name exists. It still\ncontrols the 'canonical' name of the savegame.\n\nSet this to true to have the server automatically reload a recent autosave after\na crash or desync.\n"}, "loc": ["services", "factorio", "loadLatestSave"], "readOnly": false, "type": "boolean"}, "services.factorio.mods": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Mods the server should install and activate.\n\nThe derivations in this list must \"build\" the mod by simply copying\nthe .zip, named correctly, into the output directory. Eventually,\nthere will be a way to pull in the most up-to-date list of\nderivations via nixos-channel. Until then, this is for experts only.\n"}, "loc": ["services", "factorio", "mods"], "readOnly": false, "type": "list of package"}, "services.factorio.mods-dat": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Mods settings can be changed by specifying a dat file, in the [mod\nsettings file\nformat](https://wiki.factorio.com/Mod_settings_file_format).\n"}, "loc": ["services", "factorio", "mods-dat"], "readOnly": false, "type": "null or path"}, "services.factorio.nonBlockingSaving": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Highly experimental feature, enable only at your own risk of losing your saves.\nOn UNIX systems, server will fork itself to create an autosave.\nAutosaving on connected Windows clients will be disabled regardless of autosave_only_on_server option.\n"}, "loc": ["services", "factorio", "nonBlockingSaving"], "readOnly": false, "type": "boolean"}, "services.factorio.openFirewall": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to automatically open the specified UDP port in the firewall.\n"}, "loc": ["services", "factorio", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.factorio.package": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "pkgs.factorio-headless"}, "description": {"_type": "mdDoc", "text": "Factorio version to use. This defaults to the stable channel.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.factorio-headless-experimental"}, "loc": ["services", "factorio", "package"], "readOnly": false, "type": "package"}, "services.factorio.password": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Your factorio.com login credentials. Required for games with visibility public.\n"}, "loc": ["services", "factorio", "password"], "readOnly": false, "type": "null or string"}, "services.factorio.port": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "34197"}, "description": {"_type": "mdDoc", "text": "The port to which the service should bind.\n"}, "loc": ["services", "factorio", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.factorio.public": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Game will be published on the official Factorio matching server.\n"}, "loc": ["services", "factorio", "public"], "readOnly": false, "type": "boolean"}, "services.factorio.requireUserVerification": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "When set to true, the server will only allow clients that have a valid factorio.com account.\n"}, "loc": ["services", "factorio", "requireUserVerification"], "readOnly": false, "type": "boolean"}, "services.factorio.saveName": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "\"default\""}, "description": {"_type": "mdDoc", "text": "The name of the savegame that will be used by the server.\n\nWhen not present in /var/lib/${config.services.factorio.stateDirName}/saves,\na new map with default settings will be generated before starting the service.\n"}, "loc": ["services", "factorio", "saveName"], "readOnly": false, "type": "string"}, "services.factorio.stateDirName": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "\"factorio\""}, "description": {"_type": "mdDoc", "text": "Name of the directory under /var/lib holding the server's data.\n\nThe configuration and map will be stored here.\n"}, "loc": ["services", "factorio", "stateDirName"], "readOnly": false, "type": "string"}, "services.factorio.token": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Authentication token. May be used instead of 'password' above.\n"}, "loc": ["services", "factorio", "token"], "readOnly": false, "type": "null or string"}, "services.factorio.username": {"declarations": ["nixos/modules/services/games/factorio.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Your factorio.com login credentials. Required for games with visibility public.\n"}, "loc": ["services", "factorio", "username"], "readOnly": false, "type": "null or string"}, "services.fail2ban.banaction": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "if config.networking.nftables.enable then \"nftables-multiport\" else \"iptables-multiport\""}, "description": {"_type": "mdDoc", "text": "Default banning action (e.g. iptables, iptables-new, iptables-multiport,\niptables-ipset-proto6-allports, shorewall, etc). It is used to\ndefine action_* variables. Can be overridden globally or per\nsection within jail.local file\n"}, "loc": ["services", "fail2ban", "banaction"], "readOnly": false, "type": "string"}, "services.fail2ban.banaction-allports": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "if config.networking.nftables.enable then \"nftables-allport\" else \"iptables-allport\""}, "description": {"_type": "mdDoc", "text": "Default banning action (e.g. iptables, iptables-new, iptables-multiport,\nshorewall, etc) for \"allports\" jails. It is used to define action_* variables. Can be overridden\nglobally or per section within jail.local file\n"}, "loc": ["services", "fail2ban", "banaction-allports"], "readOnly": false, "type": "string"}, "services.fail2ban.bantime": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of seconds that a host is banned."}, "example": {"_type": "literalExpression", "text": "\"10m\""}, "loc": ["services", "fail2ban", "bantime"], "readOnly": false, "type": "null or string"}, "services.fail2ban.bantime-increment.enable": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "\"bantime.increment\" allows to use database for searching of previously banned ip's to increase\na default ban time using special formula, default it is banTime * 1, 2, 4, 8, 16, 32 ...\n"}, "loc": ["services", "fail2ban", "bantime-increment", "enable"], "readOnly": false, "type": "boolean"}, "services.fail2ban.bantime-increment.factor": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "\"bantime.factor\" is a coefficient to calculate exponent growing of the formula or common multiplier,\ndefault value of factor is 1 and with default value of formula, the ban time grows by 1, 2, 4, 8, 16 ...\n"}, "example": {"_type": "literalExpression", "text": "\"4\""}, "loc": ["services", "fail2ban", "bantime-increment", "factor"], "readOnly": false, "type": "null or string"}, "services.fail2ban.bantime-increment.formula": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "\"bantime.formula\" used by default to calculate next value of ban time, default value bellow,\nthe same ban time growing will be reached by multipliers 1, 2, 4, 8, 16, 32 ...\n"}, "example": {"_type": "literalExpression", "text": "\"ban.Time * math.exp(float(ban.Count+1)*banFactor)/math.exp(1*banFactor)\""}, "loc": ["services", "fail2ban", "bantime-increment", "formula"], "readOnly": false, "type": "null or string"}, "services.fail2ban.bantime-increment.maxtime": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "\"bantime.maxtime\" is the max number of seconds using the ban time can reach (don't grows further)\n"}, "example": {"_type": "literalExpression", "text": "\"48h\""}, "loc": ["services", "fail2ban", "bantime-increment", "maxtime"], "readOnly": false, "type": "null or string"}, "services.fail2ban.bantime-increment.multipliers": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "\"bantime.multipliers\" used to calculate next value of ban time instead of formula, corresponding\npreviously ban count and given \"bantime.factor\" (for multipliers default is 1);\nfollowing example grows ban time by 1, 2, 4, 8, 16 ... and if last ban count greater as multipliers count,\nalways used last multiplier (64 in example), for factor '1' and original ban time 600 - 10.6 hours\n"}, "example": {"_type": "literalExpression", "text": "\"1 2 4 8 16 32 64\""}, "loc": ["services", "fail2ban", "bantime-increment", "multipliers"], "readOnly": false, "type": "null or string"}, "services.fail2ban.bantime-increment.overalljails": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "\"bantime.overalljails\" (if true) specifies the search of IP in the database will be executed\ncross over all jails, if false (default), only current jail of the ban IP will be searched\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "fail2ban", "bantime-increment", "overalljails"], "readOnly": false, "type": "null or boolean"}, "services.fail2ban.bantime-increment.rndtime": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "\"bantime.rndtime\" is the max number of seconds using for mixing with random time\nto prevent \"clever\" botnets calculate exact time IP can be unbanned again\n"}, "example": {"_type": "literalExpression", "text": "\"8m\""}, "loc": ["services", "fail2ban", "bantime-increment", "rndtime"], "readOnly": false, "type": "null or string"}, "services.fail2ban.daemonConfig": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "''\n  [Definition]\n  logtarget = SYSLOG\n  socket    = /run/fail2ban/fail2ban.sock\n  pidfile   = /run/fail2ban/fail2ban.pid\n  dbfile    = /var/lib/fail2ban/fail2ban.sqlite3\n''"}, "description": {"_type": "mdDoc", "text": "The contents of Fail2ban's main configuration file.  It's\ngenerally not necessary to change it.\n"}, "loc": ["services", "fail2ban", "daemonConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.fail2ban.enable": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the fail2ban service.\n\nSee the documentation of {option}`services.fail2ban.jails`\nfor what jails are enabled by default.\n"}, "loc": ["services", "fail2ban", "enable"], "readOnly": false, "type": "boolean"}, "services.fail2ban.extraPackages": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra packages to be made available to the fail2ban service. The example contains\nthe packages needed by the `iptables-ipset-proto6` action.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.ipset ]"}, "loc": ["services", "fail2ban", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.fail2ban.extraSettings": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra default configuration for all jails (i.e. `[DEFAULT]`). See\n<https://github.com/fail2ban/fail2ban/blob/master/config/jail.conf> for an overview.\n"}, "example": {"_type": "literalExpression", "text": "{\n  findtime = \"15m\";\n}\n"}, "loc": ["services", "fail2ban", "extraSettings"], "readOnly": false, "type": "attribute set of (boolean or positive integer, meaning >0 or string)"}, "services.fail2ban.ignoreIP": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "\"ignoreIP\" can be a list of IP addresses, CIDR masks or DNS hosts. Fail2ban will not ban a host which\nmatches an address in this list. Several addresses can be defined using space (and/or comma) separator.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168.0.0/16\"\n  \"2001:DB8::42\"\n]"}, "loc": ["services", "fail2ban", "ignoreIP"], "readOnly": false, "type": "list of string"}, "services.fail2ban.jails": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The configuration of each Fail2ban \u201cjail\u201d.  A jail\nconsists of an action (such as blocking a port using\n{command}`iptables`) that is triggered when a\nfilter applied to a log file triggers more than a certain\nnumber of times in a certain time period.  Actions are\ndefined in {file}`/etc/fail2ban/action.d`,\nwhile filters are defined in\n{file}`/etc/fail2ban/filter.d`.\n\nNixOS comes with a default `sshd` jail;\nfor it to work well,\n{option}`services.openssh.logLevel` should be set to\n`\"VERBOSE\"` or higher so that fail2ban\ncan observe failed login attempts.\nThis module sets it to `\"VERBOSE\"` if\nnot set otherwise, so enabling fail2ban can make SSH logs\nmore verbose.\n"}, "example": {"_type": "literalExpression", "text": "{ apache-nohome-iptables = ''\n    # Block an IP address if it accesses a non-existent\n    # home directory more than 5 times in 10 minutes,\n    # since that indicates that it's scanning.\n    filter   = apache-nohome\n    action   = iptables-multiport[name=HTTP, port=\"http,https\"]\n    logpath  = /var/log/httpd/error_log*\n    backend = auto\n    findtime = 600\n    bantime  = 600\n    maxretry = 5\n  '';\n dovecot = ''\n   # block IPs which failed to log-in\n   # aggressive mode add blocking for aborted connections\n   enabled = true\n   filter = dovecot[mode=aggressive]\n   maxretry = 3\n '';\n}\n"}, "loc": ["services", "fail2ban", "jails"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.fail2ban.maxretry": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Number of failures before a host gets banned."}, "loc": ["services", "fail2ban", "maxretry"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.fail2ban.package": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "pkgs.fail2ban"}, "description": {"_type": "mdDoc", "text": "The fail2ban package to use for running the fail2ban service."}, "example": {"_type": "literalExpression", "text": "pkgs.fail2ban_0_11"}, "loc": ["services", "fail2ban", "package"], "readOnly": false, "type": "package"}, "services.fail2ban.packageFirewall": {"declarations": ["nixos/modules/services/security/fail2ban.nix"], "default": {"_type": "literalExpression", "text": "config.networking.firewall.package"}, "description": {"_type": "mdDoc", "text": "The firewall package used by fail2ban service. Defaults to the package for your firewall (iptables or nftables)."}, "loc": ["services", "fail2ban", "packageFirewall"], "readOnly": false, "type": "package"}, "services.fakeroute.enable": {"declarations": ["nixos/modules/services/networking/fakeroute.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the fakeroute service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "fakeroute", "enable"], "readOnly": false, "type": "boolean"}, "services.fakeroute.route": {"declarations": ["nixos/modules/services/networking/fakeroute.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Fake route that will appear after the real\none to any host running a traceroute.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"216.102.187.130\"\n  \"4.0.1.122\"\n  \"198.116.142.34\"\n  \"63.199.8.242\"\n]"}, "loc": ["services", "fakeroute", "route"], "readOnly": false, "type": "list of string"}, "services.fcgiwrap.enable": {"declarations": ["nixos/modules/services/web-servers/fcgiwrap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable fcgiwrap, a server for running CGI applications over FastCGI."}, "loc": ["services", "fcgiwrap", "enable"], "readOnly": false, "type": "boolean"}, "services.fcgiwrap.group": {"declarations": ["nixos/modules/services/web-servers/fcgiwrap.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Group permissions for the socket."}, "loc": ["services", "fcgiwrap", "group"], "readOnly": false, "type": "null or string"}, "services.fcgiwrap.preforkProcesses": {"declarations": ["nixos/modules/services/web-servers/fcgiwrap.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Number of processes to prefork."}, "loc": ["services", "fcgiwrap", "preforkProcesses"], "readOnly": false, "type": "signed integer"}, "services.fcgiwrap.socketAddress": {"declarations": ["nixos/modules/services/web-servers/fcgiwrap.nix"], "default": {"_type": "literalExpression", "text": "\"/run/fcgiwrap.sock\""}, "description": {"_type": "mdDoc", "text": "Socket address. In case of a UNIX socket, this should be its filesystem path."}, "example": {"_type": "literalExpression", "text": "\"1.2.3.4:5678\""}, "loc": ["services", "fcgiwrap", "socketAddress"], "readOnly": false, "type": "string"}, "services.fcgiwrap.socketType": {"declarations": ["nixos/modules/services/web-servers/fcgiwrap.nix"], "default": {"_type": "literalExpression", "text": "\"unix\""}, "description": {"_type": "mdDoc", "text": "Socket type: 'unix', 'tcp' or 'tcp6'."}, "loc": ["services", "fcgiwrap", "socketType"], "readOnly": false, "type": "one of \"unix\", \"tcp\", \"tcp6\""}, "services.fcgiwrap.user": {"declarations": ["nixos/modules/services/web-servers/fcgiwrap.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "User permissions for the socket."}, "loc": ["services", "fcgiwrap", "user"], "readOnly": false, "type": "null or string"}, "services.fcron.allow": {"declarations": ["nixos/modules/services/scheduling/fcron.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"all\"\n]"}, "description": {"_type": "mdDoc", "text": "Users allowed to use fcrontab and fcrondyn (one name per\nline, `all` for everyone).\n"}, "loc": ["services", "fcron", "allow"], "readOnly": false, "type": "list of string"}, "services.fcron.deny": {"declarations": ["nixos/modules/services/scheduling/fcron.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Users forbidden from using fcron."}, "loc": ["services", "fcron", "deny"], "readOnly": false, "type": "list of string"}, "services.fcron.enable": {"declarations": ["nixos/modules/services/scheduling/fcron.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the {command}`fcron` daemon."}, "loc": ["services", "fcron", "enable"], "readOnly": false, "type": "boolean"}, "services.fcron.maxSerialJobs": {"declarations": ["nixos/modules/services/scheduling/fcron.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Maximum number of serial jobs which can run simultaneously."}, "loc": ["services", "fcron", "maxSerialJobs"], "readOnly": false, "type": "signed integer"}, "services.fcron.queuelen": {"declarations": ["nixos/modules/services/scheduling/fcron.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of jobs the serial queue and the lavg queue can contain."}, "loc": ["services", "fcron", "queuelen"], "readOnly": false, "type": "null or signed integer"}, "services.fcron.systab": {"declarations": ["nixos/modules/services/scheduling/fcron.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The \"system\" crontab contents."}, "loc": ["services", "fcron", "systab"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.felix.bundles": {"declarations": ["nixos/modules/services/misc/felix.nix"], "default": {"_type": "literalExpression", "text": "[ pkgs.felix_remoteshell ]"}, "description": {"_type": "mdDoc", "text": "List of bundles that should be activated on startup"}, "loc": ["services", "felix", "bundles"], "readOnly": false, "type": "list of package"}, "services.felix.enable": {"declarations": ["nixos/modules/services/misc/felix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Apache Felix OSGi service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "felix", "enable"], "readOnly": false, "type": "boolean"}, "services.felix.group": {"declarations": ["nixos/modules/services/misc/felix.nix"], "default": {"_type": "literalExpression", "text": "\"osgi\""}, "description": {"_type": "mdDoc", "text": "Group account under which Apache Felix runs."}, "loc": ["services", "felix", "group"], "readOnly": false, "type": "string"}, "services.felix.user": {"declarations": ["nixos/modules/services/misc/felix.nix"], "default": {"_type": "literalExpression", "text": "\"osgi\""}, "description": {"_type": "mdDoc", "text": "User account under which Apache Felix runs."}, "loc": ["services", "felix", "user"], "readOnly": false, "type": "string"}, "services.ferm.config": {"declarations": ["nixos/modules/services/networking/ferm.nix"], "default": {"_type": "literalMD", "text": "empty firewall, allows any traffic"}, "description": {"_type": "mdDoc", "text": "Verbatim ferm.conf configuration."}, "loc": ["services", "ferm", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.ferm.enable": {"declarations": ["nixos/modules/services/networking/ferm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ferm Firewall.\n*Warning*: Enabling this service WILL disable the existing NixOS\nfirewall! Default firewall rules provided by packages are not\nconsidered at the moment.\n"}, "loc": ["services", "ferm", "enable"], "readOnly": false, "type": "boolean"}, "services.ferm.package": {"declarations": ["nixos/modules/services/networking/ferm.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ferm"}, "description": {"_type": "mdDoc", "text": "The ferm package."}, "loc": ["services", "ferm", "package"], "readOnly": false, "type": "package"}, "services.filebeat.enable": {"declarations": ["nixos/modules/services/logging/filebeat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable filebeat."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "filebeat", "enable"], "readOnly": false, "type": "boolean"}, "services.filebeat.inputs": {"declarations": ["nixos/modules/services/logging/filebeat.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Inputs specify how Filebeat locates and processes input data.\n\nThis is like `services.filebeat.settings.filebeat.inputs`,\nbut structured as an attribute set. This has the benefit\nthat multiple NixOS modules can contribute settings to a\nsingle filebeat input.\n\nAn input type can be specified multiple times by choosing a\ndifferent `<name>` for each, but setting\n[](#opt-services.filebeat.inputs._name_.type)\nto the same value.\n\nSee <https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html>.\n"}, "example": {"_type": "literalExpression", "text": "{\n  journald.id = \"everything\";  # Only for filebeat7\n  log = {\n    enabled = true;\n    paths = [\n      \"/var/log/*.log\"\n    ];\n  };\n};\n"}, "loc": ["services", "filebeat", "inputs"], "readOnly": false, "type": "attribute set of (JSON value)"}, "services.filebeat.inputs.<name>.type": {"declarations": ["nixos/modules/services/logging/filebeat.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The input type.\n\nLook for the value after `type:` on\nthe individual input pages linked from\n<https://www.elastic.co/guide/en/beats/filebeat/current/configuration-filebeat-options.html>.\n"}, "loc": ["services", "filebeat", "inputs", "<name>", "type"], "readOnly": false, "type": "string"}, "services.filebeat.modules": {"declarations": ["nixos/modules/services/logging/filebeat.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Filebeat modules provide a quick way to get started\nprocessing common log formats. They contain default\nconfigurations, Elasticsearch ingest pipeline definitions,\nand Kibana dashboards to help you implement and deploy a log\nmonitoring solution.\n\nThis is like `services.filebeat.settings.filebeat.modules`,\nbut structured as an attribute set. This has the benefit\nthat multiple NixOS modules can contribute settings to a\nsingle filebeat module.\n\nA module can be specified multiple times by choosing a\ndifferent `<name>` for each, but setting\n[](#opt-services.filebeat.modules._name_.module)\nto the same value.\n\nSee <https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-modules.html>.\n"}, "example": {"_type": "literalExpression", "text": "{\n  nginx = {\n    access = {\n      enabled = true;\n      var.paths = [ \"/path/to/log/nginx/access.log*\" ];\n    };\n    error = {\n      enabled = true;\n      var.paths = [ \"/path/to/log/nginx/error.log*\" ];\n    };\n  };\n};\n"}, "loc": ["services", "filebeat", "modules"], "readOnly": false, "type": "attribute set of (JSON value)"}, "services.filebeat.modules.<name>.module": {"declarations": ["nixos/modules/services/logging/filebeat.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The name of the module.\n\nLook for the value after `module:` on\nthe individual input pages linked from\n<https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-modules.html>.\n"}, "loc": ["services", "filebeat", "modules", "<name>", "module"], "readOnly": false, "type": "string"}, "services.filebeat.package": {"declarations": ["nixos/modules/services/logging/filebeat.nix"], "default": {"_type": "literalExpression", "text": "pkgs.filebeat"}, "description": {"_type": "mdDoc", "text": "The filebeat package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.filebeat7"}, "loc": ["services", "filebeat", "package"], "readOnly": false, "type": "package"}, "services.filebeat.settings": {"declarations": ["nixos/modules/services/logging/filebeat.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for filebeat. See\n<https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-reference-yml.html>\nfor supported values.\n\nOptions containing secret data should be set to an attribute\nset containing the attribute `_secret` - a\nstring pointing to a file containing the value the option\nshould be set to. See the example to get a better picture of\nthis: in the resulting\n{file}`filebeat.yml` file, the\n`output.elasticsearch.password`\nkey will be set to the contents of the\n{file}`/var/keys/elasticsearch_password` file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  settings = {\n    output.elasticsearch = {\n      hosts = [ \"myEShost:9200\" ];\n      username = \"filebeat_internal\";\n      password = { _secret = \"/var/keys/elasticsearch_password\"; };\n    };\n    logging.level = \"info\";\n  };\n};\n"}, "loc": ["services", "filebeat", "settings"], "readOnly": false, "type": "JSON value"}, "services.filebeat.settings.output.elasticsearch.hosts": {"declarations": ["nixos/modules/services/logging/filebeat.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1:9200\"\n]"}, "description": {"_type": "mdDoc", "text": "The list of Elasticsearch nodes to connect to.\n\nThe events are distributed to these nodes in round\nrobin order. If one node becomes unreachable, the\nevent is automatically sent to another node. Each\nElasticsearch node can be defined as a URL or\nIP:PORT. For example:\n`http://192.15.3.2`,\n`https://es.found.io:9230` or\n`192.24.3.2:9300`. If no port is\nspecified, `9200` is used.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"myEShost:9200\"\n]"}, "loc": ["services", "filebeat", "settings", "output", "elasticsearch", "hosts"], "readOnly": false, "type": "list of string"}, "services.firebird.baseDir": {"declarations": ["nixos/modules/services/databases/firebird.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/firebird\""}, "description": {"_type": "mdDoc", "text": "Location containing data/ and system/ directories.\ndata/ stores the databases, system/ stores the password database security2.fdb.\n"}, "loc": ["services", "firebird", "baseDir"], "readOnly": false, "type": "string"}, "services.firebird.enable": {"declarations": ["nixos/modules/services/databases/firebird.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Firebird super server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "firebird", "enable"], "readOnly": false, "type": "boolean"}, "services.firebird.package": {"declarations": ["nixos/modules/services/databases/firebird.nix"], "default": {"_type": "literalExpression", "text": "pkgs.firebird"}, "description": {"_type": "mdDoc", "text": "Which Firebird package to be installed: `pkgs.firebird_3`\nFor SuperServer use override: `pkgs.firebird_3.override { superServer = true; };`\n"}, "example": {"_type": "literalExpression", "text": "pkgs.firebird_3"}, "loc": ["services", "firebird", "package"], "readOnly": false, "type": "package"}, "services.firebird.port": {"declarations": ["nixos/modules/services/databases/firebird.nix"], "default": {"_type": "literalExpression", "text": "3050"}, "description": {"_type": "mdDoc", "text": "Port Firebird uses.\n"}, "loc": ["services", "firebird", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.firebird.user": {"declarations": ["nixos/modules/services/databases/firebird.nix"], "default": {"_type": "literalExpression", "text": "\"firebird\""}, "description": {"_type": "mdDoc", "text": "User account under which firebird runs.\n"}, "loc": ["services", "firebird", "user"], "readOnly": false, "type": "string"}, "services.firefox-syncserver.database.createLocally": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to create database and user on the local machine if they do not exist.\nThis includes enabling unix domain socket authentication for the configured user.\n"}, "loc": ["services", "firefox-syncserver", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.firefox-syncserver.database.host": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host name. `localhost` is treated specially and inserts\nsystemd dependencies, other hostnames or IP addresses of the local machine do not.\n"}, "loc": ["services", "firefox-syncserver", "database", "host"], "readOnly": false, "type": "string"}, "services.firefox-syncserver.database.name": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "\"firefox_syncserver\""}, "description": {"_type": "mdDoc", "text": "Database to use for storage. Will be created automatically if it does not exist\nand `config.services.firefox-syncserver.database.createLocally` is set.\n"}, "loc": ["services", "firefox-syncserver", "database", "name"], "readOnly": false, "type": "string matching the pattern [a-z_][a-z0-9_]*"}, "services.firefox-syncserver.database.user": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "\"firefox-syncserver\""}, "description": {"_type": "mdDoc", "text": "Username for database connections.\n"}, "loc": ["services", "firefox-syncserver", "database", "user"], "readOnly": false, "type": "string"}, "services.firefox-syncserver.enable": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Firefox Sync storage service.\n\nOut of the box this will not be very useful unless you also configure at least\none service and one nodes by inserting them into the mysql database manually, e.g.\nby running\n\n```\n  INSERT INTO `services` (`id`, `service`, `pattern`) VALUES ('1', 'sync-1.5', '{node}/1.5/{uid}');\n  INSERT INTO `nodes` (`id`, `service`, `node`, `available`, `current_load`,\n      `capacity`, `downed`, `backoff`)\n    VALUES ('1', '1', 'https://mydomain.tld', '1', '0', '10', '0', '0');\n```\n\n{option}`services.firefox-syncserver.singleNode.enable` does this automatically when enabled\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "firefox-syncserver", "enable"], "readOnly": false, "type": "boolean"}, "services.firefox-syncserver.logLevel": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "\"error\""}, "description": {"_type": "mdDoc", "text": "Log level to run with. This can be a simple log level like `error`\nor `trace`, or a more complicated logging expression.\n"}, "loc": ["services", "firefox-syncserver", "logLevel"], "readOnly": false, "type": "string"}, "services.firefox-syncserver.package": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "pkgs.syncstorage-rs"}, "description": {"_type": "mdDoc", "text": "Package to use.\n"}, "loc": ["services", "firefox-syncserver", "package"], "readOnly": false, "type": "package"}, "services.firefox-syncserver.secrets": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "description": {"_type": "mdDoc", "text": "A file containing the various secrets. Should be in the format expected by systemd's\n`EnvironmentFile` directory. Two secrets are currently available:\n`SYNC_MASTER_SECRET` and\n`SYNC_TOKENSERVER__FXA_METRICS_HASH_SECRET`.\n"}, "loc": ["services", "firefox-syncserver", "secrets"], "readOnly": false, "type": "path"}, "services.firefox-syncserver.settings": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings for the sync server. These take priority over values computed\nfrom NixOS options.\n\nSee the example config in\n<https://github.com/mozilla-services/syncstorage-rs/blob/master/config/local.example.toml>\nand the doc comments on the `Settings` structs in\n<https://github.com/mozilla-services/syncstorage-rs/blob/master/syncstorage-settings/src/lib.rs>\nand\n<https://github.com/mozilla-services/syncstorage-rs/blob/master/tokenserver-settings/src/lib.rs>\nfor available options.\n"}, "loc": ["services", "firefox-syncserver", "settings"], "readOnly": false, "type": "TOML value"}, "services.firefox-syncserver.settings.port": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Port to bind to.\n"}, "loc": ["services", "firefox-syncserver", "settings", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.firefox-syncserver.settings.tokenserver.enabled": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the token service as well.\n"}, "loc": ["services", "firefox-syncserver", "settings", "tokenserver", "enabled"], "readOnly": false, "type": "boolean"}, "services.firefox-syncserver.singleNode.capacity": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "How many sync accounts are allowed on this server. Setting this value\nequal to or less than the number of currently active accounts will\neffectively deny service to accounts not yet registered here.\n"}, "loc": ["services", "firefox-syncserver", "singleNode", "capacity"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.firefox-syncserver.singleNode.enable": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable auto-configuration for a simple single-node setup."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "firefox-syncserver", "singleNode", "enable"], "readOnly": false, "type": "boolean"}, "services.firefox-syncserver.singleNode.enableNginx": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nginx virtualhost definitions."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "firefox-syncserver", "singleNode", "enableNginx"], "readOnly": false, "type": "boolean"}, "services.firefox-syncserver.singleNode.enableTLS": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic TLS setup."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "firefox-syncserver", "singleNode", "enableTLS"], "readOnly": false, "type": "boolean"}, "services.firefox-syncserver.singleNode.hostname": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "description": {"_type": "mdDoc", "text": "Host name to use for this service.\n"}, "loc": ["services", "firefox-syncserver", "singleNode", "hostname"], "readOnly": false, "type": "string"}, "services.firefox-syncserver.singleNode.url": {"declarations": ["nixos/modules/services/networking/firefox-syncserver.nix"], "default": {"_type": "literalExpression", "text": "${if cfg.singleNode.enableTLS then \"https\" else \"http\"}://${config.services.firefox-syncserver.singleNode.hostname}\n"}, "description": {"_type": "mdDoc", "text": "URL of the host. If you are not using the automatic webserver proxy setup you will have\nto change this setting or your sync server may not be functional.\n"}, "loc": ["services", "firefox-syncserver", "singleNode", "url"], "readOnly": false, "type": "string"}, "services.fireqos.config": {"declarations": ["nixos/modules/services/networking/fireqos.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The FireQOS configuration goes here.\n"}, "example": {"_type": "literalExpression", "text": "''\n  interface wlp3s0 world-in input rate 10mbit ethernet\n    class web commit 50kbit\n      match tcp ports 80,443\n  \n  interface wlp3s0 world-out input rate 10mbit ethernet\n    class web commit 50kbit\n      match tcp ports 80,443\n''"}, "loc": ["services", "fireqos", "config"], "readOnly": false, "type": "string"}, "services.fireqos.enable": {"declarations": ["nixos/modules/services/networking/fireqos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, FireQOS will be launched with the specified\nconfiguration given in `config`.\n"}, "loc": ["services", "fireqos", "enable"], "readOnly": false, "type": "boolean"}, "services.flannel.backend": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "{\n  Type = \"vxlan\";\n}"}, "description": {"_type": "mdDoc", "text": "Type of backend to use and specific configurations for that backend."}, "loc": ["services", "flannel", "backend"], "readOnly": false, "type": "attribute set"}, "services.flannel.enable": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable flannel."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "flannel", "enable"], "readOnly": false, "type": "boolean"}, "services.flannel.etcd.caFile": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Etcd certificate authority file"}, "loc": ["services", "flannel", "etcd", "caFile"], "readOnly": false, "type": "null or path"}, "services.flannel.etcd.certFile": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Etcd cert file"}, "loc": ["services", "flannel", "etcd", "certFile"], "readOnly": false, "type": "null or path"}, "services.flannel.etcd.endpoints": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"http://127.0.0.1:2379\"\n]"}, "description": {"_type": "mdDoc", "text": "Etcd endpoints"}, "loc": ["services", "flannel", "etcd", "endpoints"], "readOnly": false, "type": "list of string"}, "services.flannel.etcd.keyFile": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Etcd key file"}, "loc": ["services", "flannel", "etcd", "keyFile"], "readOnly": false, "type": "null or path"}, "services.flannel.etcd.prefix": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "\"/coreos.com/network\""}, "description": {"_type": "mdDoc", "text": "Etcd key prefix"}, "loc": ["services", "flannel", "etcd", "prefix"], "readOnly": false, "type": "string"}, "services.flannel.iface": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Interface to use (IP or name) for inter-host communication.\nDefaults to the interface for the default route on the machine.\n"}, "loc": ["services", "flannel", "iface"], "readOnly": false, "type": "null or string"}, "services.flannel.kubeconfig": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to kubeconfig to use for storing flannel config using the\nKubernetes API\n"}, "loc": ["services", "flannel", "kubeconfig"], "readOnly": false, "type": "null or path"}, "services.flannel.network": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "description": {"_type": "mdDoc", "text": " IPv4 network in CIDR format to use for the entire flannel network."}, "loc": ["services", "flannel", "network"], "readOnly": false, "type": "string"}, "services.flannel.nodeName": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "config.networking.fqdnOrHostName"}, "description": {"_type": "mdDoc", "text": "Needed when running with Kubernetes as backend as this cannot be auto-detected\";\n"}, "example": {"_type": "literalExpression", "text": "\"node1.example.com\""}, "loc": ["services", "flannel", "nodeName"], "readOnly": false, "type": "null or string"}, "services.flannel.package": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "pkgs.flannel"}, "description": {"_type": "mdDoc", "text": "Package to use for flannel"}, "loc": ["services", "flannel", "package"], "readOnly": false, "type": "package"}, "services.flannel.publicIp": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IP accessible by other nodes for inter-host communication.\nDefaults to the IP of the interface being used for communication.\n"}, "loc": ["services", "flannel", "publicIp"], "readOnly": false, "type": "null or string"}, "services.flannel.storageBackend": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "\"etcd\""}, "description": {"_type": "mdDoc", "text": "Determines where flannel stores its configuration at runtime"}, "loc": ["services", "flannel", "storageBackend"], "readOnly": false, "type": "one of \"etcd\", \"kubernetes\""}, "services.flannel.subnetLen": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "24"}, "description": {"_type": "mdDoc", "text": "The size of the subnet allocated to each host. Defaults to 24 (i.e. /24)\nunless the Network was configured to be smaller than a /24 in which case\nit is one less than the network.\n"}, "loc": ["services", "flannel", "subnetLen"], "readOnly": false, "type": "signed integer"}, "services.flannel.subnetMax": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The end of IP range which the subnet allocation should start with.\nDefaults to the last subnet of Network.\n"}, "loc": ["services", "flannel", "subnetMax"], "readOnly": false, "type": "null or string"}, "services.flannel.subnetMin": {"declarations": ["nixos/modules/services/networking/flannel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The beginning of IP range which the subnet allocation should start with.\nDefaults to the first subnet of Network.\n"}, "loc": ["services", "flannel", "subnetMin"], "readOnly": false, "type": "null or string"}, "services.flatpak.enable": {"declarations": ["nixos/modules/services/desktops/flatpak.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable flatpak."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "flatpak", "enable"], "readOnly": false, "type": "boolean"}, "services.flexget.config": {"declarations": ["nixos/modules/services/torrent/flexget.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The YAML configuration for FlexGet."}, "loc": ["services", "flexget", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.flexget.enable": {"declarations": ["nixos/modules/services/torrent/flexget.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Run FlexGet Daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "flexget", "enable"], "readOnly": false, "type": "boolean"}, "services.flexget.homeDir": {"declarations": ["nixos/modules/services/torrent/flexget.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/deluge\""}, "description": {"_type": "mdDoc", "text": "Where files live."}, "example": {"_type": "literalExpression", "text": "\"/home/flexget\""}, "loc": ["services", "flexget", "homeDir"], "readOnly": false, "type": "path"}, "services.flexget.interval": {"declarations": ["nixos/modules/services/torrent/flexget.nix"], "default": {"_type": "literalExpression", "text": "\"10m\""}, "description": {"_type": "mdDoc", "text": "When to perform a {command}`flexget` run. See {command}`man 7 systemd.time` for the format."}, "example": {"_type": "literalExpression", "text": "\"1h\""}, "loc": ["services", "flexget", "interval"], "readOnly": false, "type": "string"}, "services.flexget.package": {"declarations": ["nixos/modules/services/torrent/flexget.nix"], "default": {"_type": "literalExpression", "text": "pkgs.flexget"}, "description": {"_type": "mdDoc", "text": "The flexget package to use."}, "loc": ["services", "flexget", "package"], "readOnly": false, "type": "package"}, "services.flexget.systemScheduler": {"declarations": ["nixos/modules/services/torrent/flexget.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "When true, execute the runs via the flexget-runner.timer. If false, you have to specify the settings yourself in the YML file."}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "flexget", "systemScheduler"], "readOnly": false, "type": "boolean"}, "services.flexget.user": {"declarations": ["nixos/modules/services/torrent/flexget.nix"], "default": {"_type": "literalExpression", "text": "\"deluge\""}, "description": {"_type": "mdDoc", "text": "The user under which to run flexget."}, "example": {"_type": "literalExpression", "text": "\"some_user\""}, "loc": ["services", "flexget", "user"], "readOnly": false, "type": "string"}, "services.fluentd.config": {"declarations": ["nixos/modules/services/logging/fluentd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Fluentd config."}, "loc": ["services", "fluentd", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.fluentd.enable": {"declarations": ["nixos/modules/services/logging/fluentd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable fluentd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "fluentd", "enable"], "readOnly": false, "type": "boolean"}, "services.fluentd.package": {"declarations": ["nixos/modules/services/logging/fluentd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.fluentd"}, "description": {"_type": "mdDoc", "text": "The fluentd package to use."}, "loc": ["services", "fluentd", "package"], "readOnly": false, "type": "path"}, "services.fluentd.plugins": {"declarations": ["nixos/modules/services/logging/fluentd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of plugin paths to pass into fluentd. It will make plugins defined in ruby files\nthere available in your config.\n"}, "loc": ["services", "fluentd", "plugins"], "readOnly": false, "type": "list of path"}, "services.fluidd.enable": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Fluidd, a Klipper web interface for managing your 3d printer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "fluidd", "enable"], "readOnly": false, "type": "boolean"}, "services.fluidd.hostName": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Hostname to serve fluidd on"}, "loc": ["services", "fluidd", "hostName"], "readOnly": false, "type": "string"}, "services.fluidd.nginx": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration for the nginx virtual host of fluidd."}, "example": {"_type": "literalExpression", "text": "{\n  serverAliases = [ \"fluidd.${config.networking.domain}\" ];\n}\n"}, "loc": ["services", "fluidd", "nginx"], "readOnly": false, "type": "submodule"}, "services.fluidd.nginx.acmeFallbackHost": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host which to proxy requests to if ACME challenge is not found. Useful\nif you want multiple hosts to be able to verify the same domain name.\n\nWith this option, you could request certificates for the present domain\nwith an ACME client that is running on another host, which you would\nspecify here.\n"}, "loc": ["services", "fluidd", "nginx", "acmeFallbackHost"], "readOnly": false, "type": "null or string"}, "services.fluidd.nginx.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the ACME challenge, which is **public**. Don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "fluidd", "nginx", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.fluidd.nginx.addSSL": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "fluidd", "nginx", "addSSL"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.basicAuth": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "fluidd", "nginx", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.fluidd.nginx.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "fluidd", "nginx", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.fluidd.nginx.default": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Makes this vhost the default.\n"}, "loc": ["services", "fluidd", "nginx", "default"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.enableACME": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "fluidd", "nginx", "enableACME"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.extraConfig": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the vhost verbatim.\n"}, "loc": ["services", "fluidd", "nginx", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.fluidd.nginx.forceSSL": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "fluidd", "nginx", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given hostname.\n"}, "example": {"_type": "literalExpression", "text": "\"newserver.example.org\""}, "loc": ["services", "fluidd", "nginx", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.fluidd.nginx.http2": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/2 protocol.\nNote that (as of writing) due to nginx's implementation, to disable\nHTTP/2 you have to disable it on all vhosts that use a given\nIP address / port.\nIf there is one server block configured to enable http2, then it is\nenabled for all server blocks on this IP.\nSee https://stackoverflow.com/a/39466948/263061.\n"}, "loc": ["services", "fluidd", "nginx", "http2"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.http3": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/3 protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that HTTP/3 support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "fluidd", "nginx", "http3"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.http3_hq": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that special application protocol support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "fluidd", "nginx", "http3_hq"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.kTLS": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kTLS support.\nImplementing TLS in the kernel (kTLS) improves performance by significantly\nreducing the need for copying operations between user space and the kernel.\nRequired Nginx version 1.21.4 or later.\n"}, "loc": ["services", "fluidd", "nginx", "kTLS"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.listen": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\nIPv6 addresses must be enclosed in square brackets.\nNote: this option overrides `addSSL`\nand `onlySSL`.\n\nIf you only want to set the addresses manually and not\nthe ports, take a look at `listenAddresses`\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    addr = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    addr = \"192.154.1.1\";\n    port = 80;\n  }\n]"}, "loc": ["services", "fluidd", "nginx", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.fluidd.nginx.listen.*.addr": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "description": {"_type": "mdDoc", "text": "IP address."}, "loc": ["services", "fluidd", "nginx", "listen", "*", "addr"], "readOnly": false, "type": "string"}, "services.fluidd.nginx.listen.*.extraParameters": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters of this listen directive."}, "example": {"_type": "literalExpression", "text": "[\n  \"backlog=1024\"\n  \"deferred\"\n]"}, "loc": ["services", "fluidd", "nginx", "listen", "*", "extraParameters"], "readOnly": false, "type": "list of string"}, "services.fluidd.nginx.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Port number."}, "loc": ["services", "fluidd", "nginx", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.fluidd.nginx.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SSL."}, "loc": ["services", "fluidd", "nginx", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n\nNote: This option overrides `enableIPv6`\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"[::1]\"\n]"}, "loc": ["services", "fluidd", "nginx", "listenAddresses"], "readOnly": false, "type": "list of string"}, "services.fluidd.nginx.locations": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n};\n"}, "loc": ["services", "fluidd", "nginx", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.fluidd.nginx.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "fluidd", "nginx", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.fluidd.nginx.locations.<name>.basicAuth": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "fluidd", "nginx", "locations", "<name>", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.fluidd.nginx.locations.<name>.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "fluidd", "nginx", "locations", "<name>", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.fluidd.nginx.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "fluidd", "nginx", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.fluidd.nginx.locations.<name>.fastcgiParams": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "FastCGI parameters to override.  Unlike in the Nginx\nconfiguration file, overriding only some default parameters\nwon't unset the default values for other parameters.\n"}, "loc": ["services", "fluidd", "nginx", "locations", "<name>", "fastcgiParams"], "readOnly": false, "type": "attribute set of (string or path)"}, "services.fluidd.nginx.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds index directive.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "fluidd", "nginx", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.fluidd.nginx.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "fluidd", "nginx", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.fluidd.nginx.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds proxy_pass directive and sets recommended proxy headers if\nrecommendedProxySettings is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "fluidd", "nginx", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.fluidd.nginx.locations.<name>.proxyWebsockets": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to support proxying websocket connections with HTTP/1.1.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "fluidd", "nginx", "locations", "<name>", "proxyWebsockets"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.locations.<name>.recommendedProxySettings": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "config.services.nginx.recommendedProxySettings"}, "description": {"_type": "mdDoc", "text": "Enable recommended proxy settings.\n"}, "loc": ["services", "fluidd", "nginx", "locations", "<name>", "recommendedProxySettings"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.locations.<name>.return": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds a return directive, for e.g. redirections.\n"}, "example": {"_type": "literalExpression", "text": "\"301 http://example.com$request_uri\""}, "loc": ["services", "fluidd", "nginx", "locations", "<name>", "return"], "readOnly": false, "type": "null or string"}, "services.fluidd.nginx.locations.<name>.root": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Root directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/root/directory\""}, "loc": ["services", "fluidd", "nginx", "locations", "<name>", "root"], "readOnly": false, "type": "null or path"}, "services.fluidd.nginx.locations.<name>.tryFiles": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds try_files directive.\n"}, "example": {"_type": "literalExpression", "text": "\"$uri =404\""}, "loc": ["services", "fluidd", "nginx", "locations", "<name>", "tryFiles"], "readOnly": false, "type": "null or string"}, "services.fluidd.nginx.onlySSL": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "fluidd", "nginx", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.quic": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the QUIC transport protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.\nNote that QUIC support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "fluidd", "nginx", "quic"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.rejectSSL": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to listen for and reject all HTTPS connections to this vhost. Useful in\n[default](#opt-services.nginx.virtualHosts._name_.default)\nserver blocks to avoid serving the certificate for another vhost. Uses the\n`ssl_reject_handshake` directive available in nginx versions\n1.19.4 and above.\n"}, "loc": ["services", "fluidd", "nginx", "rejectSSL"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.reuseport": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create an individual listening socket .\nIt is required to specify only once on one of the hosts.\n"}, "loc": ["services", "fluidd", "nginx", "reuseport"], "readOnly": false, "type": "boolean"}, "services.fluidd.nginx.root": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of the web root directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "fluidd", "nginx", "root"], "readOnly": false, "type": "null or path"}, "services.fluidd.nginx.serverAliases": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"example.org\"\n]"}, "loc": ["services", "fluidd", "nginx", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.fluidd.nginx.serverName": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of this virtual host. Defaults to attribute name in virtualHosts.\n"}, "example": {"_type": "literalExpression", "text": "\"example.org\""}, "loc": ["services", "fluidd", "nginx", "serverName"], "readOnly": false, "type": "null or string"}, "services.fluidd.nginx.sslCertificate": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "fluidd", "nginx", "sslCertificate"], "readOnly": false, "type": "path"}, "services.fluidd.nginx.sslCertificateKey": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "fluidd", "nginx", "sslCertificateKey"], "readOnly": false, "type": "path"}, "services.fluidd.nginx.sslTrustedCertificate": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to root SSL certificate for stapling and client certificates."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\""}, "loc": ["services", "fluidd", "nginx", "sslTrustedCertificate"], "readOnly": false, "type": "null or path"}, "services.fluidd.nginx.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "fluidd", "nginx", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.fluidd.package": {"declarations": ["nixos/modules/services/web-apps/fluidd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.fluidd"}, "description": {"_type": "mdDoc", "text": "Fluidd package to be used in the module"}, "loc": ["services", "fluidd", "package"], "readOnly": false, "type": "package"}, "services.foldingathome.daemonNiceLevel": {"declarations": ["nixos/modules/services/computing/foldingathome/client.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Daemon process priority for FAHClient.\n0 is the default Unix process priority, 19 is the lowest.\n"}, "loc": ["services", "foldingathome", "daemonNiceLevel"], "readOnly": false, "type": "integer between -20 and 19 (both inclusive)"}, "services.foldingathome.enable": {"declarations": ["nixos/modules/services/computing/foldingathome/client.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Folding@home client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "foldingathome", "enable"], "readOnly": false, "type": "boolean"}, "services.foldingathome.extraArgs": {"declarations": ["nixos/modules/services/computing/foldingathome/client.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra startup options for the FAHClient. Run\n`FAHClient --help` to find all the available options.\n"}, "loc": ["services", "foldingathome", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.foldingathome.package": {"declarations": ["nixos/modules/services/computing/foldingathome/client.nix"], "default": {"_type": "literalExpression", "text": "pkgs.fahclient"}, "description": {"_type": "mdDoc", "text": "Which Folding@home client to use.\n"}, "loc": ["services", "foldingathome", "package"], "readOnly": false, "type": "package"}, "services.foldingathome.team": {"declarations": ["nixos/modules/services/computing/foldingathome/client.nix"], "default": {"_type": "literalExpression", "text": "236565"}, "description": {"_type": "mdDoc", "text": "The team ID associated with the reported computation results. This\nwill be used in the ranking statistics.\n\nBy default, use the NixOS folding@home team ID is being used.\n"}, "loc": ["services", "foldingathome", "team"], "readOnly": false, "type": "signed integer"}, "services.foldingathome.user": {"declarations": ["nixos/modules/services/computing/foldingathome/client.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The user associated with the reported computation results. This will\nbe used in the ranking statistics.\n"}, "loc": ["services", "foldingathome", "user"], "readOnly": false, "type": "null or string"}, "services.foundationdb.backupProcesses": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Number of backup_agent processes to run for snapshots."}, "loc": ["services", "foundationdb", "backupProcesses"], "readOnly": false, "type": "signed integer"}, "services.foundationdb.class": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Process class"}, "loc": ["services", "foundationdb", "class"], "readOnly": false, "type": "null or one of \"storage\", \"transaction\", \"stateless\""}, "services.foundationdb.dataDir": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/foundationdb\""}, "description": {"_type": "mdDoc", "text": "Data directory. All cluster data will be put under here."}, "loc": ["services", "foundationdb", "dataDir"], "readOnly": false, "type": "path"}, "services.foundationdb.enable": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable FoundationDB Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "foundationdb", "enable"], "readOnly": false, "type": "boolean"}, "services.foundationdb.extraReadWritePaths": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An extra set of filesystem paths that FoundationDB can read to\nand write from. By default, FoundationDB runs under a heavily\nnamespaced systemd environment without write access to most of\nthe filesystem outside of its data and log directories. By\nadding paths to this list, the set of writeable paths will be\nexpanded. This is useful for allowing e.g. backups to local files,\nwhich must be performed on behalf of the foundationdb service.\n"}, "loc": ["services", "foundationdb", "extraReadWritePaths"], "readOnly": false, "type": "list of path"}, "services.foundationdb.group": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "\"foundationdb\""}, "description": {"_type": "mdDoc", "text": "Group account under which FoundationDB runs."}, "loc": ["services", "foundationdb", "group"], "readOnly": false, "type": "string"}, "services.foundationdb.listenAddress": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "\"public\""}, "description": {"_type": "mdDoc", "text": "Publicly visible IP address of the process. Port is determined by process ID"}, "loc": ["services", "foundationdb", "listenAddress"], "readOnly": false, "type": "string"}, "services.foundationdb.listenPortStart": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "4500"}, "description": {"_type": "mdDoc", "text": "Starting port number for database listening sockets. Every FDB process binds to a\nsubsequent port, to this number reflects the start of the overall range. e.g. having\n8 server processes will use all ports between 4500 and 4507.\n"}, "loc": ["services", "foundationdb", "listenPortStart"], "readOnly": false, "type": "signed integer"}, "services.foundationdb.locality": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "{\n  dataHall = null;\n  datacenterId = null;\n  machineId = null;\n  zoneId = null;\n}"}, "description": {"_type": "mdDoc", "text": "FoundationDB locality settings.\n"}, "loc": ["services", "foundationdb", "locality"], "readOnly": false, "type": "submodule"}, "services.foundationdb.locality.dataHall": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Data hall identifier key. All processes physically located in a\ndata hall should share the id. If you are depending on data\nhall based replication this must be set on all processes.\n"}, "loc": ["services", "foundationdb", "locality", "dataHall"], "readOnly": false, "type": "null or string"}, "services.foundationdb.locality.datacenterId": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Data center identifier key. All processes physically located in a\ndata center should share the id. If you are depending on data\ncenter based replication this must be set on all processes.\n"}, "loc": ["services", "foundationdb", "locality", "datacenterId"], "readOnly": false, "type": "null or string"}, "services.foundationdb.locality.machineId": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Machine identifier key. All processes on a machine should share a\nunique id. By default, processes on a machine determine a unique id to share.\nThis does not generally need to be set.\n"}, "loc": ["services", "foundationdb", "locality", "machineId"], "readOnly": false, "type": "null or string"}, "services.foundationdb.locality.zoneId": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Zone identifier key. Processes that share a zone id are\nconsidered non-unique for the purposes of data replication.\nIf unset, defaults to machine id.\n"}, "loc": ["services", "foundationdb", "locality", "zoneId"], "readOnly": false, "type": "null or string"}, "services.foundationdb.logDir": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "\"/var/log/foundationdb\""}, "description": {"_type": "mdDoc", "text": "Log directory."}, "loc": ["services", "foundationdb", "logDir"], "readOnly": false, "type": "path"}, "services.foundationdb.logSize": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "\"10MiB\""}, "description": {"_type": "mdDoc", "text": "Roll over to a new log file after the current log file\nreaches the specified size.\n"}, "loc": ["services", "foundationdb", "logSize"], "readOnly": false, "type": "string"}, "services.foundationdb.maxLogSize": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "\"100MiB\""}, "description": {"_type": "mdDoc", "text": "Delete the oldest log file when the total size of all log\nfiles exceeds the specified size. If set to 0, old log files\nwill not be deleted.\n"}, "loc": ["services", "foundationdb", "maxLogSize"], "readOnly": false, "type": "string"}, "services.foundationdb.memory": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "\"8GiB\""}, "description": {"_type": "mdDoc", "text": "Maximum memory used by the process. The default value is\n`8GiB`. When specified without a unit,\n`MiB` is assumed. This parameter does not\nchange the memory allocation of the program. Rather, it sets\na hard limit beyond which the process will kill itself and\nbe restarted. The default value of `8GiB`\nis double the intended memory usage in the default\nconfiguration (providing an emergency buffer to deal with\nmemory leaks or similar problems). It is not recommended to\ndecrease the value of this parameter below its default\nvalue. It may be increased if you wish to allocate a very\nlarge amount of storage engine memory or cache. In\nparticular, when the `storageMemory`\nparameter is increased, the `memory`\nparameter should be increased by an equal amount.\n"}, "loc": ["services", "foundationdb", "memory"], "readOnly": false, "type": "string"}, "services.foundationdb.openFirewall": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open the firewall ports corresponding to FoundationDB processes and coordinators\nusing {option}`config.networking.firewall.*`.\n"}, "loc": ["services", "foundationdb", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.foundationdb.package": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "description": {"_type": "mdDoc", "text": "The FoundationDB package to use for this server. This must be specified by the user\nin order to ensure migrations and upgrades are controlled appropriately.\n"}, "loc": ["services", "foundationdb", "package"], "readOnly": false, "type": "package"}, "services.foundationdb.pidfile": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "\"/run/foundationdb.pid\""}, "description": {"_type": "mdDoc", "text": "Path to pidfile for fdbmonitor."}, "loc": ["services", "foundationdb", "pidfile"], "readOnly": false, "type": "path"}, "services.foundationdb.publicAddress": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "\"auto\""}, "description": {"_type": "mdDoc", "text": "Publicly visible IP address of the process. Port is determined by process ID"}, "loc": ["services", "foundationdb", "publicAddress"], "readOnly": false, "type": "string"}, "services.foundationdb.restartDelay": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Number of seconds to wait before restarting servers."}, "loc": ["services", "foundationdb", "restartDelay"], "readOnly": false, "type": "signed integer"}, "services.foundationdb.serverProcesses": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Number of fdbserver processes to run."}, "loc": ["services", "foundationdb", "serverProcesses"], "readOnly": false, "type": "signed integer"}, "services.foundationdb.storageMemory": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "\"1GiB\""}, "description": {"_type": "mdDoc", "text": "Maximum memory used for data storage. The default value is\n`1GiB`. When specified without a unit,\n`MB` is assumed. Clusters using the memory\nstorage engine will be restricted to using this amount of\nmemory per process for purposes of data storage. Memory\noverhead associated with storing the data is counted against\nthis total. If you increase the\n`storageMemory`, you should also increase\nthe `memory` parameter by the same amount.\n"}, "loc": ["services", "foundationdb", "storageMemory"], "readOnly": false, "type": "string"}, "services.foundationdb.tls": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "FoundationDB Transport Security Layer (TLS) settings.\n"}, "loc": ["services", "foundationdb", "tls"], "readOnly": false, "type": "null or (submodule)"}, "services.foundationdb.tls.allowedPeers": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "\"Check.Valid=1,Check.Unexpired=1\""}, "description": {"_type": "mdDoc", "text": "\"Peer verification string\". This may be used to adjust which TLS\nclient certificates a server will accept, as a form of user\nauthorization; for example, it may only accept TLS clients who\noffer a certificate abiding by some locality or organization name.\n\nFor more information, please see the FoundationDB documentation.\n"}, "loc": ["services", "foundationdb", "tls", "allowedPeers"], "readOnly": false, "type": "string"}, "services.foundationdb.tls.certificate": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "description": {"_type": "mdDoc", "text": "Path to the TLS certificate file. This certificate will\nbe offered to, and may be verified by, clients.\n"}, "loc": ["services", "foundationdb", "tls", "certificate"], "readOnly": false, "type": "string"}, "services.foundationdb.tls.key": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "description": {"_type": "mdDoc", "text": "Private key file for the certificate."}, "loc": ["services", "foundationdb", "tls", "key"], "readOnly": false, "type": "string"}, "services.foundationdb.traceFormat": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "\"xml\""}, "description": {"_type": "mdDoc", "text": "Trace logging format."}, "loc": ["services", "foundationdb", "traceFormat"], "readOnly": false, "type": "one of \"xml\", \"json\""}, "services.foundationdb.user": {"declarations": ["nixos/modules/services/databases/foundationdb.nix"], "default": {"_type": "literalExpression", "text": "\"foundationdb\""}, "description": {"_type": "mdDoc", "text": "User account under which FoundationDB runs."}, "loc": ["services", "foundationdb", "user"], "readOnly": false, "type": "string"}, "services.fprintd.enable": {"declarations": ["nixos/modules/services/security/fprintd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable fprintd daemon and PAM module for fingerprint readers handling."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "fprintd", "enable"], "readOnly": false, "type": "boolean"}, "services.fprintd.package": {"declarations": ["nixos/modules/services/security/fprintd.nix"], "default": {"_type": "literalExpression", "text": "if config.services.fprintd.tod.enable then pkgs.fprintd-tod else pkgs.fprintd"}, "description": {"_type": "mdDoc", "text": "fprintd package to use.\n"}, "loc": ["services", "fprintd", "package"], "readOnly": false, "type": "package"}, "services.fprintd.tod.driver": {"declarations": ["nixos/modules/services/security/fprintd.nix"], "description": {"_type": "mdDoc", "text": "Touch OEM Drivers (TOD) package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.libfprint-2-tod1-goodix"}, "loc": ["services", "fprintd", "tod", "driver"], "readOnly": false, "type": "package"}, "services.fprintd.tod.enable": {"declarations": ["nixos/modules/services/security/fprintd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Touch OEM Drivers library support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "fprintd", "tod", "enable"], "readOnly": false, "type": "boolean"}, "services.fractalart.enable": {"declarations": ["nixos/modules/services/x11/fractalart.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable FractalArt for generating colorful wallpapers on login"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "fractalart", "enable"], "readOnly": false, "type": "boolean"}, "services.fractalart.height": {"declarations": ["nixos/modules/services/x11/fractalart.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Screen height"}, "example": {"_type": "literalExpression", "text": "1080"}, "loc": ["services", "fractalart", "height"], "readOnly": false, "type": "null or signed integer"}, "services.fractalart.width": {"declarations": ["nixos/modules/services/x11/fractalart.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Screen width"}, "example": {"_type": "literalExpression", "text": "1920"}, "loc": ["services", "fractalart", "width"], "readOnly": false, "type": "null or signed integer"}, "services.freeciv.enable": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable freeciv."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "freeciv", "enable"], "readOnly": false, "type": "boolean"}, "services.freeciv.openFirewall": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable opening the firewall for the port listening for clients."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "freeciv", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.freeciv.settings": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Parameters of freeciv-server.\n"}, "loc": ["services", "freeciv", "settings"], "readOnly": false, "type": "freeciv-server params"}, "services.freeciv.settings.Announce": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "\"none\""}, "description": {"_type": "mdDoc", "text": "Announce game in LAN using given protocol."}, "loc": ["services", "freeciv", "settings", "Announce"], "readOnly": false, "type": "one of \"IPv4\", \"IPv6\", \"none\""}, "services.freeciv.settings.Database": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "''\n  [fcdb]\n    backend=\"sqlite\"\n    database=\"/var/lib/freeciv/auth.sqlite\"\n''"}, "description": {"_type": "mdDoc", "text": "Enable database connection with given configuration."}, "loc": ["services", "freeciv", "settings", "Database"], "readOnly": false, "type": "null or string"}, "services.freeciv.settings.Guests": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable guests to login if auth is enabled."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "freeciv", "settings", "Guests"], "readOnly": false, "type": "boolean"}, "services.freeciv.settings.Newusers": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable new users to login if auth is enabled."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "freeciv", "settings", "Newusers"], "readOnly": false, "type": "boolean"}, "services.freeciv.settings.auth": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable server authentication."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "freeciv", "settings", "auth"], "readOnly": false, "type": "boolean"}, "services.freeciv.settings.debug": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Set debug log level."}, "loc": ["services", "freeciv", "settings", "debug"], "readOnly": false, "type": "integer between 0 and 3 (both inclusive)"}, "services.freeciv.settings.exit-on-end": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable exit instead of restarting when a game ends."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "freeciv", "settings", "exit-on-end"], "readOnly": false, "type": "boolean"}, "services.freeciv.settings.port": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "5556"}, "description": {"_type": "mdDoc", "text": "Listen for clients on given port"}, "loc": ["services", "freeciv", "settings", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.freeciv.settings.quitidle": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Quit if no players for given time in seconds."}, "loc": ["services", "freeciv", "settings", "quitidle"], "readOnly": false, "type": "null or signed integer"}, "services.freeciv.settings.read": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "''\n  /fcdb lua sqlite_createdb()\n''"}, "description": {"_type": "mdDoc", "text": "Startup script."}, "loc": ["services", "freeciv", "settings", "read"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.freeciv.settings.saves": {"declarations": ["nixos/modules/services/games/freeciv.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/freeciv/saves/\""}, "description": {"_type": "mdDoc", "text": "Save games to given directory,\na sub-directory named after the starting date of the service\nwill me inserted to preserve older saves.\n"}, "loc": ["services", "freeciv", "settings", "saves"], "readOnly": false, "type": "null or string"}, "services.freefall.devices": {"declarations": ["nixos/modules/services/hardware/freefall.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"/dev/sda\"\n]"}, "description": {"_type": "mdDoc", "text": "Device paths to all internal spinning hard drives.\n"}, "loc": ["services", "freefall", "devices"], "readOnly": false, "type": "list of string"}, "services.freefall.enable": {"declarations": ["nixos/modules/services/hardware/freefall.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to protect HP/Dell laptop hard drives (not SSDs) in free fall.\n"}, "loc": ["services", "freefall", "enable"], "readOnly": false, "type": "boolean"}, "services.freefall.package": {"declarations": ["nixos/modules/services/hardware/freefall.nix"], "default": {"_type": "literalExpression", "text": "pkgs.freefall"}, "description": {"_type": "mdDoc", "text": "freefall derivation to use.\n"}, "loc": ["services", "freefall", "package"], "readOnly": false, "type": "package"}, "services.freenet.enable": {"declarations": ["nixos/modules/services/networking/freenet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the Freenet daemon"}, "loc": ["services", "freenet", "enable"], "readOnly": false, "type": "boolean"}, "services.freenet.nice": {"declarations": ["nixos/modules/services/networking/freenet.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Set the nice level for the Freenet daemon"}, "loc": ["services", "freenet", "nice"], "readOnly": false, "type": "signed integer"}, "services.freeradius.configDir": {"declarations": ["nixos/modules/services/networking/freeradius.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/raddb\""}, "description": {"_type": "mdDoc", "text": "The path of the freeradius server configuration directory.\n"}, "loc": ["services", "freeradius", "configDir"], "readOnly": false, "type": "path"}, "services.freeradius.debug": {"declarations": ["nixos/modules/services/networking/freeradius.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable debug logging for freeradius (-xx\noption). This should not be left on, since it includes\nsensitive data such as passwords in the logs.\n"}, "loc": ["services", "freeradius", "debug"], "readOnly": false, "type": "boolean"}, "services.freeradius.enable": {"declarations": ["nixos/modules/services/networking/freeradius.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the freeradius server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "freeradius", "enable"], "readOnly": false, "type": "boolean"}, "services.freeswitch.configDir": {"declarations": ["nixos/modules/services/misc/freeswitch.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Override file in FreeSWITCH config template directory.\nEach top-level attribute denotes a file path in the configuration directory, its value is the file path.\nSee [FreeSWITCH documentation](https://freeswitch.org/confluence/display/FREESWITCH/Default+Configuration) for more info.\nAlso check available templates in [FreeSWITCH repository](https://github.com/signalwire/freeswitch/tree/master/conf).\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"freeswitch.xml\" = ./freeswitch.xml;\n  \"dialplan/default.xml\" = pkgs.writeText \"dialplan-default.xml\" ''\n    [xml lines]\n  '';\n}\n"}, "loc": ["services", "freeswitch", "configDir"], "readOnly": false, "type": "attribute set of path"}, "services.freeswitch.configTemplate": {"declarations": ["nixos/modules/services/misc/freeswitch.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.freeswitch.package}/share/freeswitch/conf/vanilla\""}, "description": {"_type": "mdDoc", "text": "Configuration template to use.\nSee available templates in [FreeSWITCH repository](https://github.com/signalwire/freeswitch/tree/master/conf).\nYou can also set your own configuration directory.\n"}, "example": {"_type": "literalExpression", "text": "\"${config.services.freeswitch.package}/share/freeswitch/conf/minimal\""}, "loc": ["services", "freeswitch", "configTemplate"], "readOnly": false, "type": "path"}, "services.freeswitch.enable": {"declarations": ["nixos/modules/services/misc/freeswitch.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable FreeSWITCH."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "freeswitch", "enable"], "readOnly": false, "type": "boolean"}, "services.freeswitch.enableReload": {"declarations": ["nixos/modules/services/misc/freeswitch.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Issue the `reloadxml` command to FreeSWITCH when configuration directory changes (instead of restart).\nSee [FreeSWITCH documentation](https://freeswitch.org/confluence/display/FREESWITCH/Reloading) for more info.\nThe configuration directory is exposed at {file}`/etc/freeswitch`.\nSee also `systemd.services.*.restartIfChanged`.\n"}, "loc": ["services", "freeswitch", "enableReload"], "readOnly": false, "type": "boolean"}, "services.freeswitch.package": {"declarations": ["nixos/modules/services/misc/freeswitch.nix"], "default": {"_type": "literalExpression", "text": "pkgs.freeswitch"}, "description": {"_type": "mdDoc", "text": "FreeSWITCH package.\n"}, "loc": ["services", "freeswitch", "package"], "readOnly": false, "type": "package"}, "services.freshrss.baseUrl": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "description": {"_type": "mdDoc", "text": "Default URL for FreshRSS."}, "example": {"_type": "literalExpression", "text": "\"https://freshrss.example.com\""}, "loc": ["services", "freshrss", "baseUrl"], "readOnly": false, "type": "string"}, "services.freshrss.dataDir": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/freshrss\""}, "description": {"_type": "mdDoc", "text": "Default data folder for FreshRSS."}, "example": {"_type": "literalExpression", "text": "\"/mnt/freshrss\""}, "loc": ["services", "freshrss", "dataDir"], "readOnly": false, "type": "string"}, "services.freshrss.database.host": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host for FreshRSS."}, "loc": ["services", "freshrss", "database", "host"], "readOnly": false, "type": "null or string"}, "services.freshrss.database.name": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "\"freshrss\""}, "description": {"_type": "mdDoc", "text": "Database name for FreshRSS."}, "loc": ["services", "freshrss", "database", "name"], "readOnly": false, "type": "null or string"}, "services.freshrss.database.passFile": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Database password file for FreshRSS."}, "example": {"_type": "literalExpression", "text": "\"/run/secrets/freshrss\""}, "loc": ["services", "freshrss", "database", "passFile"], "readOnly": false, "type": "null or path"}, "services.freshrss.database.port": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Database port for FreshRSS."}, "example": {"_type": "literalExpression", "text": "3306"}, "loc": ["services", "freshrss", "database", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.freshrss.database.tableprefix": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Database table prefix for FreshRSS."}, "example": {"_type": "literalExpression", "text": "\"freshrss\""}, "loc": ["services", "freshrss", "database", "tableprefix"], "readOnly": false, "type": "null or string"}, "services.freshrss.database.type": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite\""}, "description": {"_type": "mdDoc", "text": "Database type."}, "example": {"_type": "literalExpression", "text": "\"pgsql\""}, "loc": ["services", "freshrss", "database", "type"], "readOnly": false, "type": "one of \"sqlite\", \"pgsql\", \"mysql\""}, "services.freshrss.database.user": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "\"freshrss\""}, "description": {"_type": "mdDoc", "text": "Database user for FreshRSS."}, "loc": ["services", "freshrss", "database", "user"], "readOnly": false, "type": "null or string"}, "services.freshrss.defaultUser": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "\"admin\""}, "description": {"_type": "mdDoc", "text": "Default username for FreshRSS."}, "example": {"_type": "literalExpression", "text": "\"eva\""}, "loc": ["services", "freshrss", "defaultUser"], "readOnly": false, "type": "string"}, "services.freshrss.enable": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable FreshRSS feed reader."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "freshrss", "enable"], "readOnly": false, "type": "boolean"}, "services.freshrss.language": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "\"en\""}, "description": {"_type": "mdDoc", "text": "Default language for FreshRSS."}, "example": {"_type": "literalExpression", "text": "\"de\""}, "loc": ["services", "freshrss", "language"], "readOnly": false, "type": "string"}, "services.freshrss.package": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "pkgs.freshrss"}, "description": {"_type": "mdDoc", "text": "Which FreshRSS package to use."}, "loc": ["services", "freshrss", "package"], "readOnly": false, "type": "package"}, "services.freshrss.passwordFile": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "description": {"_type": "mdDoc", "text": "Password for the defaultUser for FreshRSS."}, "example": {"_type": "literalExpression", "text": "\"/run/secrets/freshrss\""}, "loc": ["services", "freshrss", "passwordFile"], "readOnly": false, "type": "path"}, "services.freshrss.pool": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "\"freshrss\""}, "description": {"_type": "mdDoc", "text": "Name of the phpfpm pool to use and setup. If not specified, a pool will be created\nwith default values.\n"}, "loc": ["services", "freshrss", "pool"], "readOnly": false, "type": "string"}, "services.freshrss.user": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "\"freshrss\""}, "description": {"_type": "mdDoc", "text": "User under which Freshrss runs."}, "loc": ["services", "freshrss", "user"], "readOnly": false, "type": "string"}, "services.freshrss.virtualHost": {"declarations": ["nixos/modules/services/web-apps/freshrss.nix"], "default": {"_type": "literalExpression", "text": "\"freshrss\""}, "description": {"_type": "mdDoc", "text": "Name of the nginx virtualhost to use and setup. If null, do not setup any virtualhost.\n"}, "loc": ["services", "freshrss", "virtualHost"], "readOnly": false, "type": "null or string"}, "services.fstrim.enable": {"declarations": ["nixos/modules/services/misc/fstrim.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable periodic SSD TRIM of mounted partitions in background."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "fstrim", "enable"], "readOnly": false, "type": "boolean"}, "services.fstrim.interval": {"declarations": ["nixos/modules/services/misc/fstrim.nix"], "default": {"_type": "literalExpression", "text": "\"weekly\""}, "description": {"_type": "mdDoc", "text": "How often we run fstrim. For most desktop and server systems\na sufficient trimming frequency is once a week.\n\nThe format is described in\n{manpage}`systemd.time(7)`.\n"}, "loc": ["services", "fstrim", "interval"], "readOnly": false, "type": "string"}, "services.fusionInventory.enable": {"declarations": ["nixos/modules/services/monitoring/fusion-inventory.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Fusion Inventory Agent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "fusionInventory", "enable"], "readOnly": false, "type": "boolean"}, "services.fusionInventory.extraConfig": {"declarations": ["nixos/modules/services/monitoring/fusion-inventory.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration that is injected verbatim into the configuration file.\n"}, "loc": ["services", "fusionInventory", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.fusionInventory.servers": {"declarations": ["nixos/modules/services/monitoring/fusion-inventory.nix"], "description": {"_type": "mdDoc", "text": "The urls of the OCS/GLPI servers to connect to.\n"}, "loc": ["services", "fusionInventory", "servers"], "readOnly": false, "type": "list of string"}, "services.fwupd.daemonSettings": {"declarations": ["nixos/modules/services/hardware/fwupd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configurations for the fwupd daemon.\n"}, "loc": ["services", "fwupd", "daemonSettings"], "readOnly": false, "type": "attribute set of (INI atom (null, bool, int, float or string) or a non-empty list of them)"}, "services.fwupd.daemonSettings.DisabledDevices": {"declarations": ["nixos/modules/services/hardware/fwupd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of device GUIDs to be disabled.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"2082b5e0-7a64-478a-b1b2-e3404fab6dad\"\n]"}, "loc": ["services", "fwupd", "daemonSettings", "DisabledDevices"], "readOnly": false, "type": "list of string"}, "services.fwupd.daemonSettings.DisabledPlugins": {"declarations": ["nixos/modules/services/hardware/fwupd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of plugins to be disabled.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"udev\"\n]"}, "loc": ["services", "fwupd", "daemonSettings", "DisabledPlugins"], "readOnly": false, "type": "list of string"}, "services.fwupd.daemonSettings.EspLocation": {"declarations": ["nixos/modules/services/hardware/fwupd.nix"], "default": {"_type": "literalExpression", "text": "config.boot.loader.efi.efiSysMountPoint"}, "description": {"_type": "mdDoc", "text": "The EFI system partition (ESP) path used if UDisks is not available\nor if this partition is not mounted at /boot/efi, /boot, or /efi\n"}, "loc": ["services", "fwupd", "daemonSettings", "EspLocation"], "readOnly": false, "type": "path"}, "services.fwupd.enable": {"declarations": ["nixos/modules/services/hardware/fwupd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable fwupd, a DBus service that allows\napplications to update firmware.\n"}, "loc": ["services", "fwupd", "enable"], "readOnly": false, "type": "boolean"}, "services.fwupd.enableTestRemote": {"declarations": ["nixos/modules/services/hardware/fwupd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable test remote. This is used by\n[installed tests](https://github.com/fwupd/fwupd/blob/master/data/installed-tests/README.md).\n"}, "loc": ["services", "fwupd", "enableTestRemote"], "readOnly": false, "type": "boolean"}, "services.fwupd.extraRemotes": {"declarations": ["nixos/modules/services/hardware/fwupd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Enables extra remotes in fwupd. See `/etc/fwupd/remotes.d`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"lvfs-testing\"\n]"}, "loc": ["services", "fwupd", "extraRemotes"], "readOnly": false, "type": "list of string"}, "services.fwupd.extraTrustedKeys": {"declarations": ["nixos/modules/services/hardware/fwupd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Installing a public key allows firmware signed with a matching private key to be recognized as trusted, which may require less authentication to install than for untrusted files. By default trusted firmware can be upgraded (but not downgraded) without the user or administrator password. Only very few keys are installed by default.\n"}, "example": {"_type": "literalExpression", "text": "[ /etc/nixos/fwupd/myfirmware.pem ]"}, "loc": ["services", "fwupd", "extraTrustedKeys"], "readOnly": false, "type": "list of path"}, "services.fwupd.package": {"declarations": ["nixos/modules/services/hardware/fwupd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.fwupd"}, "description": {"_type": "mdDoc", "text": "Which fwupd package to use.\n"}, "loc": ["services", "fwupd", "package"], "readOnly": false, "type": "package"}, "services.fwupd.uefiCapsuleSettings": {"declarations": ["nixos/modules/services/hardware/fwupd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "UEFI capsule configurations for the fwupd daemon.\n"}, "loc": ["services", "fwupd", "uefiCapsuleSettings"], "readOnly": false, "type": "attribute set of (INI atom (null, bool, int, float or string) or a non-empty list of them)"}, "services.galene.certFile": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the server's certificate. The file is copied at runtime to\nGalene's data directory where it needs to reside.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/your/cert.pem\""}, "loc": ["services", "galene", "certFile"], "readOnly": false, "type": "null or string"}, "services.galene.dataDir": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.galene.stateDir}/data\""}, "description": {"_type": "mdDoc", "text": "Data directory."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/galene/data\""}, "loc": ["services", "galene", "dataDir"], "readOnly": false, "type": "string"}, "services.galene.enable": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Galene Service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "galene", "enable"], "readOnly": false, "type": "boolean"}, "services.galene.group": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "\"galene\""}, "description": {"_type": "mdDoc", "text": "Group under which galene runs."}, "loc": ["services", "galene", "group"], "readOnly": false, "type": "string"}, "services.galene.groupsDir": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.galene.stateDir}/groups\""}, "description": {"_type": "mdDoc", "text": "Web server directory."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/galene/groups\""}, "loc": ["services", "galene", "groupsDir"], "readOnly": false, "type": "string"}, "services.galene.httpAddress": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "HTTP listen address for galene."}, "loc": ["services", "galene", "httpAddress"], "readOnly": false, "type": "string"}, "services.galene.httpPort": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "8443"}, "description": {"_type": "mdDoc", "text": "HTTP listen port."}, "loc": ["services", "galene", "httpPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.galene.insecure": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether Galene should listen in http or in https. If left as the default\nvalue (false), Galene needs to be fed a private key and a certificate.\n"}, "loc": ["services", "galene", "insecure"], "readOnly": false, "type": "boolean"}, "services.galene.keyFile": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the server's private key. The file is copied at runtime to\nGalene's data directory where it needs to reside.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/your/key.pem\""}, "loc": ["services", "galene", "keyFile"], "readOnly": false, "type": "null or string"}, "services.galene.package": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "pkgs.galene"}, "description": {"_type": "mdDoc", "text": "Package for running Galene.\n"}, "loc": ["services", "galene", "package"], "readOnly": false, "type": "package"}, "services.galene.recordingsDir": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.galene.stateDir}/recordings\""}, "description": {"_type": "mdDoc", "text": "Recordings directory."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/galene/recordings\""}, "loc": ["services", "galene", "recordingsDir"], "readOnly": false, "type": "string"}, "services.galene.stateDir": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/galene\""}, "description": {"_type": "mdDoc", "text": "The directory where Galene stores its internal state. If left as the default\nvalue this directory will automatically be created before the Galene server\nstarts, otherwise the sysadmin is responsible for ensuring the directory\nexists with appropriate ownership and permissions.\n"}, "loc": ["services", "galene", "stateDir"], "readOnly": false, "type": "string"}, "services.galene.staticDir": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "\"${package.static}/static\""}, "description": {"_type": "mdDoc", "text": "Web server directory."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/galene/static\""}, "loc": ["services", "galene", "staticDir"], "readOnly": false, "type": "string"}, "services.galene.user": {"declarations": ["nixos/modules/services/web-apps/galene.nix"], "default": {"_type": "literalExpression", "text": "\"galene\""}, "description": {"_type": "mdDoc", "text": "User account under which galene runs."}, "loc": ["services", "galene", "user"], "readOnly": false, "type": "string"}, "services.gammu-smsd.backend.files.errorSMSPath": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/spool/sms/error/\""}, "description": {"_type": "mdDoc", "text": "Where SMSes with error in transmission is placed"}, "loc": ["services", "gammu-smsd", "backend", "files", "errorSMSPath"], "readOnly": false, "type": "path"}, "services.gammu-smsd.backend.files.inboxPath": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/spool/sms/inbox/\""}, "description": {"_type": "mdDoc", "text": "Where the received SMSes are stored"}, "loc": ["services", "gammu-smsd", "backend", "files", "inboxPath"], "readOnly": false, "type": "path"}, "services.gammu-smsd.backend.files.outboxPath": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/spool/sms/outbox/\""}, "description": {"_type": "mdDoc", "text": "Where SMSes to be sent should be placed"}, "loc": ["services", "gammu-smsd", "backend", "files", "outboxPath"], "readOnly": false, "type": "path"}, "services.gammu-smsd.backend.files.sentSMSPath": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/spool/sms/sent/\""}, "description": {"_type": "mdDoc", "text": "Where the transmitted SMSes are placed"}, "loc": ["services", "gammu-smsd", "backend", "files", "sentSMSPath"], "readOnly": false, "type": "path"}, "services.gammu-smsd.backend.service": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "\"null\""}, "description": {"_type": "mdDoc", "text": "Service to use to store sms data."}, "loc": ["services", "gammu-smsd", "backend", "service"], "readOnly": false, "type": "one of \"null\", \"files\", \"sql\""}, "services.gammu-smsd.backend.sql.database": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Database name to store sms data"}, "loc": ["services", "gammu-smsd", "backend", "sql", "database"], "readOnly": false, "type": "null or string"}, "services.gammu-smsd.backend.sql.driver": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "description": {"_type": "mdDoc", "text": "DB driver to use"}, "loc": ["services", "gammu-smsd", "backend", "sql", "driver"], "readOnly": false, "type": "one of \"native_mysql\", \"native_pgsql\", \"odbc\", \"dbi\""}, "services.gammu-smsd.backend.sql.host": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database server address"}, "loc": ["services", "gammu-smsd", "backend", "sql", "host"], "readOnly": false, "type": "string"}, "services.gammu-smsd.backend.sql.password": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "User password used for connection to the database"}, "loc": ["services", "gammu-smsd", "backend", "sql", "password"], "readOnly": false, "type": "null or string"}, "services.gammu-smsd.backend.sql.sqlDialect": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SQL dialect to use (odbc driver only)"}, "loc": ["services", "gammu-smsd", "backend", "sql", "sqlDialect"], "readOnly": false, "type": "null or string"}, "services.gammu-smsd.backend.sql.user": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "User name used for connection to the database"}, "loc": ["services", "gammu-smsd", "backend", "sql", "user"], "readOnly": false, "type": "null or string"}, "services.gammu-smsd.device.connection": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "\"at\""}, "description": {"_type": "mdDoc", "text": "Protocol which will be used to talk to the phone"}, "loc": ["services", "gammu-smsd", "device", "connection"], "readOnly": false, "type": "string"}, "services.gammu-smsd.device.group": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "Owner group of the device"}, "example": {"_type": "literalExpression", "text": "\"dialout\""}, "loc": ["services", "gammu-smsd", "device", "group"], "readOnly": false, "type": "string"}, "services.gammu-smsd.device.path": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "description": {"_type": "mdDoc", "text": "Device node or address of the phone"}, "example": {"_type": "literalExpression", "text": "\"/dev/ttyUSB2\""}, "loc": ["services", "gammu-smsd", "device", "path"], "readOnly": false, "type": "path"}, "services.gammu-smsd.device.pin": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "PIN code for the simcard"}, "loc": ["services", "gammu-smsd", "device", "pin"], "readOnly": false, "type": "null or string"}, "services.gammu-smsd.device.synchronizeTime": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to set time from computer to the phone during starting connection"}, "loc": ["services", "gammu-smsd", "device", "synchronizeTime"], "readOnly": false, "type": "boolean"}, "services.gammu-smsd.enable": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable gammu-smsd daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gammu-smsd", "enable"], "readOnly": false, "type": "boolean"}, "services.gammu-smsd.extraConfig.gammu": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config lines to be added into [gammu] section"}, "loc": ["services", "gammu-smsd", "extraConfig", "gammu"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.gammu-smsd.extraConfig.smsd": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config lines to be added into [smsd] section"}, "loc": ["services", "gammu-smsd", "extraConfig", "smsd"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.gammu-smsd.log.file": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "\"syslog\""}, "description": {"_type": "mdDoc", "text": "Path to file where information about communication will be stored"}, "loc": ["services", "gammu-smsd", "log", "file"], "readOnly": false, "type": "string"}, "services.gammu-smsd.log.format": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "\"errors\""}, "description": {"_type": "mdDoc", "text": "Determines what will be logged to the LogFile"}, "loc": ["services", "gammu-smsd", "log", "format"], "readOnly": false, "type": "one of \"nothing\", \"text\", \"textall\", \"textalldate\", \"errors\", \"errorsdate\", \"binary\""}, "services.gammu-smsd.user": {"declarations": ["nixos/modules/services/misc/gammu-smsd.nix"], "default": {"_type": "literalExpression", "text": "\"smsd\""}, "description": {"_type": "mdDoc", "text": "User that has access to the device"}, "loc": ["services", "gammu-smsd", "user"], "readOnly": false, "type": "string"}, "services.garage.enable": {"declarations": ["nixos/modules/services/web-servers/garage.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Garage Object Storage (S3 compatible)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "garage", "enable"], "readOnly": false, "type": "boolean"}, "services.garage.extraEnvironment": {"declarations": ["nixos/modules/services/web-servers/garage.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables to pass to the Garage server."}, "example": {"_type": "literalExpression", "text": "{\n  RUST_BACKTRACE = \"yes\";\n}"}, "loc": ["services", "garage", "extraEnvironment"], "readOnly": false, "type": "attribute set of string"}, "services.garage.logLevel": {"declarations": ["nixos/modules/services/web-servers/garage.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Garage log level, see <https://garagehq.deuxfleurs.fr/documentation/quick-start/#launching-the-garage-server> for examples."}, "example": {"_type": "literalExpression", "text": "\"debug\""}, "loc": ["services", "garage", "logLevel"], "readOnly": false, "type": "one of \"info\", \"debug\", \"trace\""}, "services.garage.package": {"declarations": ["nixos/modules/services/web-servers/garage.nix"], "default": {"_type": "literalExpression", "text": "pkgs.garage_0_7"}, "description": {"_type": "mdDoc", "text": "Garage package to use, if you are upgrading from a major version, please read NixOS and Garage release notes for upgrade instructions."}, "loc": ["services", "garage", "package"], "readOnly": false, "type": "package"}, "services.garage.settings": {"declarations": ["nixos/modules/services/web-servers/garage.nix"], "description": {"_type": "mdDoc", "text": "Garage configuration, see <https://garagehq.deuxfleurs.fr/documentation/reference-manual/configuration/> for reference."}, "loc": ["services", "garage", "settings"], "readOnly": false, "type": "TOML value"}, "services.garage.settings.data_dir": {"declarations": ["nixos/modules/services/web-servers/garage.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/garage/data\""}, "description": {"_type": "mdDoc", "text": "The main data storage, put this on your large storage (e.g. high capacity HDD)"}, "loc": ["services", "garage", "settings", "data_dir"], "readOnly": false, "type": "path"}, "services.garage.settings.metadata_dir": {"declarations": ["nixos/modules/services/web-servers/garage.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/garage/meta\""}, "description": {"_type": "mdDoc", "text": "The metadata directory, put this on a fast disk (e.g. SSD) if possible."}, "loc": ["services", "garage", "settings", "metadata_dir"], "readOnly": false, "type": "path"}, "services.garage.settings.replication_mode": {"declarations": ["nixos/modules/services/web-servers/garage.nix"], "default": {"_type": "literalExpression", "text": "\"none\""}, "description": {"_type": "mdDoc", "text": "Garage replication mode, defaults to none, see: <https://garagehq.deuxfleurs.fr/documentation/reference-manual/configuration/#replication-mode> for reference."}, "loc": ["services", "garage", "settings", "replication_mode"], "readOnly": false, "type": "one of \"none\", \"1\", \"2\", \"3\", \"2-dangerous\", \"3-dangerous\", \"3-degraded\", 1, 2, 3"}, "services.gateone.enable": {"declarations": ["nixos/modules/services/networking/gateone.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GateOne server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gateone", "enable"], "readOnly": false, "type": "boolean"}, "services.gateone.pidDir": {"declarations": ["nixos/modules/services/networking/gateone.nix"], "default": {"_type": "literalExpression", "text": "\"/run/gateone\""}, "description": {"_type": "mdDoc", "text": "Path of pid files for GateOne."}, "loc": ["services", "gateone", "pidDir"], "readOnly": false, "type": "path"}, "services.gateone.settingsDir": {"declarations": ["nixos/modules/services/networking/gateone.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/gateone\""}, "description": {"_type": "mdDoc", "text": "Path of configuration files for GateOne."}, "loc": ["services", "gateone", "settingsDir"], "readOnly": false, "type": "path"}, "services.gdomap.enable": {"declarations": ["nixos/modules/services/networking/gdomap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GNUstep Distributed Objects name server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gdomap", "enable"], "readOnly": false, "type": "boolean"}, "services.gemstash.enable": {"declarations": ["nixos/modules/services/development/gemstash.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable gemstash service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gemstash", "enable"], "readOnly": false, "type": "boolean"}, "services.gemstash.openFirewall": {"declarations": ["nixos/modules/services/development/gemstash.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the firewall for the port in {option}`services.gemstash.bind`.\n"}, "loc": ["services", "gemstash", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.gemstash.settings": {"declarations": ["nixos/modules/services/development/gemstash.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for Gemstash. The details can be found at in\n[gemstash documentation](https://github.com/rubygems/gemstash/blob/master/man/gemstash-configuration.5.md).\nEach key set here is automatically prefixed with \":\" to match the gemstash expectations.\n"}, "loc": ["services", "gemstash", "settings"], "readOnly": false, "type": "YAML value"}, "services.gemstash.settings.base_path": {"declarations": ["nixos/modules/services/development/gemstash.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/gemstash\""}, "description": {"_type": "mdDoc", "text": "Path to store the gem files and the sqlite database. If left unchanged, the directory will be created."}, "loc": ["services", "gemstash", "settings", "base_path"], "readOnly": false, "type": "path"}, "services.gemstash.settings.bind": {"declarations": ["nixos/modules/services/development/gemstash.nix"], "default": {"_type": "literalExpression", "text": "\"tcp://0.0.0.0:9292\""}, "description": {"_type": "mdDoc", "text": "Host and port combination for the server to listen on."}, "loc": ["services", "gemstash", "settings", "bind"], "readOnly": false, "type": "string"}, "services.gemstash.settings.db_adapter": {"declarations": ["nixos/modules/services/development/gemstash.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Which database type to use. For choices other than sqlite3, the dbUrl has to be specified as well."}, "loc": ["services", "gemstash", "settings", "db_adapter"], "readOnly": false, "type": "null or one of \"sqlite3\", \"postgres\", \"mysql\", \"mysql2\""}, "services.gemstash.settings.db_url": {"declarations": ["nixos/modules/services/development/gemstash.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The database to connect to when using postgres, mysql, or mysql2."}, "loc": ["services", "gemstash", "settings", "db_url"], "readOnly": false, "type": "null or string"}, "services.geoclue2.appConfig": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specify extra settings per application.\n"}, "example": {"_type": "literalExpression", "text": "\"com.github.app\" = {\n  isAllowed = true;\n  isSystem = true;\n  users = [ \"300\" ];\n};\n"}, "loc": ["services", "geoclue2", "appConfig"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.geoclue2.appConfig.<name>.desktopID": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "description": {"_type": "mdDoc", "text": "Desktop ID of the application."}, "loc": ["services", "geoclue2", "appConfig", "<name>", "desktopID"], "readOnly": false, "type": "string"}, "services.geoclue2.appConfig.<name>.isAllowed": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "description": {"_type": "mdDoc", "text": "Whether the application will be allowed access to location information.\n"}, "loc": ["services", "geoclue2", "appConfig", "<name>", "isAllowed"], "readOnly": false, "type": "boolean"}, "services.geoclue2.appConfig.<name>.isSystem": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "description": {"_type": "mdDoc", "text": "Whether the application is a system component or not.\n"}, "loc": ["services", "geoclue2", "appConfig", "<name>", "isSystem"], "readOnly": false, "type": "boolean"}, "services.geoclue2.appConfig.<name>.users": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of UIDs of all users for which this application is allowed location\ninfo access, Defaults to an empty string to allow it for all users.\n"}, "loc": ["services", "geoclue2", "appConfig", "<name>", "users"], "readOnly": false, "type": "list of string"}, "services.geoclue2.enable": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GeoClue 2 daemon, a DBus service\nthat provides location information for accessing.\n"}, "loc": ["services", "geoclue2", "enable"], "readOnly": false, "type": "boolean"}, "services.geoclue2.enable3G": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable 3G source.\n"}, "loc": ["services", "geoclue2", "enable3G"], "readOnly": false, "type": "boolean"}, "services.geoclue2.enableCDMA": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable CDMA source.\n"}, "loc": ["services", "geoclue2", "enableCDMA"], "readOnly": false, "type": "boolean"}, "services.geoclue2.enableDemoAgent": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to use the GeoClue demo agent. This should be\noverridden by desktop environments that provide their own\nagent.\n"}, "loc": ["services", "geoclue2", "enableDemoAgent"], "readOnly": false, "type": "boolean"}, "services.geoclue2.enableModemGPS": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable Modem-GPS source.\n"}, "loc": ["services", "geoclue2", "enableModemGPS"], "readOnly": false, "type": "boolean"}, "services.geoclue2.enableNmea": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to fetch location from NMEA sources on local network.\n"}, "loc": ["services", "geoclue2", "enableNmea"], "readOnly": false, "type": "boolean"}, "services.geoclue2.enableWifi": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable WiFi source.\n"}, "loc": ["services", "geoclue2", "enableWifi"], "readOnly": false, "type": "boolean"}, "services.geoclue2.geoProviderUrl": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "default": {"_type": "literalExpression", "text": "\"https://location.services.mozilla.com/v1/geolocate?key=geoclue\""}, "description": {"_type": "mdDoc", "text": "The url to the wifi GeoLocation Service.\n"}, "example": {"_type": "literalExpression", "text": "\"https://www.googleapis.com/geolocation/v1/geolocate?key=YOUR_KEY\""}, "loc": ["services", "geoclue2", "geoProviderUrl"], "readOnly": false, "type": "string"}, "services.geoclue2.submissionNick": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "default": {"_type": "literalExpression", "text": "\"geoclue\""}, "description": {"_type": "mdDoc", "text": "A nickname to submit network data with.\nMust be 2-32 characters long.\n"}, "loc": ["services", "geoclue2", "submissionNick"], "readOnly": false, "type": "string"}, "services.geoclue2.submissionUrl": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "default": {"_type": "literalExpression", "text": "\"https://location.services.mozilla.com/v1/submit?key=geoclue\""}, "description": {"_type": "mdDoc", "text": "The url to submit data to a GeoLocation Service.\n"}, "loc": ["services", "geoclue2", "submissionUrl"], "readOnly": false, "type": "string"}, "services.geoclue2.submitData": {"declarations": ["nixos/modules/services/desktops/geoclue2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to submit data to a GeoLocation Service.\n"}, "loc": ["services", "geoclue2", "submitData"], "readOnly": false, "type": "boolean"}, "services.geoipupdate.enable": {"declarations": ["nixos/modules/services/misc/geoipupdate.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable periodic downloading of GeoIP databases using geoipupdate.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "geoipupdate", "enable"], "readOnly": false, "type": "boolean"}, "services.geoipupdate.interval": {"declarations": ["nixos/modules/services/misc/geoipupdate.nix"], "default": {"_type": "literalExpression", "text": "\"weekly\""}, "description": {"_type": "mdDoc", "text": "Update the GeoIP databases at this time / interval.\nThe format is described in\n{manpage}`systemd.time(7)`.\n"}, "loc": ["services", "geoipupdate", "interval"], "readOnly": false, "type": "string"}, "services.geoipupdate.settings": {"declarations": ["nixos/modules/services/misc/geoipupdate.nix"], "description": {"_type": "mdDoc", "text": "geoipupdate configuration options. See\n<https://github.com/maxmind/geoipupdate/blob/main/doc/GeoIP.conf.md>\nfor a full list of available options.\n\nSettings containing secret data should be set to an\nattribute set containing the attribute\n`_secret` - a string pointing to a file\ncontaining the value the option should be set to. See the\nexample to get a better picture of this: in the resulting\n{file}`GeoIP.conf` file, the\n`ProxyUserPassword` key will be set to the\ncontents of the\n{file}`/run/keys/proxy_pass` file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  AccountID = 200001;\n  DatabaseDirectory = \"/var/lib/GeoIP\";\n  LicenseKey = { _secret = \"/run/keys/maxmind_license_key\"; };\n  Proxy = \"10.0.0.10:8888\";\n  ProxyUserPassword = { _secret = \"/run/keys/proxy_pass\"; };\n}\n"}, "loc": ["services", "geoipupdate", "settings"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean or list of (string or signed integer or boolean))"}, "services.geoipupdate.settings.AccountID": {"declarations": ["nixos/modules/services/misc/geoipupdate.nix"], "description": {"_type": "mdDoc", "text": "Your MaxMind account ID.\n"}, "loc": ["services", "geoipupdate", "settings", "AccountID"], "readOnly": false, "type": "signed integer"}, "services.geoipupdate.settings.DatabaseDirectory": {"declarations": ["nixos/modules/services/misc/geoipupdate.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/GeoIP\""}, "description": {"_type": "mdDoc", "text": "The directory to store the database files in. The\ndirectory will be automatically created, the owner\nchanged to `geoip` and permissions\nset to world readable. This applies if the directory\nalready exists as well, so don't use a directory with\nsensitive contents.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/GeoIP\""}, "loc": ["services", "geoipupdate", "settings", "DatabaseDirectory"], "readOnly": false, "type": "path"}, "services.geoipupdate.settings.EditionIDs": {"declarations": ["nixos/modules/services/misc/geoipupdate.nix"], "description": {"_type": "mdDoc", "text": "List of database edition IDs. This includes new string\nIDs like `GeoIP2-City` and old\nnumeric IDs like `106`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"GeoLite2-ASN\"\n  \"GeoLite2-City\"\n  \"GeoLite2-Country\"\n]"}, "loc": ["services", "geoipupdate", "settings", "EditionIDs"], "readOnly": false, "type": "list of (string or signed integer)"}, "services.geoipupdate.settings.LicenseKey": {"declarations": ["nixos/modules/services/misc/geoipupdate.nix"], "description": {"_type": "mdDoc", "text": "A file containing the MaxMind license key.\n\nAlways handled as a secret whether the value is\nwrapped in a `{ _secret = ...; }`\nattrset or not (refer to [](#opt-services.geoipupdate.settings) for\ndetails).\n"}, "loc": ["services", "geoipupdate", "settings", "LicenseKey"], "readOnly": false, "type": "path or attribute set of path"}, "services.geth": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specification of one or more geth instances."}, "loc": ["services", "geth"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.geth.<name>.authrpc.address": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listen address of Go Ethereum Auth RPC API."}, "loc": ["services", "geth", "<name>", "authrpc", "address"], "readOnly": false, "type": "string"}, "services.geth.<name>.authrpc.enable": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Go Ethereum Auth RPC API."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "geth", "<name>", "authrpc", "enable"], "readOnly": false, "type": "boolean"}, "services.geth.<name>.authrpc.jwtsecret": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Path to a JWT secret for authenticated RPC endpoint."}, "example": {"_type": "literalExpression", "text": "\"/var/run/geth/jwtsecret\""}, "loc": ["services", "geth", "<name>", "authrpc", "jwtsecret"], "readOnly": false, "type": "string"}, "services.geth.<name>.authrpc.port": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "8551"}, "description": {"_type": "mdDoc", "text": "Port number of Go Ethereum Auth RPC API."}, "loc": ["services", "geth", "<name>", "authrpc", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.geth.<name>.authrpc.vhosts": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"localhost\"\n]"}, "description": {"_type": "mdDoc", "text": "List of virtual hostnames from which to accept requests."}, "example": {"_type": "literalExpression", "text": "[\n  \"localhost\"\n  \"geth.example.org\"\n]"}, "loc": ["services", "geth", "<name>", "authrpc", "vhosts"], "readOnly": false, "type": "null or (list of string)"}, "services.geth.<name>.enable": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Go Ethereum Node."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "geth", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.geth.<name>.extraArgs": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional arguments passed to Go Ethereum."}, "loc": ["services", "geth", "<name>", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.geth.<name>.gcmode": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "\"full\""}, "description": {"_type": "mdDoc", "text": "Blockchain garbage collection mode."}, "loc": ["services", "geth", "<name>", "gcmode"], "readOnly": false, "type": "one of \"full\", \"archive\""}, "services.geth.<name>.http.address": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listen address of Go Ethereum HTTP API."}, "loc": ["services", "geth", "<name>", "http", "address"], "readOnly": false, "type": "string"}, "services.geth.<name>.http.apis": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "APIs to enable over WebSocket"}, "example": {"_type": "literalExpression", "text": "[\n  \"net\"\n  \"eth\"\n]"}, "loc": ["services", "geth", "<name>", "http", "apis"], "readOnly": false, "type": "null or (list of string)"}, "services.geth.<name>.http.enable": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Go Ethereum HTTP API."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "geth", "<name>", "http", "enable"], "readOnly": false, "type": "boolean"}, "services.geth.<name>.http.port": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "8545"}, "description": {"_type": "mdDoc", "text": "Port number of Go Ethereum HTTP API."}, "loc": ["services", "geth", "<name>", "http", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.geth.<name>.maxpeers": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "50"}, "description": {"_type": "mdDoc", "text": "Maximum peers to connect to."}, "loc": ["services", "geth", "<name>", "maxpeers"], "readOnly": false, "type": "signed integer"}, "services.geth.<name>.metrics.address": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listen address of Go Ethereum metrics service."}, "loc": ["services", "geth", "<name>", "metrics", "address"], "readOnly": false, "type": "string"}, "services.geth.<name>.metrics.enable": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Go Ethereum prometheus metrics."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "geth", "<name>", "metrics", "enable"], "readOnly": false, "type": "boolean"}, "services.geth.<name>.metrics.port": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "6060"}, "description": {"_type": "mdDoc", "text": "Port number of Go Ethereum metrics service."}, "loc": ["services", "geth", "<name>", "metrics", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.geth.<name>.network": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The network to connect to. Mainnet (null) is the default ethereum network."}, "loc": ["services", "geth", "<name>", "network"], "readOnly": false, "type": "null or one of \"goerli\", \"rinkeby\", \"yolov2\", \"ropsten\""}, "services.geth.<name>.package": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "pkgs.go-ethereum.geth"}, "description": {"_type": "mdDoc", "text": "Package to use as Go Ethereum node."}, "loc": ["services", "geth", "<name>", "package"], "readOnly": false, "type": "package"}, "services.geth.<name>.port": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "30303"}, "description": {"_type": "mdDoc", "text": "Port number Go Ethereum will be listening on, both TCP and UDP."}, "loc": ["services", "geth", "<name>", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.geth.<name>.syncmode": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "\"snap\""}, "description": {"_type": "mdDoc", "text": "Blockchain sync mode."}, "loc": ["services", "geth", "<name>", "syncmode"], "readOnly": false, "type": "one of \"snap\", \"fast\", \"full\", \"light\""}, "services.geth.<name>.websocket.address": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listen address of Go Ethereum WebSocket API."}, "loc": ["services", "geth", "<name>", "websocket", "address"], "readOnly": false, "type": "string"}, "services.geth.<name>.websocket.apis": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "APIs to enable over WebSocket"}, "example": {"_type": "literalExpression", "text": "[\n  \"net\"\n  \"eth\"\n]"}, "loc": ["services", "geth", "<name>", "websocket", "apis"], "readOnly": false, "type": "null or (list of string)"}, "services.geth.<name>.websocket.enable": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Go Ethereum WebSocket API."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "geth", "<name>", "websocket", "enable"], "readOnly": false, "type": "boolean"}, "services.geth.<name>.websocket.port": {"declarations": ["nixos/modules/services/blockchain/ethereum/geth.nix"], "default": {"_type": "literalExpression", "text": "8546"}, "description": {"_type": "mdDoc", "text": "Port number of Go Ethereum WebSocket API."}, "loc": ["services", "geth", "<name>", "websocket", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.getty.autologinUser": {"declarations": ["nixos/modules/services/ttys/getty.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Username of the account that will be automatically logged in at the console.\nIf unspecified, a login prompt is shown as usual.\n"}, "loc": ["services", "getty", "autologinUser"], "readOnly": false, "type": "null or string"}, "services.getty.extraArgs": {"declarations": ["nixos/modules/services/ttys/getty.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional arguments passed to agetty.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--nohostname\"\n]"}, "loc": ["services", "getty", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.getty.greetingLine": {"declarations": ["nixos/modules/services/ttys/getty.nix"], "description": {"_type": "mdDoc", "text": "Welcome line printed by agetty.\nThe default shows current NixOS version label, machine type and tty.\n"}, "loc": ["services", "getty", "greetingLine"], "readOnly": false, "type": "string"}, "services.getty.helpLine": {"declarations": ["nixos/modules/services/ttys/getty.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Help line printed by agetty below the welcome line.\nUsed by the installation CD to give some hints on\nhow to proceed.\n"}, "loc": ["services", "getty", "helpLine"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.getty.loginOptions": {"declarations": ["nixos/modules/services/ttys/getty.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Template for arguments to be passed to\n{manpage}`login(1)`.\n\nSee {manpage}`agetty(1)` for details,\nincluding security considerations.  If unspecified, agetty\nwill not be invoked with a {option}`--login-options`\noption.\n"}, "example": {"_type": "literalExpression", "text": "\"-h darkstar -- \\\\u\""}, "loc": ["services", "getty", "loginOptions"], "readOnly": false, "type": "null or string"}, "services.getty.loginProgram": {"declarations": ["nixos/modules/services/ttys/getty.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.shadow}/bin/login\""}, "description": {"_type": "mdDoc", "text": "Path to the login binary executed by agetty.\n"}, "loc": ["services", "getty", "loginProgram"], "readOnly": false, "type": "path"}, "services.ghostunnel.enable": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ghostunnel."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ghostunnel", "enable"], "readOnly": false, "type": "boolean"}, "services.ghostunnel.package": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ghostunnel"}, "description": {"_type": "mdDoc", "text": "The ghostunnel package to use."}, "loc": ["services", "ghostunnel", "package"], "readOnly": false, "type": "package"}, "services.ghostunnel.servers": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Server mode ghostunnels (TLS listener -> plain TCP/UNIX target)\n"}, "loc": ["services", "ghostunnel", "servers"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.ghostunnel.servers.<name>.allowAll": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If true, allow all clients, do not check client cert subject.\n"}, "loc": ["services", "ghostunnel", "servers", "<name>", "allowAll"], "readOnly": false, "type": "boolean"}, "services.ghostunnel.servers.<name>.allowCN": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Allow client if common name appears in the list.\n"}, "loc": ["services", "ghostunnel", "servers", "<name>", "allowCN"], "readOnly": false, "type": "list of string"}, "services.ghostunnel.servers.<name>.allowDNS": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Allow client if DNS subject alternative name appears in the list.\n"}, "loc": ["services", "ghostunnel", "servers", "<name>", "allowDNS"], "readOnly": false, "type": "list of string"}, "services.ghostunnel.servers.<name>.allowOU": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Allow client if organizational unit name appears in the list.\n"}, "loc": ["services", "ghostunnel", "servers", "<name>", "allowOU"], "readOnly": false, "type": "list of string"}, "services.ghostunnel.servers.<name>.allowURI": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Allow client if URI subject alternative name appears in the list.\n"}, "loc": ["services", "ghostunnel", "servers", "<name>", "allowURI"], "readOnly": false, "type": "list of string"}, "services.ghostunnel.servers.<name>.cacert": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "description": {"_type": "mdDoc", "text": "Path to CA bundle file (PEM/X509). Uses system trust store if `null`.\n"}, "loc": ["services", "ghostunnel", "servers", "<name>", "cacert"], "readOnly": false, "type": "null or string"}, "services.ghostunnel.servers.<name>.cert": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to certificate (PEM with certificate chain).\n\nNot required if `keystore` is set.\n"}, "loc": ["services", "ghostunnel", "servers", "<name>", "cert"], "readOnly": false, "type": "null or string"}, "services.ghostunnel.servers.<name>.disableAuthentication": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable client authentication, no client certificate will be required.\n"}, "loc": ["services", "ghostunnel", "servers", "<name>", "disableAuthentication"], "readOnly": false, "type": "boolean"}, "services.ghostunnel.servers.<name>.extraArguments": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra arguments to pass to `ghostunnel server`"}, "loc": ["services", "ghostunnel", "servers", "<name>", "extraArguments"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.ghostunnel.servers.<name>.key": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to certificate private key (PEM with private key).\n\nNot required if `keystore` is set.\n"}, "loc": ["services", "ghostunnel", "servers", "<name>", "key"], "readOnly": false, "type": "null or string"}, "services.ghostunnel.servers.<name>.keystore": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to keystore (combined PEM with cert/key, or PKCS12 keystore).\n\nNB: storepass is not supported because it would expose credentials via `/proc/*/cmdline`.\n\nSpecify this or `cert` and `key`.\n"}, "loc": ["services", "ghostunnel", "servers", "<name>", "keystore"], "readOnly": false, "type": "null or string"}, "services.ghostunnel.servers.<name>.listen": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "description": {"_type": "mdDoc", "text": "Address and port to listen on (can be HOST:PORT, unix:PATH).\n"}, "loc": ["services", "ghostunnel", "servers", "<name>", "listen"], "readOnly": false, "type": "string"}, "services.ghostunnel.servers.<name>.target": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "description": {"_type": "mdDoc", "text": "Address to forward connections to (can be HOST:PORT or unix:PATH).\n"}, "loc": ["services", "ghostunnel", "servers", "<name>", "target"], "readOnly": false, "type": "string"}, "services.ghostunnel.servers.<name>.unsafeTarget": {"declarations": ["nixos/modules/services/networking/ghostunnel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, does not limit target to localhost, 127.0.0.1, [::1], or UNIX sockets.\n\nThis is meant to protect against accidental unencrypted traffic on\nuntrusted networks.\n"}, "loc": ["services", "ghostunnel", "servers", "<name>", "unsafeTarget"], "readOnly": false, "type": "boolean"}, "services.gitDaemon.basePath": {"declarations": ["nixos/modules/services/networking/git-daemon.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Remap all the path requests as relative to the given path. For example,\nif you set base-path to /srv/git, then if you later try to pull\ngit://example.com/hello.git, Git daemon will interpret the path as /srv/git/hello.git.\n"}, "example": {"_type": "literalExpression", "text": "\"/srv/git/\""}, "loc": ["services", "gitDaemon", "basePath"], "readOnly": false, "type": "string"}, "services.gitDaemon.enable": {"declarations": ["nixos/modules/services/networking/git-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Git daemon, which allows public hosting of git repositories\nwithout any access controls. This is mostly intended for read-only access.\n\nYou can allow write access by setting daemon.receivepack configuration\nitem of the repository to true. This is solely meant for a closed LAN setting\nwhere everybody is friendly.\n\nIf you need any access controls, use something else.\n"}, "loc": ["services", "gitDaemon", "enable"], "readOnly": false, "type": "boolean"}, "services.gitDaemon.exportAll": {"declarations": ["nixos/modules/services/networking/git-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Publish all directories that look like Git repositories (have the objects\nand refs subdirectories), even if they do not have the git-daemon-export-ok file.\n\nIf disabled, you need to touch .git/git-daemon-export-ok in each repository\nyou want the daemon to publish.\n\nWarning: enabling this without a repository whitelist or basePath\npublishes every git repository you have.\n"}, "loc": ["services", "gitDaemon", "exportAll"], "readOnly": false, "type": "boolean"}, "services.gitDaemon.group": {"declarations": ["nixos/modules/services/networking/git-daemon.nix"], "default": {"_type": "literalExpression", "text": "\"git\""}, "description": {"_type": "mdDoc", "text": "Group under which Git daemon would be running."}, "loc": ["services", "gitDaemon", "group"], "readOnly": false, "type": "string"}, "services.gitDaemon.listenAddress": {"declarations": ["nixos/modules/services/networking/git-daemon.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Listen on a specific IP address or hostname."}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "gitDaemon", "listenAddress"], "readOnly": false, "type": "string"}, "services.gitDaemon.options": {"declarations": ["nixos/modules/services/networking/git-daemon.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options to be passed to Git daemon."}, "loc": ["services", "gitDaemon", "options"], "readOnly": false, "type": "string"}, "services.gitDaemon.port": {"declarations": ["nixos/modules/services/networking/git-daemon.nix"], "default": {"_type": "literalExpression", "text": "9418"}, "description": {"_type": "mdDoc", "text": "Port to listen on."}, "loc": ["services", "gitDaemon", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gitDaemon.repositories": {"declarations": ["nixos/modules/services/networking/git-daemon.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A whitelist of paths of git repositories, or directories containing repositories\nall of which would be published. Paths must not end in \"/\".\n\nWarning: leaving this empty and enabling exportAll publishes all\nrepositories in your filesystem or basePath if specified.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/srv/git\"\n  \"/home/user/git/repo2\"\n]"}, "loc": ["services", "gitDaemon", "repositories"], "readOnly": false, "type": "list of string"}, "services.gitDaemon.user": {"declarations": ["nixos/modules/services/networking/git-daemon.nix"], "default": {"_type": "literalExpression", "text": "\"git\""}, "description": {"_type": "mdDoc", "text": "User under which Git daemon would be running."}, "loc": ["services", "gitDaemon", "user"], "readOnly": false, "type": "string"}, "services.gitea-actions-runner.instances": {"declarations": ["nixos/modules/services/continuous-integration/gitea-actions-runner.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Gitea Actions Runner instances.\n"}, "loc": ["services", "gitea-actions-runner", "instances"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.gitea-actions-runner.instances.<name>.enable": {"declarations": ["nixos/modules/services/continuous-integration/gitea-actions-runner.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Gitea Actions Runner instance."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gitea-actions-runner", "instances", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.gitea-actions-runner.instances.<name>.hostPackages": {"declarations": ["nixos/modules/services/continuous-integration/gitea-actions-runner.nix"], "default": {"_type": "literalExpression", "text": "with pkgs; [\n  bash\n  coreutils\n  curl\n  gawk\n  gitMinimal\n  gnused\n  nodejs\n  wget\n]\n"}, "description": {"_type": "mdDoc", "text": "List of packages, that are available to actions, when the runner is configured\nwith a host execution label.\n"}, "loc": ["services", "gitea-actions-runner", "instances", "<name>", "hostPackages"], "readOnly": false, "type": "list of package"}, "services.gitea-actions-runner.instances.<name>.labels": {"declarations": ["nixos/modules/services/continuous-integration/gitea-actions-runner.nix"], "description": {"_type": "mdDoc", "text": "Labels used to map jobs to their runtime environment. Changing these\nlabels currently requires a new registration token.\n\nMany common actions require bash, git and nodejs, as well as a filesystem\nthat follows the filesystem hierarchy standard.\n"}, "example": {"_type": "literalExpression", "text": "[\n  # provide a debian base with nodejs for actions\n  \"debian-latest:docker://node:18-bullseye\"\n  # fake the ubuntu name, because node provides no ubuntu builds\n  \"ubuntu-latest:docker://node:18-bullseye\"\n  # provide native execution on the host\n  #\"native:host\"\n]\n"}, "loc": ["services", "gitea-actions-runner", "instances", "<name>", "labels"], "readOnly": false, "type": "list of string"}, "services.gitea-actions-runner.instances.<name>.name": {"declarations": ["nixos/modules/services/continuous-integration/gitea-actions-runner.nix"], "description": {"_type": "mdDoc", "text": "The name identifying the runner instance towards the Gitea/Forgejo instance.\n"}, "example": {"_type": "literalExpression", "text": "config.networking.hostName"}, "loc": ["services", "gitea-actions-runner", "instances", "<name>", "name"], "readOnly": false, "type": "string"}, "services.gitea-actions-runner.instances.<name>.token": {"declarations": ["nixos/modules/services/continuous-integration/gitea-actions-runner.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Plain token to register at the configured Gitea/Forgejo instance.\n"}, "loc": ["services", "gitea-actions-runner", "instances", "<name>", "token"], "readOnly": false, "type": "null or string"}, "services.gitea-actions-runner.instances.<name>.tokenFile": {"declarations": ["nixos/modules/services/continuous-integration/gitea-actions-runner.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to an environment file, containing the `TOKEN` environment\nvariable, that holds a token to register at the configured\nGitea/Forgejo instance.\n"}, "loc": ["services", "gitea-actions-runner", "instances", "<name>", "tokenFile"], "readOnly": false, "type": "null or string or path"}, "services.gitea-actions-runner.instances.<name>.url": {"declarations": ["nixos/modules/services/continuous-integration/gitea-actions-runner.nix"], "description": {"_type": "mdDoc", "text": "Base URL of your Gitea/Forgejo instance.\n"}, "example": {"_type": "literalExpression", "text": "\"https://forge.example.com\""}, "loc": ["services", "gitea-actions-runner", "instances", "<name>", "url"], "readOnly": false, "type": "string"}, "services.gitea-actions-runner.package": {"declarations": ["nixos/modules/services/continuous-integration/gitea-actions-runner.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gitea-actions-runner"}, "description": {"_type": "mdDoc", "text": "The gitea-actions-runner package to use."}, "loc": ["services", "gitea-actions-runner", "package"], "readOnly": false, "type": "package"}, "services.gitea.appName": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"gitea: Gitea Service\""}, "description": {"_type": "mdDoc", "text": "Application name."}, "loc": ["services", "gitea", "appName"], "readOnly": false, "type": "string"}, "services.gitea.customDir": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.gitea.stateDir}/custom\""}, "description": {"_type": "mdDoc", "text": "Gitea custom directory. Used for config, custom templates and other options."}, "loc": ["services", "gitea", "customDir"], "readOnly": false, "type": "string"}, "services.gitea.database.createDatabase": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to create a local database automatically."}, "loc": ["services", "gitea", "database", "createDatabase"], "readOnly": false, "type": "boolean"}, "services.gitea.database.host": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "gitea", "database", "host"], "readOnly": false, "type": "string"}, "services.gitea.database.name": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"gitea\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "gitea", "database", "name"], "readOnly": false, "type": "string"}, "services.gitea.database.password": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The password corresponding to {option}`database.user`.\nWarning: this is stored in cleartext in the Nix store!\nUse {option}`database.passwordFile` instead.\n"}, "loc": ["services", "gitea", "database", "password"], "readOnly": false, "type": "string"}, "services.gitea.database.passwordFile": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/gitea-dbpassword\""}, "loc": ["services", "gitea", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.gitea.database.path": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.gitea.stateDir}/data/gitea.db\""}, "description": {"_type": "mdDoc", "text": "Path to the sqlite3 database file."}, "loc": ["services", "gitea", "database", "path"], "readOnly": false, "type": "string"}, "services.gitea.database.port": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "if config.services.gitea.database.type != \"postgresql\"\nthen 3306\nelse config.services.postgresql.port\n"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "gitea", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gitea.database.socket": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the unix socket file to use for authentication."}, "example": {"_type": "literalExpression", "text": "\"/run/mysqld/mysqld.sock\""}, "loc": ["services", "gitea", "database", "socket"], "readOnly": false, "type": "null or path"}, "services.gitea.database.type": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite3\""}, "description": {"_type": "mdDoc", "text": "Database engine to use."}, "example": {"_type": "literalExpression", "text": "\"mysql\""}, "loc": ["services", "gitea", "database", "type"], "readOnly": false, "type": "one of \"sqlite3\", \"mysql\", \"postgres\""}, "services.gitea.database.user": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"gitea\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "gitea", "database", "user"], "readOnly": false, "type": "string"}, "services.gitea.dump.backupDir": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.gitea.stateDir}/dump\""}, "description": {"_type": "mdDoc", "text": "Path to the dump files."}, "loc": ["services", "gitea", "dump", "backupDir"], "readOnly": false, "type": "string"}, "services.gitea.dump.enable": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable a timer that runs gitea dump to generate backup-files of the\ncurrent gitea database and repositories.\n"}, "loc": ["services", "gitea", "dump", "enable"], "readOnly": false, "type": "boolean"}, "services.gitea.dump.file": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Filename to be used for the dump. If `null` a default name is chosen by gitea."}, "example": {"_type": "literalExpression", "text": "\"gitea-dump\""}, "loc": ["services", "gitea", "dump", "file"], "readOnly": false, "type": "null or string"}, "services.gitea.dump.interval": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"04:31\""}, "description": {"_type": "mdDoc", "text": "Run a gitea dump at this interval. Runs by default at 04:31 every day.\n\nThe format is described in\n{manpage}`systemd.time(7)`.\n"}, "example": {"_type": "literalExpression", "text": "\"hourly\""}, "loc": ["services", "gitea", "dump", "interval"], "readOnly": false, "type": "string"}, "services.gitea.dump.type": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"zip\""}, "description": {"_type": "mdDoc", "text": "Archive format used to store the dump file."}, "loc": ["services", "gitea", "dump", "type"], "readOnly": false, "type": "one of \"zip\", \"rar\", \"tar\", \"sz\", \"tar.gz\", \"tar.xz\", \"tar.bz2\", \"tar.br\", \"tar.lz4\", \"tar.zst\""}, "services.gitea.enable": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Gitea Service."}, "loc": ["services", "gitea", "enable"], "readOnly": false, "type": "boolean"}, "services.gitea.extraConfig": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration lines appended to the generated gitea configuration file."}, "loc": ["services", "gitea", "extraConfig"], "readOnly": false, "type": "null or string"}, "services.gitea.group": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"gitea\""}, "description": {"_type": "mdDoc", "text": "Group under which gitea runs."}, "loc": ["services", "gitea", "group"], "readOnly": false, "type": "string"}, "services.gitea.lfs.contentDir": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.gitea.stateDir}/data/lfs\""}, "description": {"_type": "mdDoc", "text": "Where to store LFS files."}, "loc": ["services", "gitea", "lfs", "contentDir"], "readOnly": false, "type": "string"}, "services.gitea.lfs.enable": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables git-lfs support."}, "loc": ["services", "gitea", "lfs", "enable"], "readOnly": false, "type": "boolean"}, "services.gitea.mailerPasswordFile": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a file containing the SMTP password."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/secrets/gitea/mailpw\""}, "loc": ["services", "gitea", "mailerPasswordFile"], "readOnly": false, "type": "null or string"}, "services.gitea.package": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gitea"}, "description": {"_type": "mdDoc", "text": "gitea derivation to use"}, "loc": ["services", "gitea", "package"], "readOnly": false, "type": "package"}, "services.gitea.repositoryRoot": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.gitea.stateDir}/repositories\""}, "description": {"_type": "mdDoc", "text": "Path to the git repositories."}, "loc": ["services", "gitea", "repositoryRoot"], "readOnly": false, "type": "string"}, "services.gitea.settings": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Gitea configuration. Refer to <https://docs.gitea.io/en-us/config-cheat-sheet/>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"cron.sync_external_users\" = {\n    RUN_AT_START = true;\n    SCHEDULE = \"@every 24h\";\n    UPDATE_EXISTING = true;\n  };\n  mailer = {\n    ENABLED = true;\n    MAILER_TYPE = \"sendmail\";\n    FROM = \"do-not-reply@example.org\";\n    SENDMAIL_PATH = \"${pkgs.system-sendmail}/bin/sendmail\";\n  };\n  other = {\n    SHOW_FOOTER_VERSION = false;\n  };\n}\n"}, "loc": ["services", "gitea", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.gitea.settings.log.LEVEL": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"Info\""}, "description": {"_type": "mdDoc", "text": "General log level."}, "loc": ["services", "gitea", "settings", "log", "LEVEL"], "readOnly": false, "type": "one of \"Trace\", \"Debug\", \"Info\", \"Warn\", \"Error\", \"Critical\""}, "services.gitea.settings.log.ROOT_PATH": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.gitea.stateDir}/log\""}, "description": {"_type": "mdDoc", "text": "Root path for log files."}, "loc": ["services", "gitea", "settings", "log", "ROOT_PATH"], "readOnly": false, "type": "string"}, "services.gitea.settings.server.DISABLE_SSH": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable external SSH feature."}, "loc": ["services", "gitea", "settings", "server", "DISABLE_SSH"], "readOnly": false, "type": "boolean"}, "services.gitea.settings.server.DOMAIN": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Domain name of your server."}, "loc": ["services", "gitea", "settings", "server", "DOMAIN"], "readOnly": false, "type": "string"}, "services.gitea.settings.server.HTTP_ADDR": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "if lib.hasSuffix \"+unix\" cfg.settings.server.PROTOCOL then \"/run/gitea/gitea.sock\" else \"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Listen address. Must be a path when using a unix socket."}, "loc": ["services", "gitea", "settings", "server", "HTTP_ADDR"], "readOnly": false, "type": "string or path"}, "services.gitea.settings.server.HTTP_PORT": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Listen port. Ignored when using a unix socket."}, "loc": ["services", "gitea", "settings", "server", "HTTP_PORT"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gitea.settings.server.PROTOCOL": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"http\""}, "description": {"_type": "mdDoc", "text": "Listen protocol. `+unix` means \"over unix\", not \"in addition to.\""}, "loc": ["services", "gitea", "settings", "server", "PROTOCOL"], "readOnly": false, "type": "one of \"http\", \"https\", \"fcgi\", \"http+unix\", \"fcgi+unix\""}, "services.gitea.settings.server.ROOT_URL": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"http://${config.services.gitea.settings.server.DOMAIN}:${toString config.services.gitea.settings.server.HTTP_PORT}/\""}, "description": {"_type": "mdDoc", "text": "Full public URL of gitea server."}, "loc": ["services", "gitea", "settings", "server", "ROOT_URL"], "readOnly": false, "type": "string"}, "services.gitea.settings.server.SSH_PORT": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "22"}, "description": {"_type": "mdDoc", "text": "SSH port displayed in clone URL.\nThe option is required to configure a service when the external visible port\ndiffers from the local listening port i.e. if port forwarding is used.\n"}, "example": {"_type": "literalExpression", "text": "2222"}, "loc": ["services", "gitea", "settings", "server", "SSH_PORT"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gitea.settings.server.STATIC_ROOT_PATH": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "config.services.gitea.package.data"}, "description": {"_type": "mdDoc", "text": "Upper level of template and static files path."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/gitea/data\""}, "loc": ["services", "gitea", "settings", "server", "STATIC_ROOT_PATH"], "readOnly": false, "type": "string or path"}, "services.gitea.settings.service.DISABLE_REGISTRATION": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "By default any user can create an account on this `gitea` instance.\nThis can be disabled by using this option.\n\n*Note:* please keep in mind that this should be added after the initial\ndeploy unless [](#opt-services.gitea.useWizard)\nis `true` as the first registered user will be the administrator if\nno install wizard is used.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gitea", "settings", "service", "DISABLE_REGISTRATION"], "readOnly": false, "type": "boolean"}, "services.gitea.settings.session.COOKIE_SECURE": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Marks session cookies as \"secure\" as a hint for browsers to only send\nthem via HTTPS. This option is recommend, if gitea is being served over HTTPS.\n"}, "loc": ["services", "gitea", "settings", "session", "COOKIE_SECURE"], "readOnly": false, "type": "boolean"}, "services.gitea.stateDir": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/gitea\""}, "description": {"_type": "mdDoc", "text": "Gitea data directory."}, "loc": ["services", "gitea", "stateDir"], "readOnly": false, "type": "string"}, "services.gitea.useWizard": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Do not generate a configuration and use gitea' installation wizard instead. The first registered user will be administrator."}, "loc": ["services", "gitea", "useWizard"], "readOnly": false, "type": "boolean"}, "services.gitea.user": {"declarations": ["nixos/modules/services/misc/gitea.nix"], "default": {"_type": "literalExpression", "text": "\"gitea\""}, "description": {"_type": "mdDoc", "text": "User account under which gitea runs."}, "loc": ["services", "gitea", "user"], "readOnly": false, "type": "string"}, "services.github-runner.enable": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GitHub Actions runner.\n\nNote: GitHub recommends using self-hosted runners with private repositories only. Learn more here:\n[About self-hosted runners](https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners).\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "github-runner", "enable"], "readOnly": false, "type": "boolean"}, "services.github-runner.ephemeral": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, causes the following behavior:\n\n- Passes the `--ephemeral` flag to the runner configuration script\n- De-registers and stops the runner with GitHub after it has processed one job\n- On stop, systemd wipes the runtime directory (this always happens, even without using the ephemeral option)\n- Restarts the service after its successful exit\n- On start, wipes the state directory and configures a new runner\n\nYou should only enable this option if `tokenFile` points to a file which contains a\npersonal access token (PAT). If you're using the option with a registration token, restarting the\nservice will fail as soon as the registration token expired.\n"}, "loc": ["services", "github-runner", "ephemeral"], "readOnly": false, "type": "boolean"}, "services.github-runner.extraEnvironment": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables to set for the runner, as an attrset.\n"}, "example": {"_type": "literalExpression", "text": "{\n  GIT_CONFIG = \"/path/to/git/config\";\n}"}, "loc": ["services", "github-runner", "extraEnvironment"], "readOnly": false, "type": "attribute set"}, "services.github-runner.extraLabels": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra labels in addition to the default (`[\"self-hosted\", \"Linux\", \"X64\"]`).\n\nChanging this option triggers a new runner registration.\n"}, "example": {"_type": "literalExpression", "text": "[ \"nixos\" ]"}, "loc": ["services", "github-runner", "extraLabels"], "readOnly": false, "type": "list of string"}, "services.github-runner.extraPackages": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra packages to add to `PATH` of the service to make them available to workflows.\n"}, "loc": ["services", "github-runner", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.github-runner.name": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "default": {"_type": "literalExpression", "text": "config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "Name of the runner to configure. Defaults to the hostname.\n\nChanging this option triggers a new runner registration.\n"}, "example": {"_type": "literalExpression", "text": "\"nixos\""}, "loc": ["services", "github-runner", "name"], "readOnly": false, "type": "string matching the pattern ^$|^[[:alnum:]]([[:alnum:]_-]{0,61}[[:alnum:]])?$"}, "services.github-runner.package": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "default": {"_type": "literalExpression", "text": "pkgs.github-runner"}, "description": {"_type": "mdDoc", "text": "Which github-runner derivation to use.\n"}, "loc": ["services", "github-runner", "package"], "readOnly": false, "type": "package"}, "services.github-runner.replace": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Replace any existing runner with the same name.\n\nWithout this flag, registering a new runner with the same name fails.\n"}, "loc": ["services", "github-runner", "replace"], "readOnly": false, "type": "boolean"}, "services.github-runner.runnerGroup": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the runner group to add this runner to (defaults to the default runner group).\n\nChanging this option triggers a new runner registration.\n"}, "loc": ["services", "github-runner", "runnerGroup"], "readOnly": false, "type": "null or string"}, "services.github-runner.serviceOverrides": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Modify the systemd service. Can be used to, e.g., adjust the sandboxing options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ProtectHome = false;\n  RestrictAddressFamilies = [\n    \"AF_PACKET\"\n  ];\n}"}, "loc": ["services", "github-runner", "serviceOverrides"], "readOnly": false, "type": "attribute set"}, "services.github-runner.tokenFile": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "description": {"_type": "mdDoc", "text": "The full path to a file which contains either\n\n* a fine-grained personal access token (PAT),\n* a classic PAT\n* or a runner registration token\n\nChanging this option or the `tokenFile`\u2019s content triggers a new runner registration.\n\nWe suggest using the fine-grained PATs. A runner registration token is valid\nonly for 1 hour after creation, so the next time the runner configuration changes\nthis will give you hard-to-debug HTTP 404 errors in the configure step.\n\nThe file should contain exactly one line with the token without any newline.\n(Use `echo -n '\u2026token\u2026' > \u2026token file\u2026` to make sure no newlines sneak in.)\n\nIf the file contains a PAT, the service creates a new registration token\non startup as needed.\nIf a registration token is given, it can be used to re-register a runner of the same\nname but is time-limited as noted above.\n\nFor fine-grained PATs:\n\nGive it \"Read and Write access to organization/repository self hosted runners\",\ndepending on whether it is organization wide or per-repository. You might have to\nexperiment a little, fine-grained PATs are a `beta` Github feature and still subject\nto change; nonetheless they are the best option at the moment.\n\nFor classic PATs:\n\nMake sure the PAT has a scope of `admin:org` for organization-wide registrations\nor a scope of `repo` for a single repository.\n\nFor runner registration tokens:\n\nNothing special needs to be done, but updating will break after one hour,\nso these are not recommended.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/secrets/github-runner/nixos.token\""}, "loc": ["services", "github-runner", "tokenFile"], "readOnly": false, "type": "path"}, "services.github-runner.url": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "description": {"_type": "mdDoc", "text": "Repository to add the runner to.\n\nChanging this option triggers a new runner registration.\n\nIMPORTANT: If your token is org-wide (not per repository), you need to\nprovide a github org link, not a single repository, so do it like this\n`https://github.com/nixos`, not like this\n`https://github.com/nixos/nixpkgs`.\nOtherwise, you are going to get a `404 NotFound`\nfrom `POST https://api.github.com/actions/runner-registration`\nin the configure script.\n"}, "example": {"_type": "literalExpression", "text": "\"https://github.com/nixos/nixpkgs\""}, "loc": ["services", "github-runner", "url"], "readOnly": false, "type": "string"}, "services.github-runner.user": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "default": {"_type": "literalExpression", "text": "username"}, "description": {"_type": "mdDoc", "text": "User under which to run the service. If null, will use a systemd dynamic user.\n"}, "loc": ["services", "github-runner", "user"], "readOnly": false, "type": "null or string"}, "services.github-runner.workDir": {"declarations": ["nixos/modules/services/continuous-integration/github-runner.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Working directory, available as `$GITHUB_WORKSPACE` during workflow runs\nand used as a default for [repository checkouts](https://github.com/actions/checkout).\nThe service cleans this directory on every service start.\n\nA value of `null` will default to the systemd `RuntimeDirectory`.\n"}, "loc": ["services", "github-runner", "workDir"], "readOnly": false, "type": "null or string"}, "services.github-runners": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Multiple GitHub Runners.\n"}, "example": {"_type": "literalExpression", "text": "{\n  runner1 = {\n    enable = true;\n    name = \"runner1\";\n    tokenFile = \"/secrets/token1\";\n    url = \"https://github.com/owner/repo\";\n  };\n  runner2 = {\n    enable = true;\n    name = \"runner2\";\n    tokenFile = \"/secrets/token2\";\n    url = \"https://github.com/owner/repo\";\n  };\n}"}, "loc": ["services", "github-runners"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.github-runners.<name>.enable": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GitHub Actions runner.\n\nNote: GitHub recommends using self-hosted runners with private repositories only. Learn more here:\n[About self-hosted runners](https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners).\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "github-runners", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.github-runners.<name>.ephemeral": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, causes the following behavior:\n\n- Passes the `--ephemeral` flag to the runner configuration script\n- De-registers and stops the runner with GitHub after it has processed one job\n- On stop, systemd wipes the runtime directory (this always happens, even without using the ephemeral option)\n- Restarts the service after its successful exit\n- On start, wipes the state directory and configures a new runner\n\nYou should only enable this option if `tokenFile` points to a file which contains a\npersonal access token (PAT). If you're using the option with a registration token, restarting the\nservice will fail as soon as the registration token expired.\n"}, "loc": ["services", "github-runners", "<name>", "ephemeral"], "readOnly": false, "type": "boolean"}, "services.github-runners.<name>.extraEnvironment": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables to set for the runner, as an attrset.\n"}, "example": {"_type": "literalExpression", "text": "{\n  GIT_CONFIG = \"/path/to/git/config\";\n}"}, "loc": ["services", "github-runners", "<name>", "extraEnvironment"], "readOnly": false, "type": "attribute set"}, "services.github-runners.<name>.extraLabels": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra labels in addition to the default (`[\"self-hosted\", \"Linux\", \"X64\"]`).\n\nChanging this option triggers a new runner registration.\n"}, "example": {"_type": "literalExpression", "text": "[ \"nixos\" ]"}, "loc": ["services", "github-runners", "<name>", "extraLabels"], "readOnly": false, "type": "list of string"}, "services.github-runners.<name>.extraPackages": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra packages to add to `PATH` of the service to make them available to workflows.\n"}, "loc": ["services", "github-runners", "<name>", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.github-runners.<name>.name": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the runner to configure. Defaults to the hostname.\n\nChanging this option triggers a new runner registration.\n"}, "example": {"_type": "literalExpression", "text": "\"nixos\""}, "loc": ["services", "github-runners", "<name>", "name"], "readOnly": false, "type": "null or string matching the pattern ^$|^[[:alnum:]]([[:alnum:]_-]{0,61}[[:alnum:]])?$"}, "services.github-runners.<name>.package": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "default": {"_type": "literalExpression", "text": "pkgs.github-runner"}, "description": {"_type": "mdDoc", "text": "Which github-runner derivation to use.\n"}, "loc": ["services", "github-runners", "<name>", "package"], "readOnly": false, "type": "package"}, "services.github-runners.<name>.replace": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Replace any existing runner with the same name.\n\nWithout this flag, registering a new runner with the same name fails.\n"}, "loc": ["services", "github-runners", "<name>", "replace"], "readOnly": false, "type": "boolean"}, "services.github-runners.<name>.runnerGroup": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the runner group to add this runner to (defaults to the default runner group).\n\nChanging this option triggers a new runner registration.\n"}, "loc": ["services", "github-runners", "<name>", "runnerGroup"], "readOnly": false, "type": "null or string"}, "services.github-runners.<name>.serviceOverrides": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Modify the systemd service. Can be used to, e.g., adjust the sandboxing options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ProtectHome = false;\n  RestrictAddressFamilies = [\n    \"AF_PACKET\"\n  ];\n}"}, "loc": ["services", "github-runners", "<name>", "serviceOverrides"], "readOnly": false, "type": "attribute set"}, "services.github-runners.<name>.tokenFile": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "description": {"_type": "mdDoc", "text": "The full path to a file which contains either\n\n* a fine-grained personal access token (PAT),\n* a classic PAT\n* or a runner registration token\n\nChanging this option or the `tokenFile`\u2019s content triggers a new runner registration.\n\nWe suggest using the fine-grained PATs. A runner registration token is valid\nonly for 1 hour after creation, so the next time the runner configuration changes\nthis will give you hard-to-debug HTTP 404 errors in the configure step.\n\nThe file should contain exactly one line with the token without any newline.\n(Use `echo -n '\u2026token\u2026' > \u2026token file\u2026` to make sure no newlines sneak in.)\n\nIf the file contains a PAT, the service creates a new registration token\non startup as needed.\nIf a registration token is given, it can be used to re-register a runner of the same\nname but is time-limited as noted above.\n\nFor fine-grained PATs:\n\nGive it \"Read and Write access to organization/repository self hosted runners\",\ndepending on whether it is organization wide or per-repository. You might have to\nexperiment a little, fine-grained PATs are a `beta` Github feature and still subject\nto change; nonetheless they are the best option at the moment.\n\nFor classic PATs:\n\nMake sure the PAT has a scope of `admin:org` for organization-wide registrations\nor a scope of `repo` for a single repository.\n\nFor runner registration tokens:\n\nNothing special needs to be done, but updating will break after one hour,\nso these are not recommended.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/secrets/github-runner/nixos.token\""}, "loc": ["services", "github-runners", "<name>", "tokenFile"], "readOnly": false, "type": "path"}, "services.github-runners.<name>.url": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "description": {"_type": "mdDoc", "text": "Repository to add the runner to.\n\nChanging this option triggers a new runner registration.\n\nIMPORTANT: If your token is org-wide (not per repository), you need to\nprovide a github org link, not a single repository, so do it like this\n`https://github.com/nixos`, not like this\n`https://github.com/nixos/nixpkgs`.\nOtherwise, you are going to get a `404 NotFound`\nfrom `POST https://api.github.com/actions/runner-registration`\nin the configure script.\n"}, "example": {"_type": "literalExpression", "text": "\"https://github.com/nixos/nixpkgs\""}, "loc": ["services", "github-runners", "<name>", "url"], "readOnly": false, "type": "string"}, "services.github-runners.<name>.user": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "default": {"_type": "literalExpression", "text": "username"}, "description": {"_type": "mdDoc", "text": "User under which to run the service. If null, will use a systemd dynamic user.\n"}, "loc": ["services", "github-runners", "<name>", "user"], "readOnly": false, "type": "null or string"}, "services.github-runners.<name>.workDir": {"declarations": ["nixos/modules/services/continuous-integration/github-runners.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Working directory, available as `$GITHUB_WORKSPACE` during workflow runs\nand used as a default for [repository checkouts](https://github.com/actions/checkout).\nThe service cleans this directory on every service start.\n\nA value of `null` will default to the systemd `RuntimeDirectory`.\n"}, "loc": ["services", "github-runners", "<name>", "workDir"], "readOnly": false, "type": "null or string"}, "services.gitlab-runner.clear-docker-cache.dates": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "\"weekly\""}, "description": {"_type": "mdDoc", "text": "Specification (in the format described by\n{manpage}`systemd.time(7)`) of the time at\nwhich the prune will occur.\n"}, "loc": ["services", "gitlab-runner", "clear-docker-cache", "dates"], "readOnly": false, "type": "string"}, "services.gitlab-runner.clear-docker-cache.enable": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to periodically prune gitlab runner's Docker resources. If\nenabled, a systemd timer will run {command}`clear-docker-cache` as\nspecified by the `dates` option.\n"}, "loc": ["services", "gitlab-runner", "clear-docker-cache", "enable"], "readOnly": false, "type": "boolean"}, "services.gitlab-runner.clear-docker-cache.flags": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Any additional flags passed to {command}`clear-docker-cache`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"prune\"\n]"}, "loc": ["services", "gitlab-runner", "clear-docker-cache", "flags"], "readOnly": false, "type": "list of string"}, "services.gitlab-runner.clear-docker-cache.package": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "config.virtualisation.docker.package"}, "description": {"_type": "mdDoc", "text": "Docker package to use for clearing up docker cache."}, "example": {"_type": "literalExpression", "text": "pkgs.docker"}, "loc": ["services", "gitlab-runner", "clear-docker-cache", "package"], "readOnly": false, "type": "unspecified value"}, "services.gitlab-runner.configFile": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file for gitlab-runner.\n\n{option}`configFile` takes precedence over {option}`services`.\n{option}`checkInterval` and {option}`concurrent` will be ignored too.\n\nThis option is deprecated, please use {option}`services` instead.\nYou can use {option}`registrationConfigFile` and\n{option}`registrationFlags`\nfor settings not covered by this module.\n"}, "loc": ["services", "gitlab-runner", "configFile"], "readOnly": false, "type": "null or path"}, "services.gitlab-runner.enable": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Gitlab Runner."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gitlab-runner", "enable"], "readOnly": false, "type": "boolean"}, "services.gitlab-runner.extraPackages": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra packages to add to PATH for the gitlab-runner process.\n"}, "loc": ["services", "gitlab-runner", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.gitlab-runner.gracefulTermination": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Finish all remaining jobs before stopping.\nIf not set gitlab-runner will stop immediately without waiting\nfor jobs to finish, which will lead to failed builds.\n"}, "loc": ["services", "gitlab-runner", "gracefulTermination"], "readOnly": false, "type": "boolean"}, "services.gitlab-runner.gracefulTimeout": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "\"infinity\""}, "description": {"_type": "mdDoc", "text": "Time to wait until a graceful shutdown is turned into a forceful one.\n"}, "example": {"_type": "literalExpression", "text": "\"5min 20s\""}, "loc": ["services", "gitlab-runner", "gracefulTimeout"], "readOnly": false, "type": "string"}, "services.gitlab-runner.package": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gitlab-runner"}, "description": {"_type": "mdDoc", "text": "Gitlab Runner package to use."}, "example": {"_type": "literalExpression", "text": "pkgs.gitlab-runner_1_11"}, "loc": ["services", "gitlab-runner", "package"], "readOnly": false, "type": "package"}, "services.gitlab-runner.services": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "GitLab Runner services."}, "example": {"_type": "literalExpression", "text": "{\n  # runner for building in docker via host's nix-daemon\n  # nix store will be readable in runner, might be insecure\n  nix = {\n    # File should contain at least these two variables:\n    # `CI_SERVER_URL`\n    # `REGISTRATION_TOKEN`\n    registrationConfigFile = \"/run/secrets/gitlab-runner-registration\";\n    dockerImage = \"alpine\";\n    dockerVolumes = [\n      \"/nix/store:/nix/store:ro\"\n      \"/nix/var/nix/db:/nix/var/nix/db:ro\"\n      \"/nix/var/nix/daemon-socket:/nix/var/nix/daemon-socket:ro\"\n    ];\n    dockerDisableCache = true;\n    preBuildScript = pkgs.writeScript \"setup-container\" ''\n      mkdir -p -m 0755 /nix/var/log/nix/drvs\n      mkdir -p -m 0755 /nix/var/nix/gcroots\n      mkdir -p -m 0755 /nix/var/nix/profiles\n      mkdir -p -m 0755 /nix/var/nix/temproots\n      mkdir -p -m 0755 /nix/var/nix/userpool\n      mkdir -p -m 1777 /nix/var/nix/gcroots/per-user\n      mkdir -p -m 1777 /nix/var/nix/profiles/per-user\n      mkdir -p -m 0755 /nix/var/nix/profiles/per-user/root\n      mkdir -p -m 0700 \"$HOME/.nix-defexpr\"\n\n      . ${pkgs.nix}/etc/profile.d/nix.sh\n\n      ${pkgs.nix}/bin/nix-env -i ${concatStringsSep \" \" (with pkgs; [ nix cacert git openssh ])}\n\n      ${pkgs.nix}/bin/nix-channel --add https://nixos.org/channels/nixpkgs-unstable\n      ${pkgs.nix}/bin/nix-channel --update nixpkgs\n    '';\n    environmentVariables = {\n      ENV = \"/etc/profile\";\n      USER = \"root\";\n      NIX_REMOTE = \"daemon\";\n      PATH = \"/nix/var/nix/profiles/default/bin:/nix/var/nix/profiles/default/sbin:/bin:/sbin:/usr/bin:/usr/sbin\";\n      NIX_SSL_CERT_FILE = \"/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt\";\n    };\n    tagList = [ \"nix\" ];\n  };\n  # runner for building docker images\n  docker-images = {\n    # File should contain at least these two variables:\n    # `CI_SERVER_URL`\n    # `REGISTRATION_TOKEN`\n    registrationConfigFile = \"/run/secrets/gitlab-runner-registration\";\n    dockerImage = \"docker:stable\";\n    dockerVolumes = [\n      \"/var/run/docker.sock:/var/run/docker.sock\"\n    ];\n    tagList = [ \"docker-images\" ];\n  };\n  # runner for executing stuff on host system (very insecure!)\n  # make sure to add required packages (including git!)\n  # to `environment.systemPackages`\n  shell = {\n    # File should contain at least these two variables:\n    # `CI_SERVER_URL`\n    # `REGISTRATION_TOKEN`\n    registrationConfigFile = \"/run/secrets/gitlab-runner-registration\";\n    executor = \"shell\";\n    tagList = [ \"shell\" ];\n  };\n  # runner for everything else\n  default = {\n    # File should contain at least these two variables:\n    # `CI_SERVER_URL`\n    # `REGISTRATION_TOKEN`\n    registrationConfigFile = \"/run/secrets/gitlab-runner-registration\";\n    dockerImage = \"debian:stable\";\n  };\n}\n"}, "loc": ["services", "gitlab-runner", "services"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.gitlab-runner.services.<name>.buildsDir": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Absolute path to a directory where builds will be stored\nin context of selected executor (Locally, Docker, SSH).\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/gitlab-runner/builds\""}, "loc": ["services", "gitlab-runner", "services", "<name>", "buildsDir"], "readOnly": false, "type": "null or path"}, "services.gitlab-runner.services.<name>.cloneUrl": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Overwrite the URL for the GitLab instance. Used if the Runner can\u2019t connect to GitLab on the URL GitLab exposes itself.\n"}, "example": {"_type": "literalExpression", "text": "\"http://gitlab.example.local\""}, "loc": ["services", "gitlab-runner", "services", "<name>", "cloneUrl"], "readOnly": false, "type": "null or string"}, "services.gitlab-runner.services.<name>.debugTraceDisabled": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When set to true Runner will disable the possibility of\nusing the `CI_DEBUG_TRACE` feature.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "debugTraceDisabled"], "readOnly": false, "type": "boolean"}, "services.gitlab-runner.services.<name>.description": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name/description of the runner.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "description"], "readOnly": false, "type": "null or string"}, "services.gitlab-runner.services.<name>.dockerAllowedImages": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Whitelist allowed images.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"ruby:*\"\n  \"python:*\"\n  \"php:*\"\n  \"my.registry.tld:5000/*:*\"\n]"}, "loc": ["services", "gitlab-runner", "services", "<name>", "dockerAllowedImages"], "readOnly": false, "type": "list of string"}, "services.gitlab-runner.services.<name>.dockerAllowedServices": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Whitelist allowed services.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"postgres:9\"\n  \"redis:*\"\n  \"mysql:*\"\n]"}, "loc": ["services", "gitlab-runner", "services", "<name>", "dockerAllowedServices"], "readOnly": false, "type": "list of string"}, "services.gitlab-runner.services.<name>.dockerDisableCache": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable all container caching.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "dockerDisableCache"], "readOnly": false, "type": "boolean"}, "services.gitlab-runner.services.<name>.dockerExtraHosts": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Add a custom host-to-IP mapping.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"other-host:127.0.0.1\"\n]"}, "loc": ["services", "gitlab-runner", "services", "<name>", "dockerExtraHosts"], "readOnly": false, "type": "list of string"}, "services.gitlab-runner.services.<name>.dockerImage": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Docker image to be used.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "dockerImage"], "readOnly": false, "type": "null or string"}, "services.gitlab-runner.services.<name>.dockerPrivileged": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Give extended privileges to container.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "dockerPrivileged"], "readOnly": false, "type": "boolean"}, "services.gitlab-runner.services.<name>.dockerVolumes": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Bind-mount a volume and create it\nif it doesn't exist prior to mounting.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/var/run/docker.sock:/var/run/docker.sock\"\n]"}, "loc": ["services", "gitlab-runner", "services", "<name>", "dockerVolumes"], "readOnly": false, "type": "list of string"}, "services.gitlab-runner.services.<name>.environmentVariables": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Custom environment variables injected to build environment.\nFor secrets you can use {option}`registrationConfigFile`\nwith `RUNNER_ENV` variable set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  NAME = \"value\";\n}"}, "loc": ["services", "gitlab-runner", "services", "<name>", "environmentVariables"], "readOnly": false, "type": "attribute set of string"}, "services.gitlab-runner.services.<name>.executor": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "\"docker\""}, "description": {"_type": "mdDoc", "text": "Select executor, eg. shell, docker, etc.\nSee [runner documentation](https://docs.gitlab.com/runner/executors/README.html) for more information.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "executor"], "readOnly": false, "type": "string"}, "services.gitlab-runner.services.<name>.limit": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Limit how many jobs can be handled concurrently by this service.\n0 (default) simply means don't limit.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "limit"], "readOnly": false, "type": "signed integer"}, "services.gitlab-runner.services.<name>.maximumTimeout": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "What is the maximum timeout (in seconds) that will be set for\njob when using this Runner. 0 (default) simply means don't limit.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "maximumTimeout"], "readOnly": false, "type": "signed integer"}, "services.gitlab-runner.services.<name>.postBuildScript": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Runner-specific command script executed after code is pulled\nand just after build executes.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "postBuildScript"], "readOnly": false, "type": "null or path"}, "services.gitlab-runner.services.<name>.preBuildScript": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Runner-specific command script executed after code is pulled,\njust before build executes.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "preBuildScript"], "readOnly": false, "type": "null or path"}, "services.gitlab-runner.services.<name>.preCloneScript": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Runner-specific command script executed before code is pulled.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "preCloneScript"], "readOnly": false, "type": "null or path"}, "services.gitlab-runner.services.<name>.protected": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When set to true Runner will only run on pipelines\ntriggered on protected branches.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "protected"], "readOnly": false, "type": "boolean"}, "services.gitlab-runner.services.<name>.registrationConfigFile": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "description": {"_type": "mdDoc", "text": "Absolute path to a file with environment variables\nused for gitlab-runner registration.\nA list of all supported environment variables can be found in\n`gitlab-runner register --help`.\n\nOnes that you probably want to set is\n\n`CI_SERVER_URL=<CI server URL>`\n\n`REGISTRATION_TOKEN=<registration secret>`\n\nWARNING: make sure to use quoted absolute path,\nor it is going to be copied to Nix Store.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "registrationConfigFile"], "readOnly": false, "type": "path"}, "services.gitlab-runner.services.<name>.registrationFlags": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command-line flags passed to\n`gitlab-runner register`.\nExecute `gitlab-runner register --help`\nfor a list of supported flags.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--docker-helper-image my/gitlab-runner-helper\"\n]"}, "loc": ["services", "gitlab-runner", "services", "<name>", "registrationFlags"], "readOnly": false, "type": "list of string"}, "services.gitlab-runner.services.<name>.requestConcurrency": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Limit number of concurrent requests for new jobs from GitLab.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "requestConcurrency"], "readOnly": false, "type": "signed integer"}, "services.gitlab-runner.services.<name>.runUntagged": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Register to run untagged builds; defaults to\n`true` when {option}`tagList` is empty.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "runUntagged"], "readOnly": false, "type": "boolean"}, "services.gitlab-runner.services.<name>.tagList": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Tag list.\n"}, "loc": ["services", "gitlab-runner", "services", "<name>", "tagList"], "readOnly": false, "type": "list of string"}, "services.gitlab-runner.settings": {"declarations": ["nixos/modules/services/continuous-integration/gitlab-runner.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Global gitlab-runner configuration. See\n<https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-global-section>\nfor supported values.\n"}, "loc": ["services", "gitlab-runner", "settings"], "readOnly": false, "type": "JSON value"}, "services.gitlab.backup.keepTime": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "How long to keep the backups around, in\nhours. `0` means \u201ckeep forever\u201d.\n"}, "example": {"_type": "literalExpression", "text": "48"}, "loc": ["services", "gitlab", "backup", "keepTime"], "readOnly": false, "type": "signed integer"}, "services.gitlab.backup.path": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "config.services.gitlab.statePath + \"/backup\""}, "description": {"_type": "mdDoc", "text": "GitLab path for backups."}, "loc": ["services", "gitlab", "backup", "path"], "readOnly": false, "type": "string"}, "services.gitlab.backup.skip": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Directories to exclude from the backup. The example excludes\nCI artifacts and LFS objects from the backups. The\n`tar` option skips the creation of a tar\nfile.\n\nRefer to <https://docs.gitlab.com/ee/raketasks/backup_restore.html#excluding-specific-directories-from-the-backup>\nfor more information.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"artifacts\"\n  \"lfs\"\n]"}, "loc": ["services", "gitlab", "backup", "skip"], "readOnly": false, "type": "one of \"db\", \"uploads\", \"builds\", \"artifacts\", \"lfs\", \"registry\", \"pages\", \"repositories\", \"tar\" or list of (one of \"db\", \"uploads\", \"builds\", \"artifacts\", \"lfs\", \"registry\", \"pages\", \"repositories\", \"tar\")"}, "services.gitlab.backup.startAt": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The time(s) to run automatic backup of GitLab\nstate. Specified in systemd's time format; see\n{manpage}`systemd.time(7)`.\n"}, "example": {"_type": "literalExpression", "text": "\"03:00\""}, "loc": ["services", "gitlab", "backup", "startAt"], "readOnly": false, "type": "string or list of string"}, "services.gitlab.backup.uploadOptions": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "GitLab automatic upload specification. Tells GitLab to\nupload the backup to a remote location when done.\n\nAttributes specified here are added under\n`production -> backup -> upload` in\n{file}`config/gitlab.yml`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  # Fog storage connection settings, see http://fog.io/storage/\n  connection = {\n    provider = \"AWS\";\n    region = \"eu-north-1\";\n    aws_access_key_id = \"AKIAXXXXXXXXXXXXXXXX\";\n    aws_secret_access_key = { _secret = config.deployment.keys.aws_access_key.path; };\n  };\n\n  # The remote 'directory' to store your backups in.\n  # For S3, this would be the bucket name.\n  remote_directory = \"my-gitlab-backups\";\n\n  # Use multipart uploads when file size reaches 100MB, see\n  # http://docs.aws.amazon.com/AmazonS3/latest/dev/uploadobjusingmpu.html\n  multipart_chunk_size = 104857600;\n\n  # Turns on AWS Server-Side Encryption with Amazon S3-Managed Keys for backups, this is optional\n  encryption = \"AES256\";\n\n  # Specifies Amazon S3 storage class to use for backups, this is optional\n  storage_class = \"STANDARD\";\n};\n"}, "loc": ["services", "gitlab", "backup", "uploadOptions"], "readOnly": false, "type": "attribute set"}, "services.gitlab.databaseCreateLocally": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether a database should be automatically created on the\nlocal host. Set this to `false` if you plan\non provisioning a local database yourself. This has no effect\nif {option}`services.gitlab.databaseHost` is customized.\n"}, "loc": ["services", "gitlab", "databaseCreateLocally"], "readOnly": false, "type": "boolean"}, "services.gitlab.databaseHost": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "GitLab database hostname. An empty string means\n\u201cuse local unix socket connection\u201d.\n"}, "loc": ["services", "gitlab", "databaseHost"], "readOnly": false, "type": "string"}, "services.gitlab.databaseName": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"gitlab\""}, "description": {"_type": "mdDoc", "text": "GitLab database name."}, "loc": ["services", "gitlab", "databaseName"], "readOnly": false, "type": "string"}, "services.gitlab.databasePasswordFile": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing the GitLab database user password.\n\nThis should be a string, not a nix path, since nix paths are\ncopied into the world-readable nix store.\n"}, "loc": ["services", "gitlab", "databasePasswordFile"], "readOnly": false, "type": "null or path"}, "services.gitlab.databasePool": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Database connection pool size."}, "loc": ["services", "gitlab", "databasePool"], "readOnly": false, "type": "signed integer"}, "services.gitlab.databaseUsername": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"gitlab\""}, "description": {"_type": "mdDoc", "text": "GitLab database user."}, "loc": ["services", "gitlab", "databaseUsername"], "readOnly": false, "type": "string"}, "services.gitlab.enable": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the gitlab service.\n"}, "loc": ["services", "gitlab", "enable"], "readOnly": false, "type": "boolean"}, "services.gitlab.extraConfig": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra options to be added under\n`production` in\n{file}`config/gitlab.yml`, as a nix attribute\nset.\n\nOptions containing secret data should be set to an attribute\nset containing the attribute `_secret` - a\nstring pointing to a file containing the value the option\nshould be set to. See the example to get a better picture of\nthis: in the resulting\n{file}`config/gitlab.yml` file, the\n`production.omniauth.providers[0].args.client_options.secret`\nkey will be set to the contents of the\n{file}`/var/keys/gitlab_oidc_secret` file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  gitlab = {\n    default_projects_features = {\n      builds = false;\n    };\n  };\n  omniauth = {\n    enabled = true;\n    auto_sign_in_with_provider = \"openid_connect\";\n    allow_single_sign_on = [\"openid_connect\"];\n    block_auto_created_users = false;\n    providers = [\n      {\n        name = \"openid_connect\";\n        label = \"OpenID Connect\";\n        args = {\n          name = \"openid_connect\";\n          scope = [\"openid\" \"profile\"];\n          response_type = \"code\";\n          issuer = \"https://keycloak.example.com/auth/realms/My%20Realm\";\n          discovery = true;\n          client_auth_method = \"query\";\n          uid_field = \"preferred_username\";\n          client_options = {\n            identifier = \"gitlab\";\n            secret = { _secret = \"/var/keys/gitlab_oidc_secret\"; };\n            redirect_uri = \"https://git.example.com/users/auth/openid_connect/callback\";\n          };\n        };\n      }\n    ];\n  };\n};\n"}, "loc": ["services", "gitlab", "extraConfig"], "readOnly": false, "type": "YAML value"}, "services.gitlab.extraDatabaseConfig": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration in config/database.yml."}, "loc": ["services", "gitlab", "extraDatabaseConfig"], "readOnly": false, "type": "attribute set"}, "services.gitlab.extraEnv": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional environment variables for the GitLab environment.\n"}, "loc": ["services", "gitlab", "extraEnv"], "readOnly": false, "type": "attribute set of string"}, "services.gitlab.extraGitlabRb": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to be placed in config/extra-gitlab.rb. This can\nbe used to add configuration not otherwise exposed through this module's\noptions.\n"}, "example": {"_type": "literalExpression", "text": "''\n  if Rails.env.production?\n    Rails.application.config.action_mailer.delivery_method = :sendmail\n    ActionMailer::Base.delivery_method = :sendmail\n    ActionMailer::Base.sendmail_settings = {\n      location: \"/run/wrappers/bin/sendmail\",\n      arguments: \"-i -t\"\n    }\n  end\n''"}, "loc": ["services", "gitlab", "extraGitlabRb"], "readOnly": false, "type": "string"}, "services.gitlab.extraShellConfig": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration to merge into shell-config.yml"}, "loc": ["services", "gitlab", "extraShellConfig"], "readOnly": false, "type": "attribute set"}, "services.gitlab.group": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"gitlab\""}, "description": {"_type": "mdDoc", "text": "Group to run gitlab and all related services."}, "loc": ["services", "gitlab", "group"], "readOnly": false, "type": "string"}, "services.gitlab.host": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "GitLab host name. Used e.g. for copy-paste URLs."}, "loc": ["services", "gitlab", "host"], "readOnly": false, "type": "string"}, "services.gitlab.https": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether gitlab prints URLs with https as scheme."}, "loc": ["services", "gitlab", "https"], "readOnly": false, "type": "boolean"}, "services.gitlab.initialRootEmail": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"admin@local.host\""}, "description": {"_type": "mdDoc", "text": "Initial email address of the root account if this is a new install.\n"}, "loc": ["services", "gitlab", "initialRootEmail"], "readOnly": false, "type": "string"}, "services.gitlab.initialRootPasswordFile": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing the initial password of the root account if\nthis is a new install.\n\nThis should be a string, not a nix path, since nix paths are\ncopied into the world-readable nix store.\n"}, "loc": ["services", "gitlab", "initialRootPasswordFile"], "readOnly": false, "type": "null or path"}, "services.gitlab.logrotate.enable": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable rotation of log files.\n"}, "loc": ["services", "gitlab", "logrotate", "enable"], "readOnly": false, "type": "boolean"}, "services.gitlab.logrotate.frequency": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"daily\""}, "description": {"_type": "mdDoc", "text": "How often to rotate the logs."}, "loc": ["services", "gitlab", "logrotate", "frequency"], "readOnly": false, "type": "string"}, "services.gitlab.logrotate.keep": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "How many rotations to keep."}, "loc": ["services", "gitlab", "logrotate", "keep"], "readOnly": false, "type": "signed integer"}, "services.gitlab.packages.gitaly": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gitaly"}, "description": {"_type": "mdDoc", "text": "Reference to the gitaly package"}, "loc": ["services", "gitlab", "packages", "gitaly"], "readOnly": false, "type": "package"}, "services.gitlab.packages.gitlab": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gitlab"}, "description": {"_type": "mdDoc", "text": "Reference to the gitlab package"}, "example": {"_type": "literalExpression", "text": "pkgs.gitlab-ee"}, "loc": ["services", "gitlab", "packages", "gitlab"], "readOnly": false, "type": "package"}, "services.gitlab.packages.gitlab-shell": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gitlab-shell"}, "description": {"_type": "mdDoc", "text": "Reference to the gitlab-shell package"}, "loc": ["services", "gitlab", "packages", "gitlab-shell"], "readOnly": false, "type": "package"}, "services.gitlab.packages.gitlab-workhorse": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gitlab-workhorse"}, "description": {"_type": "mdDoc", "text": "Reference to the gitlab-workhorse package"}, "loc": ["services", "gitlab", "packages", "gitlab-workhorse"], "readOnly": false, "type": "package"}, "services.gitlab.packages.pages": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gitlab-pages"}, "description": {"_type": "mdDoc", "text": "Reference to the gitlab-pages package"}, "loc": ["services", "gitlab", "packages", "pages"], "readOnly": false, "type": "package"}, "services.gitlab.pages.enable": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the GitLab Pages service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gitlab", "pages", "enable"], "readOnly": false, "type": "boolean"}, "services.gitlab.pages.settings": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "description": {"_type": "mdDoc", "text": "Configuration options to set in the GitLab Pages config\nfile.\n\nOptions containing secret data should be set to an attribute\nset containing the attribute `_secret` - a string pointing\nto a file containing the value the option should be set\nto. See the example to get a better picture of this: in the\nresulting configuration file, the `auth-client-secret` and\n`auth-secret` keys will be set to the contents of the\n{file}`/var/keys/auth-client-secret` and\n{file}`/var/keys/auth-secret` files respectively.\n"}, "example": {"_type": "literalExpression", "text": "{\n  pages-domain = \"example.com\";\n  auth-client-id = \"generated-id-xxxxxxx\";\n  auth-client-secret = { _secret = \"/var/keys/auth-client-secret\"; };\n  auth-redirect-uri = \"https://projects.example.com/auth\";\n  auth-secret = { _secret = \"/var/keys/auth-secret\"; };\n  auth-server = \"https://gitlab.example.com\";\n}\n"}, "loc": ["services", "gitlab", "pages", "settings"], "readOnly": false, "type": "attribute set of (null or string or signed integer or boolean or (attribute set))"}, "services.gitlab.pages.settings.artifacts-server": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"http(s)://<services.gitlab.host>/api/v4\""}, "description": {"_type": "mdDoc", "text": "API URL to proxy artifact requests to.\n"}, "example": {"_type": "literalExpression", "text": "\"https://gitlab.example.com/api/v4\""}, "loc": ["services", "gitlab", "pages", "settings", "artifacts-server"], "readOnly": false, "type": "null or string"}, "services.gitlab.pages.settings.gitlab-server": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"http(s)://<services.gitlab.host>\""}, "description": {"_type": "mdDoc", "text": "Public GitLab server URL.\n"}, "example": {"_type": "literalExpression", "text": "\"https://gitlab.example.com\""}, "loc": ["services", "gitlab", "pages", "settings", "gitlab-server"], "readOnly": false, "type": "null or string"}, "services.gitlab.pages.settings.internal-gitlab-server": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"http(s)://<services.gitlab.host>\""}, "description": {"_type": "mdDoc", "text": "Internal GitLab server used for API requests, useful\nif you want to send that traffic over an internal load\nbalancer. By default, the value of\n`services.gitlab.pages.settings.gitlab-server` is\nused.\n"}, "example": {"_type": "literalExpression", "text": "\"https://gitlab.example.internal\""}, "loc": ["services", "gitlab", "pages", "settings", "internal-gitlab-server"], "readOnly": false, "type": "null or string"}, "services.gitlab.pages.settings.listen-http": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The address(es) to listen on for HTTP requests.\n"}, "loc": ["services", "gitlab", "pages", "settings", "listen-http"], "readOnly": false, "type": "list of string"}, "services.gitlab.pages.settings.listen-https": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The address(es) to listen on for HTTPS requests.\n"}, "loc": ["services", "gitlab", "pages", "settings", "listen-https"], "readOnly": false, "type": "list of string"}, "services.gitlab.pages.settings.listen-proxy": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1:8090\"\n]"}, "description": {"_type": "mdDoc", "text": "The address(es) to listen on for proxy requests.\n"}, "loc": ["services", "gitlab", "pages", "settings", "listen-proxy"], "readOnly": false, "type": "list of string"}, "services.gitlab.pages.settings.pages-domain": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "description": {"_type": "mdDoc", "text": "The domain to serve static pages on.\n"}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "gitlab", "pages", "settings", "pages-domain"], "readOnly": false, "type": "null or string"}, "services.gitlab.pages.settings.pages-root": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "config.services.gitlab.extraConfig.production.shared.path + \"/pages\""}, "description": {"_type": "mdDoc", "text": "The directory where pages are stored.\n"}, "loc": ["services", "gitlab", "pages", "settings", "pages-root"], "readOnly": false, "type": "string"}, "services.gitlab.port": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "GitLab server port for copy-paste URLs, e.g. 80 or 443 if you're\nservice over https.\n"}, "loc": ["services", "gitlab", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gitlab.puma.threadsMax": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "4"}, "description": {"_type": "mdDoc", "text": "The maximum number of threads Puma should use per\nworker. This limits how many threads Puma will automatically\nspawn in response to requests. In contrast to workers,\nthreads will never be able to run Ruby code in parallel, but\ngive higher IO parallelism.\n\n::: {.note}\nEach thread consumes memory and contributes to Global VM\nLock contention, so be careful when increasing this.\n:::\n"}, "loc": ["services", "gitlab", "puma", "threadsMax"], "readOnly": false, "type": "signed integer"}, "services.gitlab.puma.threadsMin": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "The minimum number of threads Puma should use per\nworker.\n\n::: {.note}\nEach thread consumes memory and contributes to Global VM\nLock contention, so be careful when increasing this.\n:::\n"}, "loc": ["services", "gitlab", "puma", "threadsMin"], "readOnly": false, "type": "signed integer"}, "services.gitlab.puma.workers": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "The number of worker processes Puma should spawn. This\ncontrols the amount of parallel Ruby code can be\nexecuted. GitLab recommends `Number of CPU cores - 1`, but at least two.\n\n::: {.note}\nEach worker consumes quite a bit of memory, so\nbe careful when increasing this.\n:::\n"}, "loc": ["services", "gitlab", "puma", "workers"], "readOnly": false, "type": "signed integer"}, "services.gitlab.redisUrl": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"unix:/run/gitlab/redis.sock\""}, "description": {"_type": "mdDoc", "text": "Redis URL for all GitLab services."}, "example": {"_type": "literalExpression", "text": "\"redis://localhost:6379/\""}, "loc": ["services", "gitlab", "redisUrl"], "readOnly": false, "type": "string"}, "services.gitlab.registry.certFile": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "description": {"_type": "mdDoc", "text": "Path to GitLab container registry certificate."}, "loc": ["services", "gitlab", "registry", "certFile"], "readOnly": false, "type": "path"}, "services.gitlab.registry.defaultForProjects": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "config.services.gitlab.registry.enable"}, "description": {"_type": "mdDoc", "text": "If GitLab container registry should be enabled by default for projects."}, "loc": ["services", "gitlab", "registry", "defaultForProjects"], "readOnly": false, "type": "boolean"}, "services.gitlab.registry.enable": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable GitLab container registry."}, "loc": ["services", "gitlab", "registry", "enable"], "readOnly": false, "type": "boolean"}, "services.gitlab.registry.externalAddress": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "External address used to access registry from the internet"}, "loc": ["services", "gitlab", "registry", "externalAddress"], "readOnly": false, "type": "string"}, "services.gitlab.registry.externalPort": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "description": {"_type": "mdDoc", "text": "External port used to access registry from the internet"}, "loc": ["services", "gitlab", "registry", "externalPort"], "readOnly": false, "type": "signed integer"}, "services.gitlab.registry.host": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "config.services.gitlab.host"}, "description": {"_type": "mdDoc", "text": "GitLab container registry host name."}, "loc": ["services", "gitlab", "registry", "host"], "readOnly": false, "type": "string"}, "services.gitlab.registry.issuer": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"gitlab-issuer\""}, "description": {"_type": "mdDoc", "text": "GitLab container registry issuer."}, "loc": ["services", "gitlab", "registry", "issuer"], "readOnly": false, "type": "string"}, "services.gitlab.registry.keyFile": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "description": {"_type": "mdDoc", "text": "Path to GitLab container registry certificate-key."}, "loc": ["services", "gitlab", "registry", "keyFile"], "readOnly": false, "type": "path"}, "services.gitlab.registry.package": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "pkgs.docker-distribution"}, "description": {"_type": "mdDoc", "text": "Container registry package to use.\n\nExternal container registries such as `pkgs.docker-distribution` are not supported\nanymore since GitLab 16.0.0.\n"}, "loc": ["services", "gitlab", "registry", "package"], "readOnly": false, "type": "package"}, "services.gitlab.registry.port": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "4567"}, "description": {"_type": "mdDoc", "text": "GitLab container registry port."}, "loc": ["services", "gitlab", "registry", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gitlab.registry.serviceName": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"container_registry\""}, "description": {"_type": "mdDoc", "text": "GitLab container registry service name."}, "loc": ["services", "gitlab", "registry", "serviceName"], "readOnly": false, "type": "string"}, "services.gitlab.secrets.dbFile": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the secret used to encrypt variables in\nthe DB. If you change or lose this key you will be unable to\naccess variables stored in database.\n\nMake sure the secret is at least 32 characters and all random,\nno regular words or you'll be exposed to dictionary attacks.\n\nThis should be a string, not a nix path, since nix paths are\ncopied into the world-readable nix store.\n"}, "loc": ["services", "gitlab", "secrets", "dbFile"], "readOnly": false, "type": "null or path"}, "services.gitlab.secrets.jwsFile": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the secret used to encrypt session\nkeys. If you change or lose this key, users will be\ndisconnected.\n\nMake sure the secret is an RSA private key in PEM format. You can\ngenerate one with\n\nopenssl genrsa 2048\n\nThis should be a string, not a nix path, since nix paths are\ncopied into the world-readable nix store.\n"}, "loc": ["services", "gitlab", "secrets", "jwsFile"], "readOnly": false, "type": "null or path"}, "services.gitlab.secrets.otpFile": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the secret used to encrypt secrets for OTP\ntokens. If you change or lose this key, users which have 2FA\nenabled for login won't be able to login anymore.\n\nMake sure the secret is at least 32 characters and all random,\nno regular words or you'll be exposed to dictionary attacks.\n\nThis should be a string, not a nix path, since nix paths are\ncopied into the world-readable nix store.\n"}, "loc": ["services", "gitlab", "secrets", "otpFile"], "readOnly": false, "type": "null or path"}, "services.gitlab.secrets.secretFile": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the secret used to encrypt variables in\nthe DB. If you change or lose this key you will be unable to\naccess variables stored in database.\n\nMake sure the secret is at least 32 characters and all random,\nno regular words or you'll be exposed to dictionary attacks.\n\nThis should be a string, not a nix path, since nix paths are\ncopied into the world-readable nix store.\n"}, "loc": ["services", "gitlab", "secrets", "secretFile"], "readOnly": false, "type": "null or path"}, "services.gitlab.sidekiq.memoryKiller.enable": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the Sidekiq MemoryKiller should be turned\non. MemoryKiller kills Sidekiq when its memory consumption\nexceeds a certain limit.\n\nSee <https://docs.gitlab.com/ee/administration/operations/sidekiq_memory_killer.html>\nfor details.\n"}, "loc": ["services", "gitlab", "sidekiq", "memoryKiller", "enable"], "readOnly": false, "type": "boolean"}, "services.gitlab.sidekiq.memoryKiller.graceTime": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "900"}, "description": {"_type": "mdDoc", "text": "The time MemoryKiller waits after noticing excessive memory\nconsumption before killing Sidekiq.\n"}, "loc": ["services", "gitlab", "sidekiq", "memoryKiller", "graceTime"], "readOnly": false, "type": "signed integer"}, "services.gitlab.sidekiq.memoryKiller.maxMemory": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "2000"}, "description": {"_type": "mdDoc", "text": "The maximum amount of memory, in MiB, a Sidekiq worker is\nallowed to consume before being killed.\n"}, "loc": ["services", "gitlab", "sidekiq", "memoryKiller", "maxMemory"], "readOnly": false, "type": "signed integer"}, "services.gitlab.sidekiq.memoryKiller.shutdownWait": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "The time allowed for all jobs to finish before Sidekiq is\nkilled forcefully.\n"}, "loc": ["services", "gitlab", "sidekiq", "memoryKiller", "shutdownWait"], "readOnly": false, "type": "signed integer"}, "services.gitlab.smtp.address": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address of the SMTP server for GitLab."}, "loc": ["services", "gitlab", "smtp", "address"], "readOnly": false, "type": "string"}, "services.gitlab.smtp.authentication": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Authentication type to use, see http://api.rubyonrails.org/classes/ActionMailer/Base.html"}, "loc": ["services", "gitlab", "smtp", "authentication"], "readOnly": false, "type": "null or string"}, "services.gitlab.smtp.domain": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "HELO domain to use for outgoing mail."}, "loc": ["services", "gitlab", "smtp", "domain"], "readOnly": false, "type": "string"}, "services.gitlab.smtp.enable": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable gitlab mail delivery over SMTP."}, "loc": ["services", "gitlab", "smtp", "enable"], "readOnly": false, "type": "boolean"}, "services.gitlab.smtp.enableStartTLSAuto": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to try to use StartTLS."}, "loc": ["services", "gitlab", "smtp", "enableStartTLSAuto"], "readOnly": false, "type": "boolean"}, "services.gitlab.smtp.opensslVerifyMode": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"peer\""}, "description": {"_type": "mdDoc", "text": "How OpenSSL checks the certificate, see http://api.rubyonrails.org/classes/ActionMailer/Base.html"}, "loc": ["services", "gitlab", "smtp", "opensslVerifyMode"], "readOnly": false, "type": "string"}, "services.gitlab.smtp.passwordFile": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing the password of the SMTP server for GitLab.\n\nThis should be a string, not a nix path, since nix paths\nare copied into the world-readable nix store.\n"}, "loc": ["services", "gitlab", "smtp", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.gitlab.smtp.port": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "25"}, "description": {"_type": "mdDoc", "text": "Port of the SMTP server for GitLab."}, "loc": ["services", "gitlab", "smtp", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gitlab.smtp.tls": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use TLS wrapper-mode."}, "loc": ["services", "gitlab", "smtp", "tls"], "readOnly": false, "type": "boolean"}, "services.gitlab.smtp.username": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Username of the SMTP server for GitLab."}, "loc": ["services", "gitlab", "smtp", "username"], "readOnly": false, "type": "null or string"}, "services.gitlab.statePath": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"/var/gitlab/state\""}, "description": {"_type": "mdDoc", "text": "GitLab state directory. Configuration, repositories and\nlogs, among other things, are stored here.\n\nThe directory will be created automatically if it doesn't\nexist already. Its parent directories must be owned by\neither `root` or the user set in\n{option}`services.gitlab.user`.\n"}, "loc": ["services", "gitlab", "statePath"], "readOnly": false, "type": "string"}, "services.gitlab.user": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "\"gitlab\""}, "description": {"_type": "mdDoc", "text": "User to run gitlab and all related services."}, "loc": ["services", "gitlab", "user"], "readOnly": false, "type": "string"}, "services.gitlab.workhorse.config": {"declarations": ["nixos/modules/services/misc/gitlab.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration options to add to Workhorse's configuration\nfile.\n\nSee\n<https://gitlab.com/gitlab-org/gitlab/-/blob/master/workhorse/config.toml.example>\nand\n<https://docs.gitlab.com/ee/development/workhorse/configuration.html>\nfor examples and option documentation.\n\nOptions containing secret data should be set to an attribute\nset containing the attribute `_secret` - a string pointing\nto a file containing the value the option should be set\nto. See the example to get a better picture of this: in the\nresulting configuration file, the\n`object_storage.s3.aws_secret_access_key` key will be set to\nthe contents of the {file}`/var/keys/aws_secret_access_key`\nfile.\n"}, "example": {"_type": "literalExpression", "text": "{\n  object_storage.provider = \"AWS\";\n  object_storage.s3 = {\n    aws_access_key_id = \"AKIAXXXXXXXXXXXXXXXX\";\n    aws_secret_access_key = { _secret = \"/var/keys/aws_secret_access_key\"; };\n  };\n};\n"}, "loc": ["services", "gitlab", "workhorse", "config"], "readOnly": false, "type": "TOML value"}, "services.gitolite.adminPubkey": {"declarations": ["nixos/modules/services/misc/gitolite.nix"], "description": {"_type": "mdDoc", "text": "Initial administrative public key for Gitolite. This should\nbe an SSH Public Key. Note that this key will only be used\nonce, upon the first initialization of the Gitolite user.\nThe key string cannot have any line breaks in it.\n"}, "loc": ["services", "gitolite", "adminPubkey"], "readOnly": false, "type": "string"}, "services.gitolite.commonHooks": {"declarations": ["nixos/modules/services/misc/gitolite.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of custom git hooks that get copied to `~/.gitolite/hooks/common`.\n"}, "loc": ["services", "gitolite", "commonHooks"], "readOnly": false, "type": "list of path"}, "services.gitolite.dataDir": {"declarations": ["nixos/modules/services/misc/gitolite.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/gitolite\""}, "description": {"_type": "mdDoc", "text": "The gitolite home directory used to store all repositories. If left as the default value\nthis directory will automatically be created before the gitolite server starts, otherwise\nthe sysadmin is responsible for ensuring the directory exists with appropriate ownership\nand permissions.\n"}, "loc": ["services", "gitolite", "dataDir"], "readOnly": false, "type": "string"}, "services.gitolite.description": {"declarations": ["nixos/modules/services/misc/gitolite.nix"], "default": {"_type": "literalExpression", "text": "\"Gitolite user\""}, "description": {"_type": "mdDoc", "text": "Gitolite user account's description.\n"}, "loc": ["services", "gitolite", "description"], "readOnly": false, "type": "string"}, "services.gitolite.enable": {"declarations": ["nixos/modules/services/misc/gitolite.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable gitolite management under the\n`gitolite` user. After\nswitching to a configuration with Gitolite enabled, you can\nthen run `git clone gitolite@host:gitolite-admin.git` to manage it further.\n"}, "loc": ["services", "gitolite", "enable"], "readOnly": false, "type": "boolean"}, "services.gitolite.enableGitAnnex": {"declarations": ["nixos/modules/services/misc/gitolite.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable git-annex support. Uses the `extraGitoliteRc` option\nto apply the necessary configuration.\n"}, "loc": ["services", "gitolite", "enableGitAnnex"], "readOnly": false, "type": "boolean"}, "services.gitolite.extraGitoliteRc": {"declarations": ["nixos/modules/services/misc/gitolite.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to append to the default `~/.gitolite.rc`.\n\nThis should be Perl code that modifies the `%RC`\nconfiguration variable. The default `~/.gitolite.rc`\ncontent is generated by invoking `gitolite print-default-rc`,\nand extra configuration from this option is appended to it. The result\nis placed to Nix store, and the `~/.gitolite.rc` file\nbecomes a symlink to it.\n\nIf you already have a customized (or otherwise changed)\n`~/.gitolite.rc` file, NixOS will refuse to replace\nit with a symlink, and the `gitolite-init` initialization service\nwill fail. In this situation, in order to use this option, you\nwill need to take any customizations you may have in\n`~/.gitolite.rc`, convert them to appropriate Perl\nstatements, add them to this option, and remove the file.\n\nSee also the `enableGitAnnex` option.\n"}, "example": {"_type": "literalExpression", "text": "''\n  $RC{UMASK} = 0027;\n  $RC{SITE_INFO} = 'This is our private repository host';\n  push( @{$RC{ENABLE}}, 'Kindergarten' ); # enable the command/feature\n  @{$RC{ENABLE}} = grep { $_ ne 'desc' } @{$RC{ENABLE}}; # disable the command/feature\n''\n"}, "loc": ["services", "gitolite", "extraGitoliteRc"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.gitolite.group": {"declarations": ["nixos/modules/services/misc/gitolite.nix"], "default": {"_type": "literalExpression", "text": "\"gitolite\""}, "description": {"_type": "mdDoc", "text": "Primary group of the Gitolite user account.\n"}, "loc": ["services", "gitolite", "group"], "readOnly": false, "type": "string"}, "services.gitolite.user": {"declarations": ["nixos/modules/services/misc/gitolite.nix"], "default": {"_type": "literalExpression", "text": "\"gitolite\""}, "description": {"_type": "mdDoc", "text": "Gitolite user account. This is the username of the gitolite endpoint.\n"}, "loc": ["services", "gitolite", "user"], "readOnly": false, "type": "string"}, "services.gitweb.extraConfig": {"declarations": ["nixos/modules/services/misc/gitweb.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim configuration text appended to the generated gitweb.conf file.\n"}, "example": {"_type": "literalExpression", "text": "''\n  $feature{'highlight'}{'default'} = [1];\n  $feature{'ctags'}{'default'} = [1];\n  $feature{'avatar'}{'default'} = ['gravatar'];\n''"}, "loc": ["services", "gitweb", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.gitweb.gitwebTheme": {"declarations": ["nixos/modules/services/misc/gitweb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use an alternative theme for gitweb, strongly inspired by GitHub.\n"}, "loc": ["services", "gitweb", "gitwebTheme"], "readOnly": false, "type": "boolean"}, "services.gitweb.projectroot": {"declarations": ["nixos/modules/services/misc/gitweb.nix"], "default": {"_type": "literalExpression", "text": "\"/srv/git\""}, "description": {"_type": "mdDoc", "text": "Path to git projects (bare repositories) that should be served by\ngitweb. Must not end with a slash.\n"}, "loc": ["services", "gitweb", "projectroot"], "readOnly": false, "type": "path"}, "services.globalprotect.csdWrapper": {"declarations": ["nixos/modules/services/networking/globalprotect-vpn.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A script that will produce a Host Integrity Protection (HIP) report,\nas described at <https://www.infradead.org/openconnect/hip.html>\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.openconnect}/libexec/openconnect/hipreport.sh\""}, "loc": ["services", "globalprotect", "csdWrapper"], "readOnly": false, "type": "null or path"}, "services.globalprotect.enable": {"declarations": ["nixos/modules/services/networking/globalprotect-vpn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable globalprotect."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "globalprotect", "enable"], "readOnly": false, "type": "boolean"}, "services.globalprotect.settings": {"declarations": ["nixos/modules/services/networking/globalprotect-vpn.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "GlobalProtect-openconnect configuration. For more information, visit\n<https://github.com/yuezk/GlobalProtect-openconnect/wiki/Configuration>.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"vpn1.company.com\" = {\n    openconnect-args = \"--script=/path/to/vpnc-script\";\n  };\n}"}, "loc": ["services", "globalprotect", "settings"], "readOnly": false, "type": "attribute set"}, "services.glusterfs.enable": {"declarations": ["nixos/modules/services/network-filesystems/glusterfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GlusterFS Daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "glusterfs", "enable"], "readOnly": false, "type": "boolean"}, "services.glusterfs.enableGlustereventsd": {"declarations": ["nixos/modules/services/network-filesystems/glusterfs.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the GlusterFS Events Daemon"}, "loc": ["services", "glusterfs", "enableGlustereventsd"], "readOnly": false, "type": "boolean"}, "services.glusterfs.extraFlags": {"declarations": ["nixos/modules/services/network-filesystems/glusterfs.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags passed to the GlusterFS daemon"}, "loc": ["services", "glusterfs", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.glusterfs.killMode": {"declarations": ["nixos/modules/services/network-filesystems/glusterfs.nix"], "default": {"_type": "literalExpression", "text": "\"control-group\""}, "description": {"_type": "mdDoc", "text": "The systemd KillMode to use for glusterd.\n\nglusterd spawns other daemons like gsyncd.\nIf you want these to stop when glusterd is stopped (e.g. to ensure\nthat NixOS config changes are reflected even for these sub-daemons),\nset this to 'control-group'.\nIf however you want running volume processes (glusterfsd) and thus\ngluster mounts not be interrupted when glusterd is restarted\n(for example, when you want to restart them manually at a later time),\nset this to 'process'.\n"}, "loc": ["services", "glusterfs", "killMode"], "readOnly": false, "type": "one of \"control-group\", \"process\", \"mixed\", \"none\""}, "services.glusterfs.logLevel": {"declarations": ["nixos/modules/services/network-filesystems/glusterfs.nix"], "default": {"_type": "literalExpression", "text": "\"INFO\""}, "description": {"_type": "mdDoc", "text": "Log level used by the GlusterFS daemon"}, "loc": ["services", "glusterfs", "logLevel"], "readOnly": false, "type": "one of \"DEBUG\", \"INFO\", \"WARNING\", \"ERROR\", \"CRITICAL\", \"TRACE\", \"NONE\""}, "services.glusterfs.stopKillTimeout": {"declarations": ["nixos/modules/services/network-filesystems/glusterfs.nix"], "default": {"_type": "literalExpression", "text": "\"5s\""}, "description": {"_type": "mdDoc", "text": "The systemd TimeoutStopSec to use.\n\nAfter this time after having been asked to shut down, glusterd\n(and depending on the killMode setting also its child processes)\nare killed by systemd.\n\nThe default is set low because GlusterFS (as of 3.10) is known to\nnot tell its children (like gsyncd) to terminate at all.\n"}, "loc": ["services", "glusterfs", "stopKillTimeout"], "readOnly": false, "type": "string"}, "services.glusterfs.tlsSettings": {"declarations": ["nixos/modules/services/network-filesystems/glusterfs.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Make the server communicate via TLS.\nThis means it will only connect to other gluster\nservers having certificates signed by the same CA.\n\nEnabling this will create a file {file}`/var/lib/glusterd/secure-access`.\nDisabling will delete this file again.\n\nSee also: https://gluster.readthedocs.io/en/latest/Administrator%20Guide/SSL/\n"}, "loc": ["services", "glusterfs", "tlsSettings"], "readOnly": false, "type": "null or (submodule)"}, "services.glusterfs.tlsSettings.caCert": {"declarations": ["nixos/modules/services/network-filesystems/glusterfs.nix"], "description": {"_type": "mdDoc", "text": "Path certificate authority used to sign the cluster certificates."}, "loc": ["services", "glusterfs", "tlsSettings", "caCert"], "readOnly": false, "type": "path"}, "services.glusterfs.tlsSettings.tlsKeyPath": {"declarations": ["nixos/modules/services/network-filesystems/glusterfs.nix"], "description": {"_type": "mdDoc", "text": "Path to the private key used for TLS."}, "loc": ["services", "glusterfs", "tlsSettings", "tlsKeyPath"], "readOnly": false, "type": "string"}, "services.glusterfs.tlsSettings.tlsPem": {"declarations": ["nixos/modules/services/network-filesystems/glusterfs.nix"], "description": {"_type": "mdDoc", "text": "Path to the certificate used for TLS."}, "loc": ["services", "glusterfs", "tlsSettings", "tlsPem"], "readOnly": false, "type": "path"}, "services.glusterfs.useRpcbind": {"declarations": ["nixos/modules/services/network-filesystems/glusterfs.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable use of rpcbind. This is required for Gluster's NFS functionality.\n\nYou may want to turn it off to reduce the attack surface for DDoS reflection attacks.\n\nSee https://davelozier.com/glusterfs-and-rpcbind-portmap-ddos-reflection-attacks/\nand https://bugzilla.redhat.com/show_bug.cgi?id=1426842 for details.\n"}, "loc": ["services", "glusterfs", "useRpcbind"], "readOnly": false, "type": "boolean"}, "services.gmediarender.audioDevice": {"declarations": ["nixos/modules/services/audio/gmediarender.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The audio device to use.\n"}, "loc": ["services", "gmediarender", "audioDevice"], "readOnly": false, "type": "null or string"}, "services.gmediarender.audioSink": {"declarations": ["nixos/modules/services/audio/gmediarender.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The audio sink to use.\n"}, "loc": ["services", "gmediarender", "audioSink"], "readOnly": false, "type": "null or string"}, "services.gmediarender.enable": {"declarations": ["nixos/modules/services/audio/gmediarender.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the gmediarender DLNA renderer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gmediarender", "enable"], "readOnly": false, "type": "boolean"}, "services.gmediarender.friendlyName": {"declarations": ["nixos/modules/services/audio/gmediarender.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A \"friendly name\" for identifying the endpoint.\n"}, "loc": ["services", "gmediarender", "friendlyName"], "readOnly": false, "type": "null or string"}, "services.gmediarender.initialVolume": {"declarations": ["nixos/modules/services/audio/gmediarender.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "A default volume attenuation (in dB) for the endpoint.\n"}, "loc": ["services", "gmediarender", "initialVolume"], "readOnly": false, "type": "null or signed integer"}, "services.gmediarender.package": {"declarations": ["nixos/modules/services/audio/gmediarender.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gmrender-resurrect"}, "description": {"_type": "mdDoc", "text": "The gmediarender package to use."}, "loc": ["services", "gmediarender", "package"], "readOnly": false, "type": "package"}, "services.gmediarender.port": {"declarations": ["nixos/modules/services/audio/gmediarender.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port that will be used to accept client connections."}, "loc": ["services", "gmediarender", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gmediarender.uuid": {"declarations": ["nixos/modules/services/audio/gmediarender.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A UUID for uniquely identifying the endpoint.  If you have\nmultiple renderers on your network, you MUST set this.\n"}, "loc": ["services", "gmediarender", "uuid"], "readOnly": false, "type": "null or string"}, "services.gnome.at-spi2-core.enable": {"declarations": ["nixos/modules/services/desktops/gnome/at-spi2-core.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable at-spi2-core, a service for the Assistive Technologies\navailable on the GNOME platform.\n\nEnable this if you get the error or warning\n`The name org.a11y.Bus was not provided by any .service files`.\n"}, "loc": ["services", "gnome", "at-spi2-core", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.core-developer-tools.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GNOME core developer tools."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gnome", "core-developer-tools", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.core-os-services.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable essential services for GNOME3."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gnome", "core-os-services", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.core-shell.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GNOME Shell services."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gnome", "core-shell", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.core-utilities.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GNOME core utilities."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gnome", "core-utilities", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.evolution-data-server.enable": {"declarations": ["nixos/modules/services/desktops/gnome/evolution-data-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Evolution Data Server, a collection of services for storing addressbooks and calendars."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gnome", "evolution-data-server", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.evolution-data-server.plugins": {"declarations": ["nixos/modules/services/desktops/gnome/evolution-data-server.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Plugins for Evolution Data Server."}, "loc": ["services", "gnome", "evolution-data-server", "plugins"], "readOnly": false, "type": "list of package"}, "services.gnome.games.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GNOME games."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gnome", "games", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.glib-networking.enable": {"declarations": ["nixos/modules/services/desktops/gnome/glib-networking.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable network extensions for GLib."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gnome", "glib-networking", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.gnome-browser-connector.enable": {"declarations": ["nixos/modules/services/desktops/gnome/gnome-browser-connector.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Native host connector for the GNOME Shell browser extension, a DBus service\nallowing to install GNOME Shell extensions from a web browser.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gnome", "gnome-browser-connector", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.gnome-initial-setup.enable": {"declarations": ["nixos/modules/services/desktops/gnome/gnome-initial-setup.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GNOME Initial Setup, a Simple, easy, and safe way to prepare a new system."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gnome", "gnome-initial-setup", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.gnome-keyring.enable": {"declarations": ["nixos/modules/services/desktops/gnome/gnome-keyring.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GNOME Keyring daemon, a service designed to\ntake care of the user's security credentials,\nsuch as user names and passwords.\n"}, "loc": ["services", "gnome", "gnome-keyring", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.gnome-online-accounts.enable": {"declarations": ["nixos/modules/services/desktops/gnome/gnome-online-accounts.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GNOME Online Accounts daemon, a service that provides\na single sign-on framework for the GNOME desktop.\n"}, "loc": ["services", "gnome", "gnome-online-accounts", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.gnome-online-miners.enable": {"declarations": ["nixos/modules/services/desktops/gnome/gnome-online-miners.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GNOME Online Miners, a service that\ncrawls through your online content.\n"}, "loc": ["services", "gnome", "gnome-online-miners", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.gnome-remote-desktop.enable": {"declarations": ["nixos/modules/services/desktops/gnome/gnome-remote-desktop.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Remote Desktop support using Pipewire."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gnome", "gnome-remote-desktop", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.gnome-settings-daemon.enable": {"declarations": ["nixos/modules/services/desktops/gnome/gnome-settings-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GNOME Settings Daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gnome", "gnome-settings-daemon", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.gnome-user-share.enable": {"declarations": ["nixos/modules/services/desktops/gnome/gnome-user-share.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GNOME User Share, a user-level file sharing service for GNOME."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gnome", "gnome-user-share", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.rygel.enable": {"declarations": ["nixos/modules/services/desktops/gnome/rygel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Rygel UPnP Mediaserver.\n\nYou will need to also allow UPnP connections in firewall, see the following [comment](https://github.com/NixOS/nixpkgs/pull/45045#issuecomment-416030795).\n"}, "loc": ["services", "gnome", "rygel", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.sushi.enable": {"declarations": ["nixos/modules/services/desktops/gnome/sushi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Sushi, a quick previewer for nautilus.\n"}, "loc": ["services", "gnome", "sushi", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.tracker-miners.enable": {"declarations": ["nixos/modules/services/desktops/gnome/tracker-miners.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Tracker miners, indexing services for Tracker\nsearch engine and metadata storage system.\n"}, "loc": ["services", "gnome", "tracker-miners", "enable"], "readOnly": false, "type": "boolean"}, "services.gnome.tracker.enable": {"declarations": ["nixos/modules/services/desktops/gnome/tracker.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Tracker services, a search engine,\nsearch tool and metadata storage system.\n"}, "loc": ["services", "gnome", "tracker", "enable"], "readOnly": false, "type": "boolean"}, "services.gnunet.enable": {"declarations": ["nixos/modules/services/networking/gnunet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the GNUnet daemon.  GNUnet is GNU's anonymous\npeer-to-peer communication and file sharing framework.\n"}, "loc": ["services", "gnunet", "enable"], "readOnly": false, "type": "boolean"}, "services.gnunet.extraOptions": {"declarations": ["nixos/modules/services/networking/gnunet.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional options that will be copied verbatim in `gnunet.conf`.\nSee {manpage}`gnunet.conf(5)` for details.\n"}, "loc": ["services", "gnunet", "extraOptions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.gnunet.fileSharing.quota": {"declarations": ["nixos/modules/services/networking/gnunet.nix"], "default": {"_type": "literalExpression", "text": "1024"}, "description": {"_type": "mdDoc", "text": "Maximum file system usage (in MiB) for file sharing.\n"}, "loc": ["services", "gnunet", "fileSharing", "quota"], "readOnly": false, "type": "signed integer"}, "services.gnunet.load.hardNetUpBandwidth": {"declarations": ["nixos/modules/services/networking/gnunet.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Hard bandwidth limit (in bits per second) when uploading\ndata.\n"}, "loc": ["services", "gnunet", "load", "hardNetUpBandwidth"], "readOnly": false, "type": "signed integer"}, "services.gnunet.load.maxNetDownBandwidth": {"declarations": ["nixos/modules/services/networking/gnunet.nix"], "default": {"_type": "literalExpression", "text": "50000"}, "description": {"_type": "mdDoc", "text": "Maximum bandwidth usage (in bits per second) for GNUnet\nwhen downloading data.\n"}, "loc": ["services", "gnunet", "load", "maxNetDownBandwidth"], "readOnly": false, "type": "signed integer"}, "services.gnunet.load.maxNetUpBandwidth": {"declarations": ["nixos/modules/services/networking/gnunet.nix"], "default": {"_type": "literalExpression", "text": "50000"}, "description": {"_type": "mdDoc", "text": "Maximum bandwidth usage (in bits per second) for GNUnet\nwhen downloading data.\n"}, "loc": ["services", "gnunet", "load", "maxNetUpBandwidth"], "readOnly": false, "type": "signed integer"}, "services.gnunet.package": {"declarations": ["nixos/modules/services/networking/gnunet.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gnunet"}, "description": {"_type": "mdDoc", "text": "Overridable attribute of the gnunet package to use."}, "example": {"_type": "literalExpression", "text": "pkgs.gnunet_git"}, "loc": ["services", "gnunet", "package"], "readOnly": false, "type": "package"}, "services.gnunet.tcp.port": {"declarations": ["nixos/modules/services/networking/gnunet.nix"], "default": {"_type": "literalExpression", "text": "2086"}, "description": {"_type": "mdDoc", "text": "The TCP port for use by GNUnet.\n"}, "loc": ["services", "gnunet", "tcp", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gnunet.udp.port": {"declarations": ["nixos/modules/services/networking/gnunet.nix"], "default": {"_type": "literalExpression", "text": "2086"}, "description": {"_type": "mdDoc", "text": "The UDP port for use by GNUnet.\n"}, "loc": ["services", "gnunet", "udp", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.go-autoconfig.enable": {"declarations": ["nixos/modules/services/networking/go-autoconfig.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable IMAP/SMTP autodiscover feature for mail clients."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "go-autoconfig", "enable"], "readOnly": false, "type": "boolean"}, "services.go-autoconfig.settings": {"declarations": ["nixos/modules/services/networking/go-autoconfig.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for go-autoconfig. See\n<https://github.com/L11R/go-autoconfig/blob/master/config.yml>\nfor more information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  service_addr = \":1323\";\n  domain = \"autoconfig.example.org\";\n  imap = {\n    server = \"example.org\";\n    port = 993;\n  };\n  smtp = {\n    server = \"example.org\";\n    port = 465;\n  };\n}\n"}, "loc": ["services", "go-autoconfig", "settings"], "readOnly": false, "type": "YAML value"}, "services.go-neb.baseUrl": {"declarations": ["nixos/modules/services/networking/go-neb.nix"], "description": {"_type": "mdDoc", "text": "Public-facing endpoint that can receive webhooks."}, "loc": ["services", "go-neb", "baseUrl"], "readOnly": false, "type": "string"}, "services.go-neb.bindAddress": {"declarations": ["nixos/modules/services/networking/go-neb.nix"], "default": {"_type": "literalExpression", "text": "\":4050\""}, "description": {"_type": "mdDoc", "text": "Port (and optionally address) to listen on."}, "loc": ["services", "go-neb", "bindAddress"], "readOnly": false, "type": "string"}, "services.go-neb.config": {"declarations": ["nixos/modules/services/networking/go-neb.nix"], "description": {"_type": "mdDoc", "text": "Your {file}`config.yaml` as a Nix attribute set.\nSee [config.sample.yaml](https://github.com/matrix-org/go-neb/blob/master/config.sample.yaml)\nfor possible options.\n"}, "loc": ["services", "go-neb", "config"], "readOnly": false, "type": "YAML value"}, "services.go-neb.enable": {"declarations": ["nixos/modules/services/networking/go-neb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Extensible matrix bot written in Go."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "go-neb", "enable"], "readOnly": false, "type": "boolean"}, "services.go-neb.secretFile": {"declarations": ["nixos/modules/services/networking/go-neb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment variables from this file will be interpolated into the\nfinal config file using envsubst with this syntax: `$ENVIRONMENT`\nor `${VARIABLE}`.\nThe file should contain lines formatted as `SECRET_VAR=SECRET_VALUE`.\nThis is useful to avoid putting secrets into the nix store.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/go-neb.env\""}, "loc": ["services", "go-neb", "secretFile"], "readOnly": false, "type": "null or path"}, "services.go-shadowsocks2.server.enable": {"declarations": ["nixos/modules/services/networking/go-shadowsocks2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable go-shadowsocks2 server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "go-shadowsocks2", "server", "enable"], "readOnly": false, "type": "boolean"}, "services.go-shadowsocks2.server.listenAddress": {"declarations": ["nixos/modules/services/networking/go-shadowsocks2.nix"], "description": {"_type": "mdDoc", "text": "Server listen address or URL"}, "example": {"_type": "literalExpression", "text": "\"ss://AEAD_CHACHA20_POLY1305:your-password@:8488\""}, "loc": ["services", "go-shadowsocks2", "server", "listenAddress"], "readOnly": false, "type": "string"}, "services.gobgpd.enable": {"declarations": ["nixos/modules/services/networking/gobgpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GoBGP Routing Daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gobgpd", "enable"], "readOnly": false, "type": "boolean"}, "services.gobgpd.settings": {"declarations": ["nixos/modules/services/networking/gobgpd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "GoBGP configuration. Refer to\n<https://github.com/osrg/gobgp#documentation>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  global = {\n    config = {\n      as = 64512;\n      router-id = \"192.168.255.1\";\n    };\n  };\n  neighbors = [\n    {\n      config = {\n        neighbor-address = \"10.0.255.1\";\n        peer-as = 65001;\n      };\n    }\n    {\n      config = {\n        neighbor-address = \"10.0.255.2\";\n        peer-as = 65002;\n      };\n    }\n  ];\n}\n"}, "loc": ["services", "gobgpd", "settings"], "readOnly": false, "type": "TOML value"}, "services.gocd-agent.agentConfig": {"declarations": ["nixos/modules/services/continuous-integration/gocd-agent/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Agent registration configuration.\n"}, "example": {"_type": "literalExpression", "text": "''\n  agent.auto.register.resources=ant,java\n  agent.auto.register.environments=QA,Performance\n  agent.auto.register.hostname=Agent01\n''"}, "loc": ["services", "gocd-agent", "agentConfig"], "readOnly": false, "type": "string"}, "services.gocd-agent.enable": {"declarations": ["nixos/modules/services/continuous-integration/gocd-agent/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable gocd-agent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gocd-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.gocd-agent.environment": {"declarations": ["nixos/modules/services/continuous-integration/gocd-agent/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional environment variables to be passed to the Go.CD agent process.\nAs a base environment, Go.CD agent receives NIX_PATH from\n{option}`environment.sessionVariables`, NIX_REMOTE is set to\n\"daemon\".\n"}, "loc": ["services", "gocd-agent", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.gocd-agent.extraGroups": {"declarations": ["nixos/modules/services/continuous-integration/gocd-agent/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of extra groups that the \"gocd-agent\" user should be a part of.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"wheel\"\n  \"docker\"\n]"}, "loc": ["services", "gocd-agent", "extraGroups"], "readOnly": false, "type": "list of string"}, "services.gocd-agent.extraOptions": {"declarations": ["nixos/modules/services/continuous-integration/gocd-agent/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Specifies additional command line arguments to pass to Go.CD agent\njava process.  Example contains debug and gcLog arguments.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-X debug\"\n  \"-Xrunjdwp:transport=dt_socket,server=y,suspend=n,address=5006\"\n  \"-verbose:gc\"\n  \"-Xloggc:go-agent-gc.log\"\n  \"-XX:+PrintGCTimeStamps\"\n  \"-XX:+PrintTenuringDistribution\"\n  \"-XX:+PrintGCDetails\"\n  \"-XX:+PrintGC\"\n]"}, "loc": ["services", "gocd-agent", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.gocd-agent.goServer": {"declarations": ["nixos/modules/services/continuous-integration/gocd-agent/default.nix"], "default": {"_type": "literalExpression", "text": "\"https://127.0.0.1:8154/go\""}, "description": {"_type": "mdDoc", "text": "URL of the GoCD Server to attach the Go.CD Agent to.\n"}, "loc": ["services", "gocd-agent", "goServer"], "readOnly": false, "type": "string"}, "services.gocd-agent.group": {"declarations": ["nixos/modules/services/continuous-integration/gocd-agent/default.nix"], "default": {"_type": "literalExpression", "text": "\"gocd-agent\""}, "description": {"_type": "mdDoc", "text": "If the default user \"gocd-agent\" is configured then this is the primary\ngroup of that user.\n"}, "loc": ["services", "gocd-agent", "group"], "readOnly": false, "type": "string"}, "services.gocd-agent.initialJavaHeapSize": {"declarations": ["nixos/modules/services/continuous-integration/gocd-agent/default.nix"], "default": {"_type": "literalExpression", "text": "\"128m\""}, "description": {"_type": "mdDoc", "text": "Specifies the initial java heap memory size for the Go.CD agent java process.\n"}, "loc": ["services", "gocd-agent", "initialJavaHeapSize"], "readOnly": false, "type": "string"}, "services.gocd-agent.maxJavaHeapMemory": {"declarations": ["nixos/modules/services/continuous-integration/gocd-agent/default.nix"], "default": {"_type": "literalExpression", "text": "\"256m\""}, "description": {"_type": "mdDoc", "text": "Specifies the java maximum heap memory size for the Go.CD agent java process.\n"}, "loc": ["services", "gocd-agent", "maxJavaHeapMemory"], "readOnly": false, "type": "string"}, "services.gocd-agent.packages": {"declarations": ["nixos/modules/services/continuous-integration/gocd-agent/default.nix"], "default": {"_type": "literalExpression", "text": "[ pkgs.stdenv pkgs.jre pkgs.git config.programs.ssh.package pkgs.nix ]"}, "description": {"_type": "mdDoc", "text": "Packages to add to PATH for the Go.CD agent process.\n"}, "loc": ["services", "gocd-agent", "packages"], "readOnly": false, "type": "list of package"}, "services.gocd-agent.startupOptions": {"declarations": ["nixos/modules/services/continuous-integration/gocd-agent/default.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"-Xms${config.services.gocd-agent.initialJavaHeapSize}\"\n  \"-Xmx${config.services.gocd-agent.maxJavaHeapMemory}\"\n  \"-Djava.io.tmpdir=/tmp\"\n  \"-Dcruise.console.publish.interval=10\"\n  \"-Djava.security.egd=file:/dev/./urandom\"\n]\n"}, "description": {"_type": "mdDoc", "text": "Specifies startup command line arguments to pass to Go.CD agent\njava process.\n"}, "loc": ["services", "gocd-agent", "startupOptions"], "readOnly": false, "type": "list of string"}, "services.gocd-agent.user": {"declarations": ["nixos/modules/services/continuous-integration/gocd-agent/default.nix"], "default": {"_type": "literalExpression", "text": "\"gocd-agent\""}, "description": {"_type": "mdDoc", "text": "User the Go.CD agent should execute under.\n"}, "loc": ["services", "gocd-agent", "user"], "readOnly": false, "type": "string"}, "services.gocd-agent.workDir": {"declarations": ["nixos/modules/services/continuous-integration/gocd-agent/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/go-agent\""}, "description": {"_type": "mdDoc", "text": "Specifies the working directory in which the Go.CD agent java archive resides.\n"}, "loc": ["services", "gocd-agent", "workDir"], "readOnly": false, "type": "string"}, "services.gocd-server.enable": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable gocd-server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gocd-server", "enable"], "readOnly": false, "type": "boolean"}, "services.gocd-server.environment": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional environment variables to be passed to the gocd-server process.\nAs a base environment, gocd-server receives NIX_PATH from\n{option}`environment.sessionVariables`, NIX_REMOTE is set to\n\"daemon\".\n"}, "loc": ["services", "gocd-server", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.gocd-server.extraGroups": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of extra groups that the \"gocd-server\" user should be a part of.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"wheel\"\n  \"docker\"\n]"}, "loc": ["services", "gocd-server", "extraGroups"], "readOnly": false, "type": "list of string"}, "services.gocd-server.extraOptions": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Specifies additional command line arguments to pass to Go.CD server's\njava process.  Example contains debug and gcLog arguments.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-X debug\"\n  \"-Xrunjdwp:transport=dt_socket,server=y,suspend=n,address=5005\"\n  \"-verbose:gc\"\n  \"-Xloggc:go-server-gc.log\"\n  \"-XX:+PrintGCTimeStamps\"\n  \"-XX:+PrintTenuringDistribution\"\n  \"-XX:+PrintGCDetails\"\n  \"-XX:+PrintGC\"\n]"}, "loc": ["services", "gocd-server", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.gocd-server.group": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "\"gocd-server\""}, "description": {"_type": "mdDoc", "text": "If the default user \"gocd-server\" is configured then this is the primary group of that user.\n"}, "loc": ["services", "gocd-server", "group"], "readOnly": false, "type": "string"}, "services.gocd-server.initialJavaHeapSize": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "\"512m\""}, "description": {"_type": "mdDoc", "text": "Specifies the initial java heap memory size for the Go.CD server's java process.\n"}, "loc": ["services", "gocd-server", "initialJavaHeapSize"], "readOnly": false, "type": "string"}, "services.gocd-server.listenAddress": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Specifies the bind address on which the Go.CD server HTTP interface listens.\n"}, "example": {"_type": "literalExpression", "text": "\"localhost\""}, "loc": ["services", "gocd-server", "listenAddress"], "readOnly": false, "type": "string"}, "services.gocd-server.maxJavaHeapMemory": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "\"1024m\""}, "description": {"_type": "mdDoc", "text": "Specifies the java maximum heap memory size for the Go.CD server's java process.\n"}, "loc": ["services", "gocd-server", "maxJavaHeapMemory"], "readOnly": false, "type": "string"}, "services.gocd-server.packages": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "[ pkgs.stdenv pkgs.jre pkgs.git config.programs.ssh.package pkgs.nix ]"}, "description": {"_type": "mdDoc", "text": "Packages to add to PATH for the Go.CD server's process.\n"}, "loc": ["services", "gocd-server", "packages"], "readOnly": false, "type": "list of package"}, "services.gocd-server.port": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "8153"}, "description": {"_type": "mdDoc", "text": "Specifies port number on which the Go.CD server HTTP interface listens.\n"}, "loc": ["services", "gocd-server", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gocd-server.sslPort": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "8154"}, "description": {"_type": "mdDoc", "text": "Specifies port number on which the Go.CD server HTTPS interface listens.\n"}, "loc": ["services", "gocd-server", "sslPort"], "readOnly": false, "type": "signed integer"}, "services.gocd-server.startupOptions": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"-Xms${config.services.gocd-server.initialJavaHeapSize}\"\n  \"-Xmx${config.services.gocd-server.maxJavaHeapMemory}\"\n  \"-Dcruise.listen.host=${config.services.gocd-server.listenAddress}\"\n  \"-Duser.language=en\"\n  \"-Djruby.rack.request.size.threshold.bytes=30000000\"\n  \"-Duser.country=US\"\n  \"-Dcruise.config.dir=${config.services.gocd-server.workDir}/conf\"\n  \"-Dcruise.config.file=${config.services.gocd-server.workDir}/conf/cruise-config.xml\"\n  \"-Dcruise.server.port=${toString config.services.gocd-server.port}\"\n  \"-Dcruise.server.ssl.port=${toString config.services.gocd-server.sslPort}\"\n  \"--add-opens=java.base/java.lang=ALL-UNNAMED\"\n  \"--add-opens=java.base/java.util=ALL-UNNAMED\"\n]\n"}, "description": {"_type": "mdDoc", "text": "Specifies startup command line arguments to pass to Go.CD server\njava process.\n"}, "loc": ["services", "gocd-server", "startupOptions"], "readOnly": false, "type": "list of string"}, "services.gocd-server.user": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "\"gocd-server\""}, "description": {"_type": "mdDoc", "text": "User the Go.CD server should execute under.\n"}, "loc": ["services", "gocd-server", "user"], "readOnly": false, "type": "string"}, "services.gocd-server.workDir": {"declarations": ["nixos/modules/services/continuous-integration/gocd-server/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/go-server\""}, "description": {"_type": "mdDoc", "text": "Specifies the working directory in which the Go.CD server java archive resides.\n"}, "loc": ["services", "gocd-server", "workDir"], "readOnly": false, "type": "string"}, "services.goeland.enable": {"declarations": ["nixos/modules/services/mail/goeland.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable goeland."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "goeland", "enable"], "readOnly": false, "type": "boolean"}, "services.goeland.schedule": {"declarations": ["nixos/modules/services/mail/goeland.nix"], "default": {"_type": "literalExpression", "text": "\"12h\""}, "description": {"_type": "mdDoc", "text": "How often to run goeland, in systemd time format."}, "example": {"_type": "literalExpression", "text": "\"Mon, 00:00:00\""}, "loc": ["services", "goeland", "schedule"], "readOnly": false, "type": "string"}, "services.goeland.settings": {"declarations": ["nixos/modules/services/mail/goeland.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration of goeland.\nSee the [example config file](https://github.com/slurdge/goeland/blob/master/cmd/asset/config.default.toml) for the available options.\n"}, "loc": ["services", "goeland", "settings"], "readOnly": false, "type": "TOML value"}, "services.goeland.stateDir": {"declarations": ["nixos/modules/services/mail/goeland.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/goeland\""}, "description": {"_type": "mdDoc", "text": "The data directory for goeland where the database will reside if using the unseen filter.\nIf left as the default value this directory will automatically be created before the goeland\nserver starts, otherwise you are responsible for ensuring the directory exists with\nappropriate ownership and permissions.\n"}, "loc": ["services", "goeland", "stateDir"], "readOnly": false, "type": "path"}, "services.gogs.appName": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"Gogs: Go Git Service\""}, "description": {"_type": "mdDoc", "text": "Application name."}, "loc": ["services", "gogs", "appName"], "readOnly": false, "type": "string"}, "services.gogs.cookieSecure": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Marks session cookies as \"secure\" as a hint for browsers to only send\nthem via HTTPS. This option is recommend, if Gogs is being served over HTTPS.\n"}, "loc": ["services", "gogs", "cookieSecure"], "readOnly": false, "type": "boolean"}, "services.gogs.database.host": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "gogs", "database", "host"], "readOnly": false, "type": "string"}, "services.gogs.database.name": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"gogs\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "gogs", "database", "name"], "readOnly": false, "type": "string"}, "services.gogs.database.password": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The password corresponding to {option}`database.user`.\nWarning: this is stored in cleartext in the Nix store!\nUse {option}`database.passwordFile` instead.\n"}, "loc": ["services", "gogs", "database", "password"], "readOnly": false, "type": "string"}, "services.gogs.database.passwordFile": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/gogs-dbpassword\""}, "loc": ["services", "gogs", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.gogs.database.path": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.gogs.stateDir}/data/gogs.db\""}, "description": {"_type": "mdDoc", "text": "Path to the sqlite3 database file."}, "loc": ["services", "gogs", "database", "path"], "readOnly": false, "type": "string"}, "services.gogs.database.port": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "3306"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "gogs", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gogs.database.type": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite3\""}, "description": {"_type": "mdDoc", "text": "Database engine to use."}, "example": {"_type": "literalExpression", "text": "\"mysql\""}, "loc": ["services", "gogs", "database", "type"], "readOnly": false, "type": "one of \"sqlite3\", \"mysql\", \"postgres\""}, "services.gogs.database.user": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"gogs\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "gogs", "database", "user"], "readOnly": false, "type": "string"}, "services.gogs.domain": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Domain name of your server."}, "loc": ["services", "gogs", "domain"], "readOnly": false, "type": "string"}, "services.gogs.enable": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Go Git Service."}, "loc": ["services", "gogs", "enable"], "readOnly": false, "type": "boolean"}, "services.gogs.extraConfig": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration lines appended to the generated Gogs configuration file."}, "loc": ["services", "gogs", "extraConfig"], "readOnly": false, "type": "string"}, "services.gogs.group": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"gogs\""}, "description": {"_type": "mdDoc", "text": "Group account under which Gogs runs."}, "loc": ["services", "gogs", "group"], "readOnly": false, "type": "string"}, "services.gogs.httpAddress": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "HTTP listen address."}, "loc": ["services", "gogs", "httpAddress"], "readOnly": false, "type": "string"}, "services.gogs.httpPort": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "HTTP listen port."}, "loc": ["services", "gogs", "httpPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gogs.repositoryRoot": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.gogs.stateDir}/repositories\""}, "description": {"_type": "mdDoc", "text": "Path to the git repositories."}, "loc": ["services", "gogs", "repositoryRoot"], "readOnly": false, "type": "string"}, "services.gogs.rootUrl": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:3000/\""}, "description": {"_type": "mdDoc", "text": "Full public URL of Gogs server."}, "loc": ["services", "gogs", "rootUrl"], "readOnly": false, "type": "string"}, "services.gogs.stateDir": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/gogs\""}, "description": {"_type": "mdDoc", "text": "Gogs data directory."}, "loc": ["services", "gogs", "stateDir"], "readOnly": false, "type": "string"}, "services.gogs.useWizard": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Do not generate a configuration and use Gogs' installation wizard instead. The first registered user will be administrator."}, "loc": ["services", "gogs", "useWizard"], "readOnly": false, "type": "boolean"}, "services.gogs.user": {"declarations": ["nixos/modules/services/misc/gogs.nix"], "default": {"_type": "literalExpression", "text": "\"gogs\""}, "description": {"_type": "mdDoc", "text": "User account under which Gogs runs."}, "loc": ["services", "gogs", "user"], "readOnly": false, "type": "string"}, "services.gollum.address": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IP address on which the web server will listen."}, "loc": ["services", "gollum", "address"], "readOnly": false, "type": "string"}, "services.gollum.allowUploads": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Enable uploads of external files"}, "loc": ["services", "gollum", "allowUploads"], "readOnly": false, "type": "null or one of \"dir\", \"page\""}, "services.gollum.branch": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "\"master\""}, "description": {"_type": "mdDoc", "text": "Git branch to serve"}, "example": {"_type": "literalExpression", "text": "\"develop\""}, "loc": ["services", "gollum", "branch"], "readOnly": false, "type": "string"}, "services.gollum.emoji": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Parse and interpret emoji tags"}, "loc": ["services", "gollum", "emoji"], "readOnly": false, "type": "boolean"}, "services.gollum.enable": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Gollum service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gollum", "enable"], "readOnly": false, "type": "boolean"}, "services.gollum.extraConfig": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Content of the configuration file"}, "loc": ["services", "gollum", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.gollum.group": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "\"gollum\""}, "description": {"_type": "mdDoc", "text": "Specifies the owner group of the wiki directory"}, "loc": ["services", "gollum", "group"], "readOnly": false, "type": "string"}, "services.gollum.h1-title": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use the first h1 as page title"}, "loc": ["services", "gollum", "h1-title"], "readOnly": false, "type": "boolean"}, "services.gollum.local-time": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use the browser's local timezone instead of the server's for displaying dates."}, "loc": ["services", "gollum", "local-time"], "readOnly": false, "type": "boolean"}, "services.gollum.mathjax": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable support for math rendering using MathJax"}, "loc": ["services", "gollum", "mathjax"], "readOnly": false, "type": "boolean"}, "services.gollum.no-edit": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable editing pages"}, "loc": ["services", "gollum", "no-edit"], "readOnly": false, "type": "boolean"}, "services.gollum.package": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gollum"}, "description": {"_type": "mdDoc", "text": "The package used in the service\n"}, "loc": ["services", "gollum", "package"], "readOnly": false, "type": "package"}, "services.gollum.port": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "4567"}, "description": {"_type": "mdDoc", "text": "Port on which the web server will run."}, "loc": ["services", "gollum", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gollum.stateDir": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/gollum\""}, "description": {"_type": "mdDoc", "text": "Specifies the path of the repository directory. If it does not exist, Gollum will create it on startup."}, "loc": ["services", "gollum", "stateDir"], "readOnly": false, "type": "path"}, "services.gollum.user": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "\"gollum\""}, "description": {"_type": "mdDoc", "text": "Specifies the owner of the wiki directory"}, "loc": ["services", "gollum", "user"], "readOnly": false, "type": "string"}, "services.gollum.user-icons": {"declarations": ["nixos/modules/services/misc/gollum.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Enable specific user icons for history view"}, "loc": ["services", "gollum", "user-icons"], "readOnly": false, "type": "null or one of \"gravatar\", \"identicon\""}, "services.gonic.enable": {"declarations": ["nixos/modules/services/audio/gonic.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Gonic music server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gonic", "enable"], "readOnly": false, "type": "boolean"}, "services.gonic.settings": {"declarations": ["nixos/modules/services/audio/gonic.nix"], "default": {"_type": "literalExpression", "text": "{\n  cache-path = \"/var/cache/gonic\";\n  listen-addr = \"127.0.0.1:4747\";\n  tls-cert = null;\n  tls-key = null;\n}"}, "description": {"_type": "mdDoc", "text": "Configuration for Gonic, see <https://github.com/sentriz/gonic#configuration-options> for supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  music-path = [\n    \"/mnt/music\"\n  ];\n  podcast-path = \"/mnt/podcasts\";\n}"}, "loc": ["services", "gonic", "settings"], "readOnly": false, "type": "attribute set of (atom (null, bool, int, float or string) or a list of them for duplicate keys)"}, "services.gotify.enable": {"declarations": ["nixos/modules/services/web-apps/gotify-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Gotify webserver."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gotify", "enable"], "readOnly": false, "type": "boolean"}, "services.gotify.port": {"declarations": ["nixos/modules/services/web-apps/gotify-server.nix"], "description": {"_type": "mdDoc", "text": "Port the server listens to.\n"}, "loc": ["services", "gotify", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gotify.stateDirectoryName": {"declarations": ["nixos/modules/services/web-apps/gotify-server.nix"], "default": {"_type": "literalExpression", "text": "\"gotify-server\""}, "description": {"_type": "mdDoc", "text": "The name of the directory below {file}`/var/lib` where\ngotify stores its runtime data.\n"}, "loc": ["services", "gotify", "stateDirectoryName"], "readOnly": false, "type": "string"}, "services.gpm.enable": {"declarations": ["nixos/modules/services/ttys/gpm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GPM, the General Purpose Mouse daemon,\nwhich enables mouse support in virtual consoles.\n"}, "loc": ["services", "gpm", "enable"], "readOnly": false, "type": "boolean"}, "services.gpm.protocol": {"declarations": ["nixos/modules/services/ttys/gpm.nix"], "default": {"_type": "literalExpression", "text": "\"ps/2\""}, "description": {"_type": "mdDoc", "text": "Mouse protocol to use."}, "loc": ["services", "gpm", "protocol"], "readOnly": false, "type": "string"}, "services.gpsd.debugLevel": {"declarations": ["nixos/modules/services/misc/gpsd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "The debugging level.\n"}, "loc": ["services", "gpsd", "debugLevel"], "readOnly": false, "type": "signed integer"}, "services.gpsd.devices": {"declarations": ["nixos/modules/services/misc/gpsd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"/dev/ttyUSB0\"\n]"}, "description": {"_type": "mdDoc", "text": "List of devices that `gpsd` should subscribe to.\n\nA device may be a local serial device for GPS input, or a\nURL of the form:\n`[{dgpsip|ntrip}://][user:passwd@]host[:port][/stream]` in\nwhich case it specifies an input source for DGPS or ntrip\ndata.\n"}, "loc": ["services", "gpsd", "devices"], "readOnly": false, "type": "list of string"}, "services.gpsd.enable": {"declarations": ["nixos/modules/services/misc/gpsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable `gpsd`, a GPS service daemon.\n"}, "loc": ["services", "gpsd", "enable"], "readOnly": false, "type": "boolean"}, "services.gpsd.listenany": {"declarations": ["nixos/modules/services/misc/gpsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Listen on all addresses rather than just loopback.\n"}, "loc": ["services", "gpsd", "listenany"], "readOnly": false, "type": "boolean"}, "services.gpsd.nowait": {"declarations": ["nixos/modules/services/misc/gpsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "don't wait for client connects to poll GPS\n"}, "loc": ["services", "gpsd", "nowait"], "readOnly": false, "type": "boolean"}, "services.gpsd.port": {"declarations": ["nixos/modules/services/misc/gpsd.nix"], "default": {"_type": "literalExpression", "text": "2947"}, "description": {"_type": "mdDoc", "text": "The port where to listen for TCP connections.\n"}, "loc": ["services", "gpsd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.gpsd.readonly": {"declarations": ["nixos/modules/services/misc/gpsd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the broken-device-safety, otherwise\nknown as read-only mode.  Some popular bluetooth and USB\nreceivers lock up or become totally inaccessible when\nprobed or reconfigured.  This switch prevents gpsd from\nwriting to a receiver.  This means that gpsd cannot\nconfigure the receiver for optimal performance, but it\nalso means that gpsd cannot break the receiver.  A better\nsolution would be for Bluetooth to not be so fragile.  A\nplatform independent method to identify\nserial-over-Bluetooth devices would also be nice.\n"}, "loc": ["services", "gpsd", "readonly"], "readOnly": false, "type": "boolean"}, "services.grafana-agent.credentials": {"declarations": ["nixos/modules/services/monitoring/grafana-agent.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Credentials to load at service startup. Keys that are UPPER_SNAKE will be loaded as env vars. Values are absolute paths to the credentials.\n"}, "example": {"_type": "literalExpression", "text": "{\n  LOGS_REMOTE_WRITE_URL = \"/run/keys/grafana_agent_logs_remote_write_url\";\n  LOGS_REMOTE_WRITE_USERNAME = \"/run/keys/grafana_agent_logs_remote_write_username\";\n  METRICS_REMOTE_WRITE_URL = \"/run/keys/grafana_agent_metrics_remote_write_url\";\n  METRICS_REMOTE_WRITE_USERNAME = \"/run/keys/grafana_agent_metrics_remote_write_username\";\n  logs_remote_write_password = \"/run/keys/grafana_agent_logs_remote_write_password\";\n  metrics_remote_write_password = \"/run/keys/grafana_agent_metrics_remote_write_password\";\n}"}, "loc": ["services", "grafana-agent", "credentials"], "readOnly": false, "type": "attribute set of string"}, "services.grafana-agent.enable": {"declarations": ["nixos/modules/services/monitoring/grafana-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable grafana-agent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "grafana-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.grafana-agent.extraFlags": {"declarations": ["nixos/modules/services/monitoring/grafana-agent.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command-line flags passed to {command}`grafana-agent`.\n\nSee <https://grafana.com/docs/agent/latest/static/configuration/flags/>\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-enable-features=integrations-next\"\n  \"-disable-reporting\"\n]"}, "loc": ["services", "grafana-agent", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.grafana-agent.package": {"declarations": ["nixos/modules/services/monitoring/grafana-agent.nix"], "default": {"_type": "literalExpression", "text": "pkgs.grafana-agent"}, "description": {"_type": "mdDoc", "text": "The grafana-agent package to use."}, "loc": ["services", "grafana-agent", "package"], "readOnly": false, "type": "package"}, "services.grafana-agent.settings": {"declarations": ["nixos/modules/services/monitoring/grafana-agent.nix"], "default": {"_type": "literalExpression", "text": "{\n  metrics = {\n    wal_directory = \"\\${STATE_DIRECTORY}\";\n    global.scrape_interval = \"5s\";\n  };\n  integrations = {\n    agent.enabled = true;\n    agent.scrape_integration = true;\n    node_exporter.enabled = true;\n  };\n}\n"}, "description": {"_type": "mdDoc", "text": "Configuration for {command}`grafana-agent`.\n\nSee <https://grafana.com/docs/agent/latest/configuration/>\n"}, "example": {"_type": "literalExpression", "text": "{\n  logs = {\n    configs = [\n      {\n        clients = [\n          {\n            basic_auth = {\n              password_file = \"\\${CREDENTIALS_DIRECTORY}/logs_remote_write_password\";\n              username = \"\\${LOGS_REMOTE_WRITE_USERNAME}\";\n            };\n            url = \"\\${LOGS_REMOTE_WRITE_URL}\";\n          }\n        ];\n        name = \"default\";\n        positions = {\n          filename = \"\\${STATE_DIRECTORY}/loki_positions.yaml\";\n        };\n        scrape_configs = [\n          {\n            job_name = \"journal\";\n            journal = {\n              labels = {\n                job = \"systemd-journal\";\n              };\n              max_age = \"12h\";\n            };\n            relabel_configs = [\n              {\n                source_labels = [\n                  \"__journal__systemd_unit\"\n                ];\n                target_label = \"systemd_unit\";\n              }\n              {\n                source_labels = [\n                  \"__journal__hostname\"\n                ];\n                target_label = \"nodename\";\n              }\n              {\n                source_labels = [\n                  \"__journal_syslog_identifier\"\n                ];\n                target_label = \"syslog_identifier\";\n              }\n            ];\n          }\n        ];\n      }\n    ];\n  };\n  metrics = {\n    global = {\n      remote_write = [\n        {\n          basic_auth = {\n            password_file = \"\\${CREDENTIALS_DIRECTORY}/metrics_remote_write_password\";\n            username = \"\\${METRICS_REMOTE_WRITE_USERNAME}\";\n          };\n          url = \"\\${METRICS_REMOTE_WRITE_URL}\";\n        }\n      ];\n    };\n  };\n}"}, "loc": ["services", "grafana-agent", "settings"], "readOnly": false, "type": "YAML value"}, "services.grafana-image-renderer.chromium": {"declarations": ["nixos/modules/services/monitoring/grafana-image-renderer.nix"], "description": {"_type": "mdDoc", "text": "The chromium to use for image rendering.\n"}, "loc": ["services", "grafana-image-renderer", "chromium"], "readOnly": false, "type": "package"}, "services.grafana-image-renderer.enable": {"declarations": ["nixos/modules/services/monitoring/grafana-image-renderer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable grafana-image-renderer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "grafana-image-renderer", "enable"], "readOnly": false, "type": "boolean"}, "services.grafana-image-renderer.provisionGrafana": {"declarations": ["nixos/modules/services/monitoring/grafana-image-renderer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Grafana configuration for grafana-image-renderer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "grafana-image-renderer", "provisionGrafana"], "readOnly": false, "type": "boolean"}, "services.grafana-image-renderer.settings": {"declarations": ["nixos/modules/services/monitoring/grafana-image-renderer.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration attributes for `grafana-image-renderer`.\n\nSee <https://github.com/grafana/grafana-image-renderer/blob/ce1f81438e5f69c7fd7c73ce08bab624c4c92e25/default.json>\nfor supported values.\n"}, "loc": ["services", "grafana-image-renderer", "settings"], "readOnly": false, "type": "JSON value"}, "services.grafana-image-renderer.settings.rendering.args": {"declarations": ["nixos/modules/services/monitoring/grafana-image-renderer.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"--no-sandbox\"\n]"}, "description": {"_type": "mdDoc", "text": "List of CLI flags passed to `chromium`.\n"}, "loc": ["services", "grafana-image-renderer", "settings", "rendering", "args"], "readOnly": false, "type": "list of string"}, "services.grafana-image-renderer.settings.rendering.height": {"declarations": ["nixos/modules/services/monitoring/grafana-image-renderer.nix"], "default": {"_type": "literalExpression", "text": "500"}, "description": {"_type": "mdDoc", "text": "Height of the PNG used to display the alerting graph.\n"}, "loc": ["services", "grafana-image-renderer", "settings", "rendering", "height"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.grafana-image-renderer.settings.rendering.mode": {"declarations": ["nixos/modules/services/monitoring/grafana-image-renderer.nix"], "default": {"_type": "literalExpression", "text": "\"default\""}, "description": {"_type": "mdDoc", "text": "Rendering mode of `grafana-image-renderer`:\n\n- `default:` Creates on browser-instance\n  per rendering request.\n- `reusable:` One browser instance\n  will be started and reused for each rendering request.\n- `clustered:` allows to precisely\n  configure how many browser-instances are supposed to be used. The values\n  for that mode can be declared in `rendering.clustering`.\n"}, "loc": ["services", "grafana-image-renderer", "settings", "rendering", "mode"], "readOnly": false, "type": "one of \"default\", \"reusable\", \"clustered\""}, "services.grafana-image-renderer.settings.rendering.width": {"declarations": ["nixos/modules/services/monitoring/grafana-image-renderer.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Width of the PNG used to display the alerting graph.\n"}, "loc": ["services", "grafana-image-renderer", "settings", "rendering", "width"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.grafana-image-renderer.settings.service.logging.level": {"declarations": ["nixos/modules/services/monitoring/grafana-image-renderer.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "The log-level of the {file}`grafana-image-renderer.service`-unit.\n"}, "loc": ["services", "grafana-image-renderer", "settings", "service", "logging", "level"], "readOnly": false, "type": "one of \"error\", \"warning\", \"info\", \"debug\""}, "services.grafana-image-renderer.settings.service.port": {"declarations": ["nixos/modules/services/monitoring/grafana-image-renderer.nix"], "default": {"_type": "literalExpression", "text": "8081"}, "description": {"_type": "mdDoc", "text": "The TCP port to use for the rendering server.\n"}, "loc": ["services", "grafana-image-renderer", "settings", "service", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.grafana-image-renderer.verbose": {"declarations": ["nixos/modules/services/monitoring/grafana-image-renderer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable verbosity for the service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "grafana-image-renderer", "verbose"], "readOnly": false, "type": "boolean"}, "services.grafana.dataDir": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/grafana\""}, "description": {"_type": "mdDoc", "text": "Data directory."}, "loc": ["services", "grafana", "dataDir"], "readOnly": false, "type": "path"}, "services.grafana.declarativePlugins": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If non-null, then a list of packages containing Grafana plugins to install. If set, plugins cannot be manually installed."}, "example": {"_type": "literalExpression", "text": "with pkgs.grafanaPlugins; [ grafana-piechart-panel ]"}, "loc": ["services", "grafana", "declarativePlugins"], "readOnly": false, "type": "null or (list of path)"}, "services.grafana.enable": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable grafana."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "grafana", "enable"], "readOnly": false, "type": "boolean"}, "services.grafana.package": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "pkgs.grafana"}, "description": {"_type": "mdDoc", "text": "Package to use."}, "loc": ["services", "grafana", "package"], "readOnly": false, "type": "package"}, "services.grafana.provision.alerting.contactPoints.path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to YAML contact points configuration. Can't be used with\n[](#opt-services.grafana.provision.alerting.contactPoints.settings) simultaneously.\nCan be either a directory or a single YAML file. Will end up in the store.\n"}, "loc": ["services", "grafana", "provision", "alerting", "contactPoints", "path"], "readOnly": false, "type": "null or path"}, "services.grafana.provision.alerting.contactPoints.settings": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Grafana contact points configuration in Nix. Can't be used with\n[](#opt-services.grafana.provision.alerting.contactPoints.path) simultaneously. See\n<https://grafana.com/docs/grafana/latest/administration/provisioning/#contact-points>\nfor supported options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  apiVersion = 1;\n\n  contactPoints = [{\n    orgId = 1;\n    name = \"cp_1\";\n    receivers = [{\n      uid = \"first_uid\";\n      type = \"prometheus-alertmanager\";\n      settings.url = \"http://test:9000\";\n    }];\n  }];\n\n  deleteContactPoints = [{\n    orgId = 1;\n    uid = \"first_uid\";\n  }];\n}\n"}, "loc": ["services", "grafana", "provision", "alerting", "contactPoints", "settings"], "readOnly": false, "type": "null or (submodule)"}, "services.grafana.provision.alerting.contactPoints.settings.apiVersion": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Config file version."}, "loc": ["services", "grafana", "provision", "alerting", "contactPoints", "settings", "apiVersion"], "readOnly": false, "type": "signed integer"}, "services.grafana.provision.alerting.contactPoints.settings.contactPoints": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of contact points to import or update."}, "loc": ["services", "grafana", "provision", "alerting", "contactPoints", "settings", "contactPoints"], "readOnly": false, "type": "list of (YAML value)"}, "services.grafana.provision.alerting.contactPoints.settings.contactPoints.*.name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Name of the contact point. Required."}, "loc": ["services", "grafana", "provision", "alerting", "contactPoints", "settings", "contactPoints", "*", "name"], "readOnly": false, "type": "string"}, "services.grafana.provision.alerting.contactPoints.settings.deleteContactPoints": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of receivers that should be deleted."}, "loc": ["services", "grafana", "provision", "alerting", "contactPoints", "settings", "deleteContactPoints"], "readOnly": false, "type": "list of (submodule)"}, "services.grafana.provision.alerting.contactPoints.settings.deleteContactPoints.*.orgId": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Organization ID, default = 1."}, "loc": ["services", "grafana", "provision", "alerting", "contactPoints", "settings", "deleteContactPoints", "*", "orgId"], "readOnly": false, "type": "signed integer"}, "services.grafana.provision.alerting.contactPoints.settings.deleteContactPoints.*.uid": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Unique identifier for the receiver. Required."}, "loc": ["services", "grafana", "provision", "alerting", "contactPoints", "settings", "deleteContactPoints", "*", "uid"], "readOnly": false, "type": "string"}, "services.grafana.provision.alerting.muteTimings.path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to YAML mute timings configuration. Can't be used with\n[](#opt-services.grafana.provision.alerting.muteTimings.settings) simultaneously.\nCan be either a directory or a single YAML file. Will end up in the store.\n"}, "loc": ["services", "grafana", "provision", "alerting", "muteTimings", "path"], "readOnly": false, "type": "null or path"}, "services.grafana.provision.alerting.muteTimings.settings": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Grafana mute timings configuration in Nix. Can't be used with\n[](#opt-services.grafana.provision.alerting.muteTimings.path) simultaneously. See\n<https://grafana.com/docs/grafana/latest/administration/provisioning/#mute-timings>\nfor supported options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  apiVersion = 1;\n\n  muteTimes = [{\n    orgId = 1;\n    name = \"mti_1\";\n    time_intervals = [{\n      times = [{\n        start_time = \"06:00\";\n        end_time = \"23:59\";\n      }];\n      weekdays = [\n        \"monday:wednesday\"\n        \"saturday\"\n        \"sunday\"\n      ];\n      months = [\n        \"1:3\"\n        \"may:august\"\n        \"december\"\n      ];\n      years = [\n        \"2020:2022\"\n        \"2030\"\n      ];\n      days_of_month = [\n        \"1:5\"\n        \"-3:-1\"\n      ];\n    }];\n  }];\n\n  deleteMuteTimes = [{\n    orgId = 1;\n    name = \"mti_1\";\n  }];\n}\n"}, "loc": ["services", "grafana", "provision", "alerting", "muteTimings", "settings"], "readOnly": false, "type": "null or (submodule)"}, "services.grafana.provision.alerting.muteTimings.settings.apiVersion": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Config file version."}, "loc": ["services", "grafana", "provision", "alerting", "muteTimings", "settings", "apiVersion"], "readOnly": false, "type": "signed integer"}, "services.grafana.provision.alerting.muteTimings.settings.deleteMuteTimes": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of mute time intervals that should be deleted."}, "loc": ["services", "grafana", "provision", "alerting", "muteTimings", "settings", "deleteMuteTimes"], "readOnly": false, "type": "list of (submodule)"}, "services.grafana.provision.alerting.muteTimings.settings.deleteMuteTimes.*.name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Name of the mute time interval, must be unique. Required."}, "loc": ["services", "grafana", "provision", "alerting", "muteTimings", "settings", "deleteMuteTimes", "*", "name"], "readOnly": false, "type": "string"}, "services.grafana.provision.alerting.muteTimings.settings.deleteMuteTimes.*.orgId": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Organization ID, default = 1."}, "loc": ["services", "grafana", "provision", "alerting", "muteTimings", "settings", "deleteMuteTimes", "*", "orgId"], "readOnly": false, "type": "signed integer"}, "services.grafana.provision.alerting.muteTimings.settings.muteTimes": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of mute time intervals to import or update."}, "loc": ["services", "grafana", "provision", "alerting", "muteTimings", "settings", "muteTimes"], "readOnly": false, "type": "list of (YAML value)"}, "services.grafana.provision.alerting.muteTimings.settings.muteTimes.*.name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Name of the mute time interval, must be unique. Required."}, "loc": ["services", "grafana", "provision", "alerting", "muteTimings", "settings", "muteTimes", "*", "name"], "readOnly": false, "type": "string"}, "services.grafana.provision.alerting.policies.path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to YAML notification policies configuration. Can't be used with\n[](#opt-services.grafana.provision.alerting.policies.settings) simultaneously.\nCan be either a directory or a single YAML file. Will end up in the store.\n"}, "loc": ["services", "grafana", "provision", "alerting", "policies", "path"], "readOnly": false, "type": "null or path"}, "services.grafana.provision.alerting.policies.settings": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Grafana notification policies configuration in Nix. Can't be used with\n[](#opt-services.grafana.provision.alerting.policies.path) simultaneously. See\n<https://grafana.com/docs/grafana/latest/administration/provisioning/#notification-policies>\nfor supported options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  apiVersion = 1;\n\n  policies = [{\n    orgId = 1;\n    receiver = \"grafana-default-email\";\n    group_by = [ \"...\" ];\n    matchers = [\n      \"alertname = Watchdog\"\n      \"severity =~ \\\"warning|critical\\\"\"\n    ];\n    mute_time_intervals = [\n      \"abc\"\n    ];\n    group_wait = \"30s\";\n    group_interval = \"5m\";\n    repeat_interval = \"4h\";\n  }];\n\n  resetPolicies = [\n    1\n  ];\n}\n"}, "loc": ["services", "grafana", "provision", "alerting", "policies", "settings"], "readOnly": false, "type": "null or (submodule)"}, "services.grafana.provision.alerting.policies.settings.apiVersion": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Config file version."}, "loc": ["services", "grafana", "provision", "alerting", "policies", "settings", "apiVersion"], "readOnly": false, "type": "signed integer"}, "services.grafana.provision.alerting.policies.settings.policies": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of contact points to import or update."}, "loc": ["services", "grafana", "provision", "alerting", "policies", "settings", "policies"], "readOnly": false, "type": "list of (YAML value)"}, "services.grafana.provision.alerting.policies.settings.resetPolicies": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of orgIds that should be reset to the default policy."}, "loc": ["services", "grafana", "provision", "alerting", "policies", "settings", "resetPolicies"], "readOnly": false, "type": "list of signed integer"}, "services.grafana.provision.alerting.rules.path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to YAML rules configuration. Can't be used with\n[](#opt-services.grafana.provision.alerting.rules.settings) simultaneously.\nCan be either a directory or a single YAML file. Will end up in the store.\n"}, "loc": ["services", "grafana", "provision", "alerting", "rules", "path"], "readOnly": false, "type": "null or path"}, "services.grafana.provision.alerting.rules.settings": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Grafana rules configuration in Nix. Can't be used with\n[](#opt-services.grafana.provision.alerting.rules.path) simultaneously. See\n<https://grafana.com/docs/grafana/latest/administration/provisioning/#rules>\nfor supported options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  apiVersion = 1;\n\n  groups = [{\n    orgId = 1;\n    name = \"my_rule_group\";\n    folder = \"my_first_folder\";\n    interval = \"60s\";\n    rules = [{\n      uid = \"my_id_1\";\n      title = \"my_first_rule\";\n      condition = \"A\";\n      data = [{\n        refId = \"A\";\n        datasourceUid = \"-100\";\n        model = {\n          conditions = [{\n            evaluator = {\n              params = [ 3 ];\n              type = \"git\";\n            };\n            operator.type = \"and\";\n            query.params = [ \"A\" ];\n            reducer.type = \"last\";\n            type = \"query\";\n          }];\n          datasource = {\n            type = \"__expr__\";\n            uid = \"-100\";\n          };\n          expression = \"1==0\";\n          intervalMs = 1000;\n          maxDataPoints = 43200;\n          refId = \"A\";\n          type = \"math\";\n        };\n      }];\n      dashboardUid = \"my_dashboard\";\n      panelId = 123;\n      noDataState = \"Alerting\";\n      for = \"60s\";\n      annotations.some_key = \"some_value\";\n      labels.team = \"sre_team1\";\n    }];\n  }];\n\n  deleteRules = [{\n    orgId = 1;\n    uid = \"my_id_1\";\n  }];\n}\n"}, "loc": ["services", "grafana", "provision", "alerting", "rules", "settings"], "readOnly": false, "type": "null or (submodule)"}, "services.grafana.provision.alerting.rules.settings.apiVersion": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Config file version."}, "loc": ["services", "grafana", "provision", "alerting", "rules", "settings", "apiVersion"], "readOnly": false, "type": "signed integer"}, "services.grafana.provision.alerting.rules.settings.deleteRules": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of alert rule UIDs that should be deleted."}, "loc": ["services", "grafana", "provision", "alerting", "rules", "settings", "deleteRules"], "readOnly": false, "type": "list of (submodule)"}, "services.grafana.provision.alerting.rules.settings.deleteRules.*.orgId": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Organization ID, default = 1"}, "loc": ["services", "grafana", "provision", "alerting", "rules", "settings", "deleteRules", "*", "orgId"], "readOnly": false, "type": "signed integer"}, "services.grafana.provision.alerting.rules.settings.deleteRules.*.uid": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Unique identifier for the rule. Required."}, "loc": ["services", "grafana", "provision", "alerting", "rules", "settings", "deleteRules", "*", "uid"], "readOnly": false, "type": "string"}, "services.grafana.provision.alerting.rules.settings.groups": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of rule groups to import or update."}, "loc": ["services", "grafana", "provision", "alerting", "rules", "settings", "groups"], "readOnly": false, "type": "list of (YAML value)"}, "services.grafana.provision.alerting.rules.settings.groups.*.folder": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Name of the folder the rule group will be stored in. Required."}, "loc": ["services", "grafana", "provision", "alerting", "rules", "settings", "groups", "*", "folder"], "readOnly": false, "type": "string"}, "services.grafana.provision.alerting.rules.settings.groups.*.interval": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Interval that the rule group should be evaluated at. Required."}, "loc": ["services", "grafana", "provision", "alerting", "rules", "settings", "groups", "*", "interval"], "readOnly": false, "type": "string"}, "services.grafana.provision.alerting.rules.settings.groups.*.name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Name of the rule group. Required."}, "loc": ["services", "grafana", "provision", "alerting", "rules", "settings", "groups", "*", "name"], "readOnly": false, "type": "string"}, "services.grafana.provision.alerting.templates.path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to YAML templates configuration. Can't be used with\n[](#opt-services.grafana.provision.alerting.templates.settings) simultaneously.\nCan be either a directory or a single YAML file. Will end up in the store.\n"}, "loc": ["services", "grafana", "provision", "alerting", "templates", "path"], "readOnly": false, "type": "null or path"}, "services.grafana.provision.alerting.templates.settings": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Grafana templates configuration in Nix. Can't be used with\n[](#opt-services.grafana.provision.alerting.templates.path) simultaneously. See\n<https://grafana.com/docs/grafana/latest/administration/provisioning/#templates>\nfor supported options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  apiVersion = 1;\n\n  templates = [{\n    orgId = 1;\n    name = \"my_first_template\";\n    template = \"Alerting with a custom text template\";\n  }];\n\n  deleteTemplates = [{\n    orgId = 1;\n    name = \"my_first_template\";\n  }];\n}\n"}, "loc": ["services", "grafana", "provision", "alerting", "templates", "settings"], "readOnly": false, "type": "null or (submodule)"}, "services.grafana.provision.alerting.templates.settings.apiVersion": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Config file version."}, "loc": ["services", "grafana", "provision", "alerting", "templates", "settings", "apiVersion"], "readOnly": false, "type": "signed integer"}, "services.grafana.provision.alerting.templates.settings.deleteTemplates": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of alert rule UIDs that should be deleted."}, "loc": ["services", "grafana", "provision", "alerting", "templates", "settings", "deleteTemplates"], "readOnly": false, "type": "list of (submodule)"}, "services.grafana.provision.alerting.templates.settings.deleteTemplates.*.name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Name of the template, must be unique. Required."}, "loc": ["services", "grafana", "provision", "alerting", "templates", "settings", "deleteTemplates", "*", "name"], "readOnly": false, "type": "string"}, "services.grafana.provision.alerting.templates.settings.deleteTemplates.*.orgId": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Organization ID, default = 1."}, "loc": ["services", "grafana", "provision", "alerting", "templates", "settings", "deleteTemplates", "*", "orgId"], "readOnly": false, "type": "signed integer"}, "services.grafana.provision.alerting.templates.settings.templates": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of templates to import or update."}, "loc": ["services", "grafana", "provision", "alerting", "templates", "settings", "templates"], "readOnly": false, "type": "list of (YAML value)"}, "services.grafana.provision.alerting.templates.settings.templates.*.name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Name of the template, must be unique. Required."}, "loc": ["services", "grafana", "provision", "alerting", "templates", "settings", "templates", "*", "name"], "readOnly": false, "type": "string"}, "services.grafana.provision.alerting.templates.settings.templates.*.template": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Alerting with a custom text template"}, "loc": ["services", "grafana", "provision", "alerting", "templates", "settings", "templates", "*", "template"], "readOnly": false, "type": "string"}, "services.grafana.provision.dashboards": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declaratively provision Grafana's dashboards.\n"}, "loc": ["services", "grafana", "provision", "dashboards"], "readOnly": false, "type": "(submodule) or (Wrapper-type for backwards compat of Grafana's declarative provisioning) convertible to it"}, "services.grafana.provision.dashboards.path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to YAML dashboard configuration. Can't be used with\n[](#opt-services.grafana.provision.dashboards.settings) simultaneously.\nCan be either a directory or a single YAML file. Will end up in the store.\n"}, "loc": ["services", "grafana", "provision", "dashboards", "path"], "readOnly": false, "type": "null or path"}, "services.grafana.provision.dashboards.settings": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Grafana dashboard configuration in Nix. Can't be used with\n[](#opt-services.grafana.provision.dashboards.path) simultaneously. See\n<https://grafana.com/docs/grafana/latest/administration/provisioning/#dashboards>\nfor supported options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  apiVersion = 1;\n\n  providers = [{\n      name = \"default\";\n      options.path = \"/var/lib/grafana/dashboards\";\n  }];\n}\n"}, "loc": ["services", "grafana", "provision", "dashboards", "settings"], "readOnly": false, "type": "null or (submodule)"}, "services.grafana.provision.dashboards.settings.apiVersion": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Config file version."}, "loc": ["services", "grafana", "provision", "dashboards", "settings", "apiVersion"], "readOnly": false, "type": "signed integer"}, "services.grafana.provision.dashboards.settings.providers": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of dashboards to insert/update."}, "loc": ["services", "grafana", "provision", "dashboards", "settings", "providers"], "readOnly": false, "type": "list of (YAML value)"}, "services.grafana.provision.dashboards.settings.providers.*.name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"default\""}, "description": {"_type": "mdDoc", "text": "A unique provider name."}, "loc": ["services", "grafana", "provision", "dashboards", "settings", "providers", "*", "name"], "readOnly": false, "type": "string"}, "services.grafana.provision.dashboards.settings.providers.*.options.path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Path grafana will watch for dashboards. Required when using the 'file' type."}, "loc": ["services", "grafana", "provision", "dashboards", "settings", "providers", "*", "options", "path"], "readOnly": false, "type": "path"}, "services.grafana.provision.dashboards.settings.providers.*.type": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"file\""}, "description": {"_type": "mdDoc", "text": "Dashboard provider type."}, "loc": ["services", "grafana", "provision", "dashboards", "settings", "providers", "*", "type"], "readOnly": false, "type": "string"}, "services.grafana.provision.datasources": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declaratively provision Grafana's datasources.\n"}, "loc": ["services", "grafana", "provision", "datasources"], "readOnly": false, "type": "(submodule) or (Wrapper-type for backwards compat of Grafana's declarative provisioning) convertible to it"}, "services.grafana.provision.datasources.path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to YAML datasource configuration. Can't be used with\n[](#opt-services.grafana.provision.datasources.settings) simultaneously.\nCan be either a directory or a single YAML file. Will end up in the store.\n"}, "loc": ["services", "grafana", "provision", "datasources", "path"], "readOnly": false, "type": "null or path"}, "services.grafana.provision.datasources.settings": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Grafana datasource configuration in Nix. Can't be used with\n[](#opt-services.grafana.provision.datasources.path) simultaneously. See\n<https://grafana.com/docs/grafana/latest/administration/provisioning/#data-sources>\nfor supported options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  apiVersion = 1;\n\n  datasources = [{\n    name = \"Graphite\";\n    type = \"graphite\";\n  }];\n\n  deleteDatasources = [{\n    name = \"Graphite\";\n    orgId = 1;\n  }];\n}\n"}, "loc": ["services", "grafana", "provision", "datasources", "settings"], "readOnly": false, "type": "null or (submodule)"}, "services.grafana.provision.datasources.settings.apiVersion": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Config file version."}, "loc": ["services", "grafana", "provision", "datasources", "settings", "apiVersion"], "readOnly": false, "type": "signed integer"}, "services.grafana.provision.datasources.settings.datasources": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of datasources to insert/update."}, "loc": ["services", "grafana", "provision", "datasources", "settings", "datasources"], "readOnly": false, "type": "list of (YAML value)"}, "services.grafana.provision.datasources.settings.datasources.*.access": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"proxy\""}, "description": {"_type": "mdDoc", "text": "Access mode. proxy or direct (Server or Browser in the UI). Required."}, "loc": ["services", "grafana", "provision", "datasources", "settings", "datasources", "*", "access"], "readOnly": false, "type": "one of \"proxy\", \"direct\""}, "services.grafana.provision.datasources.settings.datasources.*.editable": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow users to edit datasources from the UI."}, "loc": ["services", "grafana", "provision", "datasources", "settings", "datasources", "*", "editable"], "readOnly": false, "type": "boolean"}, "services.grafana.provision.datasources.settings.datasources.*.jsonData": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Extra data for datasource plugins."}, "loc": ["services", "grafana", "provision", "datasources", "settings", "datasources", "*", "jsonData"], "readOnly": false, "type": "null or (attribute set)"}, "services.grafana.provision.datasources.settings.datasources.*.name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Name of the datasource. Required."}, "loc": ["services", "grafana", "provision", "datasources", "settings", "datasources", "*", "name"], "readOnly": false, "type": "string"}, "services.grafana.provision.datasources.settings.datasources.*.secureJsonData": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Datasource specific secure configuration. Please note that the contents of this option\nwill end up in a world-readable Nix store. Use the file provider\npointing at a reasonably secured file in the local filesystem\nto work around that. Look at the documentation for details:\n<https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#file-provider>\n"}, "loc": ["services", "grafana", "provision", "datasources", "settings", "datasources", "*", "secureJsonData"], "readOnly": false, "type": "null or (attribute set)"}, "services.grafana.provision.datasources.settings.datasources.*.type": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Datasource type. Required."}, "loc": ["services", "grafana", "provision", "datasources", "settings", "datasources", "*", "type"], "readOnly": false, "type": "string"}, "services.grafana.provision.datasources.settings.datasources.*.uid": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Custom UID which can be used to reference this datasource in other parts of the configuration, if not specified will be generated automatically."}, "loc": ["services", "grafana", "provision", "datasources", "settings", "datasources", "*", "uid"], "readOnly": false, "type": "null or string"}, "services.grafana.provision.datasources.settings.datasources.*.url": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Url of the datasource."}, "loc": ["services", "grafana", "provision", "datasources", "settings", "datasources", "*", "url"], "readOnly": false, "type": "string"}, "services.grafana.provision.datasources.settings.deleteDatasources": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of datasources that should be deleted from the database."}, "loc": ["services", "grafana", "provision", "datasources", "settings", "deleteDatasources"], "readOnly": false, "type": "list of (submodule)"}, "services.grafana.provision.datasources.settings.deleteDatasources.*.name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Name of the datasource to delete."}, "loc": ["services", "grafana", "provision", "datasources", "settings", "deleteDatasources", "*", "name"], "readOnly": false, "type": "string"}, "services.grafana.provision.datasources.settings.deleteDatasources.*.orgId": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Organization ID of the datasource to delete."}, "loc": ["services", "grafana", "provision", "datasources", "settings", "deleteDatasources", "*", "orgId"], "readOnly": false, "type": "signed integer"}, "services.grafana.provision.enable": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable provision."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "grafana", "provision", "enable"], "readOnly": false, "type": "boolean"}, "services.grafana.provision.notifiers": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Grafana notifier configuration."}, "loc": ["services", "grafana", "provision", "notifiers"], "readOnly": false, "type": "list of (submodule)"}, "services.grafana.provision.notifiers.*.disable_resolve_message": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Turn off the message that sends when an alert returns to OK."}, "loc": ["services", "grafana", "provision", "notifiers", "*", "disable_resolve_message"], "readOnly": false, "type": "boolean"}, "services.grafana.provision.notifiers.*.frequency": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"5m\""}, "description": {"_type": "mdDoc", "text": "How frequently should the notifier be sent reminders."}, "loc": ["services", "grafana", "provision", "notifiers", "*", "frequency"], "readOnly": false, "type": "string"}, "services.grafana.provision.notifiers.*.is_default": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Is the default notifier."}, "loc": ["services", "grafana", "provision", "notifiers", "*", "is_default"], "readOnly": false, "type": "boolean"}, "services.grafana.provision.notifiers.*.name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"default\""}, "description": {"_type": "mdDoc", "text": "Notifier name."}, "loc": ["services", "grafana", "provision", "notifiers", "*", "name"], "readOnly": false, "type": "string"}, "services.grafana.provision.notifiers.*.org_id": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Organization ID."}, "loc": ["services", "grafana", "provision", "notifiers", "*", "org_id"], "readOnly": false, "type": "signed integer"}, "services.grafana.provision.notifiers.*.org_name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"Main Org.\""}, "description": {"_type": "mdDoc", "text": "Organization name."}, "loc": ["services", "grafana", "provision", "notifiers", "*", "org_name"], "readOnly": false, "type": "string"}, "services.grafana.provision.notifiers.*.secure_settings": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Secure settings for the notifier type. Please note that the contents of this option\nwill end up in a world-readable Nix store. Use the file provider\npointing at a reasonably secured file in the local filesystem\nto work around that. Look at the documentation for details:\n<https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#file-provider>\n"}, "loc": ["services", "grafana", "provision", "notifiers", "*", "secure_settings"], "readOnly": false, "type": "null or (attribute set)"}, "services.grafana.provision.notifiers.*.send_reminder": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Should the notifier be sent reminder notifications while alerts continue to fire."}, "loc": ["services", "grafana", "provision", "notifiers", "*", "send_reminder"], "readOnly": false, "type": "boolean"}, "services.grafana.provision.notifiers.*.settings": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Settings for the notifier type."}, "loc": ["services", "grafana", "provision", "notifiers", "*", "settings"], "readOnly": false, "type": "null or (attribute set)"}, "services.grafana.provision.notifiers.*.type": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Notifier type."}, "loc": ["services", "grafana", "provision", "notifiers", "*", "type"], "readOnly": false, "type": "one of \"dingding\", \"discord\", \"email\", \"googlechat\", \"hipchat\", \"kafka\", \"line\", \"teams\", \"opsgenie\", \"pagerduty\", \"prometheus-alertmanager\", \"pushover\", \"sensu\", \"sensugo\", \"slack\", \"telegram\", \"threema\", \"victorops\", \"webhook\""}, "services.grafana.provision.notifiers.*.uid": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Unique notifier identifier."}, "loc": ["services", "grafana", "provision", "notifiers", "*", "uid"], "readOnly": false, "type": "string"}, "services.grafana.settings": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "description": {"_type": "mdDoc", "text": "Grafana settings. See <https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/>\nfor available options. INI format is used.\n"}, "loc": ["services", "grafana", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string) or a non-empty list of them)"}, "services.grafana.settings.analytics.check_for_plugin_updates": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "cfg.declarativePlugins == null"}, "description": {"_type": "mdDoc", "text": "When set to `false`, disables checking for new versions of installed plugins from https://grafana.com.\nWhen enabled, the check for a new plugin runs every 10 minutes.\nIt will notify, via the UI, when a new plugin update exists.\nThe check itself will not prompt any auto-updates of the plugin, nor will it send any sensitive information.\n"}, "loc": ["services", "grafana", "settings", "analytics", "check_for_plugin_updates"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.analytics.check_for_updates": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "When set to `false`, disables checking for new versions of Grafana from Grafana's GitHub repository.\nWhen enabled, the check for a new version runs every 10 minutes.\nIt will notify, via the UI, when a new version is available.\nThe check itself will not prompt any auto-updates of the Grafana software, nor will it send any sensitive information.\n"}, "loc": ["services", "grafana", "settings", "analytics", "check_for_updates"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.analytics.feedback_links_enabled": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Set to `false` to remove all feedback links from the UI."}, "loc": ["services", "grafana", "settings", "analytics", "feedback_links_enabled"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.analytics.reporting_enabled": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "When enabled Grafana will send anonymous usage statistics to `stats.grafana.org`.\nNo IP addresses are being tracked, only simple counters to track running instances, versions, dashboard and error counts.\nCounters are sent every 24 hours.\n"}, "loc": ["services", "grafana", "settings", "analytics", "reporting_enabled"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.database.ca_cert_path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the CA certificate to use."}, "loc": ["services", "grafana", "settings", "database", "ca_cert_path"], "readOnly": false, "type": "null or string"}, "services.grafana.settings.database.cache_mode": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"private\""}, "description": {"_type": "mdDoc", "text": "For `sqlite3` only.\n[Shared cache](https://www.sqlite.org/sharedcache.html) setting used for connecting to the database.\n"}, "loc": ["services", "grafana", "settings", "database", "cache_mode"], "readOnly": false, "type": "one of \"private\", \"shared\""}, "services.grafana.settings.database.client_cert_path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the client cert. Only if server requires client authentication."}, "loc": ["services", "grafana", "settings", "database", "client_cert_path"], "readOnly": false, "type": "null or string"}, "services.grafana.settings.database.client_key_path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the client key. Only if server requires client authentication."}, "loc": ["services", "grafana", "settings", "database", "client_key_path"], "readOnly": false, "type": "null or string"}, "services.grafana.settings.database.conn_max_lifetime": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "14400"}, "description": {"_type": "mdDoc", "text": "Sets the maximum amount of time a connection may be reused.\nThe default is 14400 (which means 14400 seconds or 4 hours).\nFor MySQL, this setting should be shorter than the `wait_timeout` variable.\n"}, "loc": ["services", "grafana", "settings", "database", "conn_max_lifetime"], "readOnly": false, "type": "signed integer"}, "services.grafana.settings.database.host": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:3306\""}, "description": {"_type": "mdDoc", "text": "Only applicable to MySQL or Postgres.\nIncludes IP or hostname and port or in case of Unix sockets the path to it.\nFor example, for MySQL running on the same host as Grafana: `host = \"127.0.0.1:3306\"`\nor with Unix sockets: `host = \"/var/run/mysqld/mysqld.sock\"`\n"}, "loc": ["services", "grafana", "settings", "database", "host"], "readOnly": false, "type": "string"}, "services.grafana.settings.database.isolation_level": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Only the MySQL driver supports isolation levels in Grafana.\nIn case the value is empty, the driver's default isolation level is applied.\n"}, "loc": ["services", "grafana", "settings", "database", "isolation_level"], "readOnly": false, "type": "null or one of \"READ-UNCOMMITTED\", \"READ-COMMITTED\", \"REPEATABLE-READ\", \"SERIALIZABLE\""}, "services.grafana.settings.database.locking_attempt_timeout_sec": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "For `mysql`, if the `migrationLocking` feature toggle is set,\nspecify the time (in seconds) to wait before failing to lock the database for the migrations.\n"}, "loc": ["services", "grafana", "settings", "database", "locking_attempt_timeout_sec"], "readOnly": false, "type": "signed integer"}, "services.grafana.settings.database.log_queries": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to `true` to log the sql calls and execution times"}, "loc": ["services", "grafana", "settings", "database", "log_queries"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.database.max_idle_conn": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "The maximum number of connections in the idle connection pool."}, "loc": ["services", "grafana", "settings", "database", "max_idle_conn"], "readOnly": false, "type": "signed integer"}, "services.grafana.settings.database.max_open_conn": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "The maximum number of open connections to the database."}, "loc": ["services", "grafana", "settings", "database", "max_open_conn"], "readOnly": false, "type": "signed integer"}, "services.grafana.settings.database.name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"grafana\""}, "description": {"_type": "mdDoc", "text": "The name of the Grafana database."}, "loc": ["services", "grafana", "settings", "database", "name"], "readOnly": false, "type": "string"}, "services.grafana.settings.database.password": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The database user's password (not applicable for `sqlite3`).\n\nPlease note that the contents of this option\nwill end up in a world-readable Nix store. Use the file provider\npointing at a reasonably secured file in the local filesystem\nto work around that. Look at the documentation for details:\n<https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#file-provider>\n"}, "loc": ["services", "grafana", "settings", "database", "password"], "readOnly": false, "type": "string"}, "services.grafana.settings.database.path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.grafana.dataDir}/data/grafana.db\""}, "description": {"_type": "mdDoc", "text": "Only applicable to `sqlite3` database. The file path where the database will be stored."}, "loc": ["services", "grafana", "settings", "database", "path"], "readOnly": false, "type": "path"}, "services.grafana.settings.database.query_retries": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "This setting applies to `sqlite3` only and controls the number of times the system retries a query when the database is locked.\n"}, "loc": ["services", "grafana", "settings", "database", "query_retries"], "readOnly": false, "type": "signed integer"}, "services.grafana.settings.database.server_cert_name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The common name field of the certificate used by the `mysql` or `postgres` server.\nNot necessary if `ssl_mode` is set to `skip-verify`.\n"}, "loc": ["services", "grafana", "settings", "database", "server_cert_name"], "readOnly": false, "type": "null or string"}, "services.grafana.settings.database.ssl_mode": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"disable\""}, "description": {"_type": "mdDoc", "text": "For Postgres, use either `disable`, `require` or `verify-full`.\nFor MySQL, use either `true`, `false`, or `skip-verify`.\n"}, "loc": ["services", "grafana", "settings", "database", "ssl_mode"], "readOnly": false, "type": "one of \"disable\", \"require\", \"verify-full\", \"true\", \"false\", \"skip-verify\""}, "services.grafana.settings.database.transaction_retries": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "This setting applies to `sqlite3` only and controls the number of times the system retries a transaction when the database is locked.\n"}, "loc": ["services", "grafana", "settings", "database", "transaction_retries"], "readOnly": false, "type": "signed integer"}, "services.grafana.settings.database.type": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite3\""}, "description": {"_type": "mdDoc", "text": "Database type."}, "loc": ["services", "grafana", "settings", "database", "type"], "readOnly": false, "type": "one of \"mysql\", \"sqlite3\", \"postgres\""}, "services.grafana.settings.database.user": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "The database user (not applicable for `sqlite3`)."}, "loc": ["services", "grafana", "settings", "database", "user"], "readOnly": false, "type": "string"}, "services.grafana.settings.database.wal": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "For `sqlite3` only.\nSetting to enable/disable [Write-Ahead Logging](https://sqlite.org/wal.html).\n"}, "loc": ["services", "grafana", "settings", "database", "wal"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.paths.plugins": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "if (cfg.declarativePlugins == null) then \"${cfg.dataDir}/plugins\" else declarativePlugins"}, "description": {"_type": "mdDoc", "text": "Directory where grafana will automatically scan and look for plugins"}, "loc": ["services", "grafana", "settings", "paths", "plugins"], "readOnly": false, "type": "path"}, "services.grafana.settings.paths.provisioning": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"directory with links to files generated from services.grafana.provision\""}, "description": {"_type": "mdDoc", "text": "Folder that contains provisioning config files that grafana will apply on startup and while running.\nDon't change the value of this option if you are planning to use `services.grafana.provision` options.\n"}, "loc": ["services", "grafana", "settings", "paths", "provisioning"], "readOnly": false, "type": "path"}, "services.grafana.settings.security.admin_email": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"admin@localhost\""}, "description": {"_type": "mdDoc", "text": "The email of the default Grafana Admin, created on startup."}, "loc": ["services", "grafana", "settings", "security", "admin_email"], "readOnly": false, "type": "string"}, "services.grafana.settings.security.admin_password": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"admin\""}, "description": {"_type": "mdDoc", "text": "Default admin password. Please note that the contents of this option\nwill end up in a world-readable Nix store. Use the file provider\npointing at a reasonably secured file in the local filesystem\nto work around that. Look at the documentation for details:\n<https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#file-provider>\n"}, "loc": ["services", "grafana", "settings", "security", "admin_password"], "readOnly": false, "type": "string"}, "services.grafana.settings.security.admin_user": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"admin\""}, "description": {"_type": "mdDoc", "text": "Default admin username."}, "loc": ["services", "grafana", "settings", "security", "admin_user"], "readOnly": false, "type": "string"}, "services.grafana.settings.security.allow_embedding": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When `false`, the HTTP header `X-Frame-Options: deny` will be set in Grafana HTTP responses\nwhich will instruct browsers to not allow rendering Grafana in a `<frame>`, `<iframe>`, `<embed>` or `<object>`.\nThe main goal is to mitigate the risk of [Clickjacking](https://owasp.org/www-community/attacks/Clickjacking).\n"}, "loc": ["services", "grafana", "settings", "security", "allow_embedding"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.security.content_security_policy": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to `true` to add the `Content-Security-Policy` header to your requests.\nCSP allows to control resources that the user agent can load and helps prevent XSS attacks.\n"}, "loc": ["services", "grafana", "settings", "security", "content_security_policy"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.security.content_security_policy_report_only": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to `true` to add the `Content-Security-Policy-Report-Only` header to your requests.\nCSP in Report Only mode enables you to experiment with policies by monitoring their effects without enforcing them.\nYou can enable both policies simultaneously.\n"}, "loc": ["services", "grafana", "settings", "security", "content_security_policy_report_only"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.security.cookie_samesite": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"lax\""}, "description": {"_type": "mdDoc", "text": "Sets the `SameSite` cookie attribute and prevents the browser from sending this cookie along with cross-site requests.\nThe main goal is to mitigate the risk of cross-origin information leakage.\nThis setting also provides some protection against cross-site request forgery attacks (CSRF),\n[read more about SameSite here](https://owasp.org/www-community/SameSite).\nUsing value `disabled` does not add any `SameSite` attribute to cookies.\n"}, "loc": ["services", "grafana", "settings", "security", "cookie_samesite"], "readOnly": false, "type": "one of \"lax\", \"strict\", \"none\", \"disabled\""}, "services.grafana.settings.security.cookie_secure": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to `true` if you host Grafana behind HTTPS."}, "loc": ["services", "grafana", "settings", "security", "cookie_secure"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.security.csrf_additional_headers": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of allowed headers to be set by the user.\nSuggested to use for if authentication lives behind reverse proxies.\n"}, "loc": ["services", "grafana", "settings", "security", "csrf_additional_headers"], "readOnly": false, "type": "string or list of string"}, "services.grafana.settings.security.csrf_trusted_origins": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of additional allowed URLs to pass by the CSRF check.\nSuggested when authentication comes from an IdP.\n"}, "loc": ["services", "grafana", "settings", "security", "csrf_trusted_origins"], "readOnly": false, "type": "string or list of string"}, "services.grafana.settings.security.data_source_proxy_whitelist": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Define a whitelist of allowed IP addresses or domains, with ports,\nto be used in data source URLs with the Grafana data source proxy.\nFormat: `ip_or_domain:port` separated by spaces.\nPostgreSQL, MySQL, and MSSQL data sources do not use the proxy and are therefore unaffected by this setting.\n"}, "loc": ["services", "grafana", "settings", "security", "data_source_proxy_whitelist"], "readOnly": false, "type": "string or list of string"}, "services.grafana.settings.security.disable_brute_force_login_protection": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to `true` to disable [brute force login protection](https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html#account-lockout)."}, "loc": ["services", "grafana", "settings", "security", "disable_brute_force_login_protection"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.security.disable_gravatar": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to `true` to disable the use of Gravatar for user profile images."}, "loc": ["services", "grafana", "settings", "security", "disable_gravatar"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.security.disable_initial_admin_creation": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable creation of admin user on first start of Grafana."}, "loc": ["services", "grafana", "settings", "security", "disable_initial_admin_creation"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.security.secret_key": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"SW2YcwTIb9zpOOhoPsMm\""}, "description": {"_type": "mdDoc", "text": "Secret key used for signing. Please note that the contents of this option\nwill end up in a world-readable Nix store. Use the file provider\npointing at a reasonably secured file in the local filesystem\nto work around that. Look at the documentation for details:\n<https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#file-provider>\n"}, "loc": ["services", "grafana", "settings", "security", "secret_key"], "readOnly": false, "type": "string"}, "services.grafana.settings.security.strict_transport_security": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to `true` if you want to enable HTTP `Strict-Transport-Security` (HSTS) response header.\nOnly use this when HTTPS is enabled in your configuration,\nor when there is another upstream system that ensures your application does HTTPS (like a frontend load balancer).\nHSTS tells browsers that the site should only be accessed using HTTPS.\n"}, "loc": ["services", "grafana", "settings", "security", "strict_transport_security"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.security.strict_transport_security_max_age_seconds": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "86400"}, "description": {"_type": "mdDoc", "text": "Sets how long a browser should cache HSTS in seconds.\nOnly applied if `strict_transport_security` is enabled.\n"}, "loc": ["services", "grafana", "settings", "security", "strict_transport_security_max_age_seconds"], "readOnly": false, "type": "signed integer"}, "services.grafana.settings.security.strict_transport_security_preload": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to `true` to enable HSTS `preloading` option.\nOnly applied if `strict_transport_security` is enabled.\n"}, "loc": ["services", "grafana", "settings", "security", "strict_transport_security_preload"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.security.strict_transport_security_subdomains": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to `true` to enable HSTS `includeSubDomains` option.\nOnly applied if `strict_transport_security` is enabled.\n"}, "loc": ["services", "grafana", "settings", "security", "strict_transport_security_subdomains"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.security.x_content_type_options": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Set to `false` to disable the `X-Content-Type-Options` response header.\nThe `X-Content-Type-Options` response HTTP header is a marker used by the server\nto indicate that the MIME types advertised in the `Content-Type` headers should not be changed and be followed.\n"}, "loc": ["services", "grafana", "settings", "security", "x_content_type_options"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.security.x_xss_protection": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Set to `false` to disable the `X-XSS-Protection` header,\nwhich tells browsers to stop pages from loading when they detect reflected cross-site scripting (XSS) attacks.\n"}, "loc": ["services", "grafana", "settings", "security", "x_xss_protection"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.server.cdn_url": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a full HTTP URL address to the root of your Grafana CDN assets.\nGrafana will add edition and version paths.\n\nFor example, given a cdn url like `https://cdn.myserver.com`\ngrafana will try to load a javascript file from `http://cdn.myserver.com/grafana-oss/7.4.0/public/build/app.<hash>.js`.\n"}, "loc": ["services", "grafana", "settings", "server", "cdn_url"], "readOnly": false, "type": "null or string"}, "services.grafana.settings.server.cert_file": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the certificate file (if `protocol` is set to `https` or `h2`).\n"}, "loc": ["services", "grafana", "settings", "server", "cert_file"], "readOnly": false, "type": "null or string"}, "services.grafana.settings.server.cert_key": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the certificate key file (if `protocol` is set to `https` or `h2`).\n"}, "loc": ["services", "grafana", "settings", "server", "cert_key"], "readOnly": false, "type": "null or string"}, "services.grafana.settings.server.domain": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The public facing domain name used to access grafana from a browser.\n\nThis setting is only used in the default value of the `root_url` setting.\nIf you set the latter manually, this option does not have to be specified.\n"}, "loc": ["services", "grafana", "settings", "server", "domain"], "readOnly": false, "type": "string"}, "services.grafana.settings.server.enable_gzip": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set this option to `true` to enable HTTP compression, this can improve transfer speed and bandwidth utilization.\nIt is recommended that most users set it to `true`. By default it is set to `false` for compatibility reasons.\n"}, "loc": ["services", "grafana", "settings", "server", "enable_gzip"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.server.enforce_domain": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Redirect to correct domain if the host header does not match the domain.\nPrevents DNS rebinding attacks.\n"}, "loc": ["services", "grafana", "settings", "server", "enforce_domain"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.server.http_addr": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listening address.\n\n::: {.note}\nThis setting intentionally varies from upstream's default to be a bit more secure by default.\n:::\n"}, "loc": ["services", "grafana", "settings", "server", "http_addr"], "readOnly": false, "type": "string"}, "services.grafana.settings.server.http_port": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Listening port."}, "loc": ["services", "grafana", "settings", "server", "http_port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.grafana.settings.server.protocol": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"http\""}, "description": {"_type": "mdDoc", "text": "Which protocol to listen."}, "loc": ["services", "grafana", "settings", "server", "protocol"], "readOnly": false, "type": "one of \"http\", \"https\", \"h2\", \"socket\""}, "services.grafana.settings.server.read_timeout": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"0\""}, "description": {"_type": "mdDoc", "text": "Sets the maximum time using a duration format (5s/5m/5ms)\nbefore timing out read of an incoming request and closing idle connections.\n0 means there is no timeout for reading the request.\n"}, "loc": ["services", "grafana", "settings", "server", "read_timeout"], "readOnly": false, "type": "string"}, "services.grafana.settings.server.root_url": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"%(protocol)s://%(domain)s:%(http_port)s/\""}, "description": {"_type": "mdDoc", "text": "This is the full URL used to access Grafana from a web browser.\nThis is important if you use Google or GitHub OAuth authentication (for the callback URL to be correct).\n\nThis setting is also important if you have a reverse proxy in front of Grafana that exposes it through a subpath.\nIn that case add the subpath to the end of this URL setting.\n"}, "loc": ["services", "grafana", "settings", "server", "root_url"], "readOnly": false, "type": "string"}, "services.grafana.settings.server.router_logging": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to `true` for Grafana to log all HTTP requests (not just errors).\nThese are logged as Info level events to the Grafana log.\n"}, "loc": ["services", "grafana", "settings", "server", "router_logging"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.server.serve_from_sub_path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Serve Grafana from subpath specified in the `root_url` setting.\nBy default it is set to `false` for compatibility reasons.\n\nBy enabling this setting and using a subpath in `root_url` above,\ne.g. `root_url = \"http://localhost:3000/grafana\"`,\nGrafana is accessible on `http://localhost:3000/grafana`.\nIf accessed without subpath, Grafana will redirect to an URL with the subpath.\n"}, "loc": ["services", "grafana", "settings", "server", "serve_from_sub_path"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.server.socket": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"/run/grafana/grafana.sock\""}, "description": {"_type": "mdDoc", "text": "Path where the socket should be created when `protocol=socket`.\nMake sure that Grafana has appropriate permissions before you change this setting.\n"}, "loc": ["services", "grafana", "settings", "server", "socket"], "readOnly": false, "type": "string"}, "services.grafana.settings.server.socket_gid": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "-1"}, "description": {"_type": "mdDoc", "text": "GID where the socket should be set when `protocol=socket`.\nMake sure that the target group is in the group of Grafana process and that Grafana process is the file owner before you change this setting.\nIt is recommended to set the gid as http server user gid.\nNot set when the value is -1.\n"}, "loc": ["services", "grafana", "settings", "server", "socket_gid"], "readOnly": false, "type": "signed integer"}, "services.grafana.settings.server.socket_mode": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"0660\""}, "description": {"_type": "mdDoc", "text": "Mode where the socket should be set when `protocol=socket`.\nMake sure that Grafana process is the file owner before you change this setting.\n"}, "loc": ["services", "grafana", "settings", "server", "socket_mode"], "readOnly": false, "type": "string"}, "services.grafana.settings.server.static_root_path": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"${package}/share/grafana/public\""}, "description": {"_type": "mdDoc", "text": "Root path for static assets."}, "loc": ["services", "grafana", "settings", "server", "static_root_path"], "readOnly": false, "type": "string"}, "services.grafana.settings.smtp.cert_file": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File path to a cert file."}, "loc": ["services", "grafana", "settings", "smtp", "cert_file"], "readOnly": false, "type": "null or string"}, "services.grafana.settings.smtp.ehlo_identity": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name to be used as client identity for EHLO in SMTP dialog."}, "loc": ["services", "grafana", "settings", "smtp", "ehlo_identity"], "readOnly": false, "type": "null or string"}, "services.grafana.settings.smtp.enabled": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SMTP."}, "loc": ["services", "grafana", "settings", "smtp", "enabled"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.smtp.from_address": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"admin@grafana.localhost\""}, "description": {"_type": "mdDoc", "text": "Address used when sending out emails."}, "loc": ["services", "grafana", "settings", "smtp", "from_address"], "readOnly": false, "type": "string"}, "services.grafana.settings.smtp.from_name": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"Grafana\""}, "description": {"_type": "mdDoc", "text": "Name to be used as client identity for EHLO in SMTP dialog."}, "loc": ["services", "grafana", "settings", "smtp", "from_name"], "readOnly": false, "type": "string"}, "services.grafana.settings.smtp.host": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:25\""}, "description": {"_type": "mdDoc", "text": "Host to connect to."}, "loc": ["services", "grafana", "settings", "smtp", "host"], "readOnly": false, "type": "string"}, "services.grafana.settings.smtp.key_file": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File path to a key file."}, "loc": ["services", "grafana", "settings", "smtp", "key_file"], "readOnly": false, "type": "null or string"}, "services.grafana.settings.smtp.password": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Password used for authentication. Please note that the contents of this option\nwill end up in a world-readable Nix store. Use the file provider\npointing at a reasonably secured file in the local filesystem\nto work around that. Look at the documentation for details:\n<https://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#file-provider>\n"}, "loc": ["services", "grafana", "settings", "smtp", "password"], "readOnly": false, "type": "string"}, "services.grafana.settings.smtp.skip_verify": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Verify SSL for SMTP server."}, "loc": ["services", "grafana", "settings", "smtp", "skip_verify"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.smtp.startTLS_policy": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "StartTLS policy when connecting to server."}, "loc": ["services", "grafana", "settings", "smtp", "startTLS_policy"], "readOnly": false, "type": "null or one of \"OpportunisticStartTLS\", \"MandatoryStartTLS\", \"NoStartTLS\""}, "services.grafana.settings.smtp.user": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "User used for authentication."}, "loc": ["services", "grafana", "settings", "smtp", "user"], "readOnly": false, "type": "null or string"}, "services.grafana.settings.users.allow_org_create": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to `false` to prohibit users from creating new organizations."}, "loc": ["services", "grafana", "settings", "users", "allow_org_create"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.users.allow_sign_up": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to false to prohibit users from being able to sign up / create user accounts.\nThe admin user can still create users.\n"}, "loc": ["services", "grafana", "settings", "users", "allow_sign_up"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.users.auto_assign_org": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Set to `true` to automatically add new users to the main organization (id 1).\nWhen set to `false,` new users automatically cause a new organization to be created for that new user.\nThe organization will be created even if the `allow_org_create` setting is set to `false`.\n"}, "loc": ["services", "grafana", "settings", "users", "auto_assign_org"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.users.auto_assign_org_id": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Set this value to automatically add new users to the provided org.\nThis requires `auto_assign_org` to be set to `true`.\nPlease make sure that this organization already exists.\n"}, "loc": ["services", "grafana", "settings", "users", "auto_assign_org_id"], "readOnly": false, "type": "signed integer"}, "services.grafana.settings.users.auto_assign_org_role": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"Viewer\""}, "description": {"_type": "mdDoc", "text": "The role new users will be assigned for the main organization (if the `auto_assign_org` setting is set to `true`).\n"}, "loc": ["services", "grafana", "settings", "users", "auto_assign_org_role"], "readOnly": false, "type": "one of \"Viewer\", \"Editor\", \"Admin\""}, "services.grafana.settings.users.default_language": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"en-US\""}, "description": {"_type": "mdDoc", "text": "This setting configures the default UI language, which must be a supported IETF language tag, such as `en-US`."}, "loc": ["services", "grafana", "settings", "users", "default_language"], "readOnly": false, "type": "string"}, "services.grafana.settings.users.default_theme": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"dark\""}, "description": {"_type": "mdDoc", "text": "Sets the default UI theme. `system` matches the user's system theme."}, "loc": ["services", "grafana", "settings", "users", "default_theme"], "readOnly": false, "type": "one of \"dark\", \"light\", \"system\""}, "services.grafana.settings.users.editors_can_admin": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Editors can administrate dashboards, folders and teams they create."}, "loc": ["services", "grafana", "settings", "users", "editors_can_admin"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.users.hidden_users": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "This is a comma-separated list of usernames.\nUsers specified here are hidden in the Grafana UI.\nThey are still visible to Grafana administrators and to themselves.\n"}, "loc": ["services", "grafana", "settings", "users", "hidden_users"], "readOnly": false, "type": "string"}, "services.grafana.settings.users.home_page": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Path to a custom home page.\nUsers are only redirected to this if the default home dashboard is used.\nIt should match a frontend route and contain a leading slash.\n"}, "loc": ["services", "grafana", "settings", "users", "home_page"], "readOnly": false, "type": "string"}, "services.grafana.settings.users.login_hint": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"email or username\""}, "description": {"_type": "mdDoc", "text": "Text used as placeholder text on login page for login/username input."}, "loc": ["services", "grafana", "settings", "users", "login_hint"], "readOnly": false, "type": "string"}, "services.grafana.settings.users.password_hint": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"password\""}, "description": {"_type": "mdDoc", "text": "Text used as placeholder text on login page for password input."}, "loc": ["services", "grafana", "settings", "users", "password_hint"], "readOnly": false, "type": "string"}, "services.grafana.settings.users.user_invite_max_lifetime_duration": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "\"24h\""}, "description": {"_type": "mdDoc", "text": "The duration in time a user invitation remains valid before expiring.\nThis setting should be expressed as a duration.\nExamples: `6h` (hours), `2d` (days), `1w` (week).\nThe minimum supported duration is `15m` (15 minutes).\n"}, "loc": ["services", "grafana", "settings", "users", "user_invite_max_lifetime_duration"], "readOnly": false, "type": "string"}, "services.grafana.settings.users.verify_email_enabled": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Require email validation before sign up completes."}, "loc": ["services", "grafana", "settings", "users", "verify_email_enabled"], "readOnly": false, "type": "boolean"}, "services.grafana.settings.users.viewers_can_edit": {"declarations": ["nixos/modules/services/monitoring/grafana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Viewers can access and use Explore and perform temporary edits on panels in dashboards they have access to.\nThey cannot save their changes.\n"}, "loc": ["services", "grafana", "settings", "users", "viewers_can_edit"], "readOnly": false, "type": "boolean"}, "services.grafana_reporter.addr": {"declarations": ["nixos/modules/services/monitoring/grafana-reporter.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listening address."}, "loc": ["services", "grafana_reporter", "addr"], "readOnly": false, "type": "string"}, "services.grafana_reporter.enable": {"declarations": ["nixos/modules/services/monitoring/grafana-reporter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable grafana_reporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "grafana_reporter", "enable"], "readOnly": false, "type": "boolean"}, "services.grafana_reporter.grafana.addr": {"declarations": ["nixos/modules/services/monitoring/grafana-reporter.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Grafana address."}, "loc": ["services", "grafana_reporter", "grafana", "addr"], "readOnly": false, "type": "string"}, "services.grafana_reporter.grafana.port": {"declarations": ["nixos/modules/services/monitoring/grafana-reporter.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Grafana port."}, "loc": ["services", "grafana_reporter", "grafana", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.grafana_reporter.grafana.protocol": {"declarations": ["nixos/modules/services/monitoring/grafana-reporter.nix"], "default": {"_type": "literalExpression", "text": "\"http\""}, "description": {"_type": "mdDoc", "text": "Grafana protocol."}, "loc": ["services", "grafana_reporter", "grafana", "protocol"], "readOnly": false, "type": "one of \"http\", \"https\""}, "services.grafana_reporter.port": {"declarations": ["nixos/modules/services/monitoring/grafana-reporter.nix"], "default": {"_type": "literalExpression", "text": "8686"}, "description": {"_type": "mdDoc", "text": "Listening port."}, "loc": ["services", "grafana_reporter", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.grafana_reporter.templateDir": {"declarations": ["nixos/modules/services/monitoring/grafana-reporter.nix"], "default": {"_type": "literalExpression", "text": "pkgs.grafana_reporter"}, "description": {"_type": "mdDoc", "text": "Optional template directory to use custom tex templates"}, "loc": ["services", "grafana_reporter", "templateDir"], "readOnly": false, "type": "string or path"}, "services.graphite.carbon.aggregationRules": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Defines if and how received metrics will be aggregated."}, "example": {"_type": "literalExpression", "text": "''\n  <env>.applications.<app>.all.requests (60) = sum <env>.applications.<app>.*.requests\n  <env>.applications.<app>.all.latency (60) = avg <env>.applications.<app>.*.latency\n''"}, "loc": ["services", "graphite", "carbon", "aggregationRules"], "readOnly": false, "type": "null or string"}, "services.graphite.carbon.blacklist": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Any metrics received which match one of the expressions will be dropped."}, "example": {"_type": "literalExpression", "text": "\"^some\\\\.noisy\\\\.metric\\\\.prefix\\\\..*\""}, "loc": ["services", "graphite", "carbon", "blacklist"], "readOnly": false, "type": "null or string"}, "services.graphite.carbon.config": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "''\n  [cache]\n  # Listen on localhost by default for security reasons\n  UDP_RECEIVER_INTERFACE = 127.0.0.1\n  PICKLE_RECEIVER_INTERFACE = 127.0.0.1\n  LINE_RECEIVER_INTERFACE = 127.0.0.1\n  CACHE_QUERY_INTERFACE = 127.0.0.1\n  # Do not log every update\n  LOG_UPDATES = False\n  LOG_CACHE_HITS = False\n''"}, "description": {"_type": "mdDoc", "text": "Content of carbon configuration file."}, "loc": ["services", "graphite", "carbon", "config"], "readOnly": false, "type": "string"}, "services.graphite.carbon.enableAggregator": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable carbon aggregator, the carbon buffering service."}, "loc": ["services", "graphite", "carbon", "enableAggregator"], "readOnly": false, "type": "boolean"}, "services.graphite.carbon.enableCache": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable carbon cache, the graphite storage daemon."}, "loc": ["services", "graphite", "carbon", "enableCache"], "readOnly": false, "type": "boolean"}, "services.graphite.carbon.enableRelay": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable carbon relay, the carbon replication and sharding service."}, "loc": ["services", "graphite", "carbon", "enableRelay"], "readOnly": false, "type": "boolean"}, "services.graphite.carbon.relayRules": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Relay rules are used to send certain metrics to a certain backend."}, "example": {"_type": "literalExpression", "text": "''\n  [example]\n  pattern = ^mydata\\.foo\\..+\n  servers = 10.1.2.3, 10.1.2.4:2004, myserver.mydomain.com\n''"}, "loc": ["services", "graphite", "carbon", "relayRules"], "readOnly": false, "type": "null or string"}, "services.graphite.carbon.rewriteRules": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Regular expression patterns that can be used to rewrite metric names\nin a search and replace fashion.\n"}, "example": {"_type": "literalExpression", "text": "''\n  [post]\n  _sum$ =\n  _avg$ =\n''"}, "loc": ["services", "graphite", "carbon", "rewriteRules"], "readOnly": false, "type": "null or string"}, "services.graphite.carbon.storageAggregation": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Defines how to aggregate data to lower-precision retentions."}, "example": {"_type": "literalExpression", "text": "''\n  [all_min]\n  pattern = \\.min$\n  xFilesFactor = 0.1\n  aggregationMethod = min\n''"}, "loc": ["services", "graphite", "carbon", "storageAggregation"], "readOnly": false, "type": "null or string"}, "services.graphite.carbon.storageSchemas": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Defines retention rates for storing metrics."}, "example": {"_type": "literalExpression", "text": "''\n  [apache_busyWorkers]\n  pattern = ^servers\\.www.*\\.workers\\.busyWorkers$\n  retentions = 15s:7d,1m:21d,15m:5y\n''"}, "loc": ["services", "graphite", "carbon", "storageSchemas"], "readOnly": false, "type": "null or string"}, "services.graphite.carbon.whitelist": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Only metrics received which match one of the expressions will be persisted."}, "example": {"_type": "literalExpression", "text": "\".*\""}, "loc": ["services", "graphite", "carbon", "whitelist"], "readOnly": false, "type": "null or string"}, "services.graphite.dataDir": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "\"/var/db/graphite\""}, "description": {"_type": "mdDoc", "text": "Data directory for graphite.\n"}, "loc": ["services", "graphite", "dataDir"], "readOnly": false, "type": "path"}, "services.graphite.seyren.enable": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable seyren service."}, "loc": ["services", "graphite", "seyren", "enable"], "readOnly": false, "type": "boolean"}, "services.graphite.seyren.extraConfig": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra seyren configuration. See\n<https://github.com/scobal/seyren#config>\n"}, "example": {"_type": "literalExpression", "text": "{\n  GRAPHITE_USERNAME = \"user\";\n  GRAPHITE_PASSWORD = \"pass\";\n}\n"}, "loc": ["services", "graphite", "seyren", "extraConfig"], "readOnly": false, "type": "attribute set of string"}, "services.graphite.seyren.graphiteUrl": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "\"http://${config.services.graphite.web.listenAddress}:${toString config.services.graphite.web.port}\""}, "description": {"_type": "mdDoc", "text": "Host where graphite service runs."}, "loc": ["services", "graphite", "seyren", "graphiteUrl"], "readOnly": false, "type": "string"}, "services.graphite.seyren.mongoUrl": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "\"mongodb://${config.services.mongodb.bind_ip}:27017/seyren\""}, "description": {"_type": "mdDoc", "text": "Mongodb connection string."}, "loc": ["services", "graphite", "seyren", "mongoUrl"], "readOnly": false, "type": "string"}, "services.graphite.seyren.port": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "8081"}, "description": {"_type": "mdDoc", "text": "Seyren listening port."}, "loc": ["services", "graphite", "seyren", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.graphite.seyren.seyrenUrl": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:${toString config.services.graphite.seyren.port}/\""}, "description": {"_type": "mdDoc", "text": "Host where seyren is accessible."}, "loc": ["services", "graphite", "seyren", "seyrenUrl"], "readOnly": false, "type": "string"}, "services.graphite.web.enable": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable graphite web frontend."}, "loc": ["services", "graphite", "web", "enable"], "readOnly": false, "type": "boolean"}, "services.graphite.web.extraConfig": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Graphite webapp settings. See:\n<http://graphite.readthedocs.io/en/latest/config-local-settings.html>\n"}, "loc": ["services", "graphite", "web", "extraConfig"], "readOnly": false, "type": "string"}, "services.graphite.web.listenAddress": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Graphite web frontend listen address."}, "loc": ["services", "graphite", "web", "listenAddress"], "readOnly": false, "type": "string"}, "services.graphite.web.port": {"declarations": ["nixos/modules/services/monitoring/graphite.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Graphite web frontend port."}, "loc": ["services", "graphite", "web", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.graylog.elasticsearchHosts": {"declarations": ["nixos/modules/services/logging/graylog.nix"], "description": {"_type": "mdDoc", "text": "List of valid URIs of the http ports of your elastic nodes. If one or more of your elasticsearch hosts require authentication, include the credentials in each node URI that requires authentication"}, "example": {"_type": "literalExpression", "text": "[ \"http://node1:9200\" \"http://user:password@node2:19200\" ]"}, "loc": ["services", "graylog", "elasticsearchHosts"], "readOnly": false, "type": "list of string"}, "services.graylog.enable": {"declarations": ["nixos/modules/services/logging/graylog.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Graylog."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "graylog", "enable"], "readOnly": false, "type": "boolean"}, "services.graylog.extraConfig": {"declarations": ["nixos/modules/services/logging/graylog.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Any other configuration options you might want to add"}, "loc": ["services", "graylog", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.graylog.isMaster": {"declarations": ["nixos/modules/services/logging/graylog.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether this is the master instance of your Graylog cluster"}, "loc": ["services", "graylog", "isMaster"], "readOnly": false, "type": "boolean"}, "services.graylog.messageJournalDir": {"declarations": ["nixos/modules/services/logging/graylog.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/graylog/data/journal\""}, "description": {"_type": "mdDoc", "text": "The directory which will be used to store the message journal. The directory must be exclusively used by Graylog and must not contain any other files than the ones created by Graylog itself"}, "loc": ["services", "graylog", "messageJournalDir"], "readOnly": false, "type": "string"}, "services.graylog.mongodbUri": {"declarations": ["nixos/modules/services/logging/graylog.nix"], "default": {"_type": "literalExpression", "text": "\"mongodb://localhost/graylog\""}, "description": {"_type": "mdDoc", "text": "MongoDB connection string. See http://docs.mongodb.org/manual/reference/connection-string/ for details"}, "loc": ["services", "graylog", "mongodbUri"], "readOnly": false, "type": "string"}, "services.graylog.nodeIdFile": {"declarations": ["nixos/modules/services/logging/graylog.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/graylog/server/node-id\""}, "description": {"_type": "mdDoc", "text": "Path of the file containing the graylog node-id"}, "loc": ["services", "graylog", "nodeIdFile"], "readOnly": false, "type": "string"}, "services.graylog.package": {"declarations": ["nixos/modules/services/logging/graylog.nix"], "default": {"_type": "literalExpression", "text": "pkgs.graylog-5_0"}, "description": {"_type": "mdDoc", "text": "Graylog package to use."}, "loc": ["services", "graylog", "package"], "readOnly": false, "type": "package"}, "services.graylog.passwordSecret": {"declarations": ["nixos/modules/services/logging/graylog.nix"], "description": {"_type": "mdDoc", "text": "You MUST set a secret to secure/pepper the stored user passwords here. Use at least 64 characters.\nGenerate one by using for example: pwgen -N 1 -s 96\n"}, "loc": ["services", "graylog", "passwordSecret"], "readOnly": false, "type": "string"}, "services.graylog.plugins": {"declarations": ["nixos/modules/services/logging/graylog.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra graylog plugins"}, "loc": ["services", "graylog", "plugins"], "readOnly": false, "type": "list of package"}, "services.graylog.rootPasswordSha2": {"declarations": ["nixos/modules/services/logging/graylog.nix"], "description": {"_type": "mdDoc", "text": "You MUST specify a hash password for the root user (which you only need to initially set up the\nsystem and in case you lose connectivity to your authentication backend)\nThis password cannot be changed using the API or via the web interface. If you need to change it,\nmodify it here.\nCreate one by using for example: echo -n yourpassword | shasum -a 256\nand use the resulting hash value as string for the option\n"}, "example": {"_type": "literalExpression", "text": "\"e3c652f0ba0b4801205814f8b6bc49672c4c74e25b497770bb89b22cdeb4e952\""}, "loc": ["services", "graylog", "rootPasswordSha2"], "readOnly": false, "type": "string"}, "services.graylog.rootUsername": {"declarations": ["nixos/modules/services/logging/graylog.nix"], "default": {"_type": "literalExpression", "text": "\"admin\""}, "description": {"_type": "mdDoc", "text": "Name of the default administrator user"}, "loc": ["services", "graylog", "rootUsername"], "readOnly": false, "type": "string"}, "services.graylog.user": {"declarations": ["nixos/modules/services/logging/graylog.nix"], "default": {"_type": "literalExpression", "text": "\"graylog\""}, "description": {"_type": "mdDoc", "text": "User account under which graylog runs"}, "loc": ["services", "graylog", "user"], "readOnly": false, "type": "string"}, "services.greenclip.enable": {"declarations": ["nixos/modules/services/misc/greenclip.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Greenclip daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "greenclip", "enable"], "readOnly": false, "type": "boolean"}, "services.greenclip.package": {"declarations": ["nixos/modules/services/misc/greenclip.nix"], "default": {"_type": "literalExpression", "text": "pkgs.haskellPackages.greenclip"}, "description": {"_type": "mdDoc", "text": "greenclip derivation to use."}, "loc": ["services", "greenclip", "package"], "readOnly": false, "type": "package"}, "services.greetd.enable": {"declarations": ["nixos/modules/services/display-managers/greetd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable greetd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "greetd", "enable"], "readOnly": false, "type": "boolean"}, "services.greetd.package": {"declarations": ["nixos/modules/services/display-managers/greetd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.greetd.greetd"}, "description": {"_type": "mdDoc", "text": "The greetd package that should be used."}, "loc": ["services", "greetd", "package"], "readOnly": false, "type": "package"}, "services.greetd.restart": {"declarations": ["nixos/modules/services/display-managers/greetd.nix"], "default": {"_type": "literalExpression", "text": "!(config.services.greetd.settings ? initial_session)"}, "description": {"_type": "mdDoc", "text": "Whether to restart greetd when it terminates (e.g. on failure).\nThis is usually desirable so a user can always log in, but should be disabled when using 'settings.initial_session' (autologin),\nbecause every greetd restart will trigger the autologin again.\n"}, "loc": ["services", "greetd", "restart"], "readOnly": false, "type": "boolean"}, "services.greetd.settings": {"declarations": ["nixos/modules/services/display-managers/greetd.nix"], "description": {"_type": "mdDoc", "text": "greetd configuration ([documentation](https://man.sr.ht/~kennylevinsen/greetd/))\nas a Nix attribute set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  default_session = {\n    command = \"${pkgs.greetd.greetd}/bin/agreety --cmd sway\";\n  };\n}\n"}, "loc": ["services", "greetd", "settings"], "readOnly": false, "type": "TOML value"}, "services.greetd.vt": {"declarations": ["nixos/modules/services/display-managers/greetd.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "The virtual console (tty) that greetd should use. This option also disables getty on that tty.\n"}, "loc": ["services", "greetd", "vt"], "readOnly": false, "type": "signed integer"}, "services.grocy.dataDir": {"declarations": ["nixos/modules/services/web-apps/grocy.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/grocy\""}, "description": {"_type": "mdDoc", "text": "Home directory of the `grocy` user which contains\nthe application's state.\n"}, "loc": ["services", "grocy", "dataDir"], "readOnly": false, "type": "string"}, "services.grocy.enable": {"declarations": ["nixos/modules/services/web-apps/grocy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable grocy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "grocy", "enable"], "readOnly": false, "type": "boolean"}, "services.grocy.hostName": {"declarations": ["nixos/modules/services/web-apps/grocy.nix"], "description": {"_type": "mdDoc", "text": "FQDN for the grocy instance.\n"}, "loc": ["services", "grocy", "hostName"], "readOnly": false, "type": "string"}, "services.grocy.nginx.enableSSL": {"declarations": ["nixos/modules/services/web-apps/grocy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether or not to enable SSL (with ACME and let's encrypt)\nfor the grocy vhost.\n"}, "loc": ["services", "grocy", "nginx", "enableSSL"], "readOnly": false, "type": "boolean"}, "services.grocy.phpfpm.settings": {"declarations": ["nixos/modules/services/web-apps/grocy.nix"], "default": {"_type": "literalExpression", "text": "{\n  catch_workers_output = true;\n  \"listen.owner\" = \"nginx\";\n  \"php_admin_flag[log_errors]\" = true;\n  \"php_admin_value[error_log]\" = \"stderr\";\n  pm = \"dynamic\";\n  \"pm.max_children\" = \"32\";\n  \"pm.max_requests\" = \"500\";\n  \"pm.max_spare_servers\" = \"4\";\n  \"pm.min_spare_servers\" = \"2\";\n  \"pm.start_servers\" = \"2\";\n}"}, "description": {"_type": "mdDoc", "text": "Options for grocy's PHPFPM pool.\n"}, "loc": ["services", "grocy", "phpfpm", "settings"], "readOnly": false, "type": "attribute set of (signed integer or string or boolean)"}, "services.grocy.settings.calendar.firstDayOfWeek": {"declarations": ["nixos/modules/services/web-apps/grocy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Which day of the week (0=Sunday, 1=Monday etc.) should be the\nfirst day.\n"}, "loc": ["services", "grocy", "settings", "calendar", "firstDayOfWeek"], "readOnly": false, "type": "null or one of 0, 1, 2, 3, 4, 5, 6"}, "services.grocy.settings.calendar.showWeekNumber": {"declarations": ["nixos/modules/services/web-apps/grocy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Show the number of the weeks in the calendar views.\n"}, "loc": ["services", "grocy", "settings", "calendar", "showWeekNumber"], "readOnly": false, "type": "boolean"}, "services.grocy.settings.culture": {"declarations": ["nixos/modules/services/web-apps/grocy.nix"], "default": {"_type": "literalExpression", "text": "\"en\""}, "description": {"_type": "mdDoc", "text": "Display language of the frontend.\n"}, "loc": ["services", "grocy", "settings", "culture"], "readOnly": false, "type": "one of \"de\", \"en\", \"da\", \"en_GB\", \"es\", \"fr\", \"hu\", \"it\", \"nl\", \"no\", \"pl\", \"pt_BR\", \"ru\", \"sk_SK\", \"sv_SE\", \"tr\""}, "services.grocy.settings.currency": {"declarations": ["nixos/modules/services/web-apps/grocy.nix"], "default": {"_type": "literalExpression", "text": "\"USD\""}, "description": {"_type": "mdDoc", "text": "ISO 4217 code for the currency to display.\n"}, "example": {"_type": "literalExpression", "text": "\"EUR\""}, "loc": ["services", "grocy", "settings", "currency"], "readOnly": false, "type": "string"}, "services.gsignond.enable": {"declarations": ["nixos/modules/services/desktops/gsignond.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable gSignOn daemon, a DBus service\nwhich performs user authentication on behalf of its clients.\n"}, "loc": ["services", "gsignond", "enable"], "readOnly": false, "type": "boolean"}, "services.gsignond.plugins": {"declarations": ["nixos/modules/services/desktops/gsignond.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "What plugins to use with the gSignOn daemon.\n"}, "loc": ["services", "gsignond", "plugins"], "readOnly": false, "type": "list of package"}, "services.gvfs.enable": {"declarations": ["nixos/modules/services/desktops/gvfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GVfs, a userspace virtual filesystem."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gvfs", "enable"], "readOnly": false, "type": "boolean"}, "services.gvfs.package": {"declarations": ["nixos/modules/services/desktops/gvfs.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gnome.gvfs"}, "description": {"_type": "mdDoc", "text": "Which GVfs package to use."}, "loc": ["services", "gvfs", "package"], "readOnly": false, "type": "package"}, "services.gvpe.configFile": {"declarations": ["nixos/modules/services/networking/gvpe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "GVPE config file, if already present\n"}, "example": {"_type": "literalExpression", "text": "\"/root/my-gvpe-conf\""}, "loc": ["services", "gvpe", "configFile"], "readOnly": false, "type": "null or path"}, "services.gvpe.configText": {"declarations": ["nixos/modules/services/networking/gvpe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "GVPE config contents\n"}, "example": {"_type": "literalExpression", "text": "''\n  tcp-port = 655\n  udp-port = 655\n  mtu = 1480\n  ifname = vpn0\n  \n  node = alpha\n  hostname = alpha.example.org\n  connect = always\n  enable-udp = true\n  enable-tcp = true\n  on alpha if-up = if-up-0\n  on alpha pid-file = /var/gvpe/gvpe.pid\n''"}, "loc": ["services", "gvpe", "configText"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.gvpe.customIFSetup": {"declarations": ["nixos/modules/services/networking/gvpe.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional commands to apply in ifup script\n"}, "loc": ["services", "gvpe", "customIFSetup"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.gvpe.enable": {"declarations": ["nixos/modules/services/networking/gvpe.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable gvpe."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gvpe", "enable"], "readOnly": false, "type": "boolean"}, "services.gvpe.ipAddress": {"declarations": ["nixos/modules/services/networking/gvpe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IP address to assign to GVPE interface\n"}, "loc": ["services", "gvpe", "ipAddress"], "readOnly": false, "type": "null or string"}, "services.gvpe.nodename": {"declarations": ["nixos/modules/services/networking/gvpe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "GVPE node name\n"}, "loc": ["services", "gvpe", "nodename"], "readOnly": false, "type": "null or string"}, "services.gvpe.subnet": {"declarations": ["nixos/modules/services/networking/gvpe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IP subnet assigned to GVPE network\n"}, "example": {"_type": "literalExpression", "text": "\"10.0.0.0/8\""}, "loc": ["services", "gvpe", "subnet"], "readOnly": false, "type": "null or string"}, "services.hadoop.containerExecutorCfg": {"declarations": ["nixos/modules/services/cluster/hadoop/default.nix"], "default": {"_type": "literalExpression", "text": "{\n  \"feature.mount-cgroup.enabled\" = 1;\n  \"feature.terminal.enabled\" = 1;\n  \"min.user.id\" = 1000;\n  \"yarn.nodemanager.linux-container-executor.group\" = \"hadoop\";\n}"}, "description": {"_type": "mdDoc", "text": "Yarn container-executor.cfg definition\n<https://hadoop.apache.org/docs/r2.7.2/hadoop-yarn/hadoop-yarn-site/SecureContainer.html>\n"}, "example": {"_type": "literalExpression", "text": "options.services.hadoop.containerExecutorCfg.default // {\n  \"feature.terminal.enabled\" = 0;\n}\n"}, "loc": ["services", "hadoop", "containerExecutorCfg"], "readOnly": false, "type": "attribute set of anything"}, "services.hadoop.coreSite": {"declarations": ["nixos/modules/services/cluster/hadoop/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Hadoop core-site.xml definition\n<https://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/core-default.xml>\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"fs.defaultFS\" = \"hdfs://localhost\";\n}\n"}, "loc": ["services", "hadoop", "coreSite"], "readOnly": false, "type": "attribute set of anything"}, "services.hadoop.extraConfDirs": {"declarations": ["nixos/modules/services/cluster/hadoop/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Directories containing additional config files to be added to HADOOP_CONF_DIR"}, "example": {"_type": "literalExpression", "text": "[\n  ./extraHDFSConfs\n  ./extraYARNConfs\n]\n"}, "loc": ["services", "hadoop", "extraConfDirs"], "readOnly": false, "type": "list of path"}, "services.hadoop.gatewayRole.enable": {"declarations": ["nixos/modules/services/cluster/hadoop/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable gateway role for deploying hadoop configs."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "gatewayRole", "enable"], "readOnly": false, "type": "boolean"}, "services.hadoop.gatewayRole.enableHbaseCli": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HBase CLI tools."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "gatewayRole", "enableHbaseCli"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.master.enable": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HBase master."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "hbase", "master", "enable"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.master.environment": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables passed to master."}, "example": {"_type": "literalExpression", "text": "{\n  HBASE_MASTER_OPTS = \"-Dcom.sun.management.jmxremote.ssl=true\";\n}\n"}, "loc": ["services", "hadoop", "hbase", "master", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.hadoop.hbase.master.extraFlags": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags for the master service."}, "example": {"_type": "literalExpression", "text": "[ \"--backup\" ]"}, "loc": ["services", "hadoop", "hbase", "master", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.hadoop.hbase.master.initHDFS": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable initialization of the hbase directory on HDFS."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "hbase", "master", "initHDFS"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.master.openFirewall": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open firewall ports for HBase master."}, "loc": ["services", "hadoop", "hbase", "master", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.master.restartIfChanged": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Restart master con config change."}, "loc": ["services", "hadoop", "hbase", "master", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.package": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "pkgs.hbase"}, "description": {"_type": "mdDoc", "text": "HBase package"}, "loc": ["services", "hadoop", "hbase", "package"], "readOnly": false, "type": "package"}, "services.hadoop.hbase.regionServer.enable": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HBase regionServer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "hbase", "regionServer", "enable"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.regionServer.environment": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables passed to regionServer."}, "example": {"_type": "literalExpression", "text": "{\n  HBASE_MASTER_OPTS = \"-Dcom.sun.management.jmxremote.ssl=true\";\n}\n"}, "loc": ["services", "hadoop", "hbase", "regionServer", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.hadoop.hbase.regionServer.extraFlags": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags for the regionServer service."}, "example": {"_type": "literalExpression", "text": "[ \"--backup\" ]"}, "loc": ["services", "hadoop", "hbase", "regionServer", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.hadoop.hbase.regionServer.openFirewall": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open firewall ports for HBase regionServer."}, "loc": ["services", "hadoop", "hbase", "regionServer", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.regionServer.overrideHosts": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Remove /etc/hosts entries for \"127.0.0.2\" and \"::1\" defined in nixos/modules/config/networking.nix\nRegionservers must be able to resolve their hostnames to their IP addresses, through PTR records\nor /etc/hosts entries.\n"}, "loc": ["services", "hadoop", "hbase", "regionServer", "overrideHosts"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.regionServer.restartIfChanged": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Restart regionServer con config change."}, "loc": ["services", "hadoop", "hbase", "regionServer", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.rest.enable": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HBase rest."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "hbase", "rest", "enable"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.rest.environment": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables passed to rest."}, "example": {"_type": "literalExpression", "text": "{\n  HBASE_MASTER_OPTS = \"-Dcom.sun.management.jmxremote.ssl=true\";\n}\n"}, "loc": ["services", "hadoop", "hbase", "rest", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.hadoop.hbase.rest.extraFlags": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags for the rest service."}, "example": {"_type": "literalExpression", "text": "[ \"--backup\" ]"}, "loc": ["services", "hadoop", "hbase", "rest", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.hadoop.hbase.rest.infoPort": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "8085"}, "description": {"_type": "mdDoc", "text": "web UI port"}, "loc": ["services", "hadoop", "hbase", "rest", "infoPort"], "readOnly": false, "type": "signed integer"}, "services.hadoop.hbase.rest.openFirewall": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open firewall ports for HBase rest."}, "loc": ["services", "hadoop", "hbase", "rest", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.rest.port": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "RPC port"}, "loc": ["services", "hadoop", "hbase", "rest", "port"], "readOnly": false, "type": "signed integer"}, "services.hadoop.hbase.rest.restartIfChanged": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Restart rest con config change."}, "loc": ["services", "hadoop", "hbase", "rest", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.rootdir": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "\"/hbase\""}, "description": {"_type": "mdDoc", "text": "This option will set \"hbase.rootdir\" in hbase-site.xml and determine\nthe directory shared by region servers and into which HBase persists.\nThe URL should be 'fully-qualified' to include the filesystem scheme.\nIf a core-site.xml is provided, the FS scheme defaults to the value\nof \"fs.defaultFS\".\n\nFilesystems other than HDFS (like S3, QFS, Swift) are also supported.\n"}, "example": {"_type": "literalExpression", "text": "\"hdfs://nameservice1/hbase\""}, "loc": ["services", "hadoop", "hbase", "rootdir"], "readOnly": false, "type": "string"}, "services.hadoop.hbase.thrift.enable": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HBase thrift."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "hbase", "thrift", "enable"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.thrift.environment": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables passed to thrift."}, "example": {"_type": "literalExpression", "text": "{\n  HBASE_MASTER_OPTS = \"-Dcom.sun.management.jmxremote.ssl=true\";\n}\n"}, "loc": ["services", "hadoop", "hbase", "thrift", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.hadoop.hbase.thrift.extraFlags": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags for the thrift service."}, "example": {"_type": "literalExpression", "text": "[ \"--backup\" ]"}, "loc": ["services", "hadoop", "hbase", "thrift", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.hadoop.hbase.thrift.infoPort": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "9095"}, "description": {"_type": "mdDoc", "text": "web UI port"}, "loc": ["services", "hadoop", "hbase", "thrift", "infoPort"], "readOnly": false, "type": "signed integer"}, "services.hadoop.hbase.thrift.openFirewall": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open firewall ports for HBase thrift."}, "loc": ["services", "hadoop", "hbase", "thrift", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.thrift.port": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "9090"}, "description": {"_type": "mdDoc", "text": "RPC port"}, "loc": ["services", "hadoop", "hbase", "thrift", "port"], "readOnly": false, "type": "signed integer"}, "services.hadoop.hbase.thrift.restartIfChanged": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Restart thrift con config change."}, "loc": ["services", "hadoop", "hbase", "thrift", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.hadoop.hbase.zookeeperQuorum": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This option will set \"hbase.zookeeper.quorum\" in hbase-site.xml.\nComma separated list of servers in the ZooKeeper ensemble.\n"}, "example": {"_type": "literalExpression", "text": "\"zk1.internal,zk2.internal,zk3.internal\""}, "loc": ["services", "hadoop", "hbase", "zookeeperQuorum"], "readOnly": false, "type": "null or strings concatenated with \",\""}, "services.hadoop.hbaseSite": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional options and overrides for hbase-site.xml\n<https://github.com/apache/hbase/blob/rel/2.4.11/hbase-common/src/main/resources/hbase-default.xml>\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"hbase.hregion.max.filesize\" = 20*1024*1024*1024;\n  \"hbase.table.normalization.enabled\" = \"true\";\n}\n"}, "loc": ["services", "hadoop", "hbaseSite"], "readOnly": false, "type": "attribute set of anything"}, "services.hadoop.hbaseSiteDefault": {"declarations": ["nixos/modules/services/cluster/hadoop/hbase.nix"], "default": {"_type": "literalExpression", "text": "{\n  \"hbase.cluster.distributed\" = \"true\";\n  \"hbase.master.info.bindAddress\" = \"0.0.0.0\";\n  \"hbase.master.ipc.address\" = \"0.0.0.0\";\n  \"hbase.regionserver.info.bindAddress\" = \"0.0.0.0\";\n  \"hbase.regionserver.ipc.address\" = \"0.0.0.0\";\n}"}, "description": {"_type": "mdDoc", "text": "Default options for hbase-site.xml\n"}, "loc": ["services", "hadoop", "hbaseSiteDefault"], "readOnly": false, "type": "attribute set of anything"}, "services.hadoop.hdfs.datanode.dataDirs": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Tier and path definitions for datanode storage."}, "loc": ["services", "hadoop", "hdfs", "datanode", "dataDirs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.hadoop.hdfs.datanode.dataDirs.*.path": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "description": {"_type": "mdDoc", "text": "Determines where on the local filesystem a data node should store its blocks."}, "example": {"_type": "literalExpression", "text": "[\n  \"/var/lib/hadoop/hdfs/dn\"\n]"}, "loc": ["services", "hadoop", "hdfs", "datanode", "dataDirs", "*", "path"], "readOnly": false, "type": "path"}, "services.hadoop.hdfs.datanode.dataDirs.*.type": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "description": {"_type": "mdDoc", "text": "Storage types ([SSD]/[DISK]/[ARCHIVE]/[RAM_DISK]) for HDFS storage policies.\n"}, "loc": ["services", "hadoop", "hdfs", "datanode", "dataDirs", "*", "type"], "readOnly": false, "type": "one of \"SSD\", \"DISK\", \"ARCHIVE\", \"RAM_DISK\""}, "services.hadoop.hdfs.datanode.enable": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HDFS DataNode."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "hdfs", "datanode", "enable"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.datanode.extraEnv": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables for HDFS DataNode"}, "loc": ["services", "hadoop", "hdfs", "datanode", "extraEnv"], "readOnly": false, "type": "attribute set of string"}, "services.hadoop.hdfs.datanode.extraFlags": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line flags to pass to HDFS DataNode"}, "example": {"_type": "literalExpression", "text": "[\n  \"-Dcom.sun.management.jmxremote\"\n  \"-Dcom.sun.management.jmxremote.port=8010\"\n]"}, "loc": ["services", "hadoop", "hdfs", "datanode", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.hadoop.hdfs.datanode.openFirewall": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open firewall ports for HDFS DataNode."}, "loc": ["services", "hadoop", "hdfs", "datanode", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.datanode.restartIfChanged": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically restart the service on config change.\nThis can be set to false to defer restarts on clusters running critical applications.\nPlease consider the security implications of inadvertently running an older version,\nand the possibility of unexpected behavior caused by inconsistent versions across a cluster when disabling this option.\n"}, "loc": ["services", "hadoop", "hdfs", "datanode", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.httpfs.enable": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HDFS JournalNode."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "hdfs", "httpfs", "enable"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.httpfs.extraEnv": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables for HDFS JournalNode"}, "loc": ["services", "hadoop", "hdfs", "httpfs", "extraEnv"], "readOnly": false, "type": "attribute set of string"}, "services.hadoop.hdfs.httpfs.extraFlags": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line flags to pass to HDFS JournalNode"}, "example": {"_type": "literalExpression", "text": "[\n  \"-Dcom.sun.management.jmxremote\"\n  \"-Dcom.sun.management.jmxremote.port=8010\"\n]"}, "loc": ["services", "hadoop", "hdfs", "httpfs", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.hadoop.hdfs.httpfs.openFirewall": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open firewall ports for HDFS JournalNode."}, "loc": ["services", "hadoop", "hdfs", "httpfs", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.httpfs.restartIfChanged": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically restart the service on config change.\nThis can be set to false to defer restarts on clusters running critical applications.\nPlease consider the security implications of inadvertently running an older version,\nand the possibility of unexpected behavior caused by inconsistent versions across a cluster when disabling this option.\n"}, "loc": ["services", "hadoop", "hdfs", "httpfs", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.httpfs.tempPath": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "\"/tmp/hadoop/httpfs\""}, "description": {"_type": "mdDoc", "text": "HTTPFS_TEMP path used by HTTPFS"}, "loc": ["services", "hadoop", "hdfs", "httpfs", "tempPath"], "readOnly": false, "type": "path"}, "services.hadoop.hdfs.journalnode.enable": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HDFS JournalNode."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "hdfs", "journalnode", "enable"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.journalnode.extraEnv": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables for HDFS JournalNode"}, "loc": ["services", "hadoop", "hdfs", "journalnode", "extraEnv"], "readOnly": false, "type": "attribute set of string"}, "services.hadoop.hdfs.journalnode.extraFlags": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line flags to pass to HDFS JournalNode"}, "example": {"_type": "literalExpression", "text": "[\n  \"-Dcom.sun.management.jmxremote\"\n  \"-Dcom.sun.management.jmxremote.port=8010\"\n]"}, "loc": ["services", "hadoop", "hdfs", "journalnode", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.hadoop.hdfs.journalnode.openFirewall": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open firewall ports for HDFS JournalNode."}, "loc": ["services", "hadoop", "hdfs", "journalnode", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.journalnode.restartIfChanged": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically restart the service on config change.\nThis can be set to false to defer restarts on clusters running critical applications.\nPlease consider the security implications of inadvertently running an older version,\nand the possibility of unexpected behavior caused by inconsistent versions across a cluster when disabling this option.\n"}, "loc": ["services", "hadoop", "hdfs", "journalnode", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.namenode.enable": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HDFS NameNode."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "hdfs", "namenode", "enable"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.namenode.extraEnv": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables for HDFS NameNode"}, "loc": ["services", "hadoop", "hdfs", "namenode", "extraEnv"], "readOnly": false, "type": "attribute set of string"}, "services.hadoop.hdfs.namenode.extraFlags": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line flags to pass to HDFS NameNode"}, "example": {"_type": "literalExpression", "text": "[\n  \"-Dcom.sun.management.jmxremote\"\n  \"-Dcom.sun.management.jmxremote.port=8010\"\n]"}, "loc": ["services", "hadoop", "hdfs", "namenode", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.hadoop.hdfs.namenode.formatOnInit": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Format HDFS namenode on first start. This is useful for quickly spinning up\nephemeral HDFS clusters with a single namenode.\nFor HA clusters, initialization involves multiple steps across multiple nodes.\nFollow this guide to initialize an HA cluster manually:\n<https://hadoop.apache.org/docs/stable/hadoop-project-dist/hadoop-hdfs/HDFSHighAvailabilityWithQJM.html>\n"}, "loc": ["services", "hadoop", "hdfs", "namenode", "formatOnInit"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.namenode.openFirewall": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open firewall ports for HDFS NameNode."}, "loc": ["services", "hadoop", "hdfs", "namenode", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.namenode.restartIfChanged": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically restart the service on config change.\nThis can be set to false to defer restarts on clusters running critical applications.\nPlease consider the security implications of inadvertently running an older version,\nand the possibility of unexpected behavior caused by inconsistent versions across a cluster when disabling this option.\n"}, "loc": ["services", "hadoop", "hdfs", "namenode", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.zkfc.enable": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HDFS ZooKeeper failover controller."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "hdfs", "zkfc", "enable"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfs.zkfc.extraEnv": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables for HDFS ZooKeeper failover controller"}, "loc": ["services", "hadoop", "hdfs", "zkfc", "extraEnv"], "readOnly": false, "type": "attribute set of string"}, "services.hadoop.hdfs.zkfc.extraFlags": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line flags to pass to HDFS ZooKeeper failover controller"}, "example": {"_type": "literalExpression", "text": "[\n  \"-Dcom.sun.management.jmxremote\"\n  \"-Dcom.sun.management.jmxremote.port=8010\"\n]"}, "loc": ["services", "hadoop", "hdfs", "zkfc", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.hadoop.hdfs.zkfc.restartIfChanged": {"declarations": ["nixos/modules/services/cluster/hadoop/hdfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically restart the service on config change.\nThis can be set to false to defer restarts on clusters running critical applications.\nPlease consider the security implications of inadvertently running an older version,\nand the possibility of unexpected behavior caused by inconsistent versions across a cluster when disabling this option.\n"}, "loc": ["services", "hadoop", "hdfs", "zkfc", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.hadoop.hdfsSite": {"declarations": ["nixos/modules/services/cluster/hadoop/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional options and overrides for hdfs-site.xml\n<https://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-hdfs/hdfs-default.xml>\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"dfs.nameservices\" = \"namenode1\";\n}\n"}, "loc": ["services", "hadoop", "hdfsSite"], "readOnly": false, "type": "attribute set of anything"}, "services.hadoop.hdfsSiteDefault": {"declarations": ["nixos/modules/services/cluster/hadoop/default.nix"], "default": {"_type": "literalExpression", "text": "{\n  \"dfs.namenode.http-address\" = \"0.0.0.0:9870\";\n  \"dfs.namenode.http-bind-host\" = \"0.0.0.0\";\n  \"dfs.namenode.rpc-bind-host\" = \"0.0.0.0\";\n  \"dfs.namenode.servicerpc-bind-host\" = \"0.0.0.0\";\n}"}, "description": {"_type": "mdDoc", "text": "Default options for hdfs-site.xml\n"}, "loc": ["services", "hadoop", "hdfsSiteDefault"], "readOnly": false, "type": "attribute set of anything"}, "services.hadoop.httpfsSite": {"declarations": ["nixos/modules/services/cluster/hadoop/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Hadoop httpfs-site.xml definition\n<https://hadoop.apache.org/docs/current/hadoop-hdfs-httpfs/httpfs-default.html>\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"hadoop.http.max.threads\" = 500;\n}\n"}, "loc": ["services", "hadoop", "httpfsSite"], "readOnly": false, "type": "attribute set of anything"}, "services.hadoop.log4jProperties": {"declarations": ["nixos/modules/services/cluster/hadoop/default.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.hadoop.package}/lib/${config.services.hadoop.package.untarDir}/etc/hadoop/log4j.properties\"\n"}, "description": {"_type": "mdDoc", "text": "log4j.properties file added to HADOOP_CONF_DIR"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.hadoop}/lib/${pkgs.hadoop.untarDir}/etc/hadoop/log4j.properties\";\n"}, "loc": ["services", "hadoop", "log4jProperties"], "readOnly": false, "type": "path"}, "services.hadoop.mapredSite": {"declarations": ["nixos/modules/services/cluster/hadoop/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional options and overrides for mapred-site.xml\n<https://hadoop.apache.org/docs/current/hadoop-mapreduce-client/hadoop-mapreduce-client-core/mapred-default.xml>\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"mapreduce.map.java.opts\" = \"-Xmx900m -XX:+UseParallelGC\";\n}\n"}, "loc": ["services", "hadoop", "mapredSite"], "readOnly": false, "type": "attribute set of anything"}, "services.hadoop.mapredSiteDefault": {"declarations": ["nixos/modules/services/cluster/hadoop/default.nix"], "default": {"_type": "literalExpression", "text": "{\n  \"mapreduce.framework.name\" = \"yarn\";\n  \"yarn.app.mapreduce.am.env\" = \"HADOOP_MAPRED_HOME=${config.services.hadoop.package}/lib/${config.services.hadoop.package.untarDir}\";\n  \"mapreduce.map.env\" = \"HADOOP_MAPRED_HOME=${config.services.hadoop.package}/lib/${config.services.hadoop.package.untarDir}\";\n  \"mapreduce.reduce.env\" = \"HADOOP_MAPRED_HOME=${config.services.hadoop.package}/lib/${config.services.hadoop.package.untarDir}\";\n}\n"}, "description": {"_type": "mdDoc", "text": "Default options for mapred-site.xml\n"}, "loc": ["services", "hadoop", "mapredSiteDefault"], "readOnly": false, "type": "attribute set of anything"}, "services.hadoop.package": {"declarations": ["nixos/modules/services/cluster/hadoop/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.hadoop"}, "description": {"_type": "mdDoc", "text": ""}, "loc": ["services", "hadoop", "package"], "readOnly": false, "type": "package"}, "services.hadoop.yarn.nodemanager.addBinBash": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Add /bin/bash. This is needed by the linux container executor's launch script.\n"}, "loc": ["services", "hadoop", "yarn", "nodemanager", "addBinBash"], "readOnly": false, "type": "boolean"}, "services.hadoop.yarn.nodemanager.enable": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Hadoop YARN NodeManager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "yarn", "nodemanager", "enable"], "readOnly": false, "type": "boolean"}, "services.hadoop.yarn.nodemanager.extraEnv": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables"}, "loc": ["services", "hadoop", "yarn", "nodemanager", "extraEnv"], "readOnly": false, "type": "attribute set of string"}, "services.hadoop.yarn.nodemanager.extraFlags": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line flags to pass to the service"}, "example": {"_type": "literalExpression", "text": "[\n  \"-Dcom.sun.management.jmxremote\"\n  \"-Dcom.sun.management.jmxremote.port=8010\"\n]"}, "loc": ["services", "hadoop", "yarn", "nodemanager", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.hadoop.yarn.nodemanager.localDir": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of directories to store localized files in."}, "example": {"_type": "literalExpression", "text": "[\n  \"/var/lib/hadoop/yarn/nm\"\n]"}, "loc": ["services", "hadoop", "yarn", "nodemanager", "localDir"], "readOnly": false, "type": "null or (list of path)"}, "services.hadoop.yarn.nodemanager.openFirewall": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open firewall ports for nodemanager.\nBecause containers can listen on any ephemeral port, TCP ports 1024\u201365535 will be opened.\n"}, "loc": ["services", "hadoop", "yarn", "nodemanager", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.hadoop.yarn.nodemanager.resource.cpuVCores": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of vcores that can be allocated for containers."}, "loc": ["services", "hadoop", "yarn", "nodemanager", "resource", "cpuVCores"], "readOnly": false, "type": "null or positive integer, meaning >0"}, "services.hadoop.yarn.nodemanager.resource.maximumAllocationMB": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The maximum physical memory any container can be allocated."}, "loc": ["services", "hadoop", "yarn", "nodemanager", "resource", "maximumAllocationMB"], "readOnly": false, "type": "null or positive integer, meaning >0"}, "services.hadoop.yarn.nodemanager.resource.maximumAllocationVCores": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The maximum virtual CPU cores any container can be allocated."}, "loc": ["services", "hadoop", "yarn", "nodemanager", "resource", "maximumAllocationVCores"], "readOnly": false, "type": "null or positive integer, meaning >0"}, "services.hadoop.yarn.nodemanager.resource.memoryMB": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Amount of physical memory, in MB, that can be allocated for containers."}, "loc": ["services", "hadoop", "yarn", "nodemanager", "resource", "memoryMB"], "readOnly": false, "type": "null or positive integer, meaning >0"}, "services.hadoop.yarn.nodemanager.restartIfChanged": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically restart the service on config change.\nThis can be set to false to defer restarts on clusters running critical applications.\nPlease consider the security implications of inadvertently running an older version,\nand the possibility of unexpected behavior caused by inconsistent versions across a cluster when disabling this option.\n"}, "loc": ["services", "hadoop", "yarn", "nodemanager", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.hadoop.yarn.nodemanager.useCGroups": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Use cgroups to enforce resource limits on containers\n"}, "loc": ["services", "hadoop", "yarn", "nodemanager", "useCGroups"], "readOnly": false, "type": "boolean"}, "services.hadoop.yarn.resourcemanager.enable": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Hadoop YARN ResourceManager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hadoop", "yarn", "resourcemanager", "enable"], "readOnly": false, "type": "boolean"}, "services.hadoop.yarn.resourcemanager.extraEnv": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables"}, "loc": ["services", "hadoop", "yarn", "resourcemanager", "extraEnv"], "readOnly": false, "type": "attribute set of string"}, "services.hadoop.yarn.resourcemanager.extraFlags": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line flags to pass to the service"}, "example": {"_type": "literalExpression", "text": "[\n  \"-Dcom.sun.management.jmxremote\"\n  \"-Dcom.sun.management.jmxremote.port=8010\"\n]"}, "loc": ["services", "hadoop", "yarn", "resourcemanager", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.hadoop.yarn.resourcemanager.openFirewall": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open firewall ports for resourcemanager\n"}, "loc": ["services", "hadoop", "yarn", "resourcemanager", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.hadoop.yarn.resourcemanager.restartIfChanged": {"declarations": ["nixos/modules/services/cluster/hadoop/yarn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically restart the service on config change.\nThis can be set to false to defer restarts on clusters running critical applications.\nPlease consider the security implications of inadvertently running an older version,\nand the possibility of unexpected behavior caused by inconsistent versions across a cluster when disabling this option.\n"}, "loc": ["services", "hadoop", "yarn", "resourcemanager", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.hadoop.yarnSite": {"declarations": ["nixos/modules/services/cluster/hadoop/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional options and overrides for yarn-site.xml\n<https://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-common/yarn-default.xml>\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"yarn.resourcemanager.hostname\" = \"${config.networking.hostName}\";\n}\n"}, "loc": ["services", "hadoop", "yarnSite"], "readOnly": false, "type": "attribute set of anything"}, "services.hadoop.yarnSiteDefault": {"declarations": ["nixos/modules/services/cluster/hadoop/default.nix"], "default": {"_type": "literalExpression", "text": "{\n  \"yarn.nodemanager.admin-env\" = \"PATH=$PATH\";\n  \"yarn.nodemanager.aux-services\" = \"mapreduce_shuffle\";\n  \"yarn.nodemanager.aux-services.mapreduce_shuffle.class\" = \"org.apache.hadoop.mapred.ShuffleHandler\";\n  \"yarn.nodemanager.bind-host\" = \"0.0.0.0\";\n  \"yarn.nodemanager.container-executor.class\" = \"org.apache.hadoop.yarn.server.nodemanager.LinuxContainerExecutor\";\n  \"yarn.nodemanager.env-whitelist\" = \"JAVA_HOME,HADOOP_COMMON_HOME,HADOOP_HDFS_HOME,HADOOP_CONF_DIR,CLASSPATH_PREPEND_DISTCACHE,HADOOP_YARN_HOME,HADOOP_HOME,LANG,TZ\";\n  \"yarn.nodemanager.linux-container-executor.group\" = \"hadoop\";\n  \"yarn.nodemanager.linux-container-executor.path\" = \"/run/wrappers/yarn-nodemanager/bin/container-executor\";\n  \"yarn.nodemanager.log-dirs\" = \"/var/log/hadoop/yarn/nodemanager\";\n  \"yarn.resourcemanager.bind-host\" = \"0.0.0.0\";\n  \"yarn.resourcemanager.scheduler.class\" = \"org.apache.hadoop.yarn.server.resourcemanager.scheduler.fair.FairScheduler\";\n}"}, "description": {"_type": "mdDoc", "text": "Default options for yarn-site.xml\n"}, "loc": ["services", "hadoop", "yarnSiteDefault"], "readOnly": false, "type": "attribute set of anything"}, "services.hail.enable": {"declarations": ["nixos/modules/services/continuous-integration/hail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables the Hail Auto Update Service. Hail can automatically deploy artifacts\nbuilt by a Hydra Continuous Integration server. A common use case is to provide\ncontinuous deployment for single services or a full NixOS configuration."}, "loc": ["services", "hail", "enable"], "readOnly": false, "type": "boolean"}, "services.hail.hydraJobUri": {"declarations": ["nixos/modules/services/continuous-integration/hail.nix"], "description": {"_type": "mdDoc", "text": "The URI of the Hydra Job."}, "loc": ["services", "hail", "hydraJobUri"], "readOnly": false, "type": "string"}, "services.hail.netrc": {"declarations": ["nixos/modules/services/continuous-integration/hail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The netrc file to use when fetching data from Hydra."}, "loc": ["services", "hail", "netrc"], "readOnly": false, "type": "null or path"}, "services.hail.package": {"declarations": ["nixos/modules/services/continuous-integration/hail.nix"], "default": {"_type": "literalExpression", "text": "pkgs.haskellPackages.hail"}, "description": {"_type": "mdDoc", "text": "Hail package to use."}, "loc": ["services", "hail", "package"], "readOnly": false, "type": "package"}, "services.hail.profile": {"declarations": ["nixos/modules/services/continuous-integration/hail.nix"], "default": {"_type": "literalExpression", "text": "\"hail-profile\""}, "description": {"_type": "mdDoc", "text": "The name of the Nix profile used by Hail."}, "loc": ["services", "hail", "profile"], "readOnly": false, "type": "string"}, "services.haka.configFile": {"declarations": ["nixos/modules/services/security/haka.nix"], "default": {"_type": "literalExpression", "text": "\"empty.lua\""}, "description": {"_type": "mdDoc", "text": "Specify which configuration file Haka uses.\nIt can be absolute path or a path relative to the sample directory of\nthe haka git repo.\n"}, "example": {"_type": "literalExpression", "text": "\"/srv/haka/myfilter.lua\""}, "loc": ["services", "haka", "configFile"], "readOnly": false, "type": "string"}, "services.haka.dump.enable": {"declarations": ["nixos/modules/services/security/haka.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable dump."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "haka", "dump", "enable"], "readOnly": false, "type": "boolean"}, "services.haka.dump.input": {"declarations": ["nixos/modules/services/security/haka.nix"], "default": {"_type": "literalExpression", "text": "\"/tmp/input.pcap\""}, "description": {"_type": "mdDoc", "text": "Path to file where incoming packets are dumped"}, "example": {"_type": "literalExpression", "text": "\"/path/to/file.pcap\""}, "loc": ["services", "haka", "dump", "input"], "readOnly": false, "type": "path"}, "services.haka.dump.output": {"declarations": ["nixos/modules/services/security/haka.nix"], "default": {"_type": "literalExpression", "text": "\"/tmp/output.pcap\""}, "description": {"_type": "mdDoc", "text": "Path to file where outgoing packets are dumped"}, "example": {"_type": "literalExpression", "text": "\"/path/to/file.pcap\""}, "loc": ["services", "haka", "dump", "output"], "readOnly": false, "type": "path"}, "services.haka.enable": {"declarations": ["nixos/modules/services/security/haka.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Haka."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "haka", "enable"], "readOnly": false, "type": "boolean"}, "services.haka.interfaces": {"declarations": ["nixos/modules/services/security/haka.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"eth0\"\n]"}, "description": {"_type": "mdDoc", "text": "Specify which interface(s) Haka listens to.\nUse 'any' to listen to all interfaces.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"any\"\n]"}, "loc": ["services", "haka", "interfaces"], "readOnly": false, "type": "list of string"}, "services.haka.nfqueue": {"declarations": ["nixos/modules/services/security/haka.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nfqueue."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "haka", "nfqueue"], "readOnly": false, "type": "boolean"}, "services.haka.package": {"declarations": ["nixos/modules/services/security/haka.nix"], "default": {"_type": "literalExpression", "text": "pkgs.haka"}, "description": {"_type": "mdDoc", "text": "Which Haka derivation to use.\n"}, "loc": ["services", "haka", "package"], "readOnly": false, "type": "package"}, "services.haka.pcap": {"declarations": ["nixos/modules/services/security/haka.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable pcap"}, "loc": ["services", "haka", "pcap"], "readOnly": false, "type": "boolean"}, "services.haka.threads": {"declarations": ["nixos/modules/services/security/haka.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "The number of threads that will be used.\nAll system threads are used by default.\n"}, "example": {"_type": "literalExpression", "text": "4"}, "loc": ["services", "haka", "threads"], "readOnly": false, "type": "signed integer"}, "services.hans.clients": {"declarations": ["nixos/modules/services/networking/hans.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute of this option defines a systemd service that\nruns hans. Many or none may be defined.\nThe name of each service is\n`hans-\u00abname\u00bb`\nwhere \u00abname\u00bb is the name of the\ncorresponding attribute name.\n"}, "example": {"_type": "literalExpression", "text": "{\n  foo = {\n    server = \"192.0.2.1\";\n    extraConfig = \"-v\";\n  }\n}\n"}, "loc": ["services", "hans", "clients"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.hans.clients.<name>.extraConfig": {"declarations": ["nixos/modules/services/networking/hans.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional command line parameters"}, "example": {"_type": "literalExpression", "text": "\"-v\""}, "loc": ["services", "hans", "clients", "<name>", "extraConfig"], "readOnly": false, "type": "string"}, "services.hans.clients.<name>.passwordFile": {"declarations": ["nixos/modules/services/networking/hans.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "File that contains password"}, "loc": ["services", "hans", "clients", "<name>", "passwordFile"], "readOnly": false, "type": "string"}, "services.hans.clients.<name>.server": {"declarations": ["nixos/modules/services/networking/hans.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "IP address of server running hans"}, "example": {"_type": "literalExpression", "text": "\"192.0.2.1\""}, "loc": ["services", "hans", "clients", "<name>", "server"], "readOnly": false, "type": "string"}, "services.hans.server.enable": {"declarations": ["nixos/modules/services/networking/hans.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "enable hans server"}, "loc": ["services", "hans", "server", "enable"], "readOnly": false, "type": "boolean"}, "services.hans.server.extraConfig": {"declarations": ["nixos/modules/services/networking/hans.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional command line parameters"}, "example": {"_type": "literalExpression", "text": "\"-v\""}, "loc": ["services", "hans", "server", "extraConfig"], "readOnly": false, "type": "string"}, "services.hans.server.ip": {"declarations": ["nixos/modules/services/networking/hans.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The assigned ip range"}, "example": {"_type": "literalExpression", "text": "\"198.51.100.0\""}, "loc": ["services", "hans", "server", "ip"], "readOnly": false, "type": "string"}, "services.hans.server.passwordFile": {"declarations": ["nixos/modules/services/networking/hans.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "File that contains password"}, "loc": ["services", "hans", "server", "passwordFile"], "readOnly": false, "type": "string"}, "services.hans.server.respondToSystemPings": {"declarations": ["nixos/modules/services/networking/hans.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Force hans respond to ordinary pings"}, "loc": ["services", "hans", "server", "respondToSystemPings"], "readOnly": false, "type": "boolean"}, "services.haproxy.config": {"declarations": ["nixos/modules/services/networking/haproxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Contents of the HAProxy configuration file,\n{file}`haproxy.conf`.\n"}, "loc": ["services", "haproxy", "config"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.haproxy.enable": {"declarations": ["nixos/modules/services/networking/haproxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HAProxy, the reliable, high performance TCP/HTTP\nload balancer.\n"}, "loc": ["services", "haproxy", "enable"], "readOnly": false, "type": "boolean"}, "services.haproxy.group": {"declarations": ["nixos/modules/services/networking/haproxy.nix"], "default": {"_type": "literalExpression", "text": "\"haproxy\""}, "description": {"_type": "mdDoc", "text": "Group account under which haproxy runs."}, "loc": ["services", "haproxy", "group"], "readOnly": false, "type": "string"}, "services.haproxy.user": {"declarations": ["nixos/modules/services/networking/haproxy.nix"], "default": {"_type": "literalExpression", "text": "\"haproxy\""}, "description": {"_type": "mdDoc", "text": "User account under which haproxy runs."}, "loc": ["services", "haproxy", "user"], "readOnly": false, "type": "string"}, "services.hardware.argonone.enable": {"declarations": ["nixos/modules/services/hardware/argonone.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the driver for Argon One Raspberry Pi case fan and power button."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hardware", "argonone", "enable"], "readOnly": false, "type": "boolean"}, "services.hardware.argonone.package": {"declarations": ["nixos/modules/services/hardware/argonone.nix"], "default": {"_type": "literalExpression", "text": "pkgs.argononed"}, "description": {"_type": "mdDoc", "text": "The package implementing the Argon One driver\n"}, "loc": ["services", "hardware", "argonone", "package"], "readOnly": false, "type": "package"}, "services.hardware.bolt.enable": {"declarations": ["nixos/modules/services/hardware/bolt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Bolt, a userspace daemon to enable\nsecurity levels for Thunderbolt 3 on GNU/Linux.\n\nBolt is used by GNOME 3 to handle Thunderbolt settings.\n"}, "loc": ["services", "hardware", "bolt", "enable"], "readOnly": false, "type": "boolean"}, "services.hardware.lcd.client.enable": {"declarations": ["nixos/modules/services/hardware/lcd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the LCD panel client (LCDproc)"}, "loc": ["services", "hardware", "lcd", "client", "enable"], "readOnly": false, "type": "boolean"}, "services.hardware.lcd.client.extraConfig": {"declarations": ["nixos/modules/services/hardware/lcd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional configuration added verbatim to the client config."}, "loc": ["services", "hardware", "lcd", "client", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.hardware.lcd.client.restartForever": {"declarations": ["nixos/modules/services/hardware/lcd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Try restarting the client forever."}, "loc": ["services", "hardware", "lcd", "client", "restartForever"], "readOnly": false, "type": "boolean"}, "services.hardware.lcd.server.enable": {"declarations": ["nixos/modules/services/hardware/lcd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the LCD panel server (LCDd)"}, "loc": ["services", "hardware", "lcd", "server", "enable"], "readOnly": false, "type": "boolean"}, "services.hardware.lcd.server.extraConfig": {"declarations": ["nixos/modules/services/hardware/lcd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional configuration added verbatim to the server config."}, "loc": ["services", "hardware", "lcd", "server", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.hardware.lcd.server.openPorts": {"declarations": ["nixos/modules/services/hardware/lcd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open the ports in the firewall"}, "loc": ["services", "hardware", "lcd", "server", "openPorts"], "readOnly": false, "type": "boolean"}, "services.hardware.lcd.server.usbGroup": {"declarations": ["nixos/modules/services/hardware/lcd.nix"], "default": {"_type": "literalExpression", "text": "\"dialout\""}, "description": {"_type": "mdDoc", "text": "The group to use for settings permissions. This group must exist or you will have to create it."}, "loc": ["services", "hardware", "lcd", "server", "usbGroup"], "readOnly": false, "type": "string"}, "services.hardware.lcd.server.usbPermissions": {"declarations": ["nixos/modules/services/hardware/lcd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set group-write permissions on a USB device.\n\nA USB connected LCD panel will most likely require having its\npermissions modified for lcdd to write to it. Enabling this option\nsets group-write permissions on the device identified by\n{option}`services.hardware.lcd.usbVid` and\n{option}`services.hardware.lcd.usbPid`. In order to find the\nvalues, you can run the {command}`lsusb` command. Example\noutput:\n\n```\nBus 005 Device 002: ID 0403:c630 Future Technology Devices International, Ltd lcd2usb interface\n```\n\nIn this case the vendor id is 0403 and the product id is c630.\n"}, "loc": ["services", "hardware", "lcd", "server", "usbPermissions"], "readOnly": false, "type": "boolean"}, "services.hardware.lcd.server.usbPid": {"declarations": ["nixos/modules/services/hardware/lcd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The product ID of the USB device to claim."}, "loc": ["services", "hardware", "lcd", "server", "usbPid"], "readOnly": false, "type": "string"}, "services.hardware.lcd.server.usbVid": {"declarations": ["nixos/modules/services/hardware/lcd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The vendor ID of the USB device to claim."}, "loc": ["services", "hardware", "lcd", "server", "usbVid"], "readOnly": false, "type": "string"}, "services.hardware.lcd.serverHost": {"declarations": ["nixos/modules/services/hardware/lcd.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Host on which LCDd is listening."}, "loc": ["services", "hardware", "lcd", "serverHost"], "readOnly": false, "type": "string"}, "services.hardware.lcd.serverPort": {"declarations": ["nixos/modules/services/hardware/lcd.nix"], "default": {"_type": "literalExpression", "text": "13666"}, "description": {"_type": "mdDoc", "text": "Port on which LCDd is listening."}, "loc": ["services", "hardware", "lcd", "serverPort"], "readOnly": false, "type": "signed integer"}, "services.hardware.openrgb.enable": {"declarations": ["nixos/modules/services/hardware/openrgb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OpenRGB server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hardware", "openrgb", "enable"], "readOnly": false, "type": "boolean"}, "services.hardware.openrgb.motherboard": {"declarations": ["nixos/modules/services/hardware/openrgb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CPU family of motherboard. Allows for addition motherboard i2c support."}, "loc": ["services", "hardware", "openrgb", "motherboard"], "readOnly": false, "type": "null or one of \"amd\", \"intel\""}, "services.hardware.openrgb.package": {"declarations": ["nixos/modules/services/hardware/openrgb.nix"], "default": {"_type": "literalMD", "text": "pkgs.openrgb"}, "description": {"_type": "mdDoc", "text": "Set version of openrgb package to use."}, "loc": ["services", "hardware", "openrgb", "package"], "readOnly": false, "type": "package"}, "services.hardware.openrgb.server.port": {"declarations": ["nixos/modules/services/hardware/openrgb.nix"], "default": {"_type": "literalExpression", "text": "6742"}, "description": {"_type": "mdDoc", "text": "Set server port of openrgb."}, "loc": ["services", "hardware", "openrgb", "server", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.hardware.pommed.configFile": {"declarations": ["nixos/modules/services/hardware/pommed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the {file}`pommed.conf` file. Leave\nto null to use the default config file\n({file}`/etc/pommed.conf.mactel`). See the\nfiles {file}`/etc/pommed.conf.mactel` and\n{file}`/etc/pommed.conf.pmac` for examples to\nbuild on.\n"}, "loc": ["services", "hardware", "pommed", "configFile"], "readOnly": false, "type": "null or path"}, "services.hardware.pommed.enable": {"declarations": ["nixos/modules/services/hardware/pommed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use the pommed tool to handle Apple laptop\nkeyboard hotkeys.\n"}, "loc": ["services", "hardware", "pommed", "enable"], "readOnly": false, "type": "boolean"}, "services.harmonia.enable": {"declarations": ["nixos/modules/services/networking/harmonia.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Harmonia: Nix binary cache written in Rust."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "harmonia", "enable"], "readOnly": false, "type": "boolean"}, "services.harmonia.package": {"declarations": ["nixos/modules/services/networking/harmonia.nix"], "default": {"_type": "literalExpression", "text": "pkgs.harmonia"}, "description": {"_type": "mdDoc", "text": "The harmonia package to use."}, "loc": ["services", "harmonia", "package"], "readOnly": false, "type": "package"}, "services.harmonia.settings": {"declarations": ["nixos/modules/services/networking/harmonia.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings to merge with the default configuration.\nFor the list of the default configuration, see <https://github.com/nix-community/harmonia/tree/master#configuration>.\n"}, "loc": ["services", "harmonia", "settings"], "readOnly": false, "type": "TOML value"}, "services.harmonia.signKeyPath": {"declarations": ["nixos/modules/services/networking/harmonia.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the signing key that will be used for signing the cache"}, "loc": ["services", "harmonia", "signKeyPath"], "readOnly": false, "type": "null or path"}, "services.haste-server.enable": {"declarations": ["nixos/modules/services/editors/haste.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable haste-server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "haste-server", "enable"], "readOnly": false, "type": "boolean"}, "services.haste-server.openFirewall": {"declarations": ["nixos/modules/services/editors/haste.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable firewall passthrough for haste-server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "haste-server", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.haste-server.settings": {"declarations": ["nixos/modules/services/editors/haste.nix"], "description": {"_type": "mdDoc", "text": "Configuration for haste-server.\nFor documentation see [project readme](https://github.com/toptal/haste-server#settings)\n"}, "loc": ["services", "haste-server", "settings"], "readOnly": false, "type": "JSON value"}, "services.haveged.enable": {"declarations": ["nixos/modules/services/security/haveged.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable haveged entropy daemon, which refills /dev/random when low.\nNOTE: does nothing on kernels newer than 5.6.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "haveged", "enable"], "readOnly": false, "type": "boolean"}, "services.haveged.refill_threshold": {"declarations": ["nixos/modules/services/security/haveged.nix"], "default": {"_type": "literalExpression", "text": "1024"}, "description": {"_type": "mdDoc", "text": "The number of bits of available entropy beneath which\nhaveged should refill the entropy pool.\n"}, "loc": ["services", "haveged", "refill_threshold"], "readOnly": false, "type": "signed integer"}, "services.hbase-standalone.dataDir": {"declarations": ["nixos/modules/services/databases/hbase-standalone.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/hbase\""}, "description": {"_type": "mdDoc", "text": "Specifies location of HBase database files. This location should be\nwritable and readable for the user the HBase service runs as\n(hbase by default).\n"}, "loc": ["services", "hbase-standalone", "dataDir"], "readOnly": false, "type": "path"}, "services.hbase-standalone.enable": {"declarations": ["nixos/modules/services/databases/hbase-standalone.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HBase master in standalone mode with embedded regionserver and zookeper.\nDo not use this configuration for production nor for evaluating HBase performance.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hbase-standalone", "enable"], "readOnly": false, "type": "boolean"}, "services.hbase-standalone.group": {"declarations": ["nixos/modules/services/databases/hbase-standalone.nix"], "default": {"_type": "literalExpression", "text": "\"hbase\""}, "description": {"_type": "mdDoc", "text": "Group account under which HBase runs.\n"}, "loc": ["services", "hbase-standalone", "group"], "readOnly": false, "type": "string"}, "services.hbase-standalone.logDir": {"declarations": ["nixos/modules/services/databases/hbase-standalone.nix"], "default": {"_type": "literalExpression", "text": "\"/var/log/hbase\""}, "description": {"_type": "mdDoc", "text": "Specifies the location of HBase log files.\n"}, "loc": ["services", "hbase-standalone", "logDir"], "readOnly": false, "type": "path"}, "services.hbase-standalone.package": {"declarations": ["nixos/modules/services/databases/hbase-standalone.nix"], "default": {"_type": "literalExpression", "text": "pkgs.hbase"}, "description": {"_type": "mdDoc", "text": "HBase package to use.\n"}, "loc": ["services", "hbase-standalone", "package"], "readOnly": false, "type": "package"}, "services.hbase-standalone.settings": {"declarations": ["nixos/modules/services/databases/hbase-standalone.nix"], "default": {"_type": "literalExpression", "text": "{\n  \"hbase.rootdir\" = \"file://${config.services.hbase-standalone.dataDir}/hbase\";\n  \"hbase.zookeeper.property.dataDir\" = \"${config.services.hbase-standalone.dataDir}/zookeeper\";\n}\n"}, "description": {"_type": "mdDoc", "text": "configurations in hbase-site.xml, see <https://github.com/apache/hbase/blob/master/hbase-server/src/test/resources/hbase-site.xml> for details.\n"}, "loc": ["services", "hbase-standalone", "settings"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.hbase-standalone.user": {"declarations": ["nixos/modules/services/databases/hbase-standalone.nix"], "default": {"_type": "literalExpression", "text": "\"hbase\""}, "description": {"_type": "mdDoc", "text": "User account under which HBase runs.\n"}, "loc": ["services", "hbase-standalone", "user"], "readOnly": false, "type": "string"}, "services.hdapsd.enable": {"declarations": ["nixos/modules/services/monitoring/hdaps.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Hard Drive Active Protection System Daemon,\ndevices are detected and managed automatically by udev and systemd\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hdapsd", "enable"], "readOnly": false, "type": "boolean"}, "services.headphones.configFile": {"declarations": ["nixos/modules/services/misc/headphones.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.headphones.dataDir}/config.ini\""}, "description": {"_type": "mdDoc", "text": "Path to config file."}, "loc": ["services", "headphones", "configFile"], "readOnly": false, "type": "path"}, "services.headphones.dataDir": {"declarations": ["nixos/modules/services/misc/headphones.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/headphones\""}, "description": {"_type": "mdDoc", "text": "Path where to store data files."}, "loc": ["services", "headphones", "dataDir"], "readOnly": false, "type": "path"}, "services.headphones.enable": {"declarations": ["nixos/modules/services/misc/headphones.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the headphones server."}, "loc": ["services", "headphones", "enable"], "readOnly": false, "type": "boolean"}, "services.headphones.group": {"declarations": ["nixos/modules/services/misc/headphones.nix"], "default": {"_type": "literalExpression", "text": "\"headphones\""}, "description": {"_type": "mdDoc", "text": "Group to run the service as"}, "loc": ["services", "headphones", "group"], "readOnly": false, "type": "string"}, "services.headphones.host": {"declarations": ["nixos/modules/services/misc/headphones.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Host to listen on."}, "loc": ["services", "headphones", "host"], "readOnly": false, "type": "string"}, "services.headphones.port": {"declarations": ["nixos/modules/services/misc/headphones.nix"], "default": {"_type": "literalExpression", "text": "8181"}, "description": {"_type": "mdDoc", "text": "Port to bind to."}, "loc": ["services", "headphones", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.headphones.user": {"declarations": ["nixos/modules/services/misc/headphones.nix"], "default": {"_type": "literalExpression", "text": "\"headphones\""}, "description": {"_type": "mdDoc", "text": "User to run the service as"}, "loc": ["services", "headphones", "user"], "readOnly": false, "type": "string"}, "services.headscale.address": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listening address of headscale.\n"}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "headscale", "address"], "readOnly": false, "type": "string"}, "services.headscale.enable": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable headscale, Open Source coordination server for Tailscale."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "headscale", "enable"], "readOnly": false, "type": "boolean"}, "services.headscale.group": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"headscale\""}, "description": {"_type": "mdDoc", "text": "Group under which headscale runs.\n\n::: {.note}\nIf left as the default value this group will automatically be created\non system activation, otherwise you are responsible for\nensuring the user exists before the headscale service starts.\n:::\n"}, "loc": ["services", "headscale", "group"], "readOnly": false, "type": "string"}, "services.headscale.package": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "pkgs.headscale"}, "description": {"_type": "mdDoc", "text": "Which headscale package to use for the running server.\n"}, "loc": ["services", "headscale", "package"], "readOnly": false, "type": "package"}, "services.headscale.port": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Listening port of headscale.\n"}, "example": {"_type": "literalExpression", "text": "443"}, "loc": ["services", "headscale", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.headscale.settings": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "description": {"_type": "mdDoc", "text": "Overrides to {file}`config.yaml` as a Nix attribute set.\nCheck the [example config](https://github.com/juanfont/headscale/blob/main/config-example.yaml)\nfor possible options.\n"}, "loc": ["services", "headscale", "settings"], "readOnly": false, "type": "YAML value"}, "services.headscale.settings.acl_policy_path": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a file containing ACL policies.\n"}, "loc": ["services", "headscale", "settings", "acl_policy_path"], "readOnly": false, "type": "null or path"}, "services.headscale.settings.db_host": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Database host address."}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "headscale", "settings", "db_host"], "readOnly": false, "type": "null or string"}, "services.headscale.settings.db_name": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Database name."}, "example": {"_type": "literalExpression", "text": "\"headscale\""}, "loc": ["services", "headscale", "settings", "db_name"], "readOnly": false, "type": "null or string"}, "services.headscale.settings.db_password_file": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/headscale-dbpassword\""}, "loc": ["services", "headscale", "settings", "db_password_file"], "readOnly": false, "type": "null or path"}, "services.headscale.settings.db_path": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/headscale/db.sqlite\""}, "description": {"_type": "mdDoc", "text": "Path to the sqlite3 database file."}, "loc": ["services", "headscale", "settings", "db_path"], "readOnly": false, "type": "null or string"}, "services.headscale.settings.db_port": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "example": {"_type": "literalExpression", "text": "3306"}, "loc": ["services", "headscale", "settings", "db_port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.headscale.settings.db_type": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite3\""}, "description": {"_type": "mdDoc", "text": "Database engine to use."}, "example": {"_type": "literalExpression", "text": "\"postgres\""}, "loc": ["services", "headscale", "settings", "db_type"], "readOnly": false, "type": "one of \"sqlite3\", \"postgres\""}, "services.headscale.settings.db_user": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Database user."}, "example": {"_type": "literalExpression", "text": "\"headscale\""}, "loc": ["services", "headscale", "settings", "db_user"], "readOnly": false, "type": "null or string"}, "services.headscale.settings.derp.auto_update_enable": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to automatically update DERP maps on a set frequency.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "headscale", "settings", "derp", "auto_update_enable"], "readOnly": false, "type": "boolean"}, "services.headscale.settings.derp.paths": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of file paths containing DERP maps.\nSee [How Tailscale works](https://tailscale.com/blog/how-tailscale-works/) for more information on DERP maps.\n"}, "loc": ["services", "headscale", "settings", "derp", "paths"], "readOnly": false, "type": "list of path"}, "services.headscale.settings.derp.update_frequency": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"24h\""}, "description": {"_type": "mdDoc", "text": "Frequency to update DERP maps.\n"}, "example": {"_type": "literalExpression", "text": "\"5m\""}, "loc": ["services", "headscale", "settings", "derp", "update_frequency"], "readOnly": false, "type": "string"}, "services.headscale.settings.derp.urls": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"https://controlplane.tailscale.com/derpmap/default\"\n]"}, "description": {"_type": "mdDoc", "text": "List of urls containing DERP maps.\nSee [How Tailscale works](https://tailscale.com/blog/how-tailscale-works/) for more information on DERP maps.\n"}, "loc": ["services", "headscale", "settings", "derp", "urls"], "readOnly": false, "type": "list of string"}, "services.headscale.settings.dns_config.base_domain": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Defines the base domain to create the hostnames for MagicDNS.\n{option}`baseDomain` must be a FQDNs, without the trailing dot.\nThe FQDN of the hosts will be\n`hostname.namespace.base_domain` (e.g.\n`myhost.mynamespace.example.com`).\n"}, "loc": ["services", "headscale", "settings", "dns_config", "base_domain"], "readOnly": false, "type": "string"}, "services.headscale.settings.dns_config.domains": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Search domains to inject to Tailscale clients.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"mydomain.internal\"\n]"}, "loc": ["services", "headscale", "settings", "dns_config", "domains"], "readOnly": false, "type": "list of string"}, "services.headscale.settings.dns_config.magic_dns": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to use [MagicDNS](https://tailscale.com/kb/1081/magicdns/).\nOnly works if there is at least a nameserver defined.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "headscale", "settings", "dns_config", "magic_dns"], "readOnly": false, "type": "boolean"}, "services.headscale.settings.dns_config.nameservers": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"1.1.1.1\"\n]"}, "description": {"_type": "mdDoc", "text": "List of nameservers to pass to Tailscale clients.\n"}, "loc": ["services", "headscale", "settings", "dns_config", "nameservers"], "readOnly": false, "type": "list of string"}, "services.headscale.settings.dns_config.override_local_dns": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use [Override local DNS](https://tailscale.com/kb/1054/dns/).\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "headscale", "settings", "dns_config", "override_local_dns"], "readOnly": false, "type": "boolean"}, "services.headscale.settings.ephemeral_node_inactivity_timeout": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"30m\""}, "description": {"_type": "mdDoc", "text": "Time before an inactive ephemeral node is deleted.\n"}, "example": {"_type": "literalExpression", "text": "\"5m\""}, "loc": ["services", "headscale", "settings", "ephemeral_node_inactivity_timeout"], "readOnly": false, "type": "string"}, "services.headscale.settings.log.format": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"text\""}, "description": {"_type": "mdDoc", "text": "headscale log format.\n"}, "example": {"_type": "literalExpression", "text": "\"json\""}, "loc": ["services", "headscale", "settings", "log", "format"], "readOnly": false, "type": "string"}, "services.headscale.settings.log.level": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "headscale log level.\n"}, "example": {"_type": "literalExpression", "text": "\"debug\""}, "loc": ["services", "headscale", "settings", "log", "level"], "readOnly": false, "type": "string"}, "services.headscale.settings.noise.private_key_path": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/headscale/noise_private.key\""}, "description": {"_type": "mdDoc", "text": "Path to noise private key file, generated automatically if it does not exist.\n"}, "loc": ["services", "headscale", "settings", "noise", "private_key_path"], "readOnly": false, "type": "path"}, "services.headscale.settings.oidc.allowed_domains": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Allowed principal domains. if an authenticated user's domain\nis not in this list authentication request will be rejected.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"example.com\"\n]"}, "loc": ["services", "headscale", "settings", "oidc", "allowed_domains"], "readOnly": false, "type": "list of string"}, "services.headscale.settings.oidc.allowed_users": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Users allowed to authenticate even if not in allowedDomains.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"alice@example.com\"\n]"}, "loc": ["services", "headscale", "settings", "oidc", "allowed_users"], "readOnly": false, "type": "list of string"}, "services.headscale.settings.oidc.client_id": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "OpenID Connect client ID.\n"}, "loc": ["services", "headscale", "settings", "oidc", "client_id"], "readOnly": false, "type": "string"}, "services.headscale.settings.oidc.client_secret_path": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to OpenID Connect client secret file. Expands environment variables in format ${VAR}.\n"}, "loc": ["services", "headscale", "settings", "oidc", "client_secret_path"], "readOnly": false, "type": "null or path"}, "services.headscale.settings.oidc.extra_params": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Custom query parameters to send with the Authorize Endpoint request.\n"}, "example": {"_type": "literalExpression", "text": "{\n  domain_hint = \"example.com\";\n}"}, "loc": ["services", "headscale", "settings", "oidc", "extra_params"], "readOnly": false, "type": "attribute set of string"}, "services.headscale.settings.oidc.issuer": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "URL to OpenID issuer.\n"}, "example": {"_type": "literalExpression", "text": "\"https://openid.example.com\""}, "loc": ["services", "headscale", "settings", "oidc", "issuer"], "readOnly": false, "type": "string"}, "services.headscale.settings.oidc.scope": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"openid\"\n  \"profile\"\n  \"email\"\n]"}, "description": {"_type": "mdDoc", "text": "Scopes used in the OIDC flow.\n"}, "loc": ["services", "headscale", "settings", "oidc", "scope"], "readOnly": false, "type": "list of string"}, "services.headscale.settings.oidc.strip_email_domain": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the domain part of the email address should be removed when generating namespaces.\n"}, "loc": ["services", "headscale", "settings", "oidc", "strip_email_domain"], "readOnly": false, "type": "boolean"}, "services.headscale.settings.private_key_path": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/headscale/private.key\""}, "description": {"_type": "mdDoc", "text": "Path to private key file, generated automatically if it does not exist.\n"}, "loc": ["services", "headscale", "settings", "private_key_path"], "readOnly": false, "type": "path"}, "services.headscale.settings.server_url": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"http://127.0.0.1:8080\""}, "description": {"_type": "mdDoc", "text": "The url clients will connect to.\n"}, "example": {"_type": "literalExpression", "text": "\"https://myheadscale.example.com:443\""}, "loc": ["services", "headscale", "settings", "server_url"], "readOnly": false, "type": "string"}, "services.headscale.settings.tls_cert_path": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to already created certificate.\n"}, "loc": ["services", "headscale", "settings", "tls_cert_path"], "readOnly": false, "type": "null or path"}, "services.headscale.settings.tls_key_path": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to key for already created certificate.\n"}, "loc": ["services", "headscale", "settings", "tls_key_path"], "readOnly": false, "type": "null or path"}, "services.headscale.settings.tls_letsencrypt_challenge_type": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"HTTP-01\""}, "description": {"_type": "mdDoc", "text": "Type of ACME challenge to use, currently supported types:\n`HTTP-01` or `TLS-ALPN-01`.\n"}, "loc": ["services", "headscale", "settings", "tls_letsencrypt_challenge_type"], "readOnly": false, "type": "one of \"TLS-ALPN-01\", \"HTTP-01\""}, "services.headscale.settings.tls_letsencrypt_hostname": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Domain name to request a TLS certificate for.\n"}, "loc": ["services", "headscale", "settings", "tls_letsencrypt_hostname"], "readOnly": false, "type": "null or string"}, "services.headscale.settings.tls_letsencrypt_listen": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\":http\""}, "description": {"_type": "mdDoc", "text": "When HTTP-01 challenge is chosen, letsencrypt must set up a\nverification endpoint, and it will be listening on:\n`:http = port 80`.\n"}, "loc": ["services", "headscale", "settings", "tls_letsencrypt_listen"], "readOnly": false, "type": "null or string"}, "services.headscale.user": {"declarations": ["nixos/modules/services/networking/headscale.nix"], "default": {"_type": "literalExpression", "text": "\"headscale\""}, "description": {"_type": "mdDoc", "text": "User account under which headscale runs.\n\n::: {.note}\nIf left as the default value this user will automatically be created\non system activation, otherwise you are responsible for\nensuring the user exists before the headscale service starts.\n:::\n"}, "loc": ["services", "headscale", "user"], "readOnly": false, "type": "string"}, "services.healthchecks.dataDir": {"declarations": ["nixos/modules/services/web-apps/healthchecks.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/healthchecks\""}, "description": {"_type": "mdDoc", "text": "The directory used to store all data for healthchecks.\n\n::: {.note}\nIf left as the default value this directory will automatically be created before\nthe healthchecks server starts, otherwise you are responsible for ensuring the\ndirectory exists with appropriate ownership and permissions.\n:::\n"}, "loc": ["services", "healthchecks", "dataDir"], "readOnly": false, "type": "string"}, "services.healthchecks.enable": {"declarations": ["nixos/modules/services/web-apps/healthchecks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable healthchecks.\nIt is expected to be run behind a HTTP reverse proxy.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "healthchecks", "enable"], "readOnly": false, "type": "boolean"}, "services.healthchecks.group": {"declarations": ["nixos/modules/services/web-apps/healthchecks.nix"], "default": {"_type": "literalExpression", "text": "\"healthchecks\""}, "description": {"_type": "mdDoc", "text": "Group account under which healthchecks runs.\n\n::: {.note}\nIf left as the default value this group will automatically be created\non system activation, otherwise you are responsible for\nensuring the group exists before the healthchecks service starts.\n:::\n"}, "loc": ["services", "healthchecks", "group"], "readOnly": false, "type": "string"}, "services.healthchecks.listenAddress": {"declarations": ["nixos/modules/services/web-apps/healthchecks.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address the server will listen on."}, "loc": ["services", "healthchecks", "listenAddress"], "readOnly": false, "type": "string"}, "services.healthchecks.package": {"declarations": ["nixos/modules/services/web-apps/healthchecks.nix"], "default": {"_type": "literalExpression", "text": "pkgs.healthchecks"}, "description": {"_type": "mdDoc", "text": "healthchecks package to use."}, "loc": ["services", "healthchecks", "package"], "readOnly": false, "type": "package"}, "services.healthchecks.port": {"declarations": ["nixos/modules/services/web-apps/healthchecks.nix"], "default": {"_type": "literalExpression", "text": "8000"}, "description": {"_type": "mdDoc", "text": "Port the server will listen on."}, "loc": ["services", "healthchecks", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.healthchecks.settings": {"declarations": ["nixos/modules/services/web-apps/healthchecks.nix"], "description": {"_type": "mdDoc", "text": "Environment variables which are read by healthchecks `(local)_settings.py`.\n\nSettings which are explicitly covered in options bewlow, are type-checked and/or transformed\nbefore added to the environment, everything else is passed as a string.\n\nSee <https://healthchecks.io/docs/self_hosted_configuration/>\nfor a full documentation of settings.\n\nWe add two variables to this list inside the packages `local_settings.py.`\n- STATIC_ROOT to set a state directory for dynamically generated static files.\n- SECRET_KEY_FILE to read SECRET_KEY from a file at runtime and keep it out of /nix/store.\n"}, "loc": ["services", "healthchecks", "settings"], "readOnly": false, "type": "attribute set of string"}, "services.healthchecks.settings.ALLOWED_HOSTS": {"declarations": ["nixos/modules/services/web-apps/healthchecks.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*\"\n]"}, "description": {"_type": "mdDoc", "text": "The host/domain names that this site can serve."}, "loc": ["services", "healthchecks", "settings", "ALLOWED_HOSTS"], "readOnly": false, "type": "list of string"}, "services.healthchecks.settings.DEBUG": {"declarations": ["nixos/modules/services/web-apps/healthchecks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable debug mode."}, "loc": ["services", "healthchecks", "settings", "DEBUG"], "readOnly": false, "type": "boolean"}, "services.healthchecks.settings.REGISTRATION_OPEN": {"declarations": ["nixos/modules/services/web-apps/healthchecks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "A boolean that controls whether site visitors can create new accounts.\nSet it to false if you are setting up a private Healthchecks instance,\nbut it needs to be publicly accessible (so, for example, your cloud\nservices can send pings to it).\nIf you close new user registration, you can still selectively invite\nusers to your team account.\n"}, "loc": ["services", "healthchecks", "settings", "REGISTRATION_OPEN"], "readOnly": false, "type": "boolean"}, "services.healthchecks.settings.SECRET_KEY_FILE": {"declarations": ["nixos/modules/services/web-apps/healthchecks.nix"], "description": {"_type": "mdDoc", "text": "Path to a file containing the secret key."}, "loc": ["services", "healthchecks", "settings", "SECRET_KEY_FILE"], "readOnly": false, "type": "path"}, "services.healthchecks.user": {"declarations": ["nixos/modules/services/web-apps/healthchecks.nix"], "default": {"_type": "literalExpression", "text": "\"healthchecks\""}, "description": {"_type": "mdDoc", "text": "User account under which healthchecks runs.\n\n::: {.note}\nIf left as the default value this user will automatically be created\non system activation, otherwise you are responsible for\nensuring the user exists before the healthchecks service starts.\n:::\n"}, "loc": ["services", "healthchecks", "user"], "readOnly": false, "type": "string"}, "services.heapster.enable": {"declarations": ["nixos/modules/services/monitoring/heapster.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Heapster monitoring."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "heapster", "enable"], "readOnly": false, "type": "boolean"}, "services.heapster.extraOpts": {"declarations": ["nixos/modules/services/monitoring/heapster.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Heapster extra options"}, "loc": ["services", "heapster", "extraOpts"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.heapster.package": {"declarations": ["nixos/modules/services/monitoring/heapster.nix"], "default": {"_type": "literalExpression", "text": "pkgs.heapster"}, "description": {"_type": "mdDoc", "text": "Package to use by heapster"}, "loc": ["services", "heapster", "package"], "readOnly": false, "type": "package"}, "services.heapster.sink": {"declarations": ["nixos/modules/services/monitoring/heapster.nix"], "description": {"_type": "mdDoc", "text": "Heapster metic sink"}, "example": {"_type": "literalExpression", "text": "\"influxdb:http://localhost:8086\""}, "loc": ["services", "heapster", "sink"], "readOnly": false, "type": "string"}, "services.heapster.source": {"declarations": ["nixos/modules/services/monitoring/heapster.nix"], "description": {"_type": "mdDoc", "text": "Heapster metric source"}, "example": {"_type": "literalExpression", "text": "\"kubernetes:https://kubernetes.default\""}, "loc": ["services", "heapster", "source"], "readOnly": false, "type": "string"}, "services.heartbeat.enable": {"declarations": ["nixos/modules/services/logging/heartbeat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable heartbeat."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "heartbeat", "enable"], "readOnly": false, "type": "boolean"}, "services.heartbeat.extraConfig": {"declarations": ["nixos/modules/services/logging/heartbeat.nix"], "default": {"_type": "literalExpression", "text": "''\n  heartbeat.monitors:\n  - type: http\n    urls: [\"http://localhost:9200\"]\n    schedule: '@every 10s'\n''"}, "description": {"_type": "mdDoc", "text": "Any other configuration options you want to add"}, "loc": ["services", "heartbeat", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.heartbeat.name": {"declarations": ["nixos/modules/services/logging/heartbeat.nix"], "default": {"_type": "literalExpression", "text": "\"heartbeat\""}, "description": {"_type": "mdDoc", "text": "Name of the beat"}, "loc": ["services", "heartbeat", "name"], "readOnly": false, "type": "string"}, "services.heartbeat.package": {"declarations": ["nixos/modules/services/logging/heartbeat.nix"], "default": {"_type": "literalExpression", "text": "pkgs.heartbeat"}, "description": {"_type": "mdDoc", "text": "The heartbeat package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.heartbeat7"}, "loc": ["services", "heartbeat", "package"], "readOnly": false, "type": "package"}, "services.heartbeat.stateDir": {"declarations": ["nixos/modules/services/logging/heartbeat.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/heartbeat\""}, "description": {"_type": "mdDoc", "text": "The state directory. heartbeat's own logs and other data are stored here."}, "loc": ["services", "heartbeat", "stateDir"], "readOnly": false, "type": "string"}, "services.heartbeat.tags": {"declarations": ["nixos/modules/services/logging/heartbeat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Tags to place on the shipped log messages"}, "loc": ["services", "heartbeat", "tags"], "readOnly": false, "type": "list of string"}, "services.hedgedoc.enable": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HedgeDoc Markdown Editor."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hedgedoc", "enable"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.environmentFile": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file as defined in {manpage}`systemd.exec(5)`.\n\nSecrets may be passed to the service without adding them to the world-readable\nNix store, by specifying placeholder variables as the option value in Nix and\nsetting these variables accordingly in the environment file.\n\n```\n  # snippet of HedgeDoc-related config\n  services.hedgedoc.settings.dbURL = \"postgres://hedgedoc:\\${DB_PASSWORD}@db-host:5432/hedgedocdb\";\n  services.hedgedoc.settings.minio.secretKey = \"$MINIO_SECRET_KEY\";\n```\n\n```\n  # content of the environment file\n  DB_PASSWORD=verysecretdbpassword\n  MINIO_SECRET_KEY=verysecretminiokey\n```\n\nNote that this file needs to be available on the host on which\n`HedgeDoc` is running.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/hedgedoc/hedgedoc.env\""}, "loc": ["services", "hedgedoc", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.hedgedoc.groups": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Groups to which the service user should be added.\n"}, "loc": ["services", "hedgedoc", "groups"], "readOnly": false, "type": "list of string"}, "services.hedgedoc.package": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "pkgs.hedgedoc"}, "description": {"_type": "mdDoc", "text": "Package that provides HedgeDoc.\n"}, "loc": ["services", "hedgedoc", "package"], "readOnly": false, "type": "package"}, "services.hedgedoc.settings": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "HedgeDoc configuration, see\n<https://docs.hedgedoc.org/configuration/>\nfor documentation.\n"}, "loc": ["services", "hedgedoc", "settings"], "readOnly": false, "type": "JSON value"}, "services.hedgedoc.settings.allowAnonymous": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to allow anonymous usage.\n"}, "loc": ["services", "hedgedoc", "settings", "allowAnonymous"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.allowAnonymousEdits": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow guests to edit existing notes with the `freely` permission,\nwhen {option}`allowAnonymous` is enabled.\n"}, "loc": ["services", "hedgedoc", "settings", "allowAnonymousEdits"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.allowEmailRegister": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable email registration.\n"}, "loc": ["services", "hedgedoc", "settings", "allowEmailRegister"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.allowFreeURL": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow note creation by accessing a nonexistent note URL.\n"}, "loc": ["services", "hedgedoc", "settings", "allowFreeURL"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.allowGravatar": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to use gravatar as profile picture source.\n"}, "loc": ["services", "hedgedoc", "settings", "allowGravatar"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.allowOrigin": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of domains to whitelist.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"localhost\"\n  \"hedgedoc.org\"\n]"}, "loc": ["services", "hedgedoc", "settings", "allowOrigin"], "readOnly": false, "type": "list of string"}, "services.hedgedoc.settings.allowPDFExport": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable PDF exports.\n"}, "loc": ["services", "hedgedoc", "settings", "allowPDFExport"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.azure": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the azure third-party integration."}, "loc": ["services", "hedgedoc", "settings", "azure"], "readOnly": false, "type": "null or (submodule)"}, "services.hedgedoc.settings.azure.connectionString": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Azure Blob Storage connection string.\n"}, "loc": ["services", "hedgedoc", "settings", "azure", "connectionString"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.azure.container": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Azure Blob Storage container name.\nIt will be created if non-existent.\n"}, "loc": ["services", "hedgedoc", "settings", "azure", "container"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.csp": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the Content Security Policy which is passed to Helmet.\nFor configuration details see <https://helmetjs.github.io/docs/csp/>.\n"}, "example": {"_type": "literalExpression", "text": "{\n  enable = true;\n  directives = {\n    scriptSrc = \"trustworthy.scripts.example.com\";\n  };\n  upgradeInsecureRequest = \"auto\";\n  addDefaults = true;\n}\n"}, "loc": ["services", "hedgedoc", "settings", "csp"], "readOnly": false, "type": "null or (attribute set)"}, "services.hedgedoc.settings.db": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specify the configuration for sequelize.\nHedgeDoc supports mysql, postgres, sqlite and mssql.\nSee [\nhttps://sequelize.readthedocs.io/en/v3/](https://sequelize.readthedocs.io/en/v3/) for more information.\nNote: This option overrides {option}`db`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  dialect = \"sqlite\";\n  storage = \"/var/lib/hedgedoc/db.hedgedoc.sqlite\";\n}\n"}, "loc": ["services", "hedgedoc", "settings", "db"], "readOnly": false, "type": "attribute set"}, "services.hedgedoc.settings.dbURL": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify which database to use.\nHedgeDoc supports mysql, postgres, sqlite and mssql.\nSee [\nhttps://sequelize.readthedocs.io/en/v3/](https://sequelize.readthedocs.io/en/v3/) for more information.\nNote: This option overrides {option}`db`.\n"}, "example": {"_type": "literalExpression", "text": "''\n  postgres://user:pass@host:5432/dbname\n''"}, "loc": ["services", "hedgedoc", "settings", "dbURL"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.debug": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable debug mode."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hedgedoc", "settings", "debug"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.defaultNotePath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"${cfg.package}/public/default.md\""}, "description": {"_type": "mdDoc", "text": "Path to the default Note file.\n(Non-canonical paths are relative to HedgeDoc's base directory)\n"}, "loc": ["services", "hedgedoc", "settings", "defaultNotePath"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.defaultPermission": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"editable\""}, "description": {"_type": "mdDoc", "text": "Default permissions for notes.\nThis only applies for signed-in users.\n"}, "loc": ["services", "hedgedoc", "settings", "defaultPermission"], "readOnly": false, "type": "one of \"freely\", \"editable\", \"limited\", \"locked\", \"private\""}, "services.hedgedoc.settings.dhParamPath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the SSL dh params. Needed when {option}`useSSL` is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/hedgedoc/dhparam.pem\""}, "loc": ["services", "hedgedoc", "settings", "dhParamPath"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.docsPath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"${cfg.package}/public/docs\""}, "description": {"_type": "mdDoc", "text": "Path to the docs directory.\n(Non-canonical paths are relative to HedgeDoc's base directory)\n"}, "loc": ["services", "hedgedoc", "settings", "docsPath"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.documentMaxLength": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "100000"}, "description": {"_type": "mdDoc", "text": "Specify the maximum document length.\n"}, "loc": ["services", "hedgedoc", "settings", "documentMaxLength"], "readOnly": false, "type": "signed integer"}, "services.hedgedoc.settings.domain": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Domain name for the HedgeDoc instance.\n"}, "example": {"_type": "literalExpression", "text": "\"hedgedoc.org\""}, "loc": ["services", "hedgedoc", "settings", "domain"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.dropbox": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the Dropbox third-party integration."}, "loc": ["services", "hedgedoc", "settings", "dropbox"], "readOnly": false, "type": "null or (submodule)"}, "services.hedgedoc.settings.dropbox.appKey": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Dropbox app key.\n"}, "loc": ["services", "hedgedoc", "settings", "dropbox", "appKey"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.dropbox.clientID": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Dropbox API client ID.\n"}, "loc": ["services", "hedgedoc", "settings", "dropbox", "clientID"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.dropbox.clientSecret": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Dropbox API client secret.\n"}, "loc": ["services", "hedgedoc", "settings", "dropbox", "clientSecret"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.email": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable email sign-in.\n"}, "loc": ["services", "hedgedoc", "settings", "email"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.errorPath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"${cfg.package}/public/views/error.ejs\""}, "description": {"_type": "mdDoc", "text": "Path to the error template file.\n(Non-canonical paths are relative to HedgeDoc's base directory)\n"}, "loc": ["services", "hedgedoc", "settings", "errorPath"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.facebook": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the facebook third-party integration"}, "loc": ["services", "hedgedoc", "settings", "facebook"], "readOnly": false, "type": "null or (submodule)"}, "services.hedgedoc.settings.facebook.clientID": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Facebook API client ID.\n"}, "loc": ["services", "hedgedoc", "settings", "facebook", "clientID"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.facebook.clientSecret": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Facebook API client secret.\n"}, "loc": ["services", "hedgedoc", "settings", "facebook", "clientSecret"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.github": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the GitHub third-party integration."}, "loc": ["services", "hedgedoc", "settings", "github"], "readOnly": false, "type": "null or (submodule)"}, "services.hedgedoc.settings.github.clientID": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "GitHub API client ID.\n"}, "loc": ["services", "hedgedoc", "settings", "github", "clientID"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.github.clientSecret": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Github API client secret.\n"}, "loc": ["services", "hedgedoc", "settings", "github", "clientSecret"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.gitlab": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the GitLab third-party integration."}, "loc": ["services", "hedgedoc", "settings", "gitlab"], "readOnly": false, "type": "null or (submodule)"}, "services.hedgedoc.settings.gitlab.baseURL": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "GitLab API authentication endpoint.\nOnly needed for other endpoints than gitlab.com.\n"}, "loc": ["services", "hedgedoc", "settings", "gitlab", "baseURL"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.gitlab.clientID": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "GitLab API client ID.\n"}, "loc": ["services", "hedgedoc", "settings", "gitlab", "clientID"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.gitlab.clientSecret": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "GitLab API client secret.\n"}, "loc": ["services", "hedgedoc", "settings", "gitlab", "clientSecret"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.gitlab.scope": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"api\""}, "description": {"_type": "mdDoc", "text": "GitLab API requested scope.\nGitLab snippet import/export requires api scope.\n"}, "loc": ["services", "hedgedoc", "settings", "gitlab", "scope"], "readOnly": false, "type": "one of \"api\", \"read_user\""}, "services.hedgedoc.settings.google": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the Google third-party integration."}, "loc": ["services", "hedgedoc", "settings", "google"], "readOnly": false, "type": "null or (submodule)"}, "services.hedgedoc.settings.google.clientID": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Google API client ID.\n"}, "loc": ["services", "hedgedoc", "settings", "google", "clientID"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.google.clientSecret": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Google API client secret.\n"}, "loc": ["services", "hedgedoc", "settings", "google", "clientSecret"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.hackmdPath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"${cfg.package}/public/views/hackmd.ejs\""}, "description": {"_type": "mdDoc", "text": "Path to the hackmd template file.\n(Non-canonical paths are relative to HedgeDoc's base directory)\n"}, "loc": ["services", "hedgedoc", "settings", "hackmdPath"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.heartbeatInterval": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Specify the socket.io heartbeat interval.\n"}, "loc": ["services", "hedgedoc", "settings", "heartbeatInterval"], "readOnly": false, "type": "signed integer"}, "services.hedgedoc.settings.heartbeatTimeout": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "10000"}, "description": {"_type": "mdDoc", "text": "Specify the socket.io heartbeat timeout.\n"}, "loc": ["services", "hedgedoc", "settings", "heartbeatTimeout"], "readOnly": false, "type": "signed integer"}, "services.hedgedoc.settings.host": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "hedgedoc", "settings", "host"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.hsts.enable": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable HSTS if HTTPS is also enabled.\n"}, "loc": ["services", "hedgedoc", "settings", "hsts", "enable"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.hsts.includeSubdomains": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to include subdomains in HSTS.\n"}, "loc": ["services", "hedgedoc", "settings", "hsts", "includeSubdomains"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.hsts.maxAgeSeconds": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "31536000"}, "description": {"_type": "mdDoc", "text": "Max duration for clients to keep the HSTS status.\n"}, "loc": ["services", "hedgedoc", "settings", "hsts", "maxAgeSeconds"], "readOnly": false, "type": "signed integer"}, "services.hedgedoc.settings.hsts.preload": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to allow preloading of the site's HSTS status.\n"}, "loc": ["services", "hedgedoc", "settings", "hsts", "preload"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.imageUploadType": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"filesystem\""}, "description": {"_type": "mdDoc", "text": "Specify where to upload images.\n"}, "loc": ["services", "hedgedoc", "settings", "imageUploadType"], "readOnly": false, "type": "one of \"imgur\", \"s3\", \"minio\", \"filesystem\""}, "services.hedgedoc.settings.imgur.clientId": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Imgur API client ID.\n"}, "loc": ["services", "hedgedoc", "settings", "imgur", "clientId"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.indexPath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"${cfg.package}/public/views/index.ejs\""}, "description": {"_type": "mdDoc", "text": "Path to the index template file.\n(Non-canonical paths are relative to HedgeDoc's base directory)\n"}, "loc": ["services", "hedgedoc", "settings", "indexPath"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.ldap": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the LDAP integration."}, "loc": ["services", "hedgedoc", "settings", "ldap"], "readOnly": false, "type": "null or (submodule)"}, "services.hedgedoc.settings.ldap.bindCredentials": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Bind credentials for LDAP access.\n"}, "loc": ["services", "hedgedoc", "settings", "ldap", "bindCredentials"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.ldap.bindDn": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Bind DN for LDAP access.\n"}, "loc": ["services", "hedgedoc", "settings", "ldap", "bindDn"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.ldap.providerName": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Optional name to be displayed at login form, indicating the LDAP provider.\n"}, "loc": ["services", "hedgedoc", "settings", "ldap", "providerName"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.ldap.searchAttributes": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "LDAP attributes to search with.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"displayName\"\n  \"mail\"\n]"}, "loc": ["services", "hedgedoc", "settings", "ldap", "searchAttributes"], "readOnly": false, "type": "null or (list of string)"}, "services.hedgedoc.settings.ldap.searchBase": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "LDAP directory to begin search from.\n"}, "example": {"_type": "literalExpression", "text": "\"o=users,dc=example,dc=com\""}, "loc": ["services", "hedgedoc", "settings", "ldap", "searchBase"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.ldap.searchFilter": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "LDAP filter to search with.\n"}, "example": {"_type": "literalExpression", "text": "\"(uid={{username}})\""}, "loc": ["services", "hedgedoc", "settings", "ldap", "searchFilter"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.ldap.tlsca": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/ssl/certs/ca-certificates.crt\""}, "description": {"_type": "mdDoc", "text": "Root CA for LDAP TLS in PEM format.\n"}, "example": {"_type": "literalExpression", "text": "\"server-cert.pem,root.pem\""}, "loc": ["services", "hedgedoc", "settings", "ldap", "tlsca"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.ldap.url": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "URL of LDAP server.\n"}, "example": {"_type": "literalExpression", "text": "\"ldap://localhost\""}, "loc": ["services", "hedgedoc", "settings", "ldap", "url"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.ldap.userNameField": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "LDAP field which is used as the username on HedgeDoc.\nBy default {option}`useridField` is used.\n"}, "loc": ["services", "hedgedoc", "settings", "ldap", "userNameField"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.ldap.useridField": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "LDAP field which is a unique identifier for users on HedgeDoc.\n"}, "example": {"_type": "literalExpression", "text": "\"uid\""}, "loc": ["services", "hedgedoc", "settings", "ldap", "useridField"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.mattermost": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the Mattermost third-party integration."}, "loc": ["services", "hedgedoc", "settings", "mattermost"], "readOnly": false, "type": "null or (submodule)"}, "services.hedgedoc.settings.mattermost.baseURL": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Mattermost authentication endpoint.\n"}, "loc": ["services", "hedgedoc", "settings", "mattermost", "baseURL"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.mattermost.clientID": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Mattermost API client ID.\n"}, "loc": ["services", "hedgedoc", "settings", "mattermost", "clientID"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.mattermost.clientSecret": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Mattermost API client secret.\n"}, "loc": ["services", "hedgedoc", "settings", "mattermost", "clientSecret"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.minio": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the minio third-party integration."}, "loc": ["services", "hedgedoc", "settings", "minio"], "readOnly": false, "type": "null or (submodule)"}, "services.hedgedoc.settings.minio.accessKey": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Minio access key.\n"}, "loc": ["services", "hedgedoc", "settings", "minio", "accessKey"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.minio.endPoint": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Minio endpoint.\n"}, "loc": ["services", "hedgedoc", "settings", "minio", "endPoint"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.minio.port": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "9000"}, "description": {"_type": "mdDoc", "text": "Minio listen port.\n"}, "loc": ["services", "hedgedoc", "settings", "minio", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.hedgedoc.settings.minio.secretKey": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Minio secret key.\n"}, "loc": ["services", "hedgedoc", "settings", "minio", "secretKey"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.minio.secure": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to use HTTPS for Minio.\n"}, "loc": ["services", "hedgedoc", "settings", "minio", "secure"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.oauth2": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the OAuth integration."}, "loc": ["services", "hedgedoc", "settings", "oauth2"], "readOnly": false, "type": "null or (submodule)"}, "services.hedgedoc.settings.oauth2.accessRole": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify role which should be included in the ID token roles claim to grant access\n"}, "loc": ["services", "hedgedoc", "settings", "oauth2", "accessRole"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.oauth2.authorizationURL": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Specify the OAuth authorization URL.\n"}, "loc": ["services", "hedgedoc", "settings", "oauth2", "authorizationURL"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.oauth2.baseURL": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the OAuth base URL.\n"}, "loc": ["services", "hedgedoc", "settings", "oauth2", "baseURL"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.oauth2.clientID": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Specify the OAuth client ID.\n"}, "loc": ["services", "hedgedoc", "settings", "oauth2", "clientID"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.oauth2.clientSecret": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Specify the OAuth client secret.\n"}, "loc": ["services", "hedgedoc", "settings", "oauth2", "clientSecret"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.oauth2.providerName": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the name to be displayed for this strategy.\n"}, "loc": ["services", "hedgedoc", "settings", "oauth2", "providerName"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.oauth2.rolesClaim": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the role claim name.\n"}, "loc": ["services", "hedgedoc", "settings", "oauth2", "rolesClaim"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.oauth2.scope": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the OAuth scope.\n"}, "loc": ["services", "hedgedoc", "settings", "oauth2", "scope"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.oauth2.tokenURL": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Specify the OAuth token URL.\n"}, "loc": ["services", "hedgedoc", "settings", "oauth2", "tokenURL"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.oauth2.userProfileDisplayNameAttr": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the name of the attribute for the display name from the claim.\n"}, "loc": ["services", "hedgedoc", "settings", "oauth2", "userProfileDisplayNameAttr"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.oauth2.userProfileEmailAttr": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the name of the attribute for the email from the claim.\n"}, "loc": ["services", "hedgedoc", "settings", "oauth2", "userProfileEmailAttr"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.oauth2.userProfileURL": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the OAuth userprofile URL.\n"}, "loc": ["services", "hedgedoc", "settings", "oauth2", "userProfileURL"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.oauth2.userProfileUsernameAttr": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the name of the attribute for the username from the claim.\n"}, "loc": ["services", "hedgedoc", "settings", "oauth2", "userProfileUsernameAttr"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.path": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify where a UNIX domain socket should be placed.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/hedgedoc.sock\""}, "loc": ["services", "hedgedoc", "settings", "path"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.port": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "example": {"_type": "literalExpression", "text": "80"}, "loc": ["services", "hedgedoc", "settings", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.hedgedoc.settings.prettyPath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"${cfg.package}/public/views/pretty.ejs\""}, "description": {"_type": "mdDoc", "text": "Path to the pretty template file.\n(Non-canonical paths are relative to HedgeDoc's base directory)\n"}, "loc": ["services", "hedgedoc", "settings", "prettyPath"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.protocolUseSSL": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable to use TLS for resource paths.\nThis only applies when {option}`domain` is set.\n"}, "loc": ["services", "hedgedoc", "settings", "protocolUseSSL"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.requireFreeURLAuthentication": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to require authentication for FreeURL mode style note creation.\n"}, "loc": ["services", "hedgedoc", "settings", "requireFreeURLAuthentication"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.s3": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the s3 third-party integration."}, "loc": ["services", "hedgedoc", "settings", "s3"], "readOnly": false, "type": "null or (submodule)"}, "services.hedgedoc.settings.s3.accessKeyId": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "AWS access key id.\n"}, "loc": ["services", "hedgedoc", "settings", "s3", "accessKeyId"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.s3.region": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "AWS S3 region.\n"}, "loc": ["services", "hedgedoc", "settings", "s3", "region"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.s3.secretAccessKey": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "AWS access key.\n"}, "loc": ["services", "hedgedoc", "settings", "s3", "secretAccessKey"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.s3bucket": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the bucket name for upload types `s3` and `minio`.\n"}, "loc": ["services", "hedgedoc", "settings", "s3bucket"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.saml": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the SAML integration."}, "loc": ["services", "hedgedoc", "settings", "saml"], "readOnly": false, "type": "null or (submodule)"}, "services.hedgedoc.settings.saml.attribute.email": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Attribute map for `email`.\nDefaults to `NameID` of SAML response if\n{option}`identifierFormat` has\nthe default value.\n"}, "loc": ["services", "hedgedoc", "settings", "saml", "attribute", "email"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.saml.attribute.id": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Attribute map for `id`.\nDefaults to `NameID` of SAML response.\n"}, "loc": ["services", "hedgedoc", "settings", "saml", "attribute", "id"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.saml.attribute.username": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Attribute map for `username`.\nDefaults to `NameID` of SAML response.\n"}, "loc": ["services", "hedgedoc", "settings", "saml", "attribute", "username"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.saml.externalGroups": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Excluded group names.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"Temporary-staff\"\n  \"External-users\"\n]"}, "loc": ["services", "hedgedoc", "settings", "saml", "externalGroups"], "readOnly": false, "type": "list of string"}, "services.hedgedoc.settings.saml.groupAttribute": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Optional attribute name for group list.\n"}, "example": {"_type": "literalExpression", "text": "\"memberOf\""}, "loc": ["services", "hedgedoc", "settings", "saml", "groupAttribute"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.saml.identifierFormat": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress\""}, "description": {"_type": "mdDoc", "text": "Optional name identifier format.\n"}, "loc": ["services", "hedgedoc", "settings", "saml", "identifierFormat"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.saml.idpCert": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Path to IdP certificate file in PEM format.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/cert.pem\""}, "loc": ["services", "hedgedoc", "settings", "saml", "idpCert"], "readOnly": false, "type": "path"}, "services.hedgedoc.settings.saml.idpSsoUrl": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "IdP authentication endpoint.\n"}, "example": {"_type": "literalExpression", "text": "\"https://idp.example.com/sso\""}, "loc": ["services", "hedgedoc", "settings", "saml", "idpSsoUrl"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.saml.issuer": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Optional identity of the service provider.\nThis defaults to the server URL.\n"}, "loc": ["services", "hedgedoc", "settings", "saml", "issuer"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.saml.providerName": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Optional name to be displayed at login form indicating the SAML provider.\n"}, "example": {"_type": "literalExpression", "text": "\"My institution\""}, "loc": ["services", "hedgedoc", "settings", "saml", "providerName"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.saml.requiredGroups": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Required group names.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"Hedgedoc-Users\"\n]"}, "loc": ["services", "hedgedoc", "settings", "saml", "requiredGroups"], "readOnly": false, "type": "list of string"}, "services.hedgedoc.settings.sessionLife": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "1209600000"}, "description": {"_type": "mdDoc", "text": "Session life time in milliseconds.\n"}, "loc": ["services", "hedgedoc", "settings", "sessionLife"], "readOnly": false, "type": "signed integer"}, "services.hedgedoc.settings.sessionName": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"connect.sid\""}, "description": {"_type": "mdDoc", "text": "Specify the name of the session cookie.\n"}, "loc": ["services", "hedgedoc", "settings", "sessionName"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.sessionSecret": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the secret used to sign the session cookie.\nIf unset, one will be generated on startup.\n"}, "loc": ["services", "hedgedoc", "settings", "sessionSecret"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.slidePath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"${cfg.package}/public/views/slide.hbs\""}, "description": {"_type": "mdDoc", "text": "Path to the slide template file.\n(Non-canonical paths are relative to HedgeDoc's base directory)\n"}, "loc": ["services", "hedgedoc", "settings", "slidePath"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.sslCAPath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "SSL ca chain. Needed when {option}`useSSL` is enabled.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/var/lib/hedgedoc/ca.crt\"\n]"}, "loc": ["services", "hedgedoc", "settings", "sslCAPath"], "readOnly": false, "type": "list of string"}, "services.hedgedoc.settings.sslCertPath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the SSL cert. Needed when {option}`useSSL` is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/hedgedoc/hedgedoc.crt\""}, "loc": ["services", "hedgedoc", "settings", "sslCertPath"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.sslKeyPath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the SSL key. Needed when {option}`useSSL` is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/hedgedoc/hedgedoc.key\""}, "loc": ["services", "hedgedoc", "settings", "sslKeyPath"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.tmpPath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"/tmp\""}, "description": {"_type": "mdDoc", "text": "Path to the temp directory HedgeDoc should use.\nNote that {option}`serviceConfig.PrivateTmp` is enabled for\nthe HedgeDoc systemd service by default.\n(Non-canonical paths are relative to HedgeDoc's base directory)\n"}, "loc": ["services", "hedgedoc", "settings", "tmpPath"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.twitter": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the Twitter third-party integration."}, "loc": ["services", "hedgedoc", "settings", "twitter"], "readOnly": false, "type": "null or (submodule)"}, "services.hedgedoc.settings.twitter.consumerKey": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Twitter API consumer key.\n"}, "loc": ["services", "hedgedoc", "settings", "twitter", "consumerKey"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.twitter.consumerSecret": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "description": {"_type": "mdDoc", "text": "Twitter API consumer secret.\n"}, "loc": ["services", "hedgedoc", "settings", "twitter", "consumerSecret"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.uploadsPath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"${cfg.workDir}/uploads\""}, "description": {"_type": "mdDoc", "text": "Path under which uploaded files are saved.\n"}, "loc": ["services", "hedgedoc", "settings", "uploadsPath"], "readOnly": false, "type": "string"}, "services.hedgedoc.settings.urlAddPort": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable to add the port to callback URLs.\nThis only applies when {option}`domain` is set\nand only for ports other than 80 and 443.\n"}, "loc": ["services", "hedgedoc", "settings", "urlAddPort"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.urlPath": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path under which HedgeDoc is accessible.\n"}, "example": {"_type": "literalExpression", "text": "\"/url/path/to/hedgedoc\""}, "loc": ["services", "hedgedoc", "settings", "urlPath"], "readOnly": false, "type": "null or string"}, "services.hedgedoc.settings.useCDN": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use CDN resources or not.\n"}, "loc": ["services", "hedgedoc", "settings", "useCDN"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.settings.useSSL": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable to use SSL server. This will also enable\n{option}`protocolUseSSL`.\n"}, "loc": ["services", "hedgedoc", "settings", "useSSL"], "readOnly": false, "type": "boolean"}, "services.hedgedoc.workDir": {"declarations": ["nixos/modules/services/web-apps/hedgedoc.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/hedgedoc\""}, "description": {"_type": "mdDoc", "text": "Working directory for the HedgeDoc service.\n"}, "loc": ["services", "hedgedoc", "workDir"], "readOnly": false, "type": "path"}, "services.heisenbridge.address": {"declarations": ["nixos/modules/services/misc/heisenbridge.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address to listen on. IPv6 does not seem to be supported."}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "heisenbridge", "address"], "readOnly": false, "type": "string"}, "services.heisenbridge.debug": {"declarations": ["nixos/modules/services/misc/heisenbridge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "More verbose logging. Recommended during initial setup."}, "loc": ["services", "heisenbridge", "debug"], "readOnly": false, "type": "boolean"}, "services.heisenbridge.enable": {"declarations": ["nixos/modules/services/misc/heisenbridge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Matrix to IRC bridge."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "heisenbridge", "enable"], "readOnly": false, "type": "boolean"}, "services.heisenbridge.extraArgs": {"declarations": ["nixos/modules/services/misc/heisenbridge.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Heisenbridge is configured over the command line. Append extra arguments here"}, "loc": ["services", "heisenbridge", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.heisenbridge.homeserver": {"declarations": ["nixos/modules/services/misc/heisenbridge.nix"], "description": {"_type": "mdDoc", "text": "The URL to the home server for client-server API calls"}, "example": {"_type": "literalExpression", "text": "\"http://localhost:8008\""}, "loc": ["services", "heisenbridge", "homeserver"], "readOnly": false, "type": "string"}, "services.heisenbridge.identd.enable": {"declarations": ["nixos/modules/services/misc/heisenbridge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable identd service support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "heisenbridge", "identd", "enable"], "readOnly": false, "type": "boolean"}, "services.heisenbridge.identd.port": {"declarations": ["nixos/modules/services/misc/heisenbridge.nix"], "default": {"_type": "literalExpression", "text": "113"}, "description": {"_type": "mdDoc", "text": "identd listen port"}, "loc": ["services", "heisenbridge", "identd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.heisenbridge.namespaces": {"declarations": ["nixos/modules/services/misc/heisenbridge.nix"], "default": {"_type": "literalExpression", "text": "{\n  aliases = [ ];\n  rooms = [ ];\n  users = [\n    {\n      exclusive = true;\n      regex = \"@irc_.*\";\n    }\n  ];\n}"}, "description": {"_type": "mdDoc", "text": "Configure the 'namespaces' section of the registration.yml for the bridge and the server"}, "loc": ["services", "heisenbridge", "namespaces"], "readOnly": false, "type": "JSON value"}, "services.heisenbridge.owner": {"declarations": ["nixos/modules/services/misc/heisenbridge.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set owner MXID otherwise first talking local user will claim the bridge\n"}, "example": {"_type": "literalExpression", "text": "\"@admin:example.org\""}, "loc": ["services", "heisenbridge", "owner"], "readOnly": false, "type": "null or string"}, "services.heisenbridge.package": {"declarations": ["nixos/modules/services/misc/heisenbridge.nix"], "default": {"_type": "literalExpression", "text": "pkgs.heisenbridge"}, "description": {"_type": "mdDoc", "text": "Package of the application to run, exposed for overriding purposes.\n"}, "loc": ["services", "heisenbridge", "package"], "readOnly": false, "type": "package"}, "services.heisenbridge.port": {"declarations": ["nixos/modules/services/misc/heisenbridge.nix"], "default": {"_type": "literalExpression", "text": "9898"}, "description": {"_type": "mdDoc", "text": "The port to listen on"}, "loc": ["services", "heisenbridge", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.heisenbridge.registrationUrl": {"declarations": ["nixos/modules/services/misc/heisenbridge.nix"], "default": {"_type": "literalExpression", "text": "\"http://$\\${cfg.address}:$\\${toString cfg.port}\""}, "description": {"_type": "mdDoc", "text": "The URL where the application service is listening for HS requests, from the Matrix HS perspective.#\nThe default value assumes the bridge runs on the same host as the home server, in the same network.\n"}, "example": {"_type": "literalExpression", "text": "\"https://matrix.example.org\""}, "loc": ["services", "heisenbridge", "registrationUrl"], "readOnly": false, "type": "string"}, "services.hitch.backend": {"declarations": ["nixos/modules/services/web-servers/hitch/default.nix"], "description": {"_type": "mdDoc", "text": "The host and port Hitch connects to when receiving\na connection in the form [HOST]:PORT\n"}, "loc": ["services", "hitch", "backend"], "readOnly": false, "type": "string"}, "services.hitch.ciphers": {"declarations": ["nixos/modules/services/web-servers/hitch/default.nix"], "default": {"_type": "literalExpression", "text": "\"EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH\""}, "description": {"_type": "mdDoc", "text": "The list of ciphers to use"}, "loc": ["services", "hitch", "ciphers"], "readOnly": false, "type": "string"}, "services.hitch.enable": {"declarations": ["nixos/modules/services/web-servers/hitch/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Hitch Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hitch", "enable"], "readOnly": false, "type": "boolean"}, "services.hitch.extraConfig": {"declarations": ["nixos/modules/services/web-servers/hitch/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional configuration lines"}, "loc": ["services", "hitch", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.hitch.frontend": {"declarations": ["nixos/modules/services/web-servers/hitch/default.nix"], "default": {"_type": "literalExpression", "text": "\"[127.0.0.1]:443\""}, "description": {"_type": "mdDoc", "text": "The port and interface of the listen endpoint in the\nform [HOST]:PORT[+CERT].\n"}, "loc": ["services", "hitch", "frontend"], "readOnly": false, "type": "string or list of string"}, "services.hitch.group": {"declarations": ["nixos/modules/services/web-servers/hitch/default.nix"], "default": {"_type": "literalExpression", "text": "\"hitch\""}, "description": {"_type": "mdDoc", "text": "The group to run as"}, "loc": ["services", "hitch", "group"], "readOnly": false, "type": "string"}, "services.hitch.ocsp-stapling.enabled": {"declarations": ["nixos/modules/services/web-servers/hitch/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable OCSP Stapling"}, "loc": ["services", "hitch", "ocsp-stapling", "enabled"], "readOnly": false, "type": "boolean"}, "services.hitch.pem-files": {"declarations": ["nixos/modules/services/web-servers/hitch/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "PEM files to use"}, "loc": ["services", "hitch", "pem-files"], "readOnly": false, "type": "list of path"}, "services.hitch.user": {"declarations": ["nixos/modules/services/web-servers/hitch/default.nix"], "default": {"_type": "literalExpression", "text": "\"hitch\""}, "description": {"_type": "mdDoc", "text": "The user to run as"}, "loc": ["services", "hitch", "user"], "readOnly": false, "type": "string"}, "services.hledger-web.baseUrl": {"declarations": ["nixos/modules/services/web-apps/hledger-web.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Base URL, when sharing over a network.\n"}, "example": {"_type": "literalExpression", "text": "\"https://example.org\""}, "loc": ["services", "hledger-web", "baseUrl"], "readOnly": false, "type": "null or string"}, "services.hledger-web.capabilities.add": {"declarations": ["nixos/modules/services/web-apps/hledger-web.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the add capability.\n"}, "loc": ["services", "hledger-web", "capabilities", "add"], "readOnly": false, "type": "boolean"}, "services.hledger-web.capabilities.manage": {"declarations": ["nixos/modules/services/web-apps/hledger-web.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the manage capability.\n"}, "loc": ["services", "hledger-web", "capabilities", "manage"], "readOnly": false, "type": "boolean"}, "services.hledger-web.capabilities.view": {"declarations": ["nixos/modules/services/web-apps/hledger-web.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable the view capability.\n"}, "loc": ["services", "hledger-web", "capabilities", "view"], "readOnly": false, "type": "boolean"}, "services.hledger-web.enable": {"declarations": ["nixos/modules/services/web-apps/hledger-web.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable hledger-web service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hledger-web", "enable"], "readOnly": false, "type": "boolean"}, "services.hledger-web.extraOptions": {"declarations": ["nixos/modules/services/web-apps/hledger-web.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line arguments to pass to hledger-web.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--forecast\"\n]"}, "loc": ["services", "hledger-web", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.hledger-web.host": {"declarations": ["nixos/modules/services/web-apps/hledger-web.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "hledger-web", "host"], "readOnly": false, "type": "string"}, "services.hledger-web.journalFiles": {"declarations": ["nixos/modules/services/web-apps/hledger-web.nix"], "default": {"_type": "literalExpression", "text": "[\n  \".hledger.journal\"\n]"}, "description": {"_type": "mdDoc", "text": "Paths to journal files relative to {option}`services.hledger-web.stateDir`.\n"}, "loc": ["services", "hledger-web", "journalFiles"], "readOnly": false, "type": "list of string"}, "services.hledger-web.port": {"declarations": ["nixos/modules/services/web-apps/hledger-web.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "example": {"_type": "literalExpression", "text": "80"}, "loc": ["services", "hledger-web", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.hledger-web.serveApi": {"declarations": ["nixos/modules/services/web-apps/hledger-web.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Serve only the JSON web API, without the web UI."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hledger-web", "serveApi"], "readOnly": false, "type": "boolean"}, "services.hledger-web.stateDir": {"declarations": ["nixos/modules/services/web-apps/hledger-web.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/hledger-web\""}, "description": {"_type": "mdDoc", "text": "Path the service has access to. If left as the default value this\ndirectory will automatically be created before the hledger-web server\nstarts, otherwise the sysadmin is responsible for ensuring the\ndirectory exists with appropriate ownership and permissions.\n"}, "loc": ["services", "hledger-web", "stateDir"], "readOnly": false, "type": "path"}, "services.hockeypuck.enable": {"declarations": ["nixos/modules/services/security/hockeypuck.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Hockeypuck OpenPGP Key Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hockeypuck", "enable"], "readOnly": false, "type": "boolean"}, "services.hockeypuck.port": {"declarations": ["nixos/modules/services/security/hockeypuck.nix"], "default": {"_type": "literalExpression", "text": "11371"}, "description": {"_type": "mdDoc", "text": "HKP port to listen on."}, "loc": ["services", "hockeypuck", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.hockeypuck.settings": {"declarations": ["nixos/modules/services/security/hockeypuck.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration file for hockeypuck, here you can override\ncertain settings (`loglevel` and\n`openpgp.db.dsn`) by just setting those values.\n\nFor other settings you need to use lib.mkForce to override them.\n\nThis service doesn't provision or enable postgres on your\nsystem, it rather assumes that you enable postgres and create\nthe database yourself.\n\nExample:\n```\n  services.postgresql = {\n    enable = true;\n    ensureDatabases = [ \"hockeypuck\" ];\n    ensureUsers = [{\n      name = \"hockeypuck\";\n      ensurePermissions.\"DATABASE hockeypuck\" = \"ALL PRIVILEGES\";\n    }];\n  };\n```\n"}, "example": {"_type": "literalExpression", "text": "{\n  hockeypuck = {\n    loglevel = \"INFO\";\n    logfile = \"/var/log/hockeypuck/hockeypuck.log\";\n    indexTemplate = \"${pkgs.hockeypuck-web}/share/templates/index.html.tmpl\";\n    vindexTemplate = \"${pkgs.hockeypuck-web}/share/templates/index.html.tmpl\";\n    statsTemplate = \"${pkgs.hockeypuck-web}/share/templates/stats.html.tmpl\";\n    webroot = \"${pkgs.hockeypuck-web}/share/webroot\";\n\n    hkp.bind = \":${toString cfg.port}\";\n\n    openpgp.db = {\n      driver = \"postgres-jsonb\";\n      dsn = \"database=hockeypuck host=/var/run/postgresql sslmode=disable\";\n    };\n  };\n}\n"}, "loc": ["services", "hockeypuck", "settings"], "readOnly": false, "type": "TOML value"}, "services.hologram-agent.dialAddress": {"declarations": ["nixos/modules/services/security/hologram-agent.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:3100\""}, "description": {"_type": "mdDoc", "text": "Hologram server and port."}, "loc": ["services", "hologram-agent", "dialAddress"], "readOnly": false, "type": "string"}, "services.hologram-agent.enable": {"declarations": ["nixos/modules/services/security/hologram-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Hologram agent for AWS instance credentials"}, "loc": ["services", "hologram-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.hologram-agent.httpPort": {"declarations": ["nixos/modules/services/security/hologram-agent.nix"], "default": {"_type": "literalExpression", "text": "\"80\""}, "description": {"_type": "mdDoc", "text": "Port for metadata service to listen on."}, "loc": ["services", "hologram-agent", "httpPort"], "readOnly": false, "type": "string"}, "services.hologram-server.awsAccount": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "description": {"_type": "mdDoc", "text": "AWS account number"}, "loc": ["services", "hologram-server", "awsAccount"], "readOnly": false, "type": "string"}, "services.hologram-server.awsDefaultRole": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "description": {"_type": "mdDoc", "text": "AWS default role"}, "loc": ["services", "hologram-server", "awsDefaultRole"], "readOnly": false, "type": "string"}, "services.hologram-server.cacheTimeoutSeconds": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "default": {"_type": "literalExpression", "text": "3600"}, "description": {"_type": "mdDoc", "text": "How often (in seconds) to refresh the LDAP cache"}, "loc": ["services", "hologram-server", "cacheTimeoutSeconds"], "readOnly": false, "type": "signed integer"}, "services.hologram-server.enable": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Hologram server for AWS instance credentials"}, "loc": ["services", "hologram-server", "enable"], "readOnly": false, "type": "boolean"}, "services.hologram-server.enableLdapRoles": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to assign user roles based on the user's LDAP group memberships"}, "loc": ["services", "hologram-server", "enableLdapRoles"], "readOnly": false, "type": "boolean"}, "services.hologram-server.groupClassAttr": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "default": {"_type": "literalExpression", "text": "\"groupOfNames\""}, "description": {"_type": "mdDoc", "text": "The objectclass attribute to search for groups when enableLdapRoles is true"}, "loc": ["services", "hologram-server", "groupClassAttr"], "readOnly": false, "type": "string"}, "services.hologram-server.ldapBaseDN": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "description": {"_type": "mdDoc", "text": "The base DN for your Hologram users"}, "loc": ["services", "hologram-server", "ldapBaseDN"], "readOnly": false, "type": "string"}, "services.hologram-server.ldapBindDN": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "description": {"_type": "mdDoc", "text": "DN of account to use to query the LDAP server"}, "loc": ["services", "hologram-server", "ldapBindDN"], "readOnly": false, "type": "string"}, "services.hologram-server.ldapBindPassword": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "description": {"_type": "mdDoc", "text": "Password of account to use to query the LDAP server"}, "loc": ["services", "hologram-server", "ldapBindPassword"], "readOnly": false, "type": "string"}, "services.hologram-server.ldapHost": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "description": {"_type": "mdDoc", "text": "Address of the LDAP server to use"}, "loc": ["services", "hologram-server", "ldapHost"], "readOnly": false, "type": "string"}, "services.hologram-server.ldapInsecure": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to connect to LDAP over SSL or not"}, "loc": ["services", "hologram-server", "ldapInsecure"], "readOnly": false, "type": "boolean"}, "services.hologram-server.ldapUserAttr": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "default": {"_type": "literalExpression", "text": "\"cn\""}, "description": {"_type": "mdDoc", "text": "The LDAP attribute for usernames"}, "loc": ["services", "hologram-server", "ldapUserAttr"], "readOnly": false, "type": "string"}, "services.hologram-server.listenAddress": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0:3100\""}, "description": {"_type": "mdDoc", "text": "Address and port to listen on"}, "loc": ["services", "hologram-server", "listenAddress"], "readOnly": false, "type": "string"}, "services.hologram-server.roleAttr": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "default": {"_type": "literalExpression", "text": "\"businessCategory\""}, "description": {"_type": "mdDoc", "text": "Which LDAP group attribute to search for authorized role ARNs"}, "loc": ["services", "hologram-server", "roleAttr"], "readOnly": false, "type": "string"}, "services.hologram-server.statsAddress": {"declarations": ["nixos/modules/services/security/hologram-server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Address of statsd server"}, "loc": ["services", "hologram-server", "statsAddress"], "readOnly": false, "type": "string"}, "services.homed.enable": {"declarations": ["nixos/modules/system/boot/systemd/homed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Enable systemd home area/user account manager\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "homed", "enable"], "readOnly": false, "type": "boolean"}, "services.hoogle.enable": {"declarations": ["nixos/modules/services/development/hoogle.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Haskell documentation server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hoogle", "enable"], "readOnly": false, "type": "boolean"}, "services.hoogle.haskellPackages": {"declarations": ["nixos/modules/services/development/hoogle.nix"], "default": {"_type": "literalExpression", "text": "pkgs.haskellPackages"}, "description": {"_type": "mdDoc", "text": "Which haskell package set to use."}, "loc": ["services", "hoogle", "haskellPackages"], "readOnly": false, "type": "attribute set"}, "services.hoogle.home": {"declarations": ["nixos/modules/services/development/hoogle.nix"], "default": {"_type": "literalExpression", "text": "\"https://hoogle.haskell.org\""}, "description": {"_type": "mdDoc", "text": "Url for hoogle logo"}, "loc": ["services", "hoogle", "home"], "readOnly": false, "type": "string"}, "services.hoogle.host": {"declarations": ["nixos/modules/services/development/hoogle.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Set the host to bind on."}, "loc": ["services", "hoogle", "host"], "readOnly": false, "type": "string"}, "services.hoogle.packages": {"declarations": ["nixos/modules/services/development/hoogle.nix"], "default": {"_type": "literalExpression", "text": "hp: []"}, "description": {"_type": "mdDoc", "text": "The Haskell packages to generate documentation for.\n\nThe option value is a function that takes the package set specified in\nthe {var}`haskellPackages` option as its sole parameter and\nreturns a list of packages.\n"}, "example": {"_type": "literalExpression", "text": "hp: with hp; [ text lens ]"}, "loc": ["services", "hoogle", "packages"], "readOnly": false, "type": "function that evaluates to a(n) list of package"}, "services.hoogle.port": {"declarations": ["nixos/modules/services/development/hoogle.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Port number Hoogle will be listening to.\n"}, "loc": ["services", "hoogle", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.hostapd.channel": {"declarations": ["nixos/modules/services/networking/hostapd.nix"], "default": {"_type": "literalExpression", "text": "7"}, "description": {"_type": "mdDoc", "text": "Channel number (IEEE 802.11)\nPlease note that some drivers do not use this value from\n{command}`hostapd` and the channel will need to be configured\nseparately with {command}`iwconfig`.\n"}, "example": {"_type": "literalExpression", "text": "11"}, "loc": ["services", "hostapd", "channel"], "readOnly": false, "type": "signed integer"}, "services.hostapd.countryCode": {"declarations": ["nixos/modules/services/networking/hostapd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Country code (ISO/IEC 3166-1). Used to set regulatory domain.\nSet as needed to indicate country in which device is operating.\nThis can limit available channels and transmit power.\nThese two octets are used as the first two octets of the Country String\n(dot11CountryString).\nIf set this enables IEEE 802.11d. This advertises the countryCode and\nthe set of allowed channels and transmit power levels based on the\nregulatory limits.\n"}, "example": {"_type": "literalExpression", "text": "\"US\""}, "loc": ["services", "hostapd", "countryCode"], "readOnly": false, "type": "null or string"}, "services.hostapd.driver": {"declarations": ["nixos/modules/services/networking/hostapd.nix"], "default": {"_type": "literalExpression", "text": "\"nl80211\""}, "description": {"_type": "mdDoc", "text": "Which driver {command}`hostapd` will use.\nMost applications will probably use the default.\n"}, "example": {"_type": "literalExpression", "text": "\"hostapd\""}, "loc": ["services", "hostapd", "driver"], "readOnly": false, "type": "string"}, "services.hostapd.enable": {"declarations": ["nixos/modules/services/networking/hostapd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable putting a wireless interface into infrastructure mode,\nallowing other wireless devices to associate with the wireless\ninterface and do wireless networking. A simple access point will\n{option}`enable hostapd.wpa`,\n{option}`hostapd.wpaPassphrase`, and\n{option}`hostapd.ssid`, as well as DHCP on the wireless\ninterface to provide IP addresses to the associated stations, and\nNAT (from the wireless interface to an upstream interface).\n"}, "loc": ["services", "hostapd", "enable"], "readOnly": false, "type": "boolean"}, "services.hostapd.extraConfig": {"declarations": ["nixos/modules/services/networking/hostapd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options to put in hostapd.conf."}, "example": {"_type": "literalExpression", "text": "''\n  auth_algo=0\n  ieee80211n=1\n  ht_capab=[HT40-][SHORT-GI-40][DSSS_CCK-40]\n''"}, "loc": ["services", "hostapd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.hostapd.group": {"declarations": ["nixos/modules/services/networking/hostapd.nix"], "default": {"_type": "literalExpression", "text": "\"wheel\""}, "description": {"_type": "mdDoc", "text": "Members of this group can control {command}`hostapd`.\n"}, "example": {"_type": "literalExpression", "text": "\"network\""}, "loc": ["services", "hostapd", "group"], "readOnly": false, "type": "string"}, "services.hostapd.hwMode": {"declarations": ["nixos/modules/services/networking/hostapd.nix"], "default": {"_type": "literalExpression", "text": "\"g\""}, "description": {"_type": "mdDoc", "text": "Operation mode.\n(a = IEEE 802.11a, b = IEEE 802.11b, g = IEEE 802.11g).\n"}, "loc": ["services", "hostapd", "hwMode"], "readOnly": false, "type": "one of \"a\", \"b\", \"g\""}, "services.hostapd.interface": {"declarations": ["nixos/modules/services/networking/hostapd.nix"], "description": {"_type": "mdDoc", "text": "The interfaces {command}`hostapd` will use.\n"}, "example": {"_type": "literalExpression", "text": "\"wlp2s0\""}, "loc": ["services", "hostapd", "interface"], "readOnly": false, "type": "string"}, "services.hostapd.logLevel": {"declarations": ["nixos/modules/services/networking/hostapd.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Levels (minimum value for logged events):\n0 = verbose debugging\n1 = debugging\n2 = informational messages\n3 = notification\n4 = warning\n"}, "loc": ["services", "hostapd", "logLevel"], "readOnly": false, "type": "signed integer"}, "services.hostapd.noScan": {"declarations": ["nixos/modules/services/networking/hostapd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Do not scan for overlapping BSSs in HT40+/- mode.\nCaution: turning this on will violate regulatory requirements!\n"}, "loc": ["services", "hostapd", "noScan"], "readOnly": false, "type": "boolean"}, "services.hostapd.ssid": {"declarations": ["nixos/modules/services/networking/hostapd.nix"], "default": {"_type": "literalExpression", "text": "config.system.nixos.distroId"}, "description": {"_type": "mdDoc", "text": "SSID to be used in IEEE 802.11 management frames."}, "example": {"_type": "literalExpression", "text": "\"mySpecialSSID\""}, "loc": ["services", "hostapd", "ssid"], "readOnly": false, "type": "string"}, "services.hostapd.wpa": {"declarations": ["nixos/modules/services/networking/hostapd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable WPA (IEEE 802.11i/D3.0) to authenticate with the access point.\n"}, "loc": ["services", "hostapd", "wpa"], "readOnly": false, "type": "boolean"}, "services.hostapd.wpaPassphrase": {"declarations": ["nixos/modules/services/networking/hostapd.nix"], "default": {"_type": "literalExpression", "text": "\"my_sekret\""}, "description": {"_type": "mdDoc", "text": "WPA-PSK (pre-shared-key) passphrase. Clients will need this\npassphrase to associate with this access point.\nWarning: This passphrase will get put into a world-readable file in\nthe Nix store!\n"}, "example": {"_type": "literalExpression", "text": "\"any_64_char_string\""}, "loc": ["services", "hostapd", "wpaPassphrase"], "readOnly": false, "type": "string"}, "services.hound.config": {"declarations": ["nixos/modules/services/search/hound.nix"], "description": {"_type": "mdDoc", "text": "The full configuration of the Hound daemon. Note the dbpath\nshould be an absolute path to a writable location on disk.\n"}, "example": {"_type": "literalExpression", "text": "''\n  {\n    \"max-concurrent-indexers\" : 2,\n    \"dbpath\" : \"${services.hound.home}/data\",\n    \"repos\" : {\n        \"nixpkgs\": {\n          \"url\" : \"https://www.github.com/NixOS/nixpkgs.git\"\n        }\n    }\n  }\n''\n"}, "loc": ["services", "hound", "config"], "readOnly": false, "type": "string"}, "services.hound.enable": {"declarations": ["nixos/modules/services/search/hound.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the hound code search daemon.\n"}, "loc": ["services", "hound", "enable"], "readOnly": false, "type": "boolean"}, "services.hound.extraGroups": {"declarations": ["nixos/modules/services/search/hound.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of extra groups that the \"hound\" user should be a part of.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"dialout\"\n]"}, "loc": ["services", "hound", "extraGroups"], "readOnly": false, "type": "list of string"}, "services.hound.group": {"declarations": ["nixos/modules/services/search/hound.nix"], "default": {"_type": "literalExpression", "text": "\"hound\""}, "description": {"_type": "mdDoc", "text": "Group the hound daemon should execute under.\n"}, "loc": ["services", "hound", "group"], "readOnly": false, "type": "string"}, "services.hound.home": {"declarations": ["nixos/modules/services/search/hound.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/hound\""}, "description": {"_type": "mdDoc", "text": "The path to use as hound's $HOME. If the default user\n\"hound\" is configured then this is the home of the \"hound\"\nuser.\n"}, "loc": ["services", "hound", "home"], "readOnly": false, "type": "path"}, "services.hound.listen": {"declarations": ["nixos/modules/services/search/hound.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0:6080\""}, "description": {"_type": "mdDoc", "text": "Listen on this IP:port / :port\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1:6080 or just :6080\""}, "loc": ["services", "hound", "listen"], "readOnly": false, "type": "string"}, "services.hound.package": {"declarations": ["nixos/modules/services/search/hound.nix"], "default": {"_type": "literalExpression", "text": "pkgs.hound"}, "description": {"_type": "mdDoc", "text": "Package for running hound.\n"}, "loc": ["services", "hound", "package"], "readOnly": false, "type": "package"}, "services.hound.user": {"declarations": ["nixos/modules/services/search/hound.nix"], "default": {"_type": "literalExpression", "text": "\"hound\""}, "description": {"_type": "mdDoc", "text": "User the hound daemon should execute under.\n"}, "loc": ["services", "hound", "user"], "readOnly": false, "type": "string"}, "services.hqplayerd.auth.password": {"declarations": ["nixos/modules/services/audio/hqplayerd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password used for HQPlayer's WebUI.\n\nWithout this you will need to manually create the credentials after\nfirst start by going to http://your.ip/8088/auth\n"}, "loc": ["services", "hqplayerd", "auth", "password"], "readOnly": false, "type": "null or string"}, "services.hqplayerd.auth.username": {"declarations": ["nixos/modules/services/audio/hqplayerd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Username used for HQPlayer's WebUI.\n\nWithout this you will need to manually create the credentials after\nfirst start by going to http://your.ip/8088/auth\n"}, "loc": ["services", "hqplayerd", "auth", "username"], "readOnly": false, "type": "null or string"}, "services.hqplayerd.config": {"declarations": ["nixos/modules/services/audio/hqplayerd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HQplayer daemon configuration, written to /etc/hqplayer/hqplayerd.xml.\n\nRefer to share/doc/hqplayerd/readme.txt in the hqplayerd derivation for possible values.\n"}, "loc": ["services", "hqplayerd", "config"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.hqplayerd.enable": {"declarations": ["nixos/modules/services/audio/hqplayerd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HQPlayer Embedded."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hqplayerd", "enable"], "readOnly": false, "type": "boolean"}, "services.hqplayerd.licenseFile": {"declarations": ["nixos/modules/services/audio/hqplayerd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the HQPlayer license key file.\n\nWithout this, the service will run in trial mode and restart every 30\nminutes.\n"}, "loc": ["services", "hqplayerd", "licenseFile"], "readOnly": false, "type": "null or path"}, "services.hqplayerd.openFirewall": {"declarations": ["nixos/modules/services/audio/hqplayerd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Opens ports needed for the WebUI and controller API.\n"}, "loc": ["services", "hqplayerd", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.htpdate.enable": {"declarations": ["nixos/modules/services/networking/htpdate.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable htpdate daemon.\n"}, "loc": ["services", "htpdate", "enable"], "readOnly": false, "type": "boolean"}, "services.htpdate.extraOptions": {"declarations": ["nixos/modules/services/networking/htpdate.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional command line arguments to pass to htpdate.\n"}, "loc": ["services", "htpdate", "extraOptions"], "readOnly": false, "type": "string"}, "services.htpdate.proxy": {"declarations": ["nixos/modules/services/networking/htpdate.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "HTTP proxy used for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1:8118\""}, "loc": ["services", "htpdate", "proxy"], "readOnly": false, "type": "string"}, "services.htpdate.servers": {"declarations": ["nixos/modules/services/networking/htpdate.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"www.google.com\"\n]"}, "description": {"_type": "mdDoc", "text": "HTTP servers to use for time synchronization.\n"}, "loc": ["services", "htpdate", "servers"], "readOnly": false, "type": "list of string"}, "services.httpd.adminAddr": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "E-mail address of the server administrator."}, "example": {"_type": "literalExpression", "text": "\"admin@example.org\""}, "loc": ["services", "httpd", "adminAddr"], "readOnly": false, "type": "null or string"}, "services.httpd.configFile": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "confFile"}, "description": {"_type": "mdDoc", "text": "Override the configuration file used by Apache. By default,\nNixOS generates one automatically.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.writeText \"httpd.conf\" \"# my custom config file ...\""}, "loc": ["services", "httpd", "configFile"], "readOnly": false, "type": "path"}, "services.httpd.enable": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Apache HTTP Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "httpd", "enable"], "readOnly": false, "type": "boolean"}, "services.httpd.enableMellon": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the mod_auth_mellon module."}, "loc": ["services", "httpd", "enableMellon"], "readOnly": false, "type": "boolean"}, "services.httpd.enablePHP": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the PHP module."}, "loc": ["services", "httpd", "enablePHP"], "readOnly": false, "type": "boolean"}, "services.httpd.enablePerl": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Perl module (mod_perl)."}, "loc": ["services", "httpd", "enablePerl"], "readOnly": false, "type": "boolean"}, "services.httpd.extraConfig": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration lines appended to the generated Apache\nconfiguration file. Note that this mechanism will not work\nwhen {option}`configFile` is overridden.\n"}, "loc": ["services", "httpd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.httpd.extraModules": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional Apache modules to be used. These can be\nspecified as a string in the case of modules distributed\nwith Apache, or as an attribute set specifying the\n{var}`name` and {var}`path` of the\nmodule.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"proxy_connect\"\n  { name = \"jk\"; path = \"${pkgs.tomcat_connectors}/modules/mod_jk.so\"; }\n]\n"}, "loc": ["services", "httpd", "extraModules"], "readOnly": false, "type": "list of unspecified value"}, "services.httpd.group": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"wwwrun\""}, "description": {"_type": "mdDoc", "text": "Group under which httpd children processes run.\n"}, "loc": ["services", "httpd", "group"], "readOnly": false, "type": "string"}, "services.httpd.logDir": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/log/httpd\""}, "description": {"_type": "mdDoc", "text": "Directory for Apache's log files. It is created automatically.\n"}, "loc": ["services", "httpd", "logDir"], "readOnly": false, "type": "path"}, "services.httpd.logFormat": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"common\""}, "description": {"_type": "mdDoc", "text": "Log format for log files. Possible values are: combined, common, referer, agent, none.\nSee <https://httpd.apache.org/docs/2.4/logs.html> for more details.\n"}, "example": {"_type": "literalExpression", "text": "\"combined\""}, "loc": ["services", "httpd", "logFormat"], "readOnly": false, "type": "string"}, "services.httpd.logPerVirtualHost": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If enabled, each virtual host gets its own\n{file}`access.log` and\n{file}`error.log`, namely suffixed by the\n{option}`hostName` of the virtual host.\n"}, "loc": ["services", "httpd", "logPerVirtualHost"], "readOnly": false, "type": "boolean"}, "services.httpd.maxClients": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "150"}, "description": {"_type": "mdDoc", "text": "Maximum number of httpd processes (prefork)"}, "example": {"_type": "literalExpression", "text": "8"}, "loc": ["services", "httpd", "maxClients"], "readOnly": false, "type": "signed integer"}, "services.httpd.maxRequestsPerChild": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Maximum number of httpd requests answered per httpd child (prefork), 0 means unlimited.\n"}, "example": {"_type": "literalExpression", "text": "500"}, "loc": ["services", "httpd", "maxRequestsPerChild"], "readOnly": false, "type": "signed integer"}, "services.httpd.mpm": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"event\""}, "description": {"_type": "mdDoc", "text": "Multi-processing module to be used by Apache. Available\nmodules are `prefork` (handles each\nrequest in a separate child process), `worker`\n(hybrid approach that starts a number of child processes\neach running a number of threads) and `event`\n(the default; a recent variant of `worker`\nthat handles persistent connections more efficiently).\n"}, "example": {"_type": "literalExpression", "text": "\"worker\""}, "loc": ["services", "httpd", "mpm"], "readOnly": false, "type": "one of \"event\", \"prefork\", \"worker\""}, "services.httpd.package": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.apacheHttpd"}, "description": {"_type": "mdDoc", "text": "Overridable attribute of the Apache HTTP Server package to use.\n"}, "loc": ["services", "httpd", "package"], "readOnly": false, "type": "package"}, "services.httpd.phpOptions": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Options appended to the PHP configuration file {file}`php.ini`.\n"}, "example": {"_type": "literalExpression", "text": "''\n  date.timezone = \"CET\"\n''"}, "loc": ["services", "httpd", "phpOptions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.httpd.phpPackage": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.php"}, "description": {"_type": "mdDoc", "text": "Overridable attribute of the PHP package to use.\n"}, "loc": ["services", "httpd", "phpPackage"], "readOnly": false, "type": "package"}, "services.httpd.sslCiphers": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"HIGH:!aNULL:!MD5:!EXP\""}, "description": {"_type": "mdDoc", "text": "Cipher Suite available for negotiation in SSL proxy handshake."}, "loc": ["services", "httpd", "sslCiphers"], "readOnly": false, "type": "string"}, "services.httpd.sslProtocols": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"All -SSLv2 -SSLv3 -TLSv1 -TLSv1.1\""}, "description": {"_type": "mdDoc", "text": "Allowed SSL/TLS protocol versions."}, "example": {"_type": "literalExpression", "text": "\"All -SSLv2 -SSLv3\""}, "loc": ["services", "httpd", "sslProtocols"], "readOnly": false, "type": "string"}, "services.httpd.user": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"wwwrun\""}, "description": {"_type": "mdDoc", "text": "User account under which httpd children processes run.\n\nIf you require the main httpd process to run as\n`root` add the following configuration:\n```\nsystemd.services.httpd.serviceConfig.User = lib.mkForce \"root\";\n```\n"}, "loc": ["services", "httpd", "user"], "readOnly": false, "type": "string"}, "services.httpd.virtualHosts": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "{\n  localhost = {\n    documentRoot = \"${package.out}/htdocs\";\n  };\n}\n"}, "description": {"_type": "mdDoc", "text": "Specification of the virtual hosts served by Apache. Each\nelement should be an attribute set specifying the\nconfiguration of the virtual host.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"foo.example.com\" = {\n    forceSSL = true;\n    documentRoot = \"/var/www/foo.example.com\"\n  };\n  \"bar.example.com\" = {\n    addSSL = true;\n    documentRoot = \"/var/www/bar.example.com\";\n  };\n}\n"}, "loc": ["services", "httpd", "virtualHosts"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.httpd.virtualHosts.<name>.acmeRoot": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the acme challenge which is PUBLIC, don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.httpd.virtualHosts.<name>.addSSL": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "addSSL"], "readOnly": false, "type": "boolean"}, "services.httpd.virtualHosts.<name>.adminAddr": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "E-mail address of the server administrator."}, "example": {"_type": "literalExpression", "text": "\"admin@example.org\""}, "loc": ["services", "httpd", "virtualHosts", "<name>", "adminAddr"], "readOnly": false, "type": "null or string"}, "services.httpd.virtualHosts.<name>.documentRoot": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of Apache's document root directory.  If left undefined,\nan empty directory in the Nix store will be used as root.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "httpd", "virtualHosts", "<name>", "documentRoot"], "readOnly": false, "type": "null or path"}, "services.httpd.virtualHosts.<name>.enableACME": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "enableACME"], "readOnly": false, "type": "boolean"}, "services.httpd.virtualHosts.<name>.enableUserDir": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable serving {file}`~/public_html` as\n`/~\u00abusername\u00bb`.\n"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "enableUserDir"], "readOnly": false, "type": "boolean"}, "services.httpd.virtualHosts.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to httpd.conf verbatim. They will go after\ndirectories and directory aliases defined by default.\n"}, "example": {"_type": "literalExpression", "text": "''\n  <Directory /home>\n    Options FollowSymlinks\n    AllowOverride All\n  </Directory>\n''"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.httpd.virtualHosts.<name>.forceSSL": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.httpd.virtualHosts.<name>.globalRedirect": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given URL.\n"}, "example": {"_type": "literalExpression", "text": "\"http://newserver.example.org/\""}, "loc": ["services", "httpd", "virtualHosts", "<name>", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.httpd.virtualHosts.<name>.hostName": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Canonical hostname for the server."}, "loc": ["services", "httpd", "virtualHosts", "<name>", "hostName"], "readOnly": false, "type": "string"}, "services.httpd.virtualHosts.<name>.http2": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTP 2. HTTP/2 is supported in all multi-processing modules that come with httpd. *However, if you use the prefork mpm, there will\nbe severe restrictions.* Refer to <https://httpd.apache.org/docs/2.4/howto/http2.html#mpm-config> for details.\n"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "http2"], "readOnly": false, "type": "boolean"}, "services.httpd.virtualHosts.<name>.listen": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\n\n::: {.note}\nThis option overrides `addSSL`, `forceSSL` and `onlySSL`.\n\nIf you only want to set the addresses manually and not the ports, take a look at `listenAddresses`.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    ip = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    ip = \"192.154.1.1\";\n    port = 80;\n  }\n  {\n    ip = \"*\";\n    port = 8080;\n  }\n]"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.httpd.virtualHosts.<name>.listen.*.ip": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"*\""}, "description": {"_type": "mdDoc", "text": "IP to listen on. 0.0.0.0 for IPv4 only, * for all."}, "loc": ["services", "httpd", "virtualHosts", "<name>", "listen", "*", "ip"], "readOnly": false, "type": "string"}, "services.httpd.virtualHosts.<name>.listen.*.port": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "description": {"_type": "mdDoc", "text": "Port to listen on"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.httpd.virtualHosts.<name>.listen.*.ssl": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SSL (https) support."}, "loc": ["services", "httpd", "virtualHosts", "<name>", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.httpd.virtualHosts.<name>.listenAddresses": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*\"\n]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "listenAddresses"], "readOnly": false, "type": "non-empty (list of string)"}, "services.httpd.virtualHosts.<name>.locations": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config. See <https://httpd.apache.org/docs/2.4/mod/core.html#location> for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n  \"/foo/bar.png\" = {\n    alias = \"/home/eelco/some-file.png\";\n  };\n};\n"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.httpd.virtualHosts.<name>.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests. See <https://httpd.apache.org/docs/2.4/mod/mod_alias.html#alias>.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "httpd", "virtualHosts", "<name>", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.httpd.virtualHosts.<name>.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.httpd.virtualHosts.<name>.locations.<name>.index": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds DirectoryIndex directive. See <https://httpd.apache.org/docs/2.4/mod/mod_dir.html#directoryindex>.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "httpd", "virtualHosts", "<name>", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.httpd.virtualHosts.<name>.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.httpd.virtualHosts.<name>.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets up a simple reverse proxy as described by <https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple>.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "httpd", "virtualHosts", "<name>", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.httpd.virtualHosts.<name>.logFormat": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"common\""}, "description": {"_type": "mdDoc", "text": "Log format for Apache's log files. Possible values are: combined, common, referer, agent.\n"}, "example": {"_type": "literalExpression", "text": "\"combined\""}, "loc": ["services", "httpd", "virtualHosts", "<name>", "logFormat"], "readOnly": false, "type": "string"}, "services.httpd.virtualHosts.<name>.onlySSL": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.httpd.virtualHosts.<name>.robotsEntries": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Specification of pages to be ignored by web crawlers. See <http://www.robotstxt.org/> for details.\n"}, "example": {"_type": "literalExpression", "text": "\"Disallow: /foo/\""}, "loc": ["services", "httpd", "virtualHosts", "<name>", "robotsEntries"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.httpd.virtualHosts.<name>.servedDirs": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve static directories.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    dir = \"/home/eelco/Dev/nix-homepage\";\n    urlPath = \"/nix\";\n  }\n]"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "servedDirs"], "readOnly": false, "type": "list of (attribute set)"}, "services.httpd.virtualHosts.<name>.servedFiles": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve individual, static files.\n\n::: {.note}\nThis option has been deprecated and will be removed in a future\nversion of NixOS. You can achieve the same result by making use of\nthe `locations.<name>.alias` option.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    file = \"/home/eelco/some-file.png\";\n    urlPath = \"/foo/bar.png\";\n  }\n]"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "servedFiles"], "readOnly": false, "type": "list of (attribute set)"}, "services.httpd.virtualHosts.<name>.serverAliases": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"www.example.org:8080\"\n  \"example.org\"\n]"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.httpd.virtualHosts.<name>.sslServerCert": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "httpd", "virtualHosts", "<name>", "sslServerCert"], "readOnly": false, "type": "path"}, "services.httpd.virtualHosts.<name>.sslServerChain": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to server SSL chain file."}, "example": {"_type": "literalExpression", "text": "\"/var/ca.pem\""}, "loc": ["services", "httpd", "virtualHosts", "<name>", "sslServerChain"], "readOnly": false, "type": "null or path"}, "services.httpd.virtualHosts.<name>.sslServerKey": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "httpd", "virtualHosts", "<name>", "sslServerKey"], "readOnly": false, "type": "path"}, "services.httpd.virtualHosts.<name>.useACMEHost": {"declarations": ["nixos/modules/services/web-servers/apache-httpd/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "httpd", "virtualHosts", "<name>", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.https-dns-proxy.address": {"declarations": ["nixos/modules/services/networking/https-dns-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The address on which to listen"}, "loc": ["services", "https-dns-proxy", "address"], "readOnly": false, "type": "string"}, "services.https-dns-proxy.enable": {"declarations": ["nixos/modules/services/networking/https-dns-proxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable https-dns-proxy daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "https-dns-proxy", "enable"], "readOnly": false, "type": "boolean"}, "services.https-dns-proxy.extraArgs": {"declarations": ["nixos/modules/services/networking/https-dns-proxy.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"-v\"\n]"}, "description": {"_type": "mdDoc", "text": "Additional arguments to pass to the process."}, "loc": ["services", "https-dns-proxy", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.https-dns-proxy.port": {"declarations": ["nixos/modules/services/networking/https-dns-proxy.nix"], "default": {"_type": "literalExpression", "text": "5053"}, "description": {"_type": "mdDoc", "text": "The port on which to listen"}, "loc": ["services", "https-dns-proxy", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.https-dns-proxy.preferIPv4": {"declarations": ["nixos/modules/services/networking/https-dns-proxy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "https_dns_proxy will by default use IPv6 and fail if it is not available.\nTo play it safe, we choose IPv4.\n"}, "loc": ["services", "https-dns-proxy", "preferIPv4"], "readOnly": false, "type": "boolean"}, "services.https-dns-proxy.provider.ips": {"declarations": ["nixos/modules/services/networking/https-dns-proxy.nix"], "description": {"_type": "mdDoc", "text": "The custom provider IPs"}, "loc": ["services", "https-dns-proxy", "provider", "ips"], "readOnly": false, "type": "list of string"}, "services.https-dns-proxy.provider.kind": {"declarations": ["nixos/modules/services/networking/https-dns-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"quad9\""}, "description": {"_type": "mdDoc", "text": "The upstream provider to use or custom in case you do not trust any of\nthe predefined providers or just want to use your own.\n\nThe default is quad9 and there are privacy and security\ntrade-offs when using any upstream provider. Please consider that\nbefore using any of them.\n\nSupported providers: cloudflare, custom, google, opendns, quad9\n\nIf you pick the custom provider, you will need to provide the\nbootstrap IP addresses as well as the resolver https URL.\n"}, "loc": ["services", "https-dns-proxy", "provider", "kind"], "readOnly": false, "type": "one of \"cloudflare\", \"custom\", \"google\", \"opendns\", \"quad9\""}, "services.https-dns-proxy.provider.url": {"declarations": ["nixos/modules/services/networking/https-dns-proxy.nix"], "description": {"_type": "mdDoc", "text": "The custom provider URL"}, "loc": ["services", "https-dns-proxy", "provider", "url"], "readOnly": false, "type": "string"}, "services.hydra.buildMachinesFiles": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "optional (config.nix.buildMachines != []) \"/etc/nix/machines\""}, "description": {"_type": "mdDoc", "text": "List of files containing build machines."}, "example": {"_type": "literalExpression", "text": "[\n  \"/etc/nix/machines\"\n  \"/var/lib/hydra/provisioner/machines\"\n]"}, "loc": ["services", "hydra", "buildMachinesFiles"], "readOnly": false, "type": "list of path"}, "services.hydra.dbi": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "\"dbi:Pg:dbname=hydra;user=hydra;\""}, "description": {"_type": "mdDoc", "text": "The DBI string for Hydra database connection.\n\nNOTE: Attempts to set `application_name` will be overridden by\n`hydra-TYPE` (where TYPE is e.g. `evaluator`, `queue-runner`,\netc.) in all hydra services to more easily distinguish where\nqueries are coming from.\n"}, "example": {"_type": "literalExpression", "text": "\"dbi:Pg:dbname=hydra;host=postgres.example.org;user=foo;\""}, "loc": ["services", "hydra", "dbi"], "readOnly": false, "type": "string"}, "services.hydra.debugServer": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the server in debug mode."}, "loc": ["services", "hydra", "debugServer"], "readOnly": false, "type": "boolean"}, "services.hydra.enable": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run Hydra services.\n"}, "loc": ["services", "hydra", "enable"], "readOnly": false, "type": "boolean"}, "services.hydra.extraConfig": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "description": {"_type": "mdDoc", "text": "Extra lines for the Hydra configuration."}, "loc": ["services", "hydra", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.hydra.extraEnv": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables for Hydra."}, "loc": ["services", "hydra", "extraEnv"], "readOnly": false, "type": "attribute set of string"}, "services.hydra.gcRootsDir": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "\"/nix/var/nix/gcroots/hydra\""}, "description": {"_type": "mdDoc", "text": "Directory that holds Hydra garbage collector roots."}, "loc": ["services", "hydra", "gcRootsDir"], "readOnly": false, "type": "path"}, "services.hydra.hydraURL": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "description": {"_type": "mdDoc", "text": "The base URL for the Hydra webserver instance. Used for links in emails.\n"}, "loc": ["services", "hydra", "hydraURL"], "readOnly": false, "type": "string"}, "services.hydra.listenHost": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "\"*\""}, "description": {"_type": "mdDoc", "text": "The hostname or address to listen on or `*` to listen\non all interfaces.\n"}, "example": {"_type": "literalExpression", "text": "\"localhost\""}, "loc": ["services", "hydra", "listenHost"], "readOnly": false, "type": "string"}, "services.hydra.logo": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a file containing the logo of your Hydra instance.\n"}, "loc": ["services", "hydra", "logo"], "readOnly": false, "type": "null or path"}, "services.hydra.minimumDiskFree": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Threshold of minimum disk space (GiB) to determine if the queue runner should run or not.\n"}, "loc": ["services", "hydra", "minimumDiskFree"], "readOnly": false, "type": "signed integer"}, "services.hydra.minimumDiskFreeEvaluator": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Threshold of minimum disk space (GiB) to determine if the evaluator should run or not.\n"}, "loc": ["services", "hydra", "minimumDiskFreeEvaluator"], "readOnly": false, "type": "signed integer"}, "services.hydra.notificationSender": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "description": {"_type": "mdDoc", "text": "Sender email address used for email notifications.\n"}, "loc": ["services", "hydra", "notificationSender"], "readOnly": false, "type": "string"}, "services.hydra.package": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.hydra_unstable"}, "description": {"_type": "mdDoc", "text": "The Hydra package."}, "loc": ["services", "hydra", "package"], "readOnly": false, "type": "package"}, "services.hydra.port": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "TCP port the web server should listen to.\n"}, "loc": ["services", "hydra", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.hydra.smtpHost": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hostname of the SMTP server to use to send email.\n"}, "example": {"_type": "literalExpression", "text": "\"localhost\""}, "loc": ["services", "hydra", "smtpHost"], "readOnly": false, "type": "null or string"}, "services.hydra.tracker": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Piece of HTML that is included on all pages.\n"}, "loc": ["services", "hydra", "tracker"], "readOnly": false, "type": "string"}, "services.hydra.useSubstitutes": {"declarations": ["nixos/modules/services/continuous-integration/hydra/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use binary caches for downloading store paths. Note that\nbinary substitutions trigger (a potentially large number of) additional\nHTTP requests that slow down the queue monitor thread significantly.\nAlso, this Hydra instance will serve those downloaded store paths to\nits users with its own signature attached as if it had built them\nitself, so don't enable this feature unless your active binary caches\nare absolute trustworthy.\n"}, "loc": ["services", "hydra", "useSubstitutes"], "readOnly": false, "type": "boolean"}, "services.hydron.dataDir": {"declarations": ["nixos/modules/services/web-servers/hydron.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/hydron\""}, "description": {"_type": "mdDoc", "text": "Location where hydron runs and stores data."}, "example": {"_type": "literalExpression", "text": "\"/home/okina/hydron\""}, "loc": ["services", "hydron", "dataDir"], "readOnly": false, "type": "path"}, "services.hydron.enable": {"declarations": ["nixos/modules/services/web-servers/hydron.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable hydron."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hydron", "enable"], "readOnly": false, "type": "boolean"}, "services.hydron.fetchTags": {"declarations": ["nixos/modules/services/web-servers/hydron.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Fetch tags for imported images and webm from gelbooru."}, "loc": ["services", "hydron", "fetchTags"], "readOnly": false, "type": "boolean"}, "services.hydron.importPaths": {"declarations": ["nixos/modules/services/web-servers/hydron.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Paths that hydron will recursively import."}, "example": {"_type": "literalExpression", "text": "[\n  \"/home/okina/Pictures\"\n]"}, "loc": ["services", "hydron", "importPaths"], "readOnly": false, "type": "list of path"}, "services.hydron.interval": {"declarations": ["nixos/modules/services/web-servers/hydron.nix"], "default": {"_type": "literalExpression", "text": "\"weekly\""}, "description": {"_type": "mdDoc", "text": "How often we run hydron import and possibly fetch tags. Runs by default every week.\n\nThe format is described in\n{manpage}`systemd.time(7)`.\n"}, "example": {"_type": "literalExpression", "text": "\"06:00\""}, "loc": ["services", "hydron", "interval"], "readOnly": false, "type": "string"}, "services.hydron.listenAddress": {"declarations": ["nixos/modules/services/web-servers/hydron.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Listen on a specific IP address and port."}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1:8010\""}, "loc": ["services", "hydron", "listenAddress"], "readOnly": false, "type": "null or string"}, "services.hydron.password": {"declarations": ["nixos/modules/services/web-servers/hydron.nix"], "default": {"_type": "literalExpression", "text": "\"hydron\""}, "description": {"_type": "mdDoc", "text": "Password for the hydron database."}, "example": {"_type": "literalExpression", "text": "\"dumbpass\""}, "loc": ["services", "hydron", "password"], "readOnly": false, "type": "string"}, "services.hydron.passwordFile": {"declarations": ["nixos/modules/services/web-servers/hydron.nix"], "default": {"_type": "literalExpression", "text": "\"/run/keys/hydron-password-file\""}, "description": {"_type": "mdDoc", "text": "Password file for the hydron database."}, "example": {"_type": "literalExpression", "text": "\"/home/okina/hydron/keys/pass\""}, "loc": ["services", "hydron", "passwordFile"], "readOnly": false, "type": "path"}, "services.hydron.postgresArgs": {"declarations": ["nixos/modules/services/web-servers/hydron.nix"], "description": {"_type": "mdDoc", "text": "Postgresql connection arguments."}, "example": {"_type": "literalExpression", "text": "''\n  {\n    \"driver\": \"postgres\",\n    \"connection\": \"user=hydron password=dumbpass dbname=hydron sslmode=disable\"\n  }\n''"}, "loc": ["services", "hydron", "postgresArgs"], "readOnly": false, "type": "string"}, "services.hydron.postgresArgsFile": {"declarations": ["nixos/modules/services/web-servers/hydron.nix"], "default": {"_type": "literalExpression", "text": "\"/run/keys/hydron-postgres-args\""}, "description": {"_type": "mdDoc", "text": "Postgresql connection arguments file."}, "example": {"_type": "literalExpression", "text": "\"/home/okina/hydron/keys/postgres\""}, "loc": ["services", "hydron", "postgresArgsFile"], "readOnly": false, "type": "path"}, "services.i2p.enable": {"declarations": ["nixos/modules/services/networking/i2p.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable I2P router."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2p", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.address": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Your external IP or hostname.\n"}, "loc": ["services", "i2pd", "address"], "readOnly": false, "type": "null or string"}, "services.i2pd.addressbook.defaulturl": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"http://joajgazyztfssty4w2on5oaqksz6tqoxbduy553y34mf4byv6gpq.b32.i2p/export/alive-hosts.txt\""}, "description": {"_type": "mdDoc", "text": "AddressBook subscription URL for initial setup\n"}, "loc": ["services", "i2pd", "addressbook", "defaulturl"], "readOnly": false, "type": "string"}, "services.i2pd.addressbook.subscriptions": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"http://inr.i2p/export/alive-hosts.txt\"\n  \"http://i2p-projekt.i2p/hosts.txt\"\n  \"http://stats.i2p/cgi-bin/newhosts.txt\"\n]"}, "description": {"_type": "mdDoc", "text": "AddressBook subscription URLs\n"}, "loc": ["services", "i2pd", "addressbook", "subscriptions"], "readOnly": false, "type": "list of string"}, "services.i2pd.bandwidth": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set a router bandwidth limit integer in KBps.\nIf not set, {command}`i2pd` defaults to 32KBps.\n"}, "loc": ["services", "i2pd", "bandwidth"], "readOnly": false, "type": "null or signed integer"}, "services.i2pd.dataDir": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alternative path to storage of i2pd data (RI, keys, peer profiles, ...)\n"}, "loc": ["services", "i2pd", "dataDir"], "readOnly": false, "type": "null or string"}, "services.i2pd.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables I2Pd as a running service upon activation.\nPlease read http://i2pd.readthedocs.io/en/latest/ for further\nconfiguration help.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.enableIPv4": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable IPv4 connectivity."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "enableIPv4"], "readOnly": false, "type": "boolean"}, "services.i2pd.enableIPv6": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable IPv6 connectivity."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "enableIPv6"], "readOnly": false, "type": "boolean"}, "services.i2pd.exploratory.inbound.length": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Guaranteed minimum hops for exploratory tunnels."}, "loc": ["services", "i2pd", "exploratory", "inbound", "length"], "readOnly": false, "type": "signed integer"}, "services.i2pd.exploratory.inbound.quantity": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Number of simultaneous exploratory tunnels."}, "loc": ["services", "i2pd", "exploratory", "inbound", "quantity"], "readOnly": false, "type": "signed integer"}, "services.i2pd.exploratory.outbound.length": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Guaranteed minimum hops for exploratory tunnels."}, "loc": ["services", "i2pd", "exploratory", "outbound", "length"], "readOnly": false, "type": "signed integer"}, "services.i2pd.exploratory.outbound.quantity": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Number of simultaneous exploratory tunnels."}, "loc": ["services", "i2pd", "exploratory", "outbound", "quantity"], "readOnly": false, "type": "signed integer"}, "services.i2pd.family": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a family the router belongs to.\n"}, "loc": ["services", "i2pd", "family"], "readOnly": false, "type": "null or string"}, "services.i2pd.floodfill": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If the router is declared to be unreachable and needs introduction nodes.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "floodfill"], "readOnly": false, "type": "boolean"}, "services.i2pd.ifname": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Network interface to bind to.\n"}, "loc": ["services", "i2pd", "ifname"], "readOnly": false, "type": "null or string"}, "services.i2pd.ifname4": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IPv4 interface to bind to.\n"}, "loc": ["services", "i2pd", "ifname4"], "readOnly": false, "type": "null or string"}, "services.i2pd.ifname6": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IPv6 interface to bind to.\n"}, "loc": ["services", "i2pd", "ifname6"], "readOnly": false, "type": "null or string"}, "services.i2pd.inTunnels": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Serve something on I2P network at port and delegate requests to address inPort.\n"}, "loc": ["services", "i2pd", "inTunnels"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.i2pd.inTunnels.<name>.accessList": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "I2P nodes that are allowed to connect to this service."}, "loc": ["services", "i2pd", "inTunnels", "<name>", "accessList"], "readOnly": false, "type": "list of string"}, "services.i2pd.inTunnels.<name>.address": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Bind address for \u2039name\u203a endpoint."}, "loc": ["services", "i2pd", "inTunnels", "<name>", "address"], "readOnly": false, "type": "string"}, "services.i2pd.inTunnels.<name>.crypto.tagsToSend": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "40"}, "description": {"_type": "mdDoc", "text": "Number of ElGamal/AES tags to send."}, "loc": ["services", "i2pd", "inTunnels", "<name>", "crypto", "tagsToSend"], "readOnly": false, "type": "signed integer"}, "services.i2pd.inTunnels.<name>.destination": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "description": {"_type": "mdDoc", "text": "Remote endpoint, I2P hostname or b32.i2p address."}, "loc": ["services", "i2pd", "inTunnels", "<name>", "destination"], "readOnly": false, "type": "string"}, "services.i2pd.inTunnels.<name>.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable \u2039name\u203a."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "inTunnels", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.inTunnels.<name>.inPort": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Service port. Default to the tunnel's listen port."}, "loc": ["services", "i2pd", "inTunnels", "<name>", "inPort"], "readOnly": false, "type": "signed integer"}, "services.i2pd.inTunnels.<name>.inbound.length": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Guaranteed minimum hops for \u2039name\u203a tunnels."}, "loc": ["services", "i2pd", "inTunnels", "<name>", "inbound", "length"], "readOnly": false, "type": "signed integer"}, "services.i2pd.inTunnels.<name>.inbound.quantity": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Number of simultaneous \u2039name\u203a tunnels."}, "loc": ["services", "i2pd", "inTunnels", "<name>", "inbound", "quantity"], "readOnly": false, "type": "signed integer"}, "services.i2pd.inTunnels.<name>.keys": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a-keys.dat\""}, "description": {"_type": "mdDoc", "text": "Keyset used for tunnel identity."}, "loc": ["services", "i2pd", "inTunnels", "<name>", "keys"], "readOnly": false, "type": "string"}, "services.i2pd.inTunnels.<name>.name": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The endpoint name."}, "loc": ["services", "i2pd", "inTunnels", "<name>", "name"], "readOnly": false, "type": "string"}, "services.i2pd.inTunnels.<name>.outbound.length": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Guaranteed minimum hops for \u2039name\u203a tunnels."}, "loc": ["services", "i2pd", "inTunnels", "<name>", "outbound", "length"], "readOnly": false, "type": "signed integer"}, "services.i2pd.inTunnels.<name>.outbound.quantity": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Number of simultaneous \u2039name\u203a tunnels."}, "loc": ["services", "i2pd", "inTunnels", "<name>", "outbound", "quantity"], "readOnly": false, "type": "signed integer"}, "services.i2pd.inTunnels.<name>.port": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Bind port for \u2039name\u203a endpoint."}, "loc": ["services", "i2pd", "inTunnels", "<name>", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.i2pd.limits.coreSize": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Maximum size of corefile in Kb (0 - use system limit).\n"}, "loc": ["services", "i2pd", "limits", "coreSize"], "readOnly": false, "type": "signed integer"}, "services.i2pd.limits.ntcpHard": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Maximum number of active transit sessions.\n"}, "loc": ["services", "i2pd", "limits", "ntcpHard"], "readOnly": false, "type": "signed integer"}, "services.i2pd.limits.ntcpSoft": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Threshold to start probabalistic backoff with ntcp sessions (default: use system limit).\n"}, "loc": ["services", "i2pd", "limits", "ntcpSoft"], "readOnly": false, "type": "signed integer"}, "services.i2pd.limits.ntcpThreads": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Maximum number of threads used by NTCP DH worker.\n"}, "loc": ["services", "i2pd", "limits", "ntcpThreads"], "readOnly": false, "type": "signed integer"}, "services.i2pd.limits.openFiles": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Maximum number of open files (0 - use system default).\n"}, "loc": ["services", "i2pd", "limits", "openFiles"], "readOnly": false, "type": "signed integer"}, "services.i2pd.limits.transittunnels": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "2500"}, "description": {"_type": "mdDoc", "text": "Maximum number of active transit sessions.\n"}, "loc": ["services", "i2pd", "limits", "transittunnels"], "readOnly": false, "type": "signed integer"}, "services.i2pd.logCLFTime": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Full CLF-formatted date and time to log."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "logCLFTime"], "readOnly": false, "type": "boolean"}, "services.i2pd.logLevel": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"error\""}, "description": {"_type": "mdDoc", "text": "The log level. {command}`i2pd` defaults to \"info\"\nbut that generates copious amounts of log messages.\n\nWe default to \"error\" which is similar to the default log\nlevel of {command}`tor`.\n"}, "loc": ["services", "i2pd", "logLevel"], "readOnly": false, "type": "one of \"debug\", \"info\", \"warn\", \"error\""}, "services.i2pd.nat": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable NAT bypass."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "nat"], "readOnly": false, "type": "boolean"}, "services.i2pd.netid": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "I2P overlay netid.\n"}, "loc": ["services", "i2pd", "netid"], "readOnly": false, "type": "signed integer"}, "services.i2pd.notransit": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Tells the router to not accept transit tunnels during startup.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "notransit"], "readOnly": false, "type": "boolean"}, "services.i2pd.ntcp": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable ntcp."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "ntcp"], "readOnly": false, "type": "boolean"}, "services.i2pd.ntcp2.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable NTCP2."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "ntcp2", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.ntcp2.port": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Port to listen for incoming NTCP2 connections (0=auto).\n"}, "loc": ["services", "i2pd", "ntcp2", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.i2pd.ntcp2.published": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable NTCP2 publication."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "ntcp2", "published"], "readOnly": false, "type": "boolean"}, "services.i2pd.ntcpProxy": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Proxy URL for NTCP transport.\n"}, "loc": ["services", "i2pd", "ntcpProxy"], "readOnly": false, "type": "null or string"}, "services.i2pd.outTunnels": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Connect to someone as a client and establish a local accept endpoint\n"}, "loc": ["services", "i2pd", "outTunnels"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.i2pd.outTunnels.<name>.address": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Bind address for \u2039name\u203a endpoint."}, "loc": ["services", "i2pd", "outTunnels", "<name>", "address"], "readOnly": false, "type": "string"}, "services.i2pd.outTunnels.<name>.crypto.tagsToSend": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "40"}, "description": {"_type": "mdDoc", "text": "Number of ElGamal/AES tags to send."}, "loc": ["services", "i2pd", "outTunnels", "<name>", "crypto", "tagsToSend"], "readOnly": false, "type": "signed integer"}, "services.i2pd.outTunnels.<name>.destination": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "description": {"_type": "mdDoc", "text": "Remote endpoint, I2P hostname or b32.i2p address."}, "loc": ["services", "i2pd", "outTunnels", "<name>", "destination"], "readOnly": false, "type": "string"}, "services.i2pd.outTunnels.<name>.destinationPort": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Connect to particular port at destination."}, "loc": ["services", "i2pd", "outTunnels", "<name>", "destinationPort"], "readOnly": false, "type": "null or signed integer"}, "services.i2pd.outTunnels.<name>.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable \u2039name\u203a."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "outTunnels", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.outTunnels.<name>.inbound.length": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Guaranteed minimum hops for \u2039name\u203a tunnels."}, "loc": ["services", "i2pd", "outTunnels", "<name>", "inbound", "length"], "readOnly": false, "type": "signed integer"}, "services.i2pd.outTunnels.<name>.inbound.quantity": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Number of simultaneous \u2039name\u203a tunnels."}, "loc": ["services", "i2pd", "outTunnels", "<name>", "inbound", "quantity"], "readOnly": false, "type": "signed integer"}, "services.i2pd.outTunnels.<name>.keys": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a-keys.dat\""}, "description": {"_type": "mdDoc", "text": "Keyset used for tunnel identity."}, "loc": ["services", "i2pd", "outTunnels", "<name>", "keys"], "readOnly": false, "type": "string"}, "services.i2pd.outTunnels.<name>.name": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The endpoint name."}, "loc": ["services", "i2pd", "outTunnels", "<name>", "name"], "readOnly": false, "type": "string"}, "services.i2pd.outTunnels.<name>.outbound.length": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Guaranteed minimum hops for \u2039name\u203a tunnels."}, "loc": ["services", "i2pd", "outTunnels", "<name>", "outbound", "length"], "readOnly": false, "type": "signed integer"}, "services.i2pd.outTunnels.<name>.outbound.quantity": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Number of simultaneous \u2039name\u203a tunnels."}, "loc": ["services", "i2pd", "outTunnels", "<name>", "outbound", "quantity"], "readOnly": false, "type": "signed integer"}, "services.i2pd.outTunnels.<name>.port": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Bind port for \u2039name\u203a endpoint."}, "loc": ["services", "i2pd", "outTunnels", "<name>", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.i2pd.package": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.i2pd"}, "description": {"_type": "mdDoc", "text": "i2pd package to use.\n"}, "loc": ["services", "i2pd", "package"], "readOnly": false, "type": "package"}, "services.i2pd.port": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "I2P listen port. If no one is given the router will pick between 9111 and 30777.\n"}, "loc": ["services", "i2pd", "port"], "readOnly": false, "type": "null or signed integer"}, "services.i2pd.precomputation.elgamal": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whenever to use precomputated tables for ElGamal.\n{command}`i2pd` defaults to `false`\nto save 64M of memory (and looses some performance).\n\nWe default to `true` as that is what most\nusers want anyway.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "precomputation", "elgamal"], "readOnly": false, "type": "boolean"}, "services.i2pd.proto.bob.address": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Bind address for bob endpoint."}, "loc": ["services", "i2pd", "proto", "bob", "address"], "readOnly": false, "type": "string"}, "services.i2pd.proto.bob.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable bob."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "proto", "bob", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.proto.bob.name": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"bob\""}, "description": {"_type": "mdDoc", "text": "The endpoint name."}, "loc": ["services", "i2pd", "proto", "bob", "name"], "readOnly": false, "type": "string"}, "services.i2pd.proto.bob.port": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "2827"}, "description": {"_type": "mdDoc", "text": "Bind port for bob endpoint."}, "loc": ["services", "i2pd", "proto", "bob", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.i2pd.proto.http.address": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Bind address for http endpoint."}, "loc": ["services", "i2pd", "proto", "http", "address"], "readOnly": false, "type": "string"}, "services.i2pd.proto.http.auth": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Webconsole authentication."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "proto", "http", "auth"], "readOnly": false, "type": "boolean"}, "services.i2pd.proto.http.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable http."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "proto", "http", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.proto.http.hostname": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Expected hostname for WebUI.\n"}, "loc": ["services", "i2pd", "proto", "http", "hostname"], "readOnly": false, "type": "null or string"}, "services.i2pd.proto.http.name": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"http\""}, "description": {"_type": "mdDoc", "text": "The endpoint name."}, "loc": ["services", "i2pd", "proto", "http", "name"], "readOnly": false, "type": "string"}, "services.i2pd.proto.http.pass": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"i2pd\""}, "description": {"_type": "mdDoc", "text": "Password for webconsole access.\n"}, "loc": ["services", "i2pd", "proto", "http", "pass"], "readOnly": false, "type": "string"}, "services.i2pd.proto.http.port": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "7070"}, "description": {"_type": "mdDoc", "text": "Bind port for http endpoint."}, "loc": ["services", "i2pd", "proto", "http", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.i2pd.proto.http.strictHeaders": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Enable strict host checking on WebUI.\n"}, "loc": ["services", "i2pd", "proto", "http", "strictHeaders"], "readOnly": false, "type": "null or boolean"}, "services.i2pd.proto.http.user": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"i2pd\""}, "description": {"_type": "mdDoc", "text": "Username for webconsole access\n"}, "loc": ["services", "i2pd", "proto", "http", "user"], "readOnly": false, "type": "string"}, "services.i2pd.proto.httpProxy.address": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Bind address for httpproxy endpoint."}, "loc": ["services", "i2pd", "proto", "httpProxy", "address"], "readOnly": false, "type": "string"}, "services.i2pd.proto.httpProxy.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable httpproxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "proto", "httpProxy", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.proto.httpProxy.inbound.length": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Guaranteed minimum hops for httpproxy tunnels."}, "loc": ["services", "i2pd", "proto", "httpProxy", "inbound", "length"], "readOnly": false, "type": "signed integer"}, "services.i2pd.proto.httpProxy.inbound.quantity": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Number of simultaneous httpproxy tunnels."}, "loc": ["services", "i2pd", "proto", "httpProxy", "inbound", "quantity"], "readOnly": false, "type": "signed integer"}, "services.i2pd.proto.httpProxy.keys": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"httpproxy-keys.dat\""}, "description": {"_type": "mdDoc", "text": "File to persist HTTPPROXY keys.\n"}, "loc": ["services", "i2pd", "proto", "httpProxy", "keys"], "readOnly": false, "type": "null or string"}, "services.i2pd.proto.httpProxy.latency.max": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Max latency for tunnels."}, "loc": ["services", "i2pd", "proto", "httpProxy", "latency", "max"], "readOnly": false, "type": "null or signed integer"}, "services.i2pd.proto.httpProxy.latency.min": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Min latency for tunnels."}, "loc": ["services", "i2pd", "proto", "httpProxy", "latency", "min"], "readOnly": false, "type": "null or signed integer"}, "services.i2pd.proto.httpProxy.name": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"httpproxy\""}, "description": {"_type": "mdDoc", "text": "The endpoint name."}, "loc": ["services", "i2pd", "proto", "httpProxy", "name"], "readOnly": false, "type": "string"}, "services.i2pd.proto.httpProxy.outbound.length": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Guaranteed minimum hops for httpproxy tunnels."}, "loc": ["services", "i2pd", "proto", "httpProxy", "outbound", "length"], "readOnly": false, "type": "signed integer"}, "services.i2pd.proto.httpProxy.outbound.quantity": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Number of simultaneous httpproxy tunnels."}, "loc": ["services", "i2pd", "proto", "httpProxy", "outbound", "quantity"], "readOnly": false, "type": "signed integer"}, "services.i2pd.proto.httpProxy.outproxy": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Upstream outproxy bind address."}, "loc": ["services", "i2pd", "proto", "httpProxy", "outproxy"], "readOnly": false, "type": "null or string"}, "services.i2pd.proto.httpProxy.port": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "4444"}, "description": {"_type": "mdDoc", "text": "Bind port for httpproxy endpoint."}, "loc": ["services", "i2pd", "proto", "httpProxy", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.i2pd.proto.i2cp.address": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Bind address for i2cp endpoint."}, "loc": ["services", "i2pd", "proto", "i2cp", "address"], "readOnly": false, "type": "string"}, "services.i2pd.proto.i2cp.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable i2cp."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "proto", "i2cp", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.proto.i2cp.name": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"i2cp\""}, "description": {"_type": "mdDoc", "text": "The endpoint name."}, "loc": ["services", "i2pd", "proto", "i2cp", "name"], "readOnly": false, "type": "string"}, "services.i2pd.proto.i2cp.port": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "7654"}, "description": {"_type": "mdDoc", "text": "Bind port for i2cp endpoint."}, "loc": ["services", "i2pd", "proto", "i2cp", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.i2pd.proto.i2pControl.address": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Bind address for i2pcontrol endpoint."}, "loc": ["services", "i2pd", "proto", "i2pControl", "address"], "readOnly": false, "type": "string"}, "services.i2pd.proto.i2pControl.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable i2pcontrol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "proto", "i2pControl", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.proto.i2pControl.name": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"i2pcontrol\""}, "description": {"_type": "mdDoc", "text": "The endpoint name."}, "loc": ["services", "i2pd", "proto", "i2pControl", "name"], "readOnly": false, "type": "string"}, "services.i2pd.proto.i2pControl.port": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "7650"}, "description": {"_type": "mdDoc", "text": "Bind port for i2pcontrol endpoint."}, "loc": ["services", "i2pd", "proto", "i2pControl", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.i2pd.proto.sam.address": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Bind address for sam endpoint."}, "loc": ["services", "i2pd", "proto", "sam", "address"], "readOnly": false, "type": "string"}, "services.i2pd.proto.sam.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sam."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "proto", "sam", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.proto.sam.name": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"sam\""}, "description": {"_type": "mdDoc", "text": "The endpoint name."}, "loc": ["services", "i2pd", "proto", "sam", "name"], "readOnly": false, "type": "string"}, "services.i2pd.proto.sam.port": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "7656"}, "description": {"_type": "mdDoc", "text": "Bind port for sam endpoint."}, "loc": ["services", "i2pd", "proto", "sam", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.i2pd.proto.socksProxy.address": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Bind address for socksproxy endpoint."}, "loc": ["services", "i2pd", "proto", "socksProxy", "address"], "readOnly": false, "type": "string"}, "services.i2pd.proto.socksProxy.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable socksproxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "proto", "socksProxy", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.proto.socksProxy.inbound.length": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Guaranteed minimum hops for socksproxy tunnels."}, "loc": ["services", "i2pd", "proto", "socksProxy", "inbound", "length"], "readOnly": false, "type": "signed integer"}, "services.i2pd.proto.socksProxy.inbound.quantity": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Number of simultaneous socksproxy tunnels."}, "loc": ["services", "i2pd", "proto", "socksProxy", "inbound", "quantity"], "readOnly": false, "type": "signed integer"}, "services.i2pd.proto.socksProxy.keys": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"socksproxy-keys.dat\""}, "description": {"_type": "mdDoc", "text": "File to persist SOCKSPROXY keys.\n"}, "loc": ["services", "i2pd", "proto", "socksProxy", "keys"], "readOnly": false, "type": "null or string"}, "services.i2pd.proto.socksProxy.latency.max": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Max latency for tunnels."}, "loc": ["services", "i2pd", "proto", "socksProxy", "latency", "max"], "readOnly": false, "type": "null or signed integer"}, "services.i2pd.proto.socksProxy.latency.min": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Min latency for tunnels."}, "loc": ["services", "i2pd", "proto", "socksProxy", "latency", "min"], "readOnly": false, "type": "null or signed integer"}, "services.i2pd.proto.socksProxy.name": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"socksproxy\""}, "description": {"_type": "mdDoc", "text": "The endpoint name."}, "loc": ["services", "i2pd", "proto", "socksProxy", "name"], "readOnly": false, "type": "string"}, "services.i2pd.proto.socksProxy.outbound.length": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Guaranteed minimum hops for socksproxy tunnels."}, "loc": ["services", "i2pd", "proto", "socksProxy", "outbound", "length"], "readOnly": false, "type": "signed integer"}, "services.i2pd.proto.socksProxy.outbound.quantity": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Number of simultaneous socksproxy tunnels."}, "loc": ["services", "i2pd", "proto", "socksProxy", "outbound", "quantity"], "readOnly": false, "type": "signed integer"}, "services.i2pd.proto.socksProxy.outproxy": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Upstream outproxy bind address."}, "loc": ["services", "i2pd", "proto", "socksProxy", "outproxy"], "readOnly": false, "type": "string"}, "services.i2pd.proto.socksProxy.outproxyEnable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SOCKS outproxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "proto", "socksProxy", "outproxyEnable"], "readOnly": false, "type": "boolean"}, "services.i2pd.proto.socksProxy.outproxyPort": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "4444"}, "description": {"_type": "mdDoc", "text": "Upstream outproxy bind port."}, "loc": ["services", "i2pd", "proto", "socksProxy", "outproxyPort"], "readOnly": false, "type": "signed integer"}, "services.i2pd.proto.socksProxy.port": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "4447"}, "description": {"_type": "mdDoc", "text": "Bind port for socksproxy endpoint."}, "loc": ["services", "i2pd", "proto", "socksProxy", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.i2pd.reseed.file": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Full path to SU3 file to reseed from.\n"}, "loc": ["services", "i2pd", "reseed", "file"], "readOnly": false, "type": "null or string"}, "services.i2pd.reseed.floodfill": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to router info of floodfill to reseed from.\n"}, "loc": ["services", "i2pd", "reseed", "floodfill"], "readOnly": false, "type": "null or string"}, "services.i2pd.reseed.proxy": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "URL for reseed proxy, supports http/socks.\n"}, "loc": ["services", "i2pd", "reseed", "proxy"], "readOnly": false, "type": "null or string"}, "services.i2pd.reseed.urls": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Reseed URLs.\n"}, "loc": ["services", "i2pd", "reseed", "urls"], "readOnly": false, "type": "list of string"}, "services.i2pd.reseed.verify": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SU3 signature verification."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "reseed", "verify"], "readOnly": false, "type": "boolean"}, "services.i2pd.reseed.zipfile": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to local .zip file to reseed from.\n"}, "loc": ["services", "i2pd", "reseed", "zipfile"], "readOnly": false, "type": "null or string"}, "services.i2pd.share": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "100"}, "description": {"_type": "mdDoc", "text": "Limit of transit traffic from max bandwidth in percents.\n"}, "loc": ["services", "i2pd", "share"], "readOnly": false, "type": "signed integer"}, "services.i2pd.ssu": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable ssu."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "ssu"], "readOnly": false, "type": "boolean"}, "services.i2pd.trust.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Explicit trust options."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "trust", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.trust.family": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Router Family to trust for first hops.\n"}, "loc": ["services", "i2pd", "trust", "family"], "readOnly": false, "type": "null or string"}, "services.i2pd.trust.hidden": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Router concealment."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "trust", "hidden"], "readOnly": false, "type": "boolean"}, "services.i2pd.trust.routers": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Only connect to the listed routers.\n"}, "loc": ["services", "i2pd", "trust", "routers"], "readOnly": false, "type": "list of string"}, "services.i2pd.upnp.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable UPnP service discovery."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "upnp", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.upnp.name": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"I2Pd\""}, "description": {"_type": "mdDoc", "text": "Name i2pd appears in UPnP forwardings list.\n"}, "loc": ["services", "i2pd", "upnp", "name"], "readOnly": false, "type": "string"}, "services.i2pd.websocket.address": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Bind address for websockets endpoint."}, "loc": ["services", "i2pd", "websocket", "address"], "readOnly": false, "type": "string"}, "services.i2pd.websocket.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable websockets."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "websocket", "enable"], "readOnly": false, "type": "boolean"}, "services.i2pd.websocket.name": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "\"websockets\""}, "description": {"_type": "mdDoc", "text": "The endpoint name."}, "loc": ["services", "i2pd", "websocket", "name"], "readOnly": false, "type": "string"}, "services.i2pd.websocket.port": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "7666"}, "description": {"_type": "mdDoc", "text": "Bind port for websockets endpoint."}, "loc": ["services", "i2pd", "websocket", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.i2pd.yggdrasil.address": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Your local yggdrasil address. Specify it if you want to bind your router to a\nparticular address.\n"}, "loc": ["services", "i2pd", "yggdrasil", "address"], "readOnly": false, "type": "null or string"}, "services.i2pd.yggdrasil.enable": {"declarations": ["nixos/modules/services/networking/i2pd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Yggdrasil."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "i2pd", "yggdrasil", "enable"], "readOnly": false, "type": "boolean"}, "services.icecast.admin.password": {"declarations": ["nixos/modules/services/audio/icecast.nix"], "description": {"_type": "mdDoc", "text": "Password used for all administration functions."}, "loc": ["services", "icecast", "admin", "password"], "readOnly": false, "type": "string"}, "services.icecast.admin.user": {"declarations": ["nixos/modules/services/audio/icecast.nix"], "default": {"_type": "literalExpression", "text": "\"admin\""}, "description": {"_type": "mdDoc", "text": "Username used for all administration functions."}, "loc": ["services", "icecast", "admin", "user"], "readOnly": false, "type": "string"}, "services.icecast.enable": {"declarations": ["nixos/modules/services/audio/icecast.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Icecast server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "icecast", "enable"], "readOnly": false, "type": "boolean"}, "services.icecast.extraConf": {"declarations": ["nixos/modules/services/audio/icecast.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "icecast.xml content."}, "loc": ["services", "icecast", "extraConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.icecast.group": {"declarations": ["nixos/modules/services/audio/icecast.nix"], "default": {"_type": "literalExpression", "text": "\"nogroup\""}, "description": {"_type": "mdDoc", "text": "Group privileges for the server."}, "loc": ["services", "icecast", "group"], "readOnly": false, "type": "string"}, "services.icecast.hostname": {"declarations": ["nixos/modules/services/audio/icecast.nix"], "default": {"_type": "literalExpression", "text": "config.networking.domain"}, "description": {"_type": "mdDoc", "text": "DNS name or IP address that will be used for the stream directory lookups or possibly the playlist generation if a Host header is not provided."}, "loc": ["services", "icecast", "hostname"], "readOnly": false, "type": "null or string"}, "services.icecast.listen.address": {"declarations": ["nixos/modules/services/audio/icecast.nix"], "default": {"_type": "literalExpression", "text": "\"::\""}, "description": {"_type": "mdDoc", "text": "Address Icecast will listen on."}, "loc": ["services", "icecast", "listen", "address"], "readOnly": false, "type": "string"}, "services.icecast.listen.port": {"declarations": ["nixos/modules/services/audio/icecast.nix"], "default": {"_type": "literalExpression", "text": "8000"}, "description": {"_type": "mdDoc", "text": "TCP port that will be used to accept client connections."}, "loc": ["services", "icecast", "listen", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.icecast.logDir": {"declarations": ["nixos/modules/services/audio/icecast.nix"], "default": {"_type": "literalExpression", "text": "\"/var/log/icecast\""}, "description": {"_type": "mdDoc", "text": "Base directory used for logging."}, "loc": ["services", "icecast", "logDir"], "readOnly": false, "type": "path"}, "services.icecast.user": {"declarations": ["nixos/modules/services/audio/icecast.nix"], "default": {"_type": "literalExpression", "text": "\"nobody\""}, "description": {"_type": "mdDoc", "text": "User privileges for the server."}, "loc": ["services", "icecast", "user"], "readOnly": false, "type": "string"}, "services.icecream.daemon.cacheLimit": {"declarations": ["nixos/modules/services/networking/icecream/daemon.nix"], "default": {"_type": "literalExpression", "text": "256"}, "description": {"_type": "mdDoc", "text": "Maximum size in Megabytes of cache used to store compile environments of compile clients.\n"}, "loc": ["services", "icecream", "daemon", "cacheLimit"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.icecream.daemon.enable": {"declarations": ["nixos/modules/services/networking/icecream/daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Icecream Daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "icecream", "daemon", "enable"], "readOnly": false, "type": "boolean"}, "services.icecream.daemon.extraArgs": {"declarations": ["nixos/modules/services/networking/icecream/daemon.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command line parameters."}, "example": {"_type": "literalExpression", "text": "[\n  \"-v\"\n]"}, "loc": ["services", "icecream", "daemon", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.icecream.daemon.hostname": {"declarations": ["nixos/modules/services/networking/icecream/daemon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hostname of the daemon in the icecream infrastructure.\n\nUses the hostname retrieved via uname if set to null.\n"}, "loc": ["services", "icecream", "daemon", "hostname"], "readOnly": false, "type": "null or string"}, "services.icecream.daemon.maxProcesses": {"declarations": ["nixos/modules/services/networking/icecream/daemon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum number of compile jobs started in parallel for this daemon.\n\nUses the number of CPUs if set to null.\n"}, "loc": ["services", "icecream", "daemon", "maxProcesses"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.icecream.daemon.netName": {"declarations": ["nixos/modules/services/networking/icecream/daemon.nix"], "default": {"_type": "literalExpression", "text": "\"ICECREAM\""}, "description": {"_type": "mdDoc", "text": "Network name to connect to. A scheduler with the same name needs to be running.\n"}, "loc": ["services", "icecream", "daemon", "netName"], "readOnly": false, "type": "string"}, "services.icecream.daemon.nice": {"declarations": ["nixos/modules/services/networking/icecream/daemon.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "The level of niceness to use.\n"}, "loc": ["services", "icecream", "daemon", "nice"], "readOnly": false, "type": "signed integer"}, "services.icecream.daemon.noRemote": {"declarations": ["nixos/modules/services/networking/icecream/daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Prevent jobs from other nodes being scheduled on this daemon.\n"}, "loc": ["services", "icecream", "daemon", "noRemote"], "readOnly": false, "type": "boolean"}, "services.icecream.daemon.openBroadcast": {"declarations": ["nixos/modules/services/networking/icecream/daemon.nix"], "description": {"_type": "mdDoc", "text": "Whether to automatically open the firewall for scheduler discovery.\n"}, "loc": ["services", "icecream", "daemon", "openBroadcast"], "readOnly": false, "type": "boolean"}, "services.icecream.daemon.openFirewall": {"declarations": ["nixos/modules/services/networking/icecream/daemon.nix"], "description": {"_type": "mdDoc", "text": "Whether to automatically open receive port in the firewall.\n"}, "loc": ["services", "icecream", "daemon", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.icecream.daemon.package": {"declarations": ["nixos/modules/services/networking/icecream/daemon.nix"], "default": {"_type": "literalExpression", "text": "pkgs.icecream"}, "description": {"_type": "mdDoc", "text": "Icecream package to use."}, "loc": ["services", "icecream", "daemon", "package"], "readOnly": false, "type": "package"}, "services.icecream.daemon.schedulerHost": {"declarations": ["nixos/modules/services/networking/icecream/daemon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Explicit scheduler hostname, useful in firewalled environments.\n\nUses scheduler autodiscovery via broadcast if set to null.\n"}, "loc": ["services", "icecream", "daemon", "schedulerHost"], "readOnly": false, "type": "null or string"}, "services.icecream.daemon.user": {"declarations": ["nixos/modules/services/networking/icecream/daemon.nix"], "default": {"_type": "literalExpression", "text": "\"icecc\""}, "description": {"_type": "mdDoc", "text": "User to run the icecream daemon as. Set to root to enable receive of\nremote compile environments.\n"}, "loc": ["services", "icecream", "daemon", "user"], "readOnly": false, "type": "string"}, "services.icecream.scheduler.enable": {"declarations": ["nixos/modules/services/networking/icecream/scheduler.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Icecream Scheduler."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "icecream", "scheduler", "enable"], "readOnly": false, "type": "boolean"}, "services.icecream.scheduler.extraArgs": {"declarations": ["nixos/modules/services/networking/icecream/scheduler.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command line parameters"}, "example": {"_type": "literalExpression", "text": "[\n  \"-v\"\n]"}, "loc": ["services", "icecream", "scheduler", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.icecream.scheduler.netName": {"declarations": ["nixos/modules/services/networking/icecream/scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Network name for the icecream scheduler.\n\nUses the default ICECREAM if null.\n"}, "loc": ["services", "icecream", "scheduler", "netName"], "readOnly": false, "type": "null or string"}, "services.icecream.scheduler.openFirewall": {"declarations": ["nixos/modules/services/networking/icecream/scheduler.nix"], "description": {"_type": "mdDoc", "text": "Whether to automatically open the daemon port in the firewall.\n"}, "loc": ["services", "icecream", "scheduler", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.icecream.scheduler.openTelnet": {"declarations": ["nixos/modules/services/networking/icecream/scheduler.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the telnet TCP port on 8766.\n"}, "loc": ["services", "icecream", "scheduler", "openTelnet"], "readOnly": false, "type": "boolean"}, "services.icecream.scheduler.package": {"declarations": ["nixos/modules/services/networking/icecream/scheduler.nix"], "default": {"_type": "literalExpression", "text": "pkgs.icecream"}, "description": {"_type": "mdDoc", "text": "Icecream package to use."}, "loc": ["services", "icecream", "scheduler", "package"], "readOnly": false, "type": "package"}, "services.icecream.scheduler.persistentClientConnection": {"declarations": ["nixos/modules/services/networking/icecream/scheduler.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to prevent clients from connecting to a better scheduler.\n"}, "loc": ["services", "icecream", "scheduler", "persistentClientConnection"], "readOnly": false, "type": "boolean"}, "services.icecream.scheduler.port": {"declarations": ["nixos/modules/services/networking/icecream/scheduler.nix"], "default": {"_type": "literalExpression", "text": "8765"}, "description": {"_type": "mdDoc", "text": "Server port to listen for icecream daemon requests.\n"}, "loc": ["services", "icecream", "scheduler", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.icingaweb2.authentications": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "authentication.ini contents.\nWill automatically be converted to a .ini file.\n\nIf the value is null, no authentication.ini is created and you can\nmodify it manually (e.g. via the web interface).\n"}, "example": {"_type": "literalExpression", "text": "{\n  icingaweb = {\n    backend = \"db\";\n    resource = \"icingaweb_db\";\n  };\n}"}, "loc": ["services", "icingaweb2", "authentications"], "readOnly": false, "type": "null or (attribute set)"}, "services.icingaweb2.enable": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the icingaweb2 web interface."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "icingaweb2", "enable"], "readOnly": false, "type": "boolean"}, "services.icingaweb2.generalConfig": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "config.ini contents.\nWill automatically be converted to a .ini file.\nIf you don't set global.module_path, the module will take care of it.\n\nIf the value is null, no config.ini is created and you can\nmodify it manually (e.g. via the web interface).\nNote that you need to update module_path manually.\n"}, "example": {"_type": "literalExpression", "text": "{\n  general = {\n    config_resource = \"icingaweb_db\";\n    showStacktraces = 1;\n  };\n  logging = {\n    level = \"CRITICAL\";\n    log = \"syslog\";\n  };\n}"}, "loc": ["services", "icingaweb2", "generalConfig"], "readOnly": false, "type": "null or (attribute set)"}, "services.icingaweb2.groupBackends": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "groups.ini contents.\nWill automatically be converted to a .ini file.\n\nIf the value is null, no groups.ini is created and you can\nmodify it manually (e.g. via the web interface).\n"}, "example": {"_type": "literalExpression", "text": "{\n  icingaweb = {\n    backend = \"db\";\n    resource = \"icingaweb_db\";\n  };\n}"}, "loc": ["services", "icingaweb2", "groupBackends"], "readOnly": false, "type": "null or (attribute set)"}, "services.icingaweb2.libraryPaths": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Libraries to add to the Icingaweb2 library path.\nThe name of the attribute is the name of the library, the value\nis the package to add.\n"}, "loc": ["services", "icingaweb2", "libraryPaths"], "readOnly": false, "type": "attribute set of package"}, "services.icingaweb2.modulePackages": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Name-package attrset of Icingaweb 2 modules packages to enable.\n\nIf you enable modules manually (e.g. via the web ui), they will not be touched.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"snow\" = icingaweb2Modules.theme-snow;\n}\n"}, "loc": ["services", "icingaweb2", "modulePackages"], "readOnly": false, "type": "attribute set of package"}, "services.icingaweb2.modules.doc.enable": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the icingaweb2 doc module."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "icingaweb2", "modules", "doc", "enable"], "readOnly": false, "type": "boolean"}, "services.icingaweb2.modules.migrate.enable": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the icingaweb2 migrate module."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "icingaweb2", "modules", "migrate", "enable"], "readOnly": false, "type": "boolean"}, "services.icingaweb2.modules.monitoring.backends": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "default": {"_type": "literalExpression", "text": "{\n  icinga = {\n    resource = \"icinga_ido\";\n  };\n}"}, "description": {"_type": "mdDoc", "text": "Monitoring backends to define"}, "loc": ["services", "icingaweb2", "modules", "monitoring", "backends"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.icingaweb2.modules.monitoring.backends.<name>.disabled": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable this backend"}, "loc": ["services", "icingaweb2", "modules", "monitoring", "backends", "<name>", "disabled"], "readOnly": false, "type": "boolean"}, "services.icingaweb2.modules.monitoring.backends.<name>.resource": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "description": {"_type": "mdDoc", "text": "Name of the IDO resource"}, "loc": ["services", "icingaweb2", "modules", "monitoring", "backends", "<name>", "resource"], "readOnly": false, "type": "string"}, "services.icingaweb2.modules.monitoring.enable": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the icingaweb2 monitoring module."}, "loc": ["services", "icingaweb2", "modules", "monitoring", "enable"], "readOnly": false, "type": "boolean"}, "services.icingaweb2.modules.monitoring.generalConfig.mutable": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Make config.ini of the monitoring module mutable (e.g. via the web interface)."}, "loc": ["services", "icingaweb2", "modules", "monitoring", "generalConfig", "mutable"], "readOnly": false, "type": "boolean"}, "services.icingaweb2.modules.monitoring.generalConfig.protectedVars": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*pw*\"\n  \"*pass*\"\n  \"community\"\n]"}, "description": {"_type": "mdDoc", "text": "List of string patterns for custom variables which should be excluded from user\u2019s view."}, "loc": ["services", "icingaweb2", "modules", "monitoring", "generalConfig", "protectedVars"], "readOnly": false, "type": "list of string"}, "services.icingaweb2.modules.monitoring.mutableBackends": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Make backends.ini of the monitoring module mutable (e.g. via the web interface)."}, "loc": ["services", "icingaweb2", "modules", "monitoring", "mutableBackends"], "readOnly": false, "type": "boolean"}, "services.icingaweb2.modules.monitoring.mutableTransports": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Make commandtransports.ini of the monitoring module mutable (e.g. via the web interface)."}, "loc": ["services", "icingaweb2", "modules", "monitoring", "mutableTransports"], "readOnly": false, "type": "boolean"}, "services.icingaweb2.modules.monitoring.transports": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Command transports to define"}, "loc": ["services", "icingaweb2", "modules", "monitoring", "transports"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.icingaweb2.modules.monitoring.transports.<name>.host": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "description": {"_type": "mdDoc", "text": "Host for the api or remote transport"}, "loc": ["services", "icingaweb2", "modules", "monitoring", "transports", "<name>", "host"], "readOnly": false, "type": "string"}, "services.icingaweb2.modules.monitoring.transports.<name>.instance": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Assign a icinga instance to this transport"}, "loc": ["services", "icingaweb2", "modules", "monitoring", "transports", "<name>", "instance"], "readOnly": false, "type": "null or string"}, "services.icingaweb2.modules.monitoring.transports.<name>.password": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "description": {"_type": "mdDoc", "text": "Password for the api transport"}, "loc": ["services", "icingaweb2", "modules", "monitoring", "transports", "<name>", "password"], "readOnly": false, "type": "string"}, "services.icingaweb2.modules.monitoring.transports.<name>.path": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "description": {"_type": "mdDoc", "text": "Path to the socket for local or remote transports"}, "loc": ["services", "icingaweb2", "modules", "monitoring", "transports", "<name>", "path"], "readOnly": false, "type": "string"}, "services.icingaweb2.modules.monitoring.transports.<name>.port": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to connect to for the api or remote transport"}, "loc": ["services", "icingaweb2", "modules", "monitoring", "transports", "<name>", "port"], "readOnly": false, "type": "null or string"}, "services.icingaweb2.modules.monitoring.transports.<name>.resource": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "description": {"_type": "mdDoc", "text": "SSH identity resource for the remote transport"}, "loc": ["services", "icingaweb2", "modules", "monitoring", "transports", "<name>", "resource"], "readOnly": false, "type": "string"}, "services.icingaweb2.modules.monitoring.transports.<name>.type": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "default": {"_type": "literalExpression", "text": "\"api\""}, "description": {"_type": "mdDoc", "text": "Type of  this transport"}, "loc": ["services", "icingaweb2", "modules", "monitoring", "transports", "<name>", "type"], "readOnly": false, "type": "one of \"api\", \"local\", \"remote\""}, "services.icingaweb2.modules.monitoring.transports.<name>.username": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix"], "description": {"_type": "mdDoc", "text": "Username for the api or remote transport"}, "loc": ["services", "icingaweb2", "modules", "monitoring", "transports", "<name>", "username"], "readOnly": false, "type": "string"}, "services.icingaweb2.modules.setup.enable": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the icingaweb2 setup module."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "icingaweb2", "modules", "setup", "enable"], "readOnly": false, "type": "boolean"}, "services.icingaweb2.modules.test.enable": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the icingaweb2 test module."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "icingaweb2", "modules", "test", "enable"], "readOnly": false, "type": "boolean"}, "services.icingaweb2.modules.translation.enable": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the icingaweb2 translation module."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "icingaweb2", "modules", "translation", "enable"], "readOnly": false, "type": "boolean"}, "services.icingaweb2.pool": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "\"icingaweb2\""}, "description": {"_type": "mdDoc", "text": "Name of existing PHP-FPM pool that is used to run Icingaweb2.\nIf not specified, a pool will automatically created with default values.\n"}, "loc": ["services", "icingaweb2", "pool"], "readOnly": false, "type": "string"}, "services.icingaweb2.resources": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "resources.ini contents.\nWill automatically be converted to a .ini file.\n\nIf the value is null, no resources.ini is created and you can\nmodify it manually (e.g. via the web interface).\nNote that if you set passwords here, they will go into the nix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  icingaweb_db = {\n    db = \"mysql\";\n    dbname = \"icingaweb2\";\n    host = \"localhost\";\n    password = \"icingaweb2\";\n    type = \"db\";\n    username = \"icingaweb2\";\n  };\n}"}, "loc": ["services", "icingaweb2", "resources"], "readOnly": false, "type": "null or (attribute set)"}, "services.icingaweb2.roles": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "roles.ini contents.\nWill automatically be converted to a .ini file.\n\nIf the value is null, no roles.ini is created and you can\nmodify it manually (e.g. via the web interface).\n"}, "example": {"_type": "literalExpression", "text": "{\n  Administrators = {\n    permissions = \"*\";\n    users = \"admin\";\n  };\n}"}, "loc": ["services", "icingaweb2", "roles"], "readOnly": false, "type": "null or (attribute set)"}, "services.icingaweb2.timezone": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "\"UTC\""}, "description": {"_type": "mdDoc", "text": "PHP-compliant timezone specification"}, "example": {"_type": "literalExpression", "text": "\"Europe/Berlin\""}, "loc": ["services", "icingaweb2", "timezone"], "readOnly": false, "type": "string"}, "services.icingaweb2.virtualHost": {"declarations": ["nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix"], "default": {"_type": "literalExpression", "text": "\"icingaweb2\""}, "description": {"_type": "mdDoc", "text": "Name of the nginx virtualhost to use and setup. If null, no virtualhost is set up.\n"}, "loc": ["services", "icingaweb2", "virtualHost"], "readOnly": false, "type": "null or string"}, "services.ihaskell.enable": {"declarations": ["nixos/modules/services/misc/ihaskell.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Autostart an IHaskell notebook service."}, "loc": ["services", "ihaskell", "enable"], "readOnly": false, "type": "boolean"}, "services.ihaskell.extraPackages": {"declarations": ["nixos/modules/services/misc/ihaskell.nix"], "default": {"_type": "literalExpression", "text": "haskellPackages: []"}, "description": {"_type": "mdDoc", "text": "Extra packages available to ghc when running ihaskell. The\nvalue must be a function which receives the attrset defined\nin {var}`haskellPackages` as the sole argument.\n"}, "example": {"_type": "literalExpression", "text": "haskellPackages: [\n  haskellPackages.wreq\n  haskellPackages.lens\n]\n"}, "loc": ["services", "ihaskell", "extraPackages"], "readOnly": false, "type": "function that evaluates to a(n) list of package"}, "services.illum.enable": {"declarations": ["nixos/modules/services/hardware/illum.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable illum, a daemon for controlling screen brightness with brightness buttons.\n"}, "loc": ["services", "illum", "enable"], "readOnly": false, "type": "boolean"}, "services.imaginary.address": {"declarations": ["nixos/modules/services/networking/imaginary.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Bind address. Corresponds to the `-a` flag.\nSet to `\"\"` to bind to all addresses.\n"}, "example": {"_type": "literalExpression", "text": "\"[::1]\""}, "loc": ["services", "imaginary", "address"], "readOnly": false, "type": "string"}, "services.imaginary.enable": {"declarations": ["nixos/modules/services/networking/imaginary.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable imaginary image processing microservice."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "imaginary", "enable"], "readOnly": false, "type": "boolean"}, "services.imaginary.port": {"declarations": ["nixos/modules/services/networking/imaginary.nix"], "default": {"_type": "literalExpression", "text": "8088"}, "description": {"_type": "mdDoc", "text": "Bind port. Corresponds to the `-p` flag."}, "loc": ["services", "imaginary", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.imaginary.settings": {"declarations": ["nixos/modules/services/networking/imaginary.nix"], "description": {"_type": "mdDoc", "text": "Command line arguments passed to the imaginary executable, stripped of\nthe prefix `-`. See upstream's\n[README](https://github.com/h2non/imaginary#command-line-usage) for all\noptions.\n"}, "loc": ["services", "imaginary", "settings"], "readOnly": false, "type": "attribute set of (boolean or signed integer or non-empty (list of string) or string)"}, "services.imaginary.settings.return-size": {"declarations": ["nixos/modules/services/networking/imaginary.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Return the image size in the HTTP headers."}, "loc": ["services", "imaginary", "settings", "return-size"], "readOnly": false, "type": "boolean"}, "services.incron.allow": {"declarations": ["nixos/modules/services/monitoring/incron.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Users allowed to use incrontab.\n\nIf empty then no user will be allowed to have their own incrontab.\nIf `null` then will defer to {option}`deny`.\nIf both {option}`allow` and {option}`deny` are null\nthen all users will be allowed to have their own incrontab.\n"}, "loc": ["services", "incron", "allow"], "readOnly": false, "type": "null or (list of string)"}, "services.incron.deny": {"declarations": ["nixos/modules/services/monitoring/incron.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Users forbidden from using incrontab."}, "loc": ["services", "incron", "deny"], "readOnly": false, "type": "null or (list of string)"}, "services.incron.enable": {"declarations": ["nixos/modules/services/monitoring/incron.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the incron daemon.\n\nNote that commands run under incrontab only support common Nix profiles for the {env}`PATH` provided variable.\n"}, "loc": ["services", "incron", "enable"], "readOnly": false, "type": "boolean"}, "services.incron.extraPackages": {"declarations": ["nixos/modules/services/monitoring/incron.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra packages available to the system incrontab."}, "example": {"_type": "literalExpression", "text": "[ pkgs.rsync ]"}, "loc": ["services", "incron", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.incron.systab": {"declarations": ["nixos/modules/services/monitoring/incron.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The system incrontab contents."}, "example": {"_type": "literalExpression", "text": "''\n  /var/mail IN_CLOSE_WRITE abc $@/$#\n  /tmp IN_ALL_EVENTS efg $@/$# $&\n''"}, "loc": ["services", "incron", "systab"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.infinoted.certificateChain": {"declarations": ["nixos/modules/services/editors/infinoted.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Chain of CA-certificates to which our `certificateFile` is relative.\nOptional for TLS.\n"}, "loc": ["services", "infinoted", "certificateChain"], "readOnly": false, "type": "null or path"}, "services.infinoted.certificateFile": {"declarations": ["nixos/modules/services/editors/infinoted.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Server certificate to use for TLS\n"}, "loc": ["services", "infinoted", "certificateFile"], "readOnly": false, "type": "null or path"}, "services.infinoted.enable": {"declarations": ["nixos/modules/services/editors/infinoted.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable infinoted."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "infinoted", "enable"], "readOnly": false, "type": "boolean"}, "services.infinoted.extraConfig": {"declarations": ["nixos/modules/services/editors/infinoted.nix"], "default": {"_type": "literalExpression", "text": "''\n  [autosave]\n  interval=10\n''"}, "description": {"_type": "mdDoc", "text": "Additional configuration to append to infinoted.conf\n"}, "loc": ["services", "infinoted", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.infinoted.group": {"declarations": ["nixos/modules/services/editors/infinoted.nix"], "default": {"_type": "literalExpression", "text": "\"infinoted\""}, "description": {"_type": "mdDoc", "text": "What to call the primary group of the dedicated user under which infinoted is run\n"}, "loc": ["services", "infinoted", "group"], "readOnly": false, "type": "string"}, "services.infinoted.keyFile": {"declarations": ["nixos/modules/services/editors/infinoted.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Private key to use for TLS\n"}, "loc": ["services", "infinoted", "keyFile"], "readOnly": false, "type": "null or path"}, "services.infinoted.package": {"declarations": ["nixos/modules/services/editors/infinoted.nix"], "default": {"_type": "literalExpression", "text": "pkgs.libinfinity"}, "description": {"_type": "mdDoc", "text": "Package providing infinoted\n"}, "loc": ["services", "infinoted", "package"], "readOnly": false, "type": "package"}, "services.infinoted.passwordFile": {"declarations": ["nixos/modules/services/editors/infinoted.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File to read server-wide password from\n"}, "loc": ["services", "infinoted", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.infinoted.plugins": {"declarations": ["nixos/modules/services/editors/infinoted.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"note-text\"\n  \"note-chat\"\n  \"logging\"\n  \"autosave\"\n]"}, "description": {"_type": "mdDoc", "text": "Plugins to enable\n"}, "loc": ["services", "infinoted", "plugins"], "readOnly": false, "type": "list of string"}, "services.infinoted.port": {"declarations": ["nixos/modules/services/editors/infinoted.nix"], "default": {"_type": "literalExpression", "text": "6523"}, "description": {"_type": "mdDoc", "text": "Port to listen on\n"}, "loc": ["services", "infinoted", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.infinoted.rootDirectory": {"declarations": ["nixos/modules/services/editors/infinoted.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/infinoted/documents/\""}, "description": {"_type": "mdDoc", "text": "Root of the directory structure to serve\n"}, "loc": ["services", "infinoted", "rootDirectory"], "readOnly": false, "type": "path"}, "services.infinoted.securityPolicy": {"declarations": ["nixos/modules/services/editors/infinoted.nix"], "default": {"_type": "literalExpression", "text": "\"require-tls\""}, "description": {"_type": "mdDoc", "text": "How strictly to enforce clients connection with TLS.\n"}, "loc": ["services", "infinoted", "securityPolicy"], "readOnly": false, "type": "one of \"no-tls\", \"allow-tls\", \"require-tls\""}, "services.infinoted.user": {"declarations": ["nixos/modules/services/editors/infinoted.nix"], "default": {"_type": "literalExpression", "text": "\"infinoted\""}, "description": {"_type": "mdDoc", "text": "What to call the dedicated user under which infinoted is run\n"}, "loc": ["services", "infinoted", "user"], "readOnly": false, "type": "string"}, "services.influxdb.dataDir": {"declarations": ["nixos/modules/services/databases/influxdb.nix"], "default": {"_type": "literalExpression", "text": "\"/var/db/influxdb\""}, "description": {"_type": "mdDoc", "text": "Data directory for influxd data files."}, "loc": ["services", "influxdb", "dataDir"], "readOnly": false, "type": "path"}, "services.influxdb.enable": {"declarations": ["nixos/modules/services/databases/influxdb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the influxdb server"}, "loc": ["services", "influxdb", "enable"], "readOnly": false, "type": "boolean"}, "services.influxdb.extraConfig": {"declarations": ["nixos/modules/services/databases/influxdb.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration options for influxdb"}, "loc": ["services", "influxdb", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.influxdb.group": {"declarations": ["nixos/modules/services/databases/influxdb.nix"], "default": {"_type": "literalExpression", "text": "\"influxdb\""}, "description": {"_type": "mdDoc", "text": "Group under which influxdb runs"}, "loc": ["services", "influxdb", "group"], "readOnly": false, "type": "string"}, "services.influxdb.package": {"declarations": ["nixos/modules/services/databases/influxdb.nix"], "default": {"_type": "literalExpression", "text": "pkgs.influxdb"}, "description": {"_type": "mdDoc", "text": "Which influxdb derivation to use"}, "loc": ["services", "influxdb", "package"], "readOnly": false, "type": "package"}, "services.influxdb.user": {"declarations": ["nixos/modules/services/databases/influxdb.nix"], "default": {"_type": "literalExpression", "text": "\"influxdb\""}, "description": {"_type": "mdDoc", "text": "User account under which influxdb runs"}, "loc": ["services", "influxdb", "user"], "readOnly": false, "type": "string"}, "services.influxdb2.enable": {"declarations": ["nixos/modules/services/databases/influxdb2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the influxdb2 server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "influxdb2", "enable"], "readOnly": false, "type": "boolean"}, "services.influxdb2.package": {"declarations": ["nixos/modules/services/databases/influxdb2.nix"], "default": {"_type": "literalExpression", "text": "pkgs.influxdb2"}, "description": {"_type": "mdDoc", "text": "influxdb2 derivation to use."}, "loc": ["services", "influxdb2", "package"], "readOnly": false, "type": "package"}, "services.influxdb2.settings": {"declarations": ["nixos/modules/services/databases/influxdb2.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "configuration options for influxdb2, see <https://docs.influxdata.com/influxdb/v2.0/reference/config-options> for details."}, "loc": ["services", "influxdb2", "settings"], "readOnly": false, "type": "JSON value"}, "services.infnoise.enable": {"declarations": ["nixos/modules/services/security/infnoise.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Infinite Noise TRNG driver."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "infnoise", "enable"], "readOnly": false, "type": "boolean"}, "services.infnoise.fillDevRandom": {"declarations": ["nixos/modules/services/security/infnoise.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to run the infnoise driver as a daemon to refill /dev/random.\n\nIf disabled, you can use the `infnoise` command-line tool to\nmanually obtain randomness.\n"}, "loc": ["services", "infnoise", "fillDevRandom"], "readOnly": false, "type": "boolean"}, "services.input-remapper.enable": {"declarations": ["nixos/modules/services/misc/input-remapper.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable input-remapper, an easy to use tool to change the mapping of your input device buttons."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "input-remapper", "enable"], "readOnly": false, "type": "boolean"}, "services.input-remapper.enableUdevRules": {"declarations": ["nixos/modules/services/misc/input-remapper.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable udev rules added by input-remapper to handle hotplugged devices. Currently disabled by default due to https://github.com/sezanzeb/input-remapper/issues/140."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "input-remapper", "enableUdevRules"], "readOnly": false, "type": "boolean"}, "services.input-remapper.package": {"declarations": ["nixos/modules/services/misc/input-remapper.nix"], "default": {"_type": "literalExpression", "text": "pkgs.input-remapper"}, "description": {"_type": "mdDoc", "text": "The input-remapper package to use."}, "loc": ["services", "input-remapper", "package"], "readOnly": false, "type": "package"}, "services.input-remapper.serviceWantedBy": {"declarations": ["nixos/modules/services/misc/input-remapper.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"graphical.target\"\n]"}, "description": {"_type": "mdDoc", "text": "Specifies the WantedBy setting for the input-remapper service."}, "example": {"_type": "literalExpression", "text": "[\n  \"multi-user.target\"\n]"}, "loc": ["services", "input-remapper", "serviceWantedBy"], "readOnly": false, "type": "list of string"}, "services.inspircd.config": {"declarations": ["nixos/modules/services/networking/inspircd.nix"], "description": {"_type": "mdDoc", "text": "Verbatim `inspircd.conf` file.\nFor a list of options, consult the\n[InspIRCd documentation](https://docs.inspircd.org/3/configuration/), the\n[Module documentation](https://docs.inspircd.org/3/modules/)\nand the example configuration files distributed\nwith `pkgs.inspircd.doc`\n"}, "loc": ["services", "inspircd", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.inspircd.enable": {"declarations": ["nixos/modules/services/networking/inspircd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable InspIRCd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "inspircd", "enable"], "readOnly": false, "type": "boolean"}, "services.inspircd.package": {"declarations": ["nixos/modules/services/networking/inspircd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.inspircd"}, "description": {"_type": "mdDoc", "text": "The InspIRCd package to use. This is mainly useful\nto specify an overridden version of the\n`pkgs.inspircd` dervivation, for\nexample if you want to use a more minimal InspIRCd\ndistribution with less modules enabled or with\nmodules enabled which can't be distributed in binary\nform due to licensing issues.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.inspircdMinimal"}, "loc": ["services", "inspircd", "package"], "readOnly": false, "type": "package"}, "services.interception-tools.enable": {"declarations": ["nixos/modules/services/hardware/interception-tools.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the interception tools service."}, "loc": ["services", "interception-tools", "enable"], "readOnly": false, "type": "boolean"}, "services.interception-tools.plugins": {"declarations": ["nixos/modules/services/hardware/interception-tools.nix"], "default": {"_type": "literalExpression", "text": "[ pkgs.interception-tools-plugins.caps2esc ]"}, "description": {"_type": "mdDoc", "text": "A list of interception tools plugins that will be made available to use\ninside the udevmon configuration.\n"}, "loc": ["services", "interception-tools", "plugins"], "readOnly": false, "type": "list of package"}, "services.interception-tools.udevmonConfig": {"declarations": ["nixos/modules/services/hardware/interception-tools.nix"], "default": {"_type": "literalExpression", "text": "''\n  - JOB: \"intercept -g $DEVNODE | caps2esc | uinput -d $DEVNODE\"\n    DEVICE:\n      EVENTS:\n        EV_KEY: [KEY_CAPSLOCK, KEY_ESC]\n''"}, "description": {"_type": "mdDoc", "text": "String of udevmon YAML configuration, or path to a udevmon YAML\nconfiguration file.\n"}, "example": {"_type": "literalExpression", "text": "''\n  - JOB: \"intercept -g $DEVNODE | y2z | x2y | uinput -d $DEVNODE\"\n    DEVICE:\n      EVENTS:\n        EV_KEY: [KEY_X, KEY_Y]\n''"}, "loc": ["services", "interception-tools", "udevmonConfig"], "readOnly": false, "type": "string or path"}, "services.invidious.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/invidious.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to create a local database with PostgreSQL.\n"}, "loc": ["services", "invidious", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.invidious.database.host": {"declarations": ["nixos/modules/services/web-apps/invidious.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The database host Invidious should use.\n\nIf `null`, the local unix socket is used. Otherwise\nTCP is used.\n"}, "loc": ["services", "invidious", "database", "host"], "readOnly": false, "type": "null or string"}, "services.invidious.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/invidious.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to file containing the database password.\n"}, "loc": ["services", "invidious", "database", "passwordFile"], "readOnly": false, "type": "null or string"}, "services.invidious.database.port": {"declarations": ["nixos/modules/services/web-apps/invidious.nix"], "default": {"_type": "literalExpression", "text": "options.services.postgresql.port.default"}, "description": {"_type": "mdDoc", "text": "The port of the database Invidious should use.\n\nDefaults to the the default postgresql port.\n"}, "loc": ["services", "invidious", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.invidious.domain": {"declarations": ["nixos/modules/services/web-apps/invidious.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The FQDN Invidious is reachable on.\n\nThis is used to configure nginx and for building absolute URLs.\n"}, "loc": ["services", "invidious", "domain"], "readOnly": false, "type": "null or string"}, "services.invidious.enable": {"declarations": ["nixos/modules/services/web-apps/invidious.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Invidious."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "invidious", "enable"], "readOnly": false, "type": "boolean"}, "services.invidious.extraSettingsFile": {"declarations": ["nixos/modules/services/web-apps/invidious.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file including Invidious settings.\n\nIt gets merged with the settings specified in {option}`services.invidious.settings`\nand can be used to store secrets like `hmac_key` outside of the nix store.\n"}, "loc": ["services", "invidious", "extraSettingsFile"], "readOnly": false, "type": "null or string"}, "services.invidious.nginx.enable": {"declarations": ["nixos/modules/services/web-apps/invidious.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to configure nginx as a reverse proxy for Invidious.\n\nIt serves it under the domain specified in {option}`services.invidious.settings.domain` with enabled TLS and ACME.\nFurther configuration can be done through {option}`services.nginx.virtualHosts.${config.services.invidious.settings.domain}.*`,\nwhich can also be used to disable AMCE and TLS.\n"}, "loc": ["services", "invidious", "nginx", "enable"], "readOnly": false, "type": "boolean"}, "services.invidious.package": {"declarations": ["nixos/modules/services/web-apps/invidious.nix"], "default": {"_type": "literalExpression", "text": "pkgs.invidious"}, "description": {"_type": "mdDoc", "text": "The Invidious package to use."}, "loc": ["services", "invidious", "package"], "readOnly": false, "type": "package"}, "services.invidious.port": {"declarations": ["nixos/modules/services/web-apps/invidious.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "The port Invidious should listen on.\n\nTo allow access from outside,\nyou can use either {option}`services.invidious.nginx`\nor add `config.services.invidious.port` to {option}`networking.firewall.allowedTCPPorts`.\n"}, "loc": ["services", "invidious", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.invidious.settings": {"declarations": ["nixos/modules/services/web-apps/invidious.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The settings Invidious should use.\n\nSee [config.example.yml](https://github.com/iv-org/invidious/blob/master/config/config.example.yml) for a list of all possible options.\n"}, "loc": ["services", "invidious", "settings"], "readOnly": false, "type": "JSON value"}, "services.invoiceplane": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "InvoicePlane configuration."}, "loc": ["services", "invoiceplane"], "readOnly": false, "type": "submodule"}, "services.invoiceplane.sites": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specification of one or more WordPress sites to serve"}, "loc": ["services", "invoiceplane", "sites"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.invoiceplane.sites.<name>.cron.enable": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable cron service which periodically runs Invoiceplane tasks.\nRequires key taken from the administration page. Refer to\n<https://wiki.invoiceplane.com/en/1.0/modules/recurring-invoices>\non how to configure it.\n"}, "loc": ["services", "invoiceplane", "sites", "<name>", "cron", "enable"], "readOnly": false, "type": "boolean"}, "services.invoiceplane.sites.<name>.cron.key": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "description": {"_type": "mdDoc", "text": "Cron key taken from the administration page."}, "loc": ["services", "invoiceplane", "sites", "<name>", "cron", "key"], "readOnly": false, "type": "string"}, "services.invoiceplane.sites.<name>.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally."}, "loc": ["services", "invoiceplane", "sites", "<name>", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.invoiceplane.sites.<name>.database.host": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "invoiceplane", "sites", "<name>", "database", "host"], "readOnly": false, "type": "string"}, "services.invoiceplane.sites.<name>.database.name": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "\"invoiceplane\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "invoiceplane", "sites", "<name>", "database", "name"], "readOnly": false, "type": "string"}, "services.invoiceplane.sites.<name>.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/invoiceplane-dbpassword\""}, "loc": ["services", "invoiceplane", "sites", "<name>", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.invoiceplane.sites.<name>.database.port": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "3306"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "invoiceplane", "sites", "<name>", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.invoiceplane.sites.<name>.database.user": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "\"invoiceplane\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "invoiceplane", "sites", "<name>", "database", "user"], "readOnly": false, "type": "string"}, "services.invoiceplane.sites.<name>.enable": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable InvoicePlane web application."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "invoiceplane", "sites", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.invoiceplane.sites.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "InvoicePlane configuration. Refer to\n<https://github.com/InvoicePlane/InvoicePlane/blob/master/ipconfig.php.example>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "''\n  SETUP_COMPLETED=true\n  DISABLE_SETUP=true\n  IP_URL=https://invoice.example.com\n''"}, "loc": ["services", "invoiceplane", "sites", "<name>", "extraConfig"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.invoiceplane.sites.<name>.invoiceTemplates": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of path(s) to respective template(s) which are copied from the 'invoice_templates/pdf' directory.\n\n::: {.note}\nThese templates need to be packaged before use, see example.\n:::\n"}, "example": {"_type": "literalExpression", "text": "let\n  # Let's package an example template\n  template-vtdirektmarketing = pkgs.stdenv.mkDerivation {\n    name = \"vtdirektmarketing\";\n    # Download the template from a public repository\n    src = pkgs.fetchgit {\n      url = \"https://git.project-insanity.org/onny/invoiceplane-vtdirektmarketing.git\";\n      sha256 = \"1hh0q7wzsh8v8x03i82p6qrgbxr4v5fb05xylyrpp975l8axyg2z\";\n    };\n    sourceRoot = \".\";\n    # Installing simply means copying template php file to the output directory\n    installPhase = \"\"\n      mkdir -p $out\n      cp invoiceplane-vtdirektmarketing/vtdirektmarketing.php $out/\n    \"\";\n  };\n# And then pass this package to the template list like this:\nin [ template-vtdirektmarketing ]\n"}, "loc": ["services", "invoiceplane", "sites", "<name>", "invoiceTemplates"], "readOnly": false, "type": "list of path"}, "services.invoiceplane.sites.<name>.poolConfig": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = 32;\n  \"pm.max_requests\" = 500;\n  \"pm.max_spare_servers\" = 4;\n  \"pm.min_spare_servers\" = 2;\n  \"pm.start_servers\" = 2;\n}"}, "description": {"_type": "mdDoc", "text": "Options for the InvoicePlane PHP pool. See the documentation on `php-fpm.conf`\nfor details on configuration directives.\n"}, "loc": ["services", "invoiceplane", "sites", "<name>", "poolConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.invoiceplane.sites.<name>.stateDir": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/invoiceplane/\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "This directory is used for uploads of attachments and cache.\nThe directory passed here is automatically created and permissions\nadjusted as required.\n"}, "loc": ["services", "invoiceplane", "sites", "<name>", "stateDir"], "readOnly": false, "type": "path"}, "services.invoiceplane.webserver": {"declarations": ["nixos/modules/services/web-apps/invoiceplane.nix"], "default": {"_type": "literalExpression", "text": "\"caddy\""}, "description": {"_type": "mdDoc", "text": "Which webserver to use for virtual host management. Currently only\ncaddy is supported.\n"}, "loc": ["services", "invoiceplane", "webserver"], "readOnly": false, "type": "value \"caddy\" (singular enum)"}, "services.iodine.clients": {"declarations": ["nixos/modules/services/networking/iodine.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute of this option defines a systemd service that\nruns iodine. Many or none may be defined.\nThe name of each service is\n`iodine-\u00abname\u00bb`\nwhere \u00abname\u00bb is the name of the\ncorresponding attribute name.\n"}, "example": {"_type": "literalExpression", "text": "{\n  foo = {\n    server = \"tunnel.mdomain.com\";\n    relay = \"8.8.8.8\";\n    extraConfig = \"-v\";\n  }\n}\n"}, "loc": ["services", "iodine", "clients"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.iodine.clients.<name>.extraConfig": {"declarations": ["nixos/modules/services/networking/iodine.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional command line parameters"}, "example": {"_type": "literalExpression", "text": "\"-l 192.168.1.10 -p 23\""}, "loc": ["services", "iodine", "clients", "<name>", "extraConfig"], "readOnly": false, "type": "string"}, "services.iodine.clients.<name>.passwordFile": {"declarations": ["nixos/modules/services/networking/iodine.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Path to a file containing the password."}, "loc": ["services", "iodine", "clients", "<name>", "passwordFile"], "readOnly": false, "type": "string"}, "services.iodine.clients.<name>.relay": {"declarations": ["nixos/modules/services/networking/iodine.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "DNS server to use as an intermediate relay to the iodined server"}, "example": {"_type": "literalExpression", "text": "\"8.8.8.8\""}, "loc": ["services", "iodine", "clients", "<name>", "relay"], "readOnly": false, "type": "string"}, "services.iodine.clients.<name>.server": {"declarations": ["nixos/modules/services/networking/iodine.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Hostname of server running iodined"}, "example": {"_type": "literalExpression", "text": "\"tunnel.mydomain.com\""}, "loc": ["services", "iodine", "clients", "<name>", "server"], "readOnly": false, "type": "string"}, "services.iodine.server.domain": {"declarations": ["nixos/modules/services/networking/iodine.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Domain or subdomain of which nameservers point to us"}, "example": {"_type": "literalExpression", "text": "\"tunnel.mydomain.com\""}, "loc": ["services", "iodine", "server", "domain"], "readOnly": false, "type": "string"}, "services.iodine.server.enable": {"declarations": ["nixos/modules/services/networking/iodine.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "enable iodined server"}, "loc": ["services", "iodine", "server", "enable"], "readOnly": false, "type": "boolean"}, "services.iodine.server.extraConfig": {"declarations": ["nixos/modules/services/networking/iodine.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional command line parameters"}, "example": {"_type": "literalExpression", "text": "\"-l 192.168.1.10 -p 23\""}, "loc": ["services", "iodine", "server", "extraConfig"], "readOnly": false, "type": "string"}, "services.iodine.server.ip": {"declarations": ["nixos/modules/services/networking/iodine.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The assigned ip address or ip range"}, "example": {"_type": "literalExpression", "text": "\"172.16.10.1/24\""}, "loc": ["services", "iodine", "server", "ip"], "readOnly": false, "type": "string"}, "services.iodine.server.passwordFile": {"declarations": ["nixos/modules/services/networking/iodine.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "File that contains password"}, "loc": ["services", "iodine", "server", "passwordFile"], "readOnly": false, "type": "string"}, "services.iperf3.affinity": {"declarations": ["nixos/modules/services/networking/iperf3.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CPU affinity for the process."}, "loc": ["services", "iperf3", "affinity"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "services.iperf3.authorizedUsersFile": {"declarations": ["nixos/modules/services/networking/iperf3.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the configuration file containing authorized users credentials to run iperf tests."}, "loc": ["services", "iperf3", "authorizedUsersFile"], "readOnly": false, "type": "null or path"}, "services.iperf3.bind": {"declarations": ["nixos/modules/services/networking/iperf3.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Bind to the specific interface associated with the given address."}, "loc": ["services", "iperf3", "bind"], "readOnly": false, "type": "null or string"}, "services.iperf3.debug": {"declarations": ["nixos/modules/services/networking/iperf3.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Emit debugging output."}, "loc": ["services", "iperf3", "debug"], "readOnly": false, "type": "boolean"}, "services.iperf3.enable": {"declarations": ["nixos/modules/services/networking/iperf3.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable iperf3 network throughput testing server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "iperf3", "enable"], "readOnly": false, "type": "boolean"}, "services.iperf3.extraFlags": {"declarations": ["nixos/modules/services/networking/iperf3.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags to pass to iperf3(1)."}, "loc": ["services", "iperf3", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.iperf3.forceFlush": {"declarations": ["nixos/modules/services/networking/iperf3.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Force flushing output at every interval."}, "loc": ["services", "iperf3", "forceFlush"], "readOnly": false, "type": "boolean"}, "services.iperf3.openFirewall": {"declarations": ["nixos/modules/services/networking/iperf3.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for iperf3."}, "loc": ["services", "iperf3", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.iperf3.port": {"declarations": ["nixos/modules/services/networking/iperf3.nix"], "default": {"_type": "literalExpression", "text": "5201"}, "description": {"_type": "mdDoc", "text": "Server port to listen on for iperf3 client requests."}, "loc": ["services", "iperf3", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.iperf3.rsaPrivateKey": {"declarations": ["nixos/modules/services/networking/iperf3.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the RSA private key (not password-protected) used to decrypt authentication credentials from the client."}, "loc": ["services", "iperf3", "rsaPrivateKey"], "readOnly": false, "type": "null or path"}, "services.iperf3.verbose": {"declarations": ["nixos/modules/services/networking/iperf3.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Give more detailed output."}, "loc": ["services", "iperf3", "verbose"], "readOnly": false, "type": "boolean"}, "services.ipp-usb.enable": {"declarations": ["nixos/modules/services/printing/ipp-usb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ipp-usb, a daemon to turn an USB printer/scanner supporting IPP everywhere (aka AirPrint, WSD, AirScan) into a locally accessible network printer/scanner."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ipp-usb", "enable"], "readOnly": false, "type": "boolean"}, "services.ircdHybrid.adminEmail": {"declarations": ["nixos/modules/services/networking/ircd-hybrid/default.nix"], "default": {"_type": "literalExpression", "text": "\"<bit-bucket@example.com>\""}, "description": {"_type": "mdDoc", "text": "IRCD server administrator e-mail.\n"}, "example": {"_type": "literalExpression", "text": "\"<name@domain.tld>\""}, "loc": ["services", "ircdHybrid", "adminEmail"], "readOnly": false, "type": "string"}, "services.ircdHybrid.certificate": {"declarations": ["nixos/modules/services/networking/ircd-hybrid/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IRCD server SSL certificate. There are some limitations - read manual.\n"}, "example": {"_type": "literalExpression", "text": "/root/certificates/irc.pem"}, "loc": ["services", "ircdHybrid", "certificate"], "readOnly": false, "type": "null or path"}, "services.ircdHybrid.description": {"declarations": ["nixos/modules/services/networking/ircd-hybrid/default.nix"], "default": {"_type": "literalExpression", "text": "\"Hybrid-7 IRC server.\""}, "description": {"_type": "mdDoc", "text": "IRCD server description.\n"}, "loc": ["services", "ircdHybrid", "description"], "readOnly": false, "type": "string"}, "services.ircdHybrid.enable": {"declarations": ["nixos/modules/services/networking/ircd-hybrid/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable IRCD."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ircdHybrid", "enable"], "readOnly": false, "type": "boolean"}, "services.ircdHybrid.extraIPs": {"declarations": ["nixos/modules/services/networking/ircd-hybrid/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra IP's to bind.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "loc": ["services", "ircdHybrid", "extraIPs"], "readOnly": false, "type": "list of string"}, "services.ircdHybrid.extraPort": {"declarations": ["nixos/modules/services/networking/ircd-hybrid/default.nix"], "default": {"_type": "literalExpression", "text": "\"7117\""}, "description": {"_type": "mdDoc", "text": "Extra port to avoid filtering.\n"}, "loc": ["services", "ircdHybrid", "extraPort"], "readOnly": false, "type": "string"}, "services.ircdHybrid.rsaKey": {"declarations": ["nixos/modules/services/networking/ircd-hybrid/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IRCD server RSA key.\n"}, "example": {"_type": "literalExpression", "text": "/root/certificates/irc.key"}, "loc": ["services", "ircdHybrid", "rsaKey"], "readOnly": false, "type": "null or path"}, "services.ircdHybrid.serverName": {"declarations": ["nixos/modules/services/networking/ircd-hybrid/default.nix"], "default": {"_type": "literalExpression", "text": "\"hades.arpa\""}, "description": {"_type": "mdDoc", "text": "IRCD server name.\n"}, "loc": ["services", "ircdHybrid", "serverName"], "readOnly": false, "type": "string"}, "services.ircdHybrid.sid": {"declarations": ["nixos/modules/services/networking/ircd-hybrid/default.nix"], "default": {"_type": "literalExpression", "text": "\"0NL\""}, "description": {"_type": "mdDoc", "text": "IRCD server unique ID in a net of servers.\n"}, "loc": ["services", "ircdHybrid", "sid"], "readOnly": false, "type": "string"}, "services.irkerd.enable": {"declarations": ["nixos/modules/services/misc/irkerd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable irker, an IRC notification daemon."}, "loc": ["services", "irkerd", "enable"], "readOnly": false, "type": "boolean"}, "services.irkerd.listenAddress": {"declarations": ["nixos/modules/services/misc/irkerd.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Specifies the bind address on which the irker daemon listens.\nThe default is localhost.\n\nIrker authors strongly warn about the risks of running this on\na publicly accessible interface, so change this with caution.\n"}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "irkerd", "listenAddress"], "readOnly": false, "type": "string"}, "services.irkerd.nick": {"declarations": ["nixos/modules/services/misc/irkerd.nix"], "default": {"_type": "literalExpression", "text": "\"irker\""}, "description": {"_type": "mdDoc", "text": "Nick to use for irker"}, "loc": ["services", "irkerd", "nick"], "readOnly": false, "type": "string"}, "services.irkerd.openPorts": {"declarations": ["nixos/modules/services/misc/irkerd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for irkerd"}, "loc": ["services", "irkerd", "openPorts"], "readOnly": false, "type": "boolean"}, "services.irqbalance.enable": {"declarations": ["nixos/modules/services/hardware/irqbalance.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable irqbalance daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "irqbalance", "enable"], "readOnly": false, "type": "boolean"}, "services.isso.enable": {"declarations": ["nixos/modules/services/web-apps/isso.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable A commenting server similar to Disqus.\n\nNote: The application's author suppose to run isso behind a reverse proxy.\nThe embedded solution offered by NixOS is also only suitable for small installations\nbelow 20 requests per second.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "isso", "enable"], "readOnly": false, "type": "boolean"}, "services.isso.settings": {"declarations": ["nixos/modules/services/web-apps/isso.nix"], "description": {"_type": "mdDoc", "text": "Configuration for `isso`.\n\nSee [Isso Server Configuration](https://posativ.org/isso/docs/configuration/server/)\nfor supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  general = {\n    host = \"http://localhost\";\n  };\n}\n"}, "loc": ["services", "isso", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.ivpn.enable": {"declarations": ["nixos/modules/services/networking/ivpn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This option enables iVPN daemon.\nThis sets {option}`networking.firewall.checkReversePath` to \"loose\", which might be undesirable for security.\n"}, "loc": ["services", "ivpn", "enable"], "readOnly": false, "type": "boolean"}, "services.jack.alsa.enable": {"declarations": ["nixos/modules/services/audio/jack.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Route audio to/from generic ALSA-using applications using ALSA JACK PCM plugin.\n"}, "loc": ["services", "jack", "alsa", "enable"], "readOnly": false, "type": "boolean"}, "services.jack.alsa.support32Bit": {"declarations": ["nixos/modules/services/audio/jack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to support sound for 32-bit ALSA applications on 64-bit system.\n"}, "loc": ["services", "jack", "alsa", "support32Bit"], "readOnly": false, "type": "boolean"}, "services.jack.jackd.enable": {"declarations": ["nixos/modules/services/audio/jack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable JACK Audio Connection Kit. You need to add yourself to the \"jackaudio\" group\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jack", "jackd", "enable"], "readOnly": false, "type": "boolean"}, "services.jack.jackd.extraOptions": {"declarations": ["nixos/modules/services/audio/jack.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"-dalsa\"\n]"}, "description": {"_type": "mdDoc", "text": "Specifies startup command line arguments to pass to JACK server.\n"}, "example": {"_type": "literalExpression", "text": "[ \"-dalsa\" \"--device\" \"hw:1\" ];\n"}, "loc": ["services", "jack", "jackd", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.jack.jackd.session": {"declarations": ["nixos/modules/services/audio/jack.nix"], "description": {"_type": "mdDoc", "text": "Commands to run after JACK is started.\n"}, "loc": ["services", "jack", "jackd", "session"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.jack.loopback.config": {"declarations": ["nixos/modules/services/audio/jack.nix"], "description": {"_type": "mdDoc", "text": "ALSA config for loopback device.\n"}, "loc": ["services", "jack", "loopback", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.jack.loopback.dmixConfig": {"declarations": ["nixos/modules/services/audio/jack.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "For music production software that still doesn't support JACK natively you\nwould like to put buffer/period adjustments here\nto decrease dmix device latency.\n"}, "example": {"_type": "literalExpression", "text": "''\n  period_size 2048\n  periods 2\n''"}, "loc": ["services", "jack", "loopback", "dmixConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.jack.loopback.enable": {"declarations": ["nixos/modules/services/audio/jack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create ALSA loopback device, instead of using PCM plugin. Has broader\napplication support (things like Steam will work), but may need fine-tuning\nfor concrete hardware.\n"}, "loc": ["services", "jack", "loopback", "enable"], "readOnly": false, "type": "boolean"}, "services.jack.loopback.index": {"declarations": ["nixos/modules/services/audio/jack.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Index of an ALSA loopback device.\n"}, "loc": ["services", "jack", "loopback", "index"], "readOnly": false, "type": "signed integer"}, "services.jack.loopback.session": {"declarations": ["nixos/modules/services/audio/jack.nix"], "description": {"_type": "mdDoc", "text": "Additional commands to run to setup loopback device.\n"}, "loc": ["services", "jack", "loopback", "session"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.jackett.dataDir": {"declarations": ["nixos/modules/services/misc/jackett.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/jackett/.config/Jackett\""}, "description": {"_type": "mdDoc", "text": "The directory where Jackett stores its data files."}, "loc": ["services", "jackett", "dataDir"], "readOnly": false, "type": "string"}, "services.jackett.enable": {"declarations": ["nixos/modules/services/misc/jackett.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Jackett."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jackett", "enable"], "readOnly": false, "type": "boolean"}, "services.jackett.group": {"declarations": ["nixos/modules/services/misc/jackett.nix"], "default": {"_type": "literalExpression", "text": "\"jackett\""}, "description": {"_type": "mdDoc", "text": "Group under which Jackett runs."}, "loc": ["services", "jackett", "group"], "readOnly": false, "type": "string"}, "services.jackett.openFirewall": {"declarations": ["nixos/modules/services/misc/jackett.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the Jackett web interface."}, "loc": ["services", "jackett", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.jackett.package": {"declarations": ["nixos/modules/services/misc/jackett.nix"], "default": {"_type": "literalExpression", "text": "pkgs.jackett"}, "description": {"_type": "mdDoc", "text": "Jackett package to use."}, "loc": ["services", "jackett", "package"], "readOnly": false, "type": "package"}, "services.jackett.user": {"declarations": ["nixos/modules/services/misc/jackett.nix"], "default": {"_type": "literalExpression", "text": "\"jackett\""}, "description": {"_type": "mdDoc", "text": "User account under which Jackett runs."}, "loc": ["services", "jackett", "user"], "readOnly": false, "type": "string"}, "services.jboss.deployDir": {"declarations": ["nixos/modules/services/web-servers/jboss/default.nix"], "default": {"_type": "literalExpression", "text": "\"/nix/var/nix/profiles/default/server/default/deploy/\""}, "description": {"_type": "mdDoc", "text": "Location of the deployment files"}, "loc": ["services", "jboss", "deployDir"], "readOnly": false, "type": "string"}, "services.jboss.enable": {"declarations": ["nixos/modules/services/web-servers/jboss/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable JBoss. WARNING : this package is outdated and is known to have vulnerabilities."}, "loc": ["services", "jboss", "enable"], "readOnly": false, "type": "boolean"}, "services.jboss.libUrl": {"declarations": ["nixos/modules/services/web-servers/jboss/default.nix"], "default": {"_type": "literalExpression", "text": "\"file:///nix/var/nix/profiles/default/server/default/lib\""}, "description": {"_type": "mdDoc", "text": "Location where the shared library JARs are stored"}, "loc": ["services", "jboss", "libUrl"], "readOnly": false, "type": "string"}, "services.jboss.logDir": {"declarations": ["nixos/modules/services/web-servers/jboss/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/log/jboss\""}, "description": {"_type": "mdDoc", "text": "Location of the logfile directory of JBoss"}, "loc": ["services", "jboss", "logDir"], "readOnly": false, "type": "string"}, "services.jboss.serverDir": {"declarations": ["nixos/modules/services/web-servers/jboss/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/jboss/server\""}, "description": {"_type": "mdDoc", "text": "Location of the server instance files"}, "loc": ["services", "jboss", "serverDir"], "readOnly": false, "type": "string"}, "services.jboss.tempDir": {"declarations": ["nixos/modules/services/web-servers/jboss/default.nix"], "default": {"_type": "literalExpression", "text": "\"/tmp\""}, "description": {"_type": "mdDoc", "text": "Location where JBoss stores its temp files"}, "loc": ["services", "jboss", "tempDir"], "readOnly": false, "type": "string"}, "services.jboss.useJK": {"declarations": ["nixos/modules/services/web-servers/jboss/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use to connector to the Apache HTTP server"}, "loc": ["services", "jboss", "useJK"], "readOnly": false, "type": "boolean"}, "services.jboss.user": {"declarations": ["nixos/modules/services/web-servers/jboss/default.nix"], "default": {"_type": "literalExpression", "text": "\"nobody\""}, "description": {"_type": "mdDoc", "text": "User account under which jboss runs."}, "loc": ["services", "jboss", "user"], "readOnly": false, "type": "string"}, "services.jellyfin.enable": {"declarations": ["nixos/modules/services/misc/jellyfin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Jellyfin Media Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jellyfin", "enable"], "readOnly": false, "type": "boolean"}, "services.jellyfin.group": {"declarations": ["nixos/modules/services/misc/jellyfin.nix"], "default": {"_type": "literalExpression", "text": "\"jellyfin\""}, "description": {"_type": "mdDoc", "text": "Group under which jellyfin runs."}, "loc": ["services", "jellyfin", "group"], "readOnly": false, "type": "string"}, "services.jellyfin.openFirewall": {"declarations": ["nixos/modules/services/misc/jellyfin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open the default ports in the firewall for the media server. The\nHTTP/HTTPS ports can be changed in the Web UI, so this option should\nonly be used if they are unchanged.\n"}, "loc": ["services", "jellyfin", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.jellyfin.package": {"declarations": ["nixos/modules/services/misc/jellyfin.nix"], "default": {"_type": "literalExpression", "text": "pkgs.jellyfin"}, "description": {"_type": "mdDoc", "text": "Jellyfin package to use.\n"}, "loc": ["services", "jellyfin", "package"], "readOnly": false, "type": "package"}, "services.jellyfin.user": {"declarations": ["nixos/modules/services/misc/jellyfin.nix"], "default": {"_type": "literalExpression", "text": "\"jellyfin\""}, "description": {"_type": "mdDoc", "text": "User account under which Jellyfin runs."}, "loc": ["services", "jellyfin", "user"], "readOnly": false, "type": "string"}, "services.jellyseerr.enable": {"declarations": ["nixos/modules/services/misc/jellyseerr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Jellyseerr, a requests manager for Jellyfin."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jellyseerr", "enable"], "readOnly": false, "type": "boolean"}, "services.jellyseerr.openFirewall": {"declarations": ["nixos/modules/services/misc/jellyseerr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in the firewall for the Jellyseerr web interface."}, "loc": ["services", "jellyseerr", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.jellyseerr.port": {"declarations": ["nixos/modules/services/misc/jellyseerr.nix"], "default": {"_type": "literalExpression", "text": "5055"}, "description": {"_type": "mdDoc", "text": "The port which the Jellyseerr web UI should listen to."}, "loc": ["services", "jellyseerr", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.jenkins.enable": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the jenkins continuous integration server.\n"}, "loc": ["services", "jenkins", "enable"], "readOnly": false, "type": "boolean"}, "services.jenkins.environment": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional environment variables to be passed to the jenkins process.\nAs a base environment, jenkins receives NIX_PATH from\n{option}`environment.sessionVariables`, NIX_REMOTE is set to\n\"daemon\" and JENKINS_HOME is set to the value of\n{option}`services.jenkins.home`.\nThis option has precedence and can be used to override those\nmentioned variables.\n"}, "loc": ["services", "jenkins", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.jenkins.extraGroups": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of extra groups that the \"jenkins\" user should be a part of.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"wheel\"\n  \"dialout\"\n]"}, "loc": ["services", "jenkins", "extraGroups"], "readOnly": false, "type": "list of string"}, "services.jenkins.extraJavaOptions": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command line arguments to pass to the Java run time (as opposed to Jenkins).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-Xmx80m\"\n]"}, "loc": ["services", "jenkins", "extraJavaOptions"], "readOnly": false, "type": "list of string"}, "services.jenkins.extraOptions": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command line arguments to pass to Jenkins.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--debug=9\"\n]"}, "loc": ["services", "jenkins", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.jenkins.group": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "\"jenkins\""}, "description": {"_type": "mdDoc", "text": "If the default user \"jenkins\" is configured then this is the primary\ngroup of that user.\n"}, "loc": ["services", "jenkins", "group"], "readOnly": false, "type": "string"}, "services.jenkins.home": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/jenkins\""}, "description": {"_type": "mdDoc", "text": "The path to use as JENKINS_HOME. If the default user \"jenkins\" is configured then\nthis is the home of the \"jenkins\" user.\n"}, "loc": ["services", "jenkins", "home"], "readOnly": false, "type": "path"}, "services.jenkins.jobBuilder.accessToken": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/job-builder.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "User token in Jenkins used to reload config.\nWARNING: This token will be world readable in the Nix store. To keep\nit secret, use the {option}`accessTokenFile` option instead.\n"}, "loc": ["services", "jenkins", "jobBuilder", "accessToken"], "readOnly": false, "type": "string"}, "services.jenkins.jobBuilder.accessTokenFile": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/job-builder.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.jenkins.home}/secrets/initialAdminPassword\""}, "description": {"_type": "mdDoc", "text": "File containing the API token for the {option}`accessUser`\nuser.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/jenkins-job-builder-access-token\""}, "loc": ["services", "jenkins", "jobBuilder", "accessTokenFile"], "readOnly": false, "type": "string"}, "services.jenkins.jobBuilder.accessUser": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/job-builder.nix"], "default": {"_type": "literalExpression", "text": "\"admin\""}, "description": {"_type": "mdDoc", "text": "User id in Jenkins used to reload config.\n"}, "loc": ["services", "jenkins", "jobBuilder", "accessUser"], "readOnly": false, "type": "string"}, "services.jenkins.jobBuilder.enable": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/job-builder.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to enable the Jenkins Job Builder (JJB) service. It\nallows defining jobs for Jenkins in a declarative manner.\n\nJobs managed through the Jenkins WebUI (or by other means) are left\nunchanged.\n\nNote that it really is declarative configuration; if you remove a\npreviously defined job, the corresponding job directory will be\ndeleted.\n\nPlease see the Jenkins Job Builder documentation for more info:\n[\nhttp://docs.openstack.org/infra/jenkins-job-builder/](http://docs.openstack.org/infra/jenkins-job-builder/)\n"}, "loc": ["services", "jenkins", "jobBuilder", "enable"], "readOnly": false, "type": "boolean"}, "services.jenkins.jobBuilder.jsonJobs": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/job-builder.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Job descriptions for Jenkins Job Builder in JSON format.\n"}, "example": {"_type": "literalExpression", "text": "[\n  ''\n    [ { \"job\":\n        { \"name\": \"jenkins-job-test-2\",\n          \"builders\": [ \"shell\": \"echo 'Hello world!'\" ]\n        }\n      }\n    ]\n  ''\n]\n"}, "loc": ["services", "jenkins", "jobBuilder", "jsonJobs"], "readOnly": false, "type": "list of string"}, "services.jenkins.jobBuilder.nixJobs": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/job-builder.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Job descriptions for Jenkins Job Builder in Nix format.\n\nThis is a trivial wrapper around jsonJobs, using builtins.toJSON\nbehind the scene.\n"}, "example": {"_type": "literalExpression", "text": "[ { job =\n    { name = \"jenkins-job-test-3\";\n      builders = [\n        { shell = \"echo 'Hello world!'\"; }\n      ];\n    };\n  }\n]\n"}, "loc": ["services", "jenkins", "jobBuilder", "nixJobs"], "readOnly": false, "type": "list of (attribute set)"}, "services.jenkins.jobBuilder.yamlJobs": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/job-builder.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Job descriptions for Jenkins Job Builder in YAML format.\n"}, "example": {"_type": "literalExpression", "text": "''\n  - job:\n      name: jenkins-job-test-1\n      builders:\n        - shell: echo 'Hello world!'\n''"}, "loc": ["services", "jenkins", "jobBuilder", "yamlJobs"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.jenkins.listenAddress": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Specifies the bind address on which the jenkins HTTP interface listens.\nThe default is the wildcard address.\n"}, "example": {"_type": "literalExpression", "text": "\"localhost\""}, "loc": ["services", "jenkins", "listenAddress"], "readOnly": false, "type": "string"}, "services.jenkins.package": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.jenkins"}, "description": {"_type": "mdDoc", "text": "Jenkins package to use."}, "loc": ["services", "jenkins", "package"], "readOnly": false, "type": "package"}, "services.jenkins.packages": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "[ pkgs.stdenv pkgs.git pkgs.jdk17 config.programs.ssh.package pkgs.nix ]"}, "description": {"_type": "mdDoc", "text": "Packages to add to PATH for the jenkins process.\n"}, "loc": ["services", "jenkins", "packages"], "readOnly": false, "type": "list of package"}, "services.jenkins.plugins": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A set of plugins to activate. Note that this will completely\nremove and replace any previously installed plugins. If you\nhave manually-installed plugins that you want to keep while\nusing this module, set this option to\n`null`. You can generate this set with a\ntool such as `jenkinsPlugins2nix`.\n"}, "example": {"_type": "literalExpression", "text": "import path/to/jenkinsPlugins2nix-generated-plugins.nix { inherit (pkgs) fetchurl stdenv; }\n"}, "loc": ["services", "jenkins", "plugins"], "readOnly": false, "type": "null or (attribute set of package)"}, "services.jenkins.port": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Specifies port number on which the jenkins HTTP interface listens.\nThe default is 8080.\n"}, "loc": ["services", "jenkins", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.jenkins.prefix": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Specifies a urlPrefix to use with jenkins.\nIf the example /jenkins is given, the jenkins server will be\naccessible using localhost:8080/jenkins.\n"}, "example": {"_type": "literalExpression", "text": "\"/jenkins\""}, "loc": ["services", "jenkins", "prefix"], "readOnly": false, "type": "string"}, "services.jenkins.user": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "\"jenkins\""}, "description": {"_type": "mdDoc", "text": "User the jenkins server should execute under.\n"}, "loc": ["services", "jenkins", "user"], "readOnly": false, "type": "string"}, "services.jenkins.withCLI": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to make the CLI available.\n\nMore info about the CLI available at\n[\nhttps://www.jenkins.io/doc/book/managing/cli](https://www.jenkins.io/doc/book/managing/cli) .\n"}, "loc": ["services", "jenkins", "withCLI"], "readOnly": false, "type": "boolean"}, "services.jenkinsSlave.enable": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/slave.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If true the system will be configured to work as a jenkins slave.\nIf the system is also configured to work as a jenkins master then this has no effect.\nIn progress: Currently only assures the jenkins user is configured.\n"}, "loc": ["services", "jenkinsSlave", "enable"], "readOnly": false, "type": "boolean"}, "services.jenkinsSlave.group": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/slave.nix"], "default": {"_type": "literalExpression", "text": "\"jenkins\""}, "description": {"_type": "mdDoc", "text": "If the default slave agent user \"jenkins\" is configured then this is\nthe primary group of that user.\n"}, "loc": ["services", "jenkinsSlave", "group"], "readOnly": false, "type": "string"}, "services.jenkinsSlave.home": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/slave.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/jenkins\""}, "description": {"_type": "mdDoc", "text": "The path to use as JENKINS_HOME. If the default user \"jenkins\" is configured then\nthis is the home of the \"jenkins\" user.\n"}, "loc": ["services", "jenkinsSlave", "home"], "readOnly": false, "type": "path"}, "services.jenkinsSlave.javaPackage": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/slave.nix"], "default": {"_type": "literalExpression", "text": "pkgs.jdk"}, "description": {"_type": "mdDoc", "text": "Java package to install.\n"}, "loc": ["services", "jenkinsSlave", "javaPackage"], "readOnly": false, "type": "package"}, "services.jenkinsSlave.user": {"declarations": ["nixos/modules/services/continuous-integration/jenkins/slave.nix"], "default": {"_type": "literalExpression", "text": "\"jenkins\""}, "description": {"_type": "mdDoc", "text": "User the jenkins slave agent should execute under.\n"}, "loc": ["services", "jenkinsSlave", "user"], "readOnly": false, "type": "string"}, "services.jibri.config": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Jibri configuration.\nSee <https://github.com/jitsi/jibri/blob/master/src/main/resources/reference.conf>\nfor default configuration with comments.\n"}, "loc": ["services", "jibri", "config"], "readOnly": false, "type": "attribute set"}, "services.jibri.enable": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Jitsi BRoadcasting Infrastructure. Currently Jibri must be run on a host that is also running {option}`services.jitsi-meet.enable`, so for most use cases it will be simpler to run {option}`services.jitsi-meet.jibri.enable`."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jibri", "enable"], "readOnly": false, "type": "boolean"}, "services.jibri.finalizeScript": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.writeScript \"finalize_recording.sh\" ''''\n#!/bin/sh\n\nRECORDINGS_DIR=$1\n\necho \"This is a dummy finalize script\" > /tmp/finalize.out\necho \"The script was invoked with recordings directory $RECORDINGS_DIR.\" >> /tmp/finalize.out\necho \"You should put any finalize logic (renaming, uploading to a service\" >> /tmp/finalize.out\necho \"or storage provider, etc.) in this script\" >> /tmp/finalize.out\n\nexit 0\n'''';\n"}, "description": {"_type": "mdDoc", "text": "This script runs when jibri finishes recording a video of a conference.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.writeScript \"finalize_recording.sh\" ''''\n#!/bin/sh\nRECORDINGS_DIR=$1\n${pkgs.rclone}/bin/rclone copy $RECORDINGS_DIR RCLONE_REMOTE:jibri-recordings/ -v --log-file=/var/log/jitsi/jibri/recording-upload.txt\nexit 0\n'''';\n"}, "loc": ["services", "jibri", "finalizeScript"], "readOnly": false, "type": "path"}, "services.jibri.ignoreCert": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the flag \"--ignore-certificate-errors\" for the Chromium browser opened by Jibri.\nIntended for use in automated tests or anywhere else where using a verified cert for Jitsi-Meet is not possible.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jibri", "ignoreCert"], "readOnly": false, "type": "boolean"}, "services.jibri.xmppEnvironments": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "XMPP servers to connect to.\n"}, "example": {"_type": "literalExpression", "text": "\"jitsi-meet\" = {\n  xmppServerHosts = [ \"localhost\" ];\n  xmppDomain = config.services.jitsi-meet.hostName;\n\n  control.muc = {\n    domain = \"internal.${config.services.jitsi-meet.hostName}\";\n    roomName = \"JibriBrewery\";\n    nickname = \"jibri\";\n  };\n\n  control.login = {\n    domain = \"auth.${config.services.jitsi-meet.hostName}\";\n    username = \"jibri\";\n    passwordFile = \"/var/lib/jitsi-meet/jibri-auth-secret\";\n  };\n\n  call.login = {\n    domain = \"recorder.${config.services.jitsi-meet.hostName}\";\n    username = \"recorder\";\n    passwordFile = \"/var/lib/jitsi-meet/jibri-recorder-secret\";\n  };\n\n  usageTimeout = \"0\";\n  disableCertificateVerification = true;\n  stripFromRoomDomain = \"conference.\";\n};\n"}, "loc": ["services", "jibri", "xmppEnvironments"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.jibri.xmppEnvironments.<name>.call.login.domain": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "description": {"_type": "mdDoc", "text": "The domain part of the JID for the recorder.\n"}, "example": {"_type": "literalExpression", "text": "\"recorder.xmpp.example.org\""}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "call", "login", "domain"], "readOnly": false, "type": "string"}, "services.jibri.xmppEnvironments.<name>.call.login.passwordFile": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "description": {"_type": "mdDoc", "text": "File containing the password for the user.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/jibri-recorder-xmpp1\""}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "call", "login", "passwordFile"], "readOnly": false, "type": "string"}, "services.jibri.xmppEnvironments.<name>.call.login.username": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "default": {"_type": "literalExpression", "text": "\"recorder\""}, "description": {"_type": "mdDoc", "text": "User part of the JID for the recorder.\n"}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "call", "login", "username"], "readOnly": false, "type": "string"}, "services.jibri.xmppEnvironments.<name>.control.login.domain": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "description": {"_type": "mdDoc", "text": "The domain part of the JID for this Jibri instance.\n"}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "control", "login", "domain"], "readOnly": false, "type": "string"}, "services.jibri.xmppEnvironments.<name>.control.login.passwordFile": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "description": {"_type": "mdDoc", "text": "File containing the password for the user.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/jibri-xmpp1\""}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "control", "login", "passwordFile"], "readOnly": false, "type": "string"}, "services.jibri.xmppEnvironments.<name>.control.login.username": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "default": {"_type": "literalExpression", "text": "\"jvb\""}, "description": {"_type": "mdDoc", "text": "User part of the JID.\n"}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "control", "login", "username"], "readOnly": false, "type": "string"}, "services.jibri.xmppEnvironments.<name>.control.muc.domain": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "description": {"_type": "mdDoc", "text": "The domain part of the MUC to connect to for control.\n"}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "control", "muc", "domain"], "readOnly": false, "type": "string"}, "services.jibri.xmppEnvironments.<name>.control.muc.nickname": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "default": {"_type": "literalExpression", "text": "\"jibri\""}, "description": {"_type": "mdDoc", "text": "The nickname for this Jibri instance in the MUC.\n"}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "control", "muc", "nickname"], "readOnly": false, "type": "string"}, "services.jibri.xmppEnvironments.<name>.control.muc.roomName": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "default": {"_type": "literalExpression", "text": "\"JibriBrewery\""}, "description": {"_type": "mdDoc", "text": "The room name of the MUC to connect to for control.\n"}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "control", "muc", "roomName"], "readOnly": false, "type": "string"}, "services.jibri.xmppEnvironments.<name>.disableCertificateVerification": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to skip validation of the server's certificate.\n"}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "disableCertificateVerification"], "readOnly": false, "type": "boolean"}, "services.jibri.xmppEnvironments.<name>.stripFromRoomDomain": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "default": {"_type": "literalExpression", "text": "\"0\""}, "description": {"_type": "mdDoc", "text": "The prefix to strip from the room's JID domain to derive the call URL.\n"}, "example": {"_type": "literalExpression", "text": "\"conference.\""}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "stripFromRoomDomain"], "readOnly": false, "type": "string"}, "services.jibri.xmppEnvironments.<name>.usageTimeout": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "default": {"_type": "literalExpression", "text": "\"0\""}, "description": {"_type": "mdDoc", "text": "The duration that the Jibri session can be.\nA value of zero means indefinitely.\n"}, "example": {"_type": "literalExpression", "text": "\"1 hour\""}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "usageTimeout"], "readOnly": false, "type": "string"}, "services.jibri.xmppEnvironments.<name>.xmppDomain": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "description": {"_type": "mdDoc", "text": "The base XMPP domain.\n"}, "example": {"_type": "literalExpression", "text": "\"xmpp.example.org\""}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "xmppDomain"], "readOnly": false, "type": "string"}, "services.jibri.xmppEnvironments.<name>.xmppServerHosts": {"declarations": ["nixos/modules/services/networking/jibri/default.nix"], "description": {"_type": "mdDoc", "text": "Hostnames of the XMPP servers to connect to.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"xmpp.example.org\"\n]"}, "loc": ["services", "jibri", "xmppEnvironments", "<name>", "xmppServerHosts"], "readOnly": false, "type": "list of string"}, "services.jicofo.bridgeMuc": {"declarations": ["nixos/modules/services/networking/jicofo.nix"], "description": {"_type": "mdDoc", "text": "JID of the internal MUC used to communicate with Videobridges.\n"}, "example": {"_type": "literalExpression", "text": "\"jvbbrewery@internal.meet.example.org\""}, "loc": ["services", "jicofo", "bridgeMuc"], "readOnly": false, "type": "string"}, "services.jicofo.componentPasswordFile": {"declarations": ["nixos/modules/services/networking/jicofo.nix"], "description": {"_type": "mdDoc", "text": "Path to file containing component secret.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/jicofo-component\""}, "loc": ["services", "jicofo", "componentPasswordFile"], "readOnly": false, "type": "string"}, "services.jicofo.config": {"declarations": ["nixos/modules/services/networking/jicofo.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Contents of the {file}`jicofo.conf` configuration file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  jicofo.bridge.max-bridge-participants = 42;\n}\n"}, "loc": ["services", "jicofo", "config"], "readOnly": false, "type": "JSON value"}, "services.jicofo.enable": {"declarations": ["nixos/modules/services/networking/jicofo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Jitsi Conference Focus - component of Jitsi Meet."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jicofo", "enable"], "readOnly": false, "type": "boolean"}, "services.jicofo.userDomain": {"declarations": ["nixos/modules/services/networking/jicofo.nix"], "description": {"_type": "mdDoc", "text": "Domain part of the JID for XMPP user connection.\n"}, "example": {"_type": "literalExpression", "text": "\"auth.meet.example.org\""}, "loc": ["services", "jicofo", "userDomain"], "readOnly": false, "type": "string"}, "services.jicofo.userName": {"declarations": ["nixos/modules/services/networking/jicofo.nix"], "default": {"_type": "literalExpression", "text": "\"focus\""}, "description": {"_type": "mdDoc", "text": "User part of the JID for XMPP user connection.\n"}, "loc": ["services", "jicofo", "userName"], "readOnly": false, "type": "string"}, "services.jicofo.userPasswordFile": {"declarations": ["nixos/modules/services/networking/jicofo.nix"], "description": {"_type": "mdDoc", "text": "Path to file containing password for XMPP user connection.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/jicofo-user\""}, "loc": ["services", "jicofo", "userPasswordFile"], "readOnly": false, "type": "string"}, "services.jicofo.xmppDomain": {"declarations": ["nixos/modules/services/networking/jicofo.nix"], "description": {"_type": "mdDoc", "text": "Domain name of the XMMP server to which to connect as a component.\n\nIf null, {option}`xmppHost` is used.\n"}, "example": {"_type": "literalExpression", "text": "\"meet.example.org\""}, "loc": ["services", "jicofo", "xmppDomain"], "readOnly": false, "type": "null or string"}, "services.jicofo.xmppHost": {"declarations": ["nixos/modules/services/networking/jicofo.nix"], "description": {"_type": "mdDoc", "text": "Hostname of the XMPP server to connect to.\n"}, "example": {"_type": "literalExpression", "text": "\"localhost\""}, "loc": ["services", "jicofo", "xmppHost"], "readOnly": false, "type": "string"}, "services.jira.catalinaOptions": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Java options to pass to catalina/tomcat."}, "example": {"_type": "literalExpression", "text": "[\n  \"-Xms1024m\"\n  \"-Xmx2048m\"\n]"}, "loc": ["services", "jira", "catalinaOptions"], "readOnly": false, "type": "list of string"}, "services.jira.enable": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Atlassian JIRA service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jira", "enable"], "readOnly": false, "type": "boolean"}, "services.jira.group": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "\"jira\""}, "description": {"_type": "mdDoc", "text": "Group which runs JIRA."}, "loc": ["services", "jira", "group"], "readOnly": false, "type": "string"}, "services.jira.home": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/jira\""}, "description": {"_type": "mdDoc", "text": "Home directory of the JIRA instance."}, "loc": ["services", "jira", "home"], "readOnly": false, "type": "string"}, "services.jira.jrePackage": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "pkgs.oraclejre8"}, "description": {"_type": "mdDoc", "text": "Note that Atlassian only support the Oracle JRE (JRASERVER-46152)."}, "loc": ["services", "jira", "jrePackage"], "readOnly": false, "type": "package"}, "services.jira.listenAddress": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address to listen on."}, "loc": ["services", "jira", "listenAddress"], "readOnly": false, "type": "string"}, "services.jira.listenPort": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "8091"}, "description": {"_type": "mdDoc", "text": "Port to listen on."}, "loc": ["services", "jira", "listenPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.jira.package": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "pkgs.atlassian-jira"}, "description": {"_type": "mdDoc", "text": "Atlassian JIRA package to use."}, "loc": ["services", "jira", "package"], "readOnly": false, "type": "package"}, "services.jira.proxy.enable": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable reverse proxy support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jira", "proxy", "enable"], "readOnly": false, "type": "boolean"}, "services.jira.proxy.name": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "description": {"_type": "mdDoc", "text": "Virtual hostname at the proxy"}, "example": {"_type": "literalExpression", "text": "\"jira.example.com\""}, "loc": ["services", "jira", "proxy", "name"], "readOnly": false, "type": "string"}, "services.jira.proxy.port": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "443"}, "description": {"_type": "mdDoc", "text": "Port used at the proxy"}, "example": {"_type": "literalExpression", "text": "80"}, "loc": ["services", "jira", "proxy", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.jira.proxy.scheme": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "\"https\""}, "description": {"_type": "mdDoc", "text": "Protocol used at the proxy."}, "example": {"_type": "literalExpression", "text": "\"http\""}, "loc": ["services", "jira", "proxy", "scheme"], "readOnly": false, "type": "string"}, "services.jira.proxy.secure": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the connections to the proxy should be considered secure."}, "loc": ["services", "jira", "proxy", "secure"], "readOnly": false, "type": "boolean"}, "services.jira.sso.applicationName": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "description": {"_type": "mdDoc", "text": "Exact name of this JIRA instance in Crowd"}, "example": {"_type": "literalExpression", "text": "\"jira\""}, "loc": ["services", "jira", "sso", "applicationName"], "readOnly": false, "type": "string"}, "services.jira.sso.applicationPasswordFile": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "description": {"_type": "mdDoc", "text": "Path to the file containing the application password of this JIRA instance in Crowd"}, "loc": ["services", "jira", "sso", "applicationPasswordFile"], "readOnly": false, "type": "string"}, "services.jira.sso.crowd": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "description": {"_type": "mdDoc", "text": "Crowd Base URL without trailing slash"}, "example": {"_type": "literalExpression", "text": "\"http://localhost:8095/crowd\""}, "loc": ["services", "jira", "sso", "crowd"], "readOnly": false, "type": "string"}, "services.jira.sso.enable": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SSO with Atlassian Crowd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jira", "sso", "enable"], "readOnly": false, "type": "boolean"}, "services.jira.sso.validationInterval": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Set to 0, if you want authentication checks to occur on each\nrequest. Otherwise set to the number of minutes between request\nto validate if the user is logged in or out of the Crowd SSO\nserver. Setting this value to 1 or higher will increase the\nperformance of Crowd's integration.\n"}, "example": {"_type": "literalExpression", "text": "0"}, "loc": ["services", "jira", "sso", "validationInterval"], "readOnly": false, "type": "signed integer"}, "services.jira.user": {"declarations": ["nixos/modules/services/web-apps/atlassian/jira.nix"], "default": {"_type": "literalExpression", "text": "\"jira\""}, "description": {"_type": "mdDoc", "text": "User which runs JIRA."}, "loc": ["services", "jira", "user"], "readOnly": false, "type": "string"}, "services.jitsi-meet.caddy.enable": {"declarations": ["nixos/modules/services/web-apps/jitsi-meet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Whether to enable caddy reverse proxy to expose jitsi-meet."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jitsi-meet", "caddy", "enable"], "readOnly": false, "type": "boolean"}, "services.jitsi-meet.config": {"declarations": ["nixos/modules/services/web-apps/jitsi-meet.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Client-side web application settings that override the defaults in {file}`config.js`.\n\nSee <https://github.com/jitsi/jitsi-meet/blob/master/config.js> for default\nconfiguration with comments.\n"}, "example": {"_type": "literalExpression", "text": "{\n  enableWelcomePage = false;\n  defaultLang = \"fi\";\n}\n"}, "loc": ["services", "jitsi-meet", "config"], "readOnly": false, "type": "attribute set"}, "services.jitsi-meet.enable": {"declarations": ["nixos/modules/services/web-apps/jitsi-meet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Jitsi Meet - Secure, Simple and Scalable Video Conferences."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jitsi-meet", "enable"], "readOnly": false, "type": "boolean"}, "services.jitsi-meet.extraConfig": {"declarations": ["nixos/modules/services/web-apps/jitsi-meet.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Text to append to {file}`config.js` web application config file.\n\nCan be used to insert JavaScript logic to determine user's region in cascading bridges setup.\n"}, "loc": ["services", "jitsi-meet", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.jitsi-meet.hostName": {"declarations": ["nixos/modules/services/web-apps/jitsi-meet.nix"], "description": {"_type": "mdDoc", "text": "FQDN of the Jitsi Meet instance.\n"}, "example": {"_type": "literalExpression", "text": "\"meet.example.org\""}, "loc": ["services", "jitsi-meet", "hostName"], "readOnly": false, "type": "string"}, "services.jitsi-meet.interfaceConfig": {"declarations": ["nixos/modules/services/web-apps/jitsi-meet.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Client-side web-app interface settings that override the defaults in {file}`interface_config.js`.\n\nSee <https://github.com/jitsi/jitsi-meet/blob/master/interface_config.js> for\ndefault configuration with comments.\n"}, "example": {"_type": "literalExpression", "text": "{\n  SHOW_JITSI_WATERMARK = false;\n  SHOW_WATERMARK_FOR_GUESTS = false;\n}\n"}, "loc": ["services", "jitsi-meet", "interfaceConfig"], "readOnly": false, "type": "attribute set"}, "services.jitsi-meet.jibri.enable": {"declarations": ["nixos/modules/services/web-apps/jitsi-meet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable a Jibri instance and configure it to connect to Prosody.\n\nAdditional configuration is possible with {option}`services.jibri`, and\n{option}`services.jibri.finalizeScript` is especially useful.\n"}, "loc": ["services", "jitsi-meet", "jibri", "enable"], "readOnly": false, "type": "boolean"}, "services.jitsi-meet.jicofo.enable": {"declarations": ["nixos/modules/services/web-apps/jitsi-meet.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable JiCoFo instance and configure it to connect to Prosody.\n\nAdditional configuration is possible with {option}`services.jicofo`.\n"}, "loc": ["services", "jitsi-meet", "jicofo", "enable"], "readOnly": false, "type": "boolean"}, "services.jitsi-meet.nginx.enable": {"declarations": ["nixos/modules/services/web-apps/jitsi-meet.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable nginx virtual host that will serve the javascript application and act as\na proxy for the XMPP server. Further nginx configuration can be done by adapting\n{option}`services.nginx.virtualHosts.<hostName>`.\nWhen this is enabled, ACME will be used to retrieve a TLS certificate by default. To disable\nthis, set the {option}`services.nginx.virtualHosts.<hostName>.enableACME` to\n`false` and if appropriate do the same for\n{option}`services.nginx.virtualHosts.<hostName>.forceSSL`.\n"}, "loc": ["services", "jitsi-meet", "nginx", "enable"], "readOnly": false, "type": "boolean"}, "services.jitsi-meet.prosody.enable": {"declarations": ["nixos/modules/services/web-apps/jitsi-meet.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to configure Prosody to relay XMPP messages between Jitsi Meet components. Turn this\noff if you want to configure it manually.\n"}, "loc": ["services", "jitsi-meet", "prosody", "enable"], "readOnly": false, "type": "boolean"}, "services.jitsi-meet.videobridge.enable": {"declarations": ["nixos/modules/services/web-apps/jitsi-meet.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable Jitsi Videobridge instance and configure it to connect to Prosody.\n\nAdditional configuration is possible with {option}`services.jitsi-videobridge`.\n"}, "loc": ["services", "jitsi-meet", "videobridge", "enable"], "readOnly": false, "type": "boolean"}, "services.jitsi-meet.videobridge.passwordFile": {"declarations": ["nixos/modules/services/web-apps/jitsi-meet.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing password to the Prosody account for videobridge.\n\nIf `null`, a file with password will be generated automatically. Setting\nthis option is useful if you plan to connect additional videobridges to the XMPP server.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/videobridge\""}, "loc": ["services", "jitsi-meet", "videobridge", "passwordFile"], "readOnly": false, "type": "null or string"}, "services.jitsi-videobridge.colibriRestApi": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the private rest API for the COLIBRI control interface.\nNeeded for monitoring jitsi, enabling scraping of the /colibri/stats endpoint.\n"}, "loc": ["services", "jitsi-videobridge", "colibriRestApi"], "readOnly": false, "type": "boolean"}, "services.jitsi-videobridge.config": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Videobridge configuration.\n\nSee <https://github.com/jitsi/jitsi-videobridge/blob/master/jvb/src/main/resources/reference.conf>\nfor default configuration with comments.\n"}, "example": {"_type": "literalExpression", "text": "{\n  videobridge = {\n    ice.udp.port = 5000;\n    websockets = {\n      enabled = true;\n      server-id = \"jvb1\";\n    };\n  };\n}\n"}, "loc": ["services", "jitsi-videobridge", "config"], "readOnly": false, "type": "attribute set"}, "services.jitsi-videobridge.enable": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Jitsi Videobridge, a WebRTC compatible video router."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jitsi-videobridge", "enable"], "readOnly": false, "type": "boolean"}, "services.jitsi-videobridge.extraProperties": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional Java properties passed to jitsi-videobridge.\n"}, "loc": ["services", "jitsi-videobridge", "extraProperties"], "readOnly": false, "type": "attribute set of string"}, "services.jitsi-videobridge.nat.localAddress": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Local address when running behind NAT.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.1.42\""}, "loc": ["services", "jitsi-videobridge", "nat", "localAddress"], "readOnly": false, "type": "null or string"}, "services.jitsi-videobridge.nat.publicAddress": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Public address when running behind NAT.\n"}, "example": {"_type": "literalExpression", "text": "\"1.2.3.4\""}, "loc": ["services", "jitsi-videobridge", "nat", "publicAddress"], "readOnly": false, "type": "null or string"}, "services.jitsi-videobridge.openFirewall": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open ports in the firewall for the videobridge.\n"}, "loc": ["services", "jitsi-videobridge", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.jitsi-videobridge.xmppConfigs": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "XMPP servers to connect to.\n\nSee <https://github.com/jitsi/jitsi-videobridge/blob/master/doc/muc.md> for more information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"localhost\" = {\n    hostName = \"localhost\";\n    userName = \"jvb\";\n    domain = \"auth.xmpp.example.org\";\n    passwordFile = \"/var/lib/jitsi-meet/videobridge-secret\";\n    mucJids = \"jvbbrewery@internal.xmpp.example.org\";\n  };\n}\n"}, "loc": ["services", "jitsi-videobridge", "xmppConfigs"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.jitsi-videobridge.xmppConfigs.<name>.disableCertificateVerification": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to skip validation of the server's certificate.\n"}, "loc": ["services", "jitsi-videobridge", "xmppConfigs", "<name>", "disableCertificateVerification"], "readOnly": false, "type": "boolean"}, "services.jitsi-videobridge.xmppConfigs.<name>.domain": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Domain part of JID of the XMPP user, if it is different from hostName.\n"}, "example": {"_type": "literalExpression", "text": "\"auth.xmpp.example.org\""}, "loc": ["services", "jitsi-videobridge", "xmppConfigs", "<name>", "domain"], "readOnly": false, "type": "null or string"}, "services.jitsi-videobridge.xmppConfigs.<name>.hostName": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "description": {"_type": "mdDoc", "text": "Hostname of the XMPP server to connect to. Name of the attribute set is used by default.\n"}, "example": {"_type": "literalExpression", "text": "\"xmpp.example.org\""}, "loc": ["services", "jitsi-videobridge", "xmppConfigs", "<name>", "hostName"], "readOnly": false, "type": "string"}, "services.jitsi-videobridge.xmppConfigs.<name>.mucJids": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "description": {"_type": "mdDoc", "text": "JID of the MUC to join. JiCoFo needs to be configured to join the same MUC.\n"}, "example": {"_type": "literalExpression", "text": "\"jvbbrewery@internal.xmpp.example.org\""}, "loc": ["services", "jitsi-videobridge", "xmppConfigs", "<name>", "mucJids"], "readOnly": false, "type": "string"}, "services.jitsi-videobridge.xmppConfigs.<name>.mucNickname": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "description": {"_type": "mdDoc", "text": "Videobridges use the same XMPP account and need to be distinguished by the\nnickname (aka resource part of the JID). By default, system hostname is used.\n"}, "loc": ["services", "jitsi-videobridge", "xmppConfigs", "<name>", "mucNickname"], "readOnly": false, "type": "string"}, "services.jitsi-videobridge.xmppConfigs.<name>.passwordFile": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "description": {"_type": "mdDoc", "text": "File containing the password for the user.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/jitsi-videobridge-xmpp1\""}, "loc": ["services", "jitsi-videobridge", "xmppConfigs", "<name>", "passwordFile"], "readOnly": false, "type": "string"}, "services.jitsi-videobridge.xmppConfigs.<name>.userName": {"declarations": ["nixos/modules/services/networking/jitsi-videobridge.nix"], "default": {"_type": "literalExpression", "text": "\"jvb\""}, "description": {"_type": "mdDoc", "text": "User part of the JID.\n"}, "loc": ["services", "jitsi-videobridge", "xmppConfigs", "<name>", "userName"], "readOnly": false, "type": "string"}, "services.jmusicbot.enable": {"declarations": ["nixos/modules/services/audio/jmusicbot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable jmusicbot, a Discord music bot that's easy to set up and run yourself."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jmusicbot", "enable"], "readOnly": false, "type": "boolean"}, "services.jmusicbot.package": {"declarations": ["nixos/modules/services/audio/jmusicbot.nix"], "default": {"_type": "literalExpression", "text": "pkgs.jmusicbot"}, "description": {"_type": "mdDoc", "text": "JMusicBot package to use"}, "loc": ["services", "jmusicbot", "package"], "readOnly": false, "type": "package"}, "services.jmusicbot.stateDir": {"declarations": ["nixos/modules/services/audio/jmusicbot.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/jmusicbot/\""}, "description": {"_type": "mdDoc", "text": "The directory where config.txt and serversettings.json is saved.\nIf left as the default value this directory will automatically be created before JMusicBot starts, otherwise the sysadmin is responsible for ensuring the directory exists with appropriate ownership and permissions.\nUntouched by the value of this option config.txt needs to be placed manually into this directory.\n"}, "loc": ["services", "jmusicbot", "stateDir"], "readOnly": false, "type": "path"}, "services.journalbeat.enable": {"declarations": ["nixos/modules/services/logging/journalbeat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable journalbeat."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "journalbeat", "enable"], "readOnly": false, "type": "boolean"}, "services.journalbeat.extraConfig": {"declarations": ["nixos/modules/services/logging/journalbeat.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Any other configuration options you want to add"}, "loc": ["services", "journalbeat", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.journalbeat.name": {"declarations": ["nixos/modules/services/logging/journalbeat.nix"], "default": {"_type": "literalExpression", "text": "\"journalbeat\""}, "description": {"_type": "mdDoc", "text": "Name of the beat"}, "loc": ["services", "journalbeat", "name"], "readOnly": false, "type": "string"}, "services.journalbeat.package": {"declarations": ["nixos/modules/services/logging/journalbeat.nix"], "default": {"_type": "literalExpression", "text": "pkgs.journalbeat"}, "description": {"_type": "mdDoc", "text": "The journalbeat package to use\n"}, "loc": ["services", "journalbeat", "package"], "readOnly": false, "type": "package"}, "services.journalbeat.stateDir": {"declarations": ["nixos/modules/services/logging/journalbeat.nix"], "default": {"_type": "literalExpression", "text": "\"journalbeat\""}, "description": {"_type": "mdDoc", "text": "Directory below `/var/lib/` to store journalbeat's\nown logs and other data. This directory will be created automatically\nusing systemd's StateDirectory mechanism.\n"}, "loc": ["services", "journalbeat", "stateDir"], "readOnly": false, "type": "string"}, "services.journalbeat.tags": {"declarations": ["nixos/modules/services/logging/journalbeat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Tags to place on the shipped log messages"}, "loc": ["services", "journalbeat", "tags"], "readOnly": false, "type": "list of string"}, "services.journald.console": {"declarations": ["nixos/modules/system/boot/systemd/journald.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "If non-empty, write log messages to the specified TTY device."}, "loc": ["services", "journald", "console"], "readOnly": false, "type": "string"}, "services.journald.enableHttpGateway": {"declarations": ["nixos/modules/system/boot/systemd/journald.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP gateway to the journal.\n"}, "loc": ["services", "journald", "enableHttpGateway"], "readOnly": false, "type": "boolean"}, "services.journald.extraConfig": {"declarations": ["nixos/modules/system/boot/systemd/journald.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config options for systemd-journald. See man journald.conf\nfor available options.\n"}, "example": {"_type": "literalExpression", "text": "\"Storage=volatile\""}, "loc": ["services", "journald", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.journald.forwardToSyslog": {"declarations": ["nixos/modules/system/boot/systemd/journald.nix"], "default": {"_type": "literalExpression", "text": "services.rsyslogd.enable || services.syslog-ng.enable"}, "description": {"_type": "mdDoc", "text": "Whether to forward log messages to syslog.\n"}, "loc": ["services", "journald", "forwardToSyslog"], "readOnly": false, "type": "boolean"}, "services.journald.rateLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd/journald.nix"], "default": {"_type": "literalExpression", "text": "10000"}, "description": {"_type": "mdDoc", "text": "Configures the rate limiting burst limit (number of messages per\ninterval) that is applied to all messages generated on the system.\nThis rate limiting is applied per-service, so that two services\nwhich log do not interfere with each other's limit.\n\nNote that the effective rate limit is multiplied by a factor derived\nfrom the available free disk space for the journal as described on\n[\njournald.conf(5)](https://www.freedesktop.org/software/systemd/man/journald.conf.html).\n\nNote that the total amount of logs stored is limited by journald settings\nsuch as `SystemMaxUse`, which defaults to a 4 GB cap.\n\nIt is thus recommended to compute what period of time that you will be\nable to store logs for when an application logs at full burst rate.\nWith default settings for log lines that are 100 Bytes long, this can\namount to just a few hours.\n"}, "loc": ["services", "journald", "rateLimitBurst"], "readOnly": false, "type": "signed integer"}, "services.journald.rateLimitInterval": {"declarations": ["nixos/modules/system/boot/systemd/journald.nix"], "default": {"_type": "literalExpression", "text": "\"30s\""}, "description": {"_type": "mdDoc", "text": "Configures the rate limiting interval that is applied to all\nmessages generated on the system. This rate limiting is applied\nper-service, so that two services which log do not interfere with\neach other's limit. The value may be specified in the following\nunits: s, min, h, ms, us. To turn off any kind of rate limiting,\nset either value to 0.\n\nSee {option}`services.journald.rateLimitBurst` for important\nconsiderations when setting this value.\n"}, "loc": ["services", "journald", "rateLimitInterval"], "readOnly": false, "type": "string"}, "services.journaldriver.applicationCredentials": {"declarations": ["nixos/modules/services/logging/journaldriver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the service account private key (in JSON-format) used\nto forward log entries to Stackdriver Logging on non-GCP\ninstances.\n\nThis option is required on non-GCP machines, but should not be\nset on GCP instances.\n"}, "loc": ["services", "journaldriver", "applicationCredentials"], "readOnly": false, "type": "null or path"}, "services.journaldriver.enable": {"declarations": ["nixos/modules/services/logging/journaldriver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable journaldriver to forward journald logs to\nStackdriver Logging.\n"}, "loc": ["services", "journaldriver", "enable"], "readOnly": false, "type": "boolean"}, "services.journaldriver.googleCloudProject": {"declarations": ["nixos/modules/services/logging/journaldriver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configures the name of the Google Cloud project to which to\nforward journald logs.\n\nThis option is required on non-GCP machines, but should not be\nset on GCP instances.\n"}, "loc": ["services", "journaldriver", "googleCloudProject"], "readOnly": false, "type": "null or string"}, "services.journaldriver.logLevel": {"declarations": ["nixos/modules/services/logging/journaldriver.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Log level at which journaldriver logs its own output.\n"}, "loc": ["services", "journaldriver", "logLevel"], "readOnly": false, "type": "string"}, "services.journaldriver.logName": {"declarations": ["nixos/modules/services/logging/journaldriver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configures the name of the target log in Stackdriver Logging.\nThis option can be set to, for example, the hostname of a\nmachine to improve the user experience in the logging\noverview.\n"}, "loc": ["services", "journaldriver", "logName"], "readOnly": false, "type": "null or string"}, "services.journaldriver.logStream": {"declarations": ["nixos/modules/services/logging/journaldriver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configures the name of the Stackdriver Logging log stream into\nwhich to write journald entries.\n\nThis option is required on non-GCP machines, but should not be\nset on GCP instances.\n"}, "loc": ["services", "journaldriver", "logStream"], "readOnly": false, "type": "null or string"}, "services.journalwatch.accuracy": {"declarations": ["nixos/modules/services/logging/journalwatch.nix"], "default": {"_type": "literalExpression", "text": "\"10min\""}, "description": {"_type": "mdDoc", "text": "The time window around the interval in which the journalwatch run will be scheduled.\n\nThe format is described in systemd.time(7).\n"}, "loc": ["services", "journalwatch", "accuracy"], "readOnly": false, "type": "string"}, "services.journalwatch.enable": {"declarations": ["nixos/modules/services/logging/journalwatch.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, periodically check the journal with journalwatch and report the results by mail.\n"}, "loc": ["services", "journalwatch", "enable"], "readOnly": false, "type": "boolean"}, "services.journalwatch.extraConfig": {"declarations": ["nixos/modules/services/logging/journalwatch.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to the journalwatch/config configuration file.\nYou can add any commandline argument to the config, without the '--'.\nSee `journalwatch --help` for all arguments and their description.\n"}, "loc": ["services", "journalwatch", "extraConfig"], "readOnly": false, "type": "string"}, "services.journalwatch.filterBlocks": {"declarations": ["nixos/modules/services/logging/journalwatch.nix"], "default": {"_type": "literalExpression", "text": "[\n  {\n    filters = ''\n      (Stopped|Stopping|Starting|Started) .*\n      (Created slice|Removed slice) user-\\d*\\.slice\\.\n      Received SIGRTMIN\\+24 from PID .*\n      (Reached target|Stopped target) .*\n      Startup finished in \\d*ms\\.\n    '';\n    match = \"SYSLOG_IDENTIFIER = systemd\";\n  }\n]"}, "description": {"_type": "mdDoc", "text": "filterBlocks can be defined to blacklist journal messages which are not errors.\nEach block matches on a log entry field, and the filters in that block then are matched\nagainst all messages with a matching log entry field.\n\nAll messages whose PRIORITY is at least 6 (INFO) are processed by journalwatch.\nIf you don't specify any filterBlocks, PRIORITY is reduced to 5 (NOTICE) by default.\n\nAll regular expressions are extended Python regular expressions, for details\nsee: http://doc.pyschools.com/html/regex.html\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    filters = ''\n      New session [a-z]?\\d+ of user \\w+\\.\n      Removed session [a-z]?\\d+\\.\n    '';\n    match = \"_SYSTEMD_UNIT = systemd-logind.service\";\n  }\n  {\n    filters = ''\n      pam_unix\\(crond:session\\): session (opened|closed) for user \\w+\n      \\(\\w+\\) CMD .*\n    '';\n    match = \"SYSLOG_IDENTIFIER = /(CROND|crond)/\";\n  }\n]"}, "loc": ["services", "journalwatch", "filterBlocks"], "readOnly": false, "type": "list of (submodule)"}, "services.journalwatch.filterBlocks.*.filters": {"declarations": ["nixos/modules/services/logging/journalwatch.nix"], "description": {"_type": "mdDoc", "text": "The filters to apply on all messages which satisfy {option}`match`.\nAny of those messages that match any specified filter will be removed from journalwatch's output.\nEach filter is an extended Python regular expression.\nYou can specify multiple filters and separate them by newlines.\nLines starting with '#' are comments. Inline-comments are not permitted.\n"}, "example": {"_type": "literalExpression", "text": "''\n  (Stopped|Stopping|Starting|Started) .*\n  (Reached target|Stopped target) .*\n''"}, "loc": ["services", "journalwatch", "filterBlocks", "*", "filters"], "readOnly": false, "type": "string"}, "services.journalwatch.filterBlocks.*.match": {"declarations": ["nixos/modules/services/logging/journalwatch.nix"], "description": {"_type": "mdDoc", "text": "Syntax: `field = value`\nSpecifies the log entry `field` this block should apply to.\nIf the `field` of a message matches this `value`,\nthis patternBlock's {option}`filters` are applied.\nIf `value` starts and ends with a slash, it is interpreted as\nan extended python regular expression, if not, it's an exact match.\nThe journal fields are explained in systemd.journal-fields(7).\n"}, "example": {"_type": "literalExpression", "text": "\"SYSLOG_IDENTIFIER = systemd\""}, "loc": ["services", "journalwatch", "filterBlocks", "*", "match"], "readOnly": false, "type": "string"}, "services.journalwatch.interval": {"declarations": ["nixos/modules/services/logging/journalwatch.nix"], "default": {"_type": "literalExpression", "text": "\"hourly\""}, "description": {"_type": "mdDoc", "text": "How often to run journalwatch.\n\nThe format is described in systemd.time(7).\n"}, "loc": ["services", "journalwatch", "interval"], "readOnly": false, "type": "string"}, "services.journalwatch.mailBinary": {"declarations": ["nixos/modules/services/logging/journalwatch.nix"], "default": {"_type": "literalExpression", "text": "\"/run/wrappers/bin/sendmail\""}, "description": {"_type": "mdDoc", "text": "Sendmail-compatible binary to be used to send the messages.\n"}, "loc": ["services", "journalwatch", "mailBinary"], "readOnly": false, "type": "path"}, "services.journalwatch.mailFrom": {"declarations": ["nixos/modules/services/logging/journalwatch.nix"], "default": {"_type": "literalExpression", "text": "\"journalwatch@${config.networking.hostName}\""}, "description": {"_type": "mdDoc", "text": "Mail address to send journalwatch reports from.\n"}, "loc": ["services", "journalwatch", "mailFrom"], "readOnly": false, "type": "string"}, "services.journalwatch.mailTo": {"declarations": ["nixos/modules/services/logging/journalwatch.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Mail address to send journalwatch reports to.\n"}, "loc": ["services", "journalwatch", "mailTo"], "readOnly": false, "type": "null or string"}, "services.journalwatch.priority": {"declarations": ["nixos/modules/services/logging/journalwatch.nix"], "default": {"_type": "literalExpression", "text": "6"}, "description": {"_type": "mdDoc", "text": "Lowest priority of message to be considered.\nA value between 7 (\"debug\"), and 0 (\"emerg\"). Defaults to 6 (\"info\").\nIf you don't care about anything with \"info\" priority, you can reduce\nthis to e.g. 5 (\"notice\") to considerably reduce the amount of\nmessages without needing many {option}`filterBlocks`.\n"}, "loc": ["services", "journalwatch", "priority"], "readOnly": false, "type": "signed integer"}, "services.joycond.enable": {"declarations": ["nixos/modules/services/hardware/joycond.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable support for Nintendo Pro Controllers and Joycons."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "joycond", "enable"], "readOnly": false, "type": "boolean"}, "services.joycond.package": {"declarations": ["nixos/modules/services/hardware/joycond.nix"], "default": {"_type": "literalExpression", "text": "pkgs.joycond"}, "description": {"_type": "mdDoc", "text": "The joycond package to use.\n"}, "loc": ["services", "joycond", "package"], "readOnly": false, "type": "package"}, "services.jupyter.command": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "\"jupyter-notebook\""}, "description": {"_type": "mdDoc", "text": "Which command the service runs. Note that not all jupyter packages\nhave all commands, e.g. jupyter-lab isn't present in the default package.\n"}, "example": {"_type": "literalExpression", "text": "\"jupyter-lab\""}, "loc": ["services", "jupyter", "command"], "readOnly": false, "type": "string"}, "services.jupyter.enable": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Jupyter development server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jupyter", "enable"], "readOnly": false, "type": "boolean"}, "services.jupyter.group": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "\"jupyter\""}, "description": {"_type": "mdDoc", "text": "Name of the group used to run the jupyter service.\nUse this if you want to create a group of users that are able to view the notebook directory's content.\n"}, "example": {"_type": "literalExpression", "text": "\"users\""}, "loc": ["services", "jupyter", "group"], "readOnly": false, "type": "string"}, "services.jupyter.ip": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "IP address Jupyter will be listening on.\n"}, "loc": ["services", "jupyter", "ip"], "readOnly": false, "type": "string"}, "services.jupyter.kernels": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Declarative kernel config.\n\nKernels can be declared in any language that supports and has the required\ndependencies to communicate with a jupyter server.\nIn python's case, it means that ipykernel package must always be included in\nthe list of packages of the targeted environment.\n"}, "example": {"_type": "literalExpression", "text": "{\n  python3 = let\n    env = (pkgs.python3.withPackages (pythonPackages: with pythonPackages; [\n            ipykernel\n            pandas\n            scikit-learn\n          ]));\n  in {\n    displayName = \"Python 3 for machine learning\";\n    argv = [\n      \"${env.interpreter}\"\n      \"-m\"\n      \"ipykernel_launcher\"\n      \"-f\"\n      \"{connection_file}\"\n    ];\n    language = \"python\";\n    logo32 = \"${env.sitePackages}/ipykernel/resources/logo-32x32.png\";\n    logo64 = \"${env.sitePackages}/ipykernel/resources/logo-64x64.png\";\n    extraPaths = {\n      \"cool.txt\" = pkgs.writeText \"cool\" \"cool content\";\n    };\n  };\n}\n"}, "loc": ["services", "jupyter", "kernels"], "readOnly": false, "type": "null or (attribute set of (JSON value))"}, "services.jupyter.kernels.<name>.argv": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "description": {"_type": "mdDoc", "text": "Command and arguments to start the kernel.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"{customEnv.interpreter}\"\n  \"-m\"\n  \"ipykernel_launcher\"\n  \"-f\"\n  \"{connection_file}\"\n]"}, "loc": ["services", "jupyter", "kernels", "<name>", "argv"], "readOnly": false, "type": "list of string"}, "services.jupyter.kernels.<name>.displayName": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Name that will be shown to the user.\n"}, "example": {"_type": "literalExpression", "text": "\"Python 3\"\n\"Python 3 for Data Science\"\n"}, "loc": ["services", "jupyter", "kernels", "<name>", "displayName"], "readOnly": false, "type": "string"}, "services.jupyter.kernels.<name>.env": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables to set for the kernel.\n"}, "example": {"_type": "literalExpression", "text": "{\n  OMP_NUM_THREADS = \"1\";\n}"}, "loc": ["services", "jupyter", "kernels", "<name>", "env"], "readOnly": false, "type": "attribute set of string"}, "services.jupyter.kernels.<name>.extraPaths": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra paths to link in kernel directory\n"}, "example": {"_type": "literalExpression", "text": "\"{ examples = ${env.sitePack}/IRkernel/kernelspec/kernel.js\"; }"}, "loc": ["services", "jupyter", "kernels", "<name>", "extraPaths"], "readOnly": false, "type": "attribute set of path"}, "services.jupyter.kernels.<name>.language": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "description": {"_type": "mdDoc", "text": "Language of the environment. Typically the name of the binary.\n"}, "example": {"_type": "literalExpression", "text": "\"python\""}, "loc": ["services", "jupyter", "kernels", "<name>", "language"], "readOnly": false, "type": "string"}, "services.jupyter.kernels.<name>.logo32": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to 32x32 logo png.\n"}, "example": {"_type": "literalExpression", "text": "\"${env.sitePackages}/ipykernel/resources/logo-32x32.png\""}, "loc": ["services", "jupyter", "kernels", "<name>", "logo32"], "readOnly": false, "type": "null or path"}, "services.jupyter.kernels.<name>.logo64": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to 64x64 logo png.\n"}, "example": {"_type": "literalExpression", "text": "\"${env.sitePackages}/ipykernel/resources/logo-64x64.png\""}, "loc": ["services", "jupyter", "kernels", "<name>", "logo64"], "readOnly": false, "type": "null or path"}, "services.jupyter.notebookConfig": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Raw jupyter config.\n"}, "loc": ["services", "jupyter", "notebookConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.jupyter.notebookDir": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "\"~/\""}, "description": {"_type": "mdDoc", "text": "Root directory for notebooks.\n"}, "loc": ["services", "jupyter", "notebookDir"], "readOnly": false, "type": "string"}, "services.jupyter.package": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.python3.pkgs.notebook"}, "description": {"_type": "mdDoc", "text": "Jupyter package to use.\n"}, "loc": ["services", "jupyter", "package"], "readOnly": false, "type": "package"}, "services.jupyter.password": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "description": {"_type": "mdDoc", "text": "Password to use with notebook.\nCan be generated using:\n  In [1]: from notebook.auth import passwd\n  In [2]: passwd('test')\n  Out[2]: 'sha1:1b961dc713fb:88483270a63e57d18d43cf337e629539de1436ba'\n  NOTE: you need to keep the single quote inside the nix string.\nOr you can use a python oneliner:\n  \"open('/path/secret_file', 'r', encoding='utf8').read().strip()\"\nIt will be interpreted at the end of the notebookConfig.\n"}, "example": {"_type": "literalExpression", "text": "\"'sha1:1b961dc713fb:88483270a63e57d18d43cf337e629539de1436ba'\""}, "loc": ["services", "jupyter", "password"], "readOnly": false, "type": "string"}, "services.jupyter.port": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "8888"}, "description": {"_type": "mdDoc", "text": "Port number Jupyter will be listening on.\n"}, "loc": ["services", "jupyter", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.jupyter.user": {"declarations": ["nixos/modules/services/development/jupyter/default.nix"], "default": {"_type": "literalExpression", "text": "\"jupyter\""}, "description": {"_type": "mdDoc", "text": "Name of the user used to run the jupyter service.\nFor security reason, jupyter should really not be run as root.\nIf not set (jupyter), the service will create a jupyter user with appropriate settings.\n"}, "example": {"_type": "literalExpression", "text": "\"aborsu\""}, "loc": ["services", "jupyter", "user"], "readOnly": false, "type": "string"}, "services.jupyterhub.authentication": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "\"jupyterhub.auth.PAMAuthenticator\""}, "description": {"_type": "mdDoc", "text": "Jupyterhub authentication to use\n\nThere are many authenticators available including: oauth, pam,\nldap, kerberos, etc.\n"}, "loc": ["services", "jupyterhub", "authentication"], "readOnly": false, "type": "string"}, "services.jupyterhub.enable": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Jupyterhub development server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jupyterhub", "enable"], "readOnly": false, "type": "boolean"}, "services.jupyterhub.extraConfig": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra contents appended to the jupyterhub configuration\n\nJupyterhub configuration is a normal python file using\nTraitlets. https://jupyterhub.readthedocs.io/en/stable/getting-started/config-basics.html. The\nbase configuration of this module was designed to have sane\ndefaults for configuration but you can override anything since\nthis is a python file.\n"}, "example": {"_type": "literalExpression", "text": "''\n  c.SystemdSpawner.mem_limit = '8G'\n  c.SystemdSpawner.cpu_limit = 2.0\n''"}, "loc": ["services", "jupyterhub", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.jupyterhub.host": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Bind IP JupyterHub will be listening on\n"}, "loc": ["services", "jupyterhub", "host"], "readOnly": false, "type": "string"}, "services.jupyterhub.jupyterhubEnv": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.python3.withPackages (p: with p; [\n  jupyterhub\n  jupyterhub-systemdspawner\n])\n"}, "description": {"_type": "mdDoc", "text": "Python environment to run jupyterhub\n\nCustomizing will affect the packages available in the hub and\nproxy. This will allow packages to be available for the\nextraConfig that you may need. This will not normally need to\nbe changed.\n"}, "loc": ["services", "jupyterhub", "jupyterhubEnv"], "readOnly": false, "type": "package"}, "services.jupyterhub.jupyterlabEnv": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.python3.withPackages (p: with p; [\n  jupyterhub\n  jupyterlab\n])\n"}, "description": {"_type": "mdDoc", "text": "Python environment to run jupyterlab\n\nCustomizing will affect the packages available in the\njupyterlab server and the default kernel provided. This is the\nway to customize the jupyterlab extensions and jupyter\nnotebook extensions. This will not normally need to\nbe changed.\n"}, "loc": ["services", "jupyterhub", "jupyterlabEnv"], "readOnly": false, "type": "package"}, "services.jupyterhub.kernels": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Declarative kernel config\n\nKernels can be declared in any language that supports and has\nthe required dependencies to communicate with a jupyter server.\nIn python's case, it means that ipykernel package must always be\nincluded in the list of packages of the targeted environment.\n"}, "example": {"_type": "literalExpression", "text": "{\n  python3 = let\n    env = (pkgs.python3.withPackages (pythonPackages: with pythonPackages; [\n            ipykernel\n            pandas\n            scikit-learn\n          ]));\n  in {\n    displayName = \"Python 3 for machine learning\";\n    argv = [\n      \"${env.interpreter}\"\n      \"-m\"\n      \"ipykernel_launcher\"\n      \"-f\"\n      \"{connection_file}\"\n    ];\n    language = \"python\";\n    logo32 = \"${env}/${env.sitePackages}/ipykernel/resources/logo-32x32.png\";\n    logo64 = \"${env}/${env.sitePackages}/ipykernel/resources/logo-64x64.png\";\n  };\n}\n"}, "loc": ["services", "jupyterhub", "kernels"], "readOnly": false, "type": "null or (attribute set of (JSON value))"}, "services.jupyterhub.kernels.<name>.argv": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "description": {"_type": "mdDoc", "text": "Command and arguments to start the kernel.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"{customEnv.interpreter}\"\n  \"-m\"\n  \"ipykernel_launcher\"\n  \"-f\"\n  \"{connection_file}\"\n]"}, "loc": ["services", "jupyterhub", "kernels", "<name>", "argv"], "readOnly": false, "type": "list of string"}, "services.jupyterhub.kernels.<name>.displayName": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Name that will be shown to the user.\n"}, "example": {"_type": "literalExpression", "text": "\"Python 3\"\n\"Python 3 for Data Science\"\n"}, "loc": ["services", "jupyterhub", "kernels", "<name>", "displayName"], "readOnly": false, "type": "string"}, "services.jupyterhub.kernels.<name>.env": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables to set for the kernel.\n"}, "example": {"_type": "literalExpression", "text": "{\n  OMP_NUM_THREADS = \"1\";\n}"}, "loc": ["services", "jupyterhub", "kernels", "<name>", "env"], "readOnly": false, "type": "attribute set of string"}, "services.jupyterhub.kernels.<name>.extraPaths": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra paths to link in kernel directory\n"}, "example": {"_type": "literalExpression", "text": "\"{ examples = ${env.sitePack}/IRkernel/kernelspec/kernel.js\"; }"}, "loc": ["services", "jupyterhub", "kernels", "<name>", "extraPaths"], "readOnly": false, "type": "attribute set of path"}, "services.jupyterhub.kernels.<name>.language": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "description": {"_type": "mdDoc", "text": "Language of the environment. Typically the name of the binary.\n"}, "example": {"_type": "literalExpression", "text": "\"python\""}, "loc": ["services", "jupyterhub", "kernels", "<name>", "language"], "readOnly": false, "type": "string"}, "services.jupyterhub.kernels.<name>.logo32": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to 32x32 logo png.\n"}, "example": {"_type": "literalExpression", "text": "\"${env.sitePackages}/ipykernel/resources/logo-32x32.png\""}, "loc": ["services", "jupyterhub", "kernels", "<name>", "logo32"], "readOnly": false, "type": "null or path"}, "services.jupyterhub.kernels.<name>.logo64": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to 64x64 logo png.\n"}, "example": {"_type": "literalExpression", "text": "\"${env.sitePackages}/ipykernel/resources/logo-64x64.png\""}, "loc": ["services", "jupyterhub", "kernels", "<name>", "logo64"], "readOnly": false, "type": "null or path"}, "services.jupyterhub.port": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "8000"}, "description": {"_type": "mdDoc", "text": "Port number Jupyterhub will be listening on\n"}, "loc": ["services", "jupyterhub", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.jupyterhub.spawner": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "\"systemdspawner.SystemdSpawner\""}, "description": {"_type": "mdDoc", "text": "Jupyterhub spawner to use\n\nThere are many spawners available including: local process,\nsystemd, docker, kubernetes, yarn, batch, etc.\n"}, "loc": ["services", "jupyterhub", "spawner"], "readOnly": false, "type": "string"}, "services.jupyterhub.stateDirectory": {"declarations": ["nixos/modules/services/development/jupyterhub/default.nix"], "default": {"_type": "literalExpression", "text": "\"jupyterhub\""}, "description": {"_type": "mdDoc", "text": "Directory for jupyterhub state (token + database)\n"}, "loc": ["services", "jupyterhub", "stateDirectory"], "readOnly": false, "type": "string"}, "services.k3s.clusterInit": {"declarations": ["nixos/modules/services/cluster/k3s/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Initialize HA cluster using an embedded etcd datastore.\n\nIf this option is `false` and `role` is `server`\n\nOn a server that was using the default embedded sqlite backend,\nenabling this option will migrate to an embedded etcd DB.\n\nIf an HA cluster using the embedded etcd datastore was already initialized,\nthis option has no effect.\n\nThis option only makes sense in a server that is not connecting to another server.\n\nIf you are configuring an HA cluster with an embedded etcd,\nthe 1st server must have `clusterInit = true`\nand other servers must connect to it using `serverAddr`.\n"}, "loc": ["services", "k3s", "clusterInit"], "readOnly": false, "type": "boolean"}, "services.k3s.configPath": {"declarations": ["nixos/modules/services/cluster/k3s/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File path containing the k3s YAML config. This is useful when the config is generated (for example on boot)."}, "loc": ["services", "k3s", "configPath"], "readOnly": false, "type": "null or path"}, "services.k3s.disableAgent": {"declarations": ["nixos/modules/services/cluster/k3s/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Only run the server. This option only makes sense for a server."}, "loc": ["services", "k3s", "disableAgent"], "readOnly": false, "type": "boolean"}, "services.k3s.enable": {"declarations": ["nixos/modules/services/cluster/k3s/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable k3s."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "k3s", "enable"], "readOnly": false, "type": "boolean"}, "services.k3s.environmentFile": {"declarations": ["nixos/modules/services/cluster/k3s/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File path containing environment variables for configuring the k3s service in the format of an EnvironmentFile. See systemd.exec(5).\n"}, "loc": ["services", "k3s", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.k3s.extraFlags": {"declarations": ["nixos/modules/services/cluster/k3s/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra flags to pass to the k3s command."}, "example": {"_type": "literalExpression", "text": "\"--no-deploy traefik --cluster-cidr 10.24.0.0/16\""}, "loc": ["services", "k3s", "extraFlags"], "readOnly": false, "type": "string"}, "services.k3s.package": {"declarations": ["nixos/modules/services/cluster/k3s/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.k3s"}, "description": {"_type": "mdDoc", "text": "Package that should be used for k3s"}, "loc": ["services", "k3s", "package"], "readOnly": false, "type": "package"}, "services.k3s.role": {"declarations": ["nixos/modules/services/cluster/k3s/default.nix"], "default": {"_type": "literalExpression", "text": "\"server\""}, "description": {"_type": "mdDoc", "text": "Whether k3s should run as a server or agent.\n\nIf it's a server:\n\n- By default it also runs workloads as an agent.\n- Starts by default as a standalone server using an embedded sqlite datastore.\n- Configure `clusterInit = true` to switch over to embedded etcd datastore and enable HA mode.\n- Configure `serverAddr` to join an already-initialized HA cluster.\n\nIf it's an agent:\n\n- `serverAddr` is required.\n"}, "loc": ["services", "k3s", "role"], "readOnly": false, "type": "one of \"server\", \"agent\""}, "services.k3s.serverAddr": {"declarations": ["nixos/modules/services/cluster/k3s/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The k3s server to connect to.\n\nServers and agents need to communicate each other. Read\n[the networking docs](https://rancher.com/docs/k3s/latest/en/installation/installation-requirements/#networking)\nto know how to configure the firewall.\n"}, "example": {"_type": "literalExpression", "text": "\"https://10.0.0.10:6443\""}, "loc": ["services", "k3s", "serverAddr"], "readOnly": false, "type": "string"}, "services.k3s.token": {"declarations": ["nixos/modules/services/cluster/k3s/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The k3s token to use when connecting to a server.\n\nWARNING: This option will expose store your token unencrypted world-readable in the nix store.\nIf this is undesired use the tokenFile option instead.\n"}, "loc": ["services", "k3s", "token"], "readOnly": false, "type": "string"}, "services.k3s.tokenFile": {"declarations": ["nixos/modules/services/cluster/k3s/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File path containing k3s token to use when connecting to the server."}, "loc": ["services", "k3s", "tokenFile"], "readOnly": false, "type": "null or path"}, "services.kanata.enable": {"declarations": ["nixos/modules/services/hardware/kanata.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kanata."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kanata", "enable"], "readOnly": false, "type": "boolean"}, "services.kanata.keyboards": {"declarations": ["nixos/modules/services/hardware/kanata.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Keyboard configurations."}, "loc": ["services", "kanata", "keyboards"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.kanata.keyboards.<name>.config": {"declarations": ["nixos/modules/services/hardware/kanata.nix"], "description": {"_type": "mdDoc", "text": "Configuration other than `defcfg`.\n\nSee [example config files](https://github.com/jtroo/kanata)\nfor more information.\n"}, "example": {"_type": "literalExpression", "text": "''\n  (defsrc\n    grv  1    2    3    4    5    6    7    8    9    0    -    =    bspc\n    tab  q    w    e    r    t    y    u    i    o    p    [    ]    \\\n    caps a    s    d    f    g    h    j    k    l    ;    '    ret\n    lsft z    x    c    v    b    n    m    ,    .    /    rsft\n    lctl lmet lalt           spc            ralt rmet rctl)\n  \n  (deflayer qwerty\n    grv  1    2    3    4    5    6    7    8    9    0    -    =    bspc\n    tab  q    w    e    r    t    y    u    i    o    p    [    ]    \\\n    @cap a    s    d    f    g    h    j    k    l    ;    '    ret\n    lsft z    x    c    v    b    n    m    ,    .    /    rsft\n    lctl lmet lalt           spc            ralt rmet rctl)\n  \n  (defalias\n    ;; tap within 100ms for capslk, hold more than 100ms for lctl\n    cap (tap-hold 100 100 caps lctl))\n''"}, "loc": ["services", "kanata", "keyboards", "<name>", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.kanata.keyboards.<name>.devices": {"declarations": ["nixos/modules/services/hardware/kanata.nix"], "description": {"_type": "mdDoc", "text": "Paths to keyboard devices."}, "example": {"_type": "literalExpression", "text": "[\n  \"/dev/input/by-id/usb-0000_0000-event-kbd\"\n]"}, "loc": ["services", "kanata", "keyboards", "<name>", "devices"], "readOnly": false, "type": "list of string"}, "services.kanata.keyboards.<name>.extraArgs": {"declarations": ["nixos/modules/services/hardware/kanata.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line arguments passed to kanata."}, "loc": ["services", "kanata", "keyboards", "<name>", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.kanata.keyboards.<name>.extraDefCfg": {"declarations": ["nixos/modules/services/hardware/kanata.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration of `defcfg` other than `linux-dev` (generated\nfrom the devices option) and\n`linux-continue-if-no-devs-found` (hardcoded to be yes).\n\nSee [example config files](https://github.com/jtroo/kanata)\nfor more information.\n"}, "example": {"_type": "literalExpression", "text": "\"danger-enable-cmd yes\""}, "loc": ["services", "kanata", "keyboards", "<name>", "extraDefCfg"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.kanata.keyboards.<name>.port": {"declarations": ["nixos/modules/services/hardware/kanata.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to run the TCP server on. `null` will not run the server.\n"}, "example": {"_type": "literalExpression", "text": "6666"}, "loc": ["services", "kanata", "keyboards", "<name>", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.kanata.package": {"declarations": ["nixos/modules/services/hardware/kanata.nix"], "default": {"_type": "literalExpression", "text": "pkgs.kanata"}, "description": {"_type": "mdDoc", "text": "The kanata package to use.\n\n::: {.note}\nIf `danger-enable-cmd` is enabled in any of the keyboards, the\n`kanata-with-cmd` package should be used.\n:::\n"}, "example": {"_type": "literalExpression", "text": "pkgs.kanata-with-cmd"}, "loc": ["services", "kanata", "package"], "readOnly": false, "type": "package"}, "services.kapacitor.alerta.enable": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kapacitor alerta integration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kapacitor", "alerta", "enable"], "readOnly": false, "type": "boolean"}, "services.kapacitor.alerta.environment": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "\"Production\""}, "description": {"_type": "mdDoc", "text": "Default Alerta environment"}, "loc": ["services", "kapacitor", "alerta", "environment"], "readOnly": false, "type": "string"}, "services.kapacitor.alerta.origin": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "\"kapacitor\""}, "description": {"_type": "mdDoc", "text": "Default origin of alert"}, "loc": ["services", "kapacitor", "alerta", "origin"], "readOnly": false, "type": "string"}, "services.kapacitor.alerta.token": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Default Alerta authentication token"}, "loc": ["services", "kapacitor", "alerta", "token"], "readOnly": false, "type": "string"}, "services.kapacitor.alerta.url": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:5000\""}, "description": {"_type": "mdDoc", "text": "The URL to the Alerta REST API"}, "loc": ["services", "kapacitor", "alerta", "url"], "readOnly": false, "type": "string"}, "services.kapacitor.bind": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Address to bind to. The default is to bind to all addresses"}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "kapacitor", "bind"], "readOnly": false, "type": "string"}, "services.kapacitor.dataDir": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/kapacitor\""}, "description": {"_type": "mdDoc", "text": "Location where Kapacitor stores its state"}, "loc": ["services", "kapacitor", "dataDir"], "readOnly": false, "type": "path"}, "services.kapacitor.defaultDatabase.enable": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kapacitor.defaultDatabase."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kapacitor", "defaultDatabase", "enable"], "readOnly": false, "type": "boolean"}, "services.kapacitor.defaultDatabase.password": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "description": {"_type": "mdDoc", "text": "The password to connect to the remote InfluxDB server"}, "loc": ["services", "kapacitor", "defaultDatabase", "password"], "readOnly": false, "type": "string"}, "services.kapacitor.defaultDatabase.url": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "description": {"_type": "mdDoc", "text": "The URL to an InfluxDB server that serves as the default database"}, "example": {"_type": "literalExpression", "text": "\"http://localhost:8086\""}, "loc": ["services", "kapacitor", "defaultDatabase", "url"], "readOnly": false, "type": "string"}, "services.kapacitor.defaultDatabase.username": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "description": {"_type": "mdDoc", "text": "The username to connect to the remote InfluxDB server"}, "loc": ["services", "kapacitor", "defaultDatabase", "username"], "readOnly": false, "type": "string"}, "services.kapacitor.enable": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kapacitor."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kapacitor", "enable"], "readOnly": false, "type": "boolean"}, "services.kapacitor.extraConfig": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go into kapacitord.conf verbatim."}, "loc": ["services", "kapacitor", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.kapacitor.group": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "\"kapacitor\""}, "description": {"_type": "mdDoc", "text": "Group under which Kapacitor runs"}, "loc": ["services", "kapacitor", "group"], "readOnly": false, "type": "string"}, "services.kapacitor.loadDirectory": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Directory where to load services from, such as tasks, templates and handlers (or null to disable service loading on startup)"}, "loc": ["services", "kapacitor", "loadDirectory"], "readOnly": false, "type": "null or path"}, "services.kapacitor.port": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "9092"}, "description": {"_type": "mdDoc", "text": "Port of Kapacitor"}, "loc": ["services", "kapacitor", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.kapacitor.taskSnapshotInterval": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "\"1m0s\""}, "description": {"_type": "mdDoc", "text": "Specifies how often to snapshot the task state  (in InfluxDB time units)"}, "loc": ["services", "kapacitor", "taskSnapshotInterval"], "readOnly": false, "type": "string"}, "services.kapacitor.user": {"declarations": ["nixos/modules/services/monitoring/kapacitor.nix"], "default": {"_type": "literalExpression", "text": "\"kapacitor\""}, "description": {"_type": "mdDoc", "text": "User account under which Kapacitor runs"}, "loc": ["services", "kapacitor", "user"], "readOnly": false, "type": "string"}, "services.karma.configFile": {"declarations": ["nixos/modules/services/monitoring/karma.nix"], "default": {"_type": "literalExpression", "text": "\"A configuration file generated from the provided nix attributes settings option.\""}, "description": {"_type": "mdDoc", "text": "A YAML config file which can be used to configure karma instead of the nix-generated file.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/karma/karma.conf\""}, "loc": ["services", "karma", "configFile"], "readOnly": false, "type": "path"}, "services.karma.enable": {"declarations": ["nixos/modules/services/monitoring/karma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Karma dashboard service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "karma", "enable"], "readOnly": false, "type": "boolean"}, "services.karma.environment": {"declarations": ["nixos/modules/services/monitoring/karma.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional environment variables to provide to karma.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ALERTMANAGER_NAME = \"single\";\n  ALERTMANAGER_URI = \"https://alertmanager.example.com\";\n}"}, "loc": ["services", "karma", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.karma.extraOptions": {"declarations": ["nixos/modules/services/monitoring/karma.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line options.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--alertmanager.timeout 10s\"\n]"}, "loc": ["services", "karma", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.karma.openFirewall": {"declarations": ["nixos/modules/services/monitoring/karma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open ports in the firewall needed for karma to function.\n"}, "loc": ["services", "karma", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.karma.package": {"declarations": ["nixos/modules/services/monitoring/karma.nix"], "default": {"_type": "literalExpression", "text": "pkgs.karma"}, "description": {"_type": "mdDoc", "text": "The Karma package that should be used.\n"}, "loc": ["services", "karma", "package"], "readOnly": false, "type": "package"}, "services.karma.settings": {"declarations": ["nixos/modules/services/monitoring/karma.nix"], "default": {"_type": "literalExpression", "text": "{\n  listen = {\n    address = \"127.0.0.1\";\n  };\n}"}, "description": {"_type": "mdDoc", "text": "Karma dashboard configuration as nix attributes.\n\nReference: <https://github.com/prymitive/karma/blob/main/docs/CONFIGURATION.md>\n"}, "example": {"_type": "literalExpression", "text": "{\n  alertmanager = {\n    interval = \"15s\";\n    servers = [\n      {\n        name = \"prod\";\n        uri = \"http://alertmanager.example.com\";\n      }\n    ];\n  };\n  listen = {\n    address = \"192.168.1.4\";\n    port = \"8000\";\n    prefix = \"/dashboard\";\n  };\n}"}, "loc": ["services", "karma", "settings"], "readOnly": false, "type": "YAML value"}, "services.karma.settings.listen.address": {"declarations": ["nixos/modules/services/monitoring/karma.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Hostname or IP to listen on.\n"}, "example": {"_type": "literalExpression", "text": "\"[::]\""}, "loc": ["services", "karma", "settings", "listen", "address"], "readOnly": false, "type": "string"}, "services.karma.settings.listen.port": {"declarations": ["nixos/modules/services/monitoring/karma.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "HTTP port to listen on.\n"}, "example": {"_type": "literalExpression", "text": "8182"}, "loc": ["services", "karma", "settings", "listen", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.kasmweb.datastorePath": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/kasmweb\""}, "description": {"_type": "mdDoc", "text": "The directory used to store all data for kasmweb.\n"}, "loc": ["services", "kasmweb", "datastorePath"], "readOnly": false, "type": "string"}, "services.kasmweb.defaultAdminPassword": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "\"kasmweb\""}, "description": {"_type": "mdDoc", "text": "default admin password to use.\n"}, "loc": ["services", "kasmweb", "defaultAdminPassword"], "readOnly": false, "type": "string"}, "services.kasmweb.defaultGuacToken": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "\"kasmweb\""}, "description": {"_type": "mdDoc", "text": "default guac token to use.\n"}, "loc": ["services", "kasmweb", "defaultGuacToken"], "readOnly": false, "type": "string"}, "services.kasmweb.defaultManagerToken": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "\"kasmweb\""}, "description": {"_type": "mdDoc", "text": "default manager token to use.\n"}, "loc": ["services", "kasmweb", "defaultManagerToken"], "readOnly": false, "type": "string"}, "services.kasmweb.defaultRegistrationToken": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "\"kasmweb\""}, "description": {"_type": "mdDoc", "text": "default registration token to use.\n"}, "loc": ["services", "kasmweb", "defaultRegistrationToken"], "readOnly": false, "type": "string"}, "services.kasmweb.defaultUserPassword": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "\"kasmweb\""}, "description": {"_type": "mdDoc", "text": "default user password to use.\n"}, "loc": ["services", "kasmweb", "defaultUserPassword"], "readOnly": false, "type": "string"}, "services.kasmweb.enable": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kasmweb."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kasmweb", "enable"], "readOnly": false, "type": "boolean"}, "services.kasmweb.listenAddress": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "The address on which kasmweb should listen.\n"}, "loc": ["services", "kasmweb", "listenAddress"], "readOnly": false, "type": "string"}, "services.kasmweb.listenPort": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "443"}, "description": {"_type": "mdDoc", "text": "The port on which kasmweb should listen.\n"}, "loc": ["services", "kasmweb", "listenPort"], "readOnly": false, "type": "signed integer"}, "services.kasmweb.networkSubnet": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "\"172.20.0.0/16\""}, "description": {"_type": "mdDoc", "text": "The network subnet to use for the containers.\n"}, "loc": ["services", "kasmweb", "networkSubnet"], "readOnly": false, "type": "string"}, "services.kasmweb.postgres.password": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "\"kasmweb\""}, "description": {"_type": "mdDoc", "text": "password to use for the postgres database.\n"}, "loc": ["services", "kasmweb", "postgres", "password"], "readOnly": false, "type": "string"}, "services.kasmweb.postgres.user": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "\"kasmweb\""}, "description": {"_type": "mdDoc", "text": "Username to use for the postgres database.\n"}, "loc": ["services", "kasmweb", "postgres", "user"], "readOnly": false, "type": "string"}, "services.kasmweb.redisPassword": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "\"kasmweb\""}, "description": {"_type": "mdDoc", "text": "password to use for the redis cache.\n"}, "loc": ["services", "kasmweb", "redisPassword"], "readOnly": false, "type": "string"}, "services.kasmweb.sslCertificate": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The SSL certificate to be used for kasmweb.\n"}, "loc": ["services", "kasmweb", "sslCertificate"], "readOnly": false, "type": "null or path"}, "services.kasmweb.sslCertificateKey": {"declarations": ["nixos/modules/services/web-apps/kasmweb/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The SSL certificate's key to be used for kasmweb. Make sure to specify\nthis as a string and not a literal path, so that it is not accidentally\nincluded in your nixstore.\n"}, "loc": ["services", "kasmweb", "sslCertificateKey"], "readOnly": false, "type": "null or path"}, "services.kavita.dataDir": {"declarations": ["nixos/modules/services/web-apps/kavita.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/kavita\""}, "description": {"_type": "mdDoc", "text": "The directory where Kavita stores its state."}, "loc": ["services", "kavita", "dataDir"], "readOnly": false, "type": "string"}, "services.kavita.enable": {"declarations": ["nixos/modules/services/web-apps/kavita.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Kavita reading server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kavita", "enable"], "readOnly": false, "type": "boolean"}, "services.kavita.ipAdresses": {"declarations": ["nixos/modules/services/web-apps/kavita.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0\"\n  \"::\"\n]"}, "description": {"_type": "mdDoc", "text": "IP Addresses to bind to. The default is to bind\n      to all IPv4 and IPv6 addresses."}, "loc": ["services", "kavita", "ipAdresses"], "readOnly": false, "type": "list of string"}, "services.kavita.package": {"declarations": ["nixos/modules/services/web-apps/kavita.nix"], "default": {"_type": "literalExpression", "text": "pkgs.kavita"}, "description": {"_type": "mdDoc", "text": "The kavita package to use."}, "loc": ["services", "kavita", "package"], "readOnly": false, "type": "package"}, "services.kavita.port": {"declarations": ["nixos/modules/services/web-apps/kavita.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Port to bind to."}, "loc": ["services", "kavita", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.kavita.tokenKeyFile": {"declarations": ["nixos/modules/services/web-apps/kavita.nix"], "description": {"_type": "mdDoc", "text": "A file containing the TokenKey, a secret with at 128+ bits.\nIt can be generated with `head -c 32 /dev/urandom | base64`.\n"}, "loc": ["services", "kavita", "tokenKeyFile"], "readOnly": false, "type": "path"}, "services.kavita.user": {"declarations": ["nixos/modules/services/web-apps/kavita.nix"], "default": {"_type": "literalExpression", "text": "\"kavita\""}, "description": {"_type": "mdDoc", "text": "User account under which Kavita runs."}, "loc": ["services", "kavita", "user"], "readOnly": false, "type": "string"}, "services.kbfs.enable": {"declarations": ["nixos/modules/services/network-filesystems/kbfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to mount the Keybase filesystem."}, "loc": ["services", "kbfs", "enable"], "readOnly": false, "type": "boolean"}, "services.kbfs.enableRedirector": {"declarations": ["nixos/modules/services/network-filesystems/kbfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Keybase root redirector service, allowing\nany user to access KBFS files via `/keybase`,\nwhich will show different contents depending on the requester.\n"}, "loc": ["services", "kbfs", "enableRedirector"], "readOnly": false, "type": "boolean"}, "services.kbfs.extraFlags": {"declarations": ["nixos/modules/services/network-filesystems/kbfs.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional flags to pass to the Keybase filesystem on launch.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-label kbfs\"\n  \"-mount-type normal\"\n]"}, "loc": ["services", "kbfs", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.kbfs.mountPoint": {"declarations": ["nixos/modules/services/network-filesystems/kbfs.nix"], "default": {"_type": "literalExpression", "text": "\"%h/keybase\""}, "description": {"_type": "mdDoc", "text": "Mountpoint for the Keybase filesystem."}, "example": {"_type": "literalExpression", "text": "\"/keybase\""}, "loc": ["services", "kbfs", "mountPoint"], "readOnly": false, "type": "string"}, "services.keepalived.enable": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Keepalived.\n"}, "loc": ["services", "keepalived", "enable"], "readOnly": false, "type": "boolean"}, "services.keepalived.enableScriptSecurity": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Don't run scripts configured to be run as root if any part of the path is writable by a non-root user.\n"}, "loc": ["services", "keepalived", "enableScriptSecurity"], "readOnly": false, "type": "boolean"}, "services.keepalived.extraConfig": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to the configuration file.\n"}, "loc": ["services", "keepalived", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.keepalived.extraGlobalDefs": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to the 'global_defs' block of the\nconfiguration file\n"}, "loc": ["services", "keepalived", "extraGlobalDefs"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.keepalived.secretFile": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment variables from this file will be interpolated into the\nfinal config file using envsubst with this syntax: `$ENVIRONMENT`\nor `${VARIABLE}`.\nThe file should contain lines formatted as `SECRET_VAR=SECRET_VALUE`.\nThis is useful to avoid putting secrets into the nix store.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/keepalived.env\""}, "loc": ["services", "keepalived", "secretFile"], "readOnly": false, "type": "null or path"}, "services.keepalived.snmp.enable": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the builtin AgentX subagent.\n"}, "loc": ["services", "keepalived", "snmp", "enable"], "readOnly": false, "type": "boolean"}, "services.keepalived.snmp.enableChecker": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SNMP handling of checker element of KEEPALIVED MIB.\n"}, "loc": ["services", "keepalived", "snmp", "enableChecker"], "readOnly": false, "type": "boolean"}, "services.keepalived.snmp.enableKeepalived": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SNMP handling of vrrp element of KEEPALIVED MIB.\n"}, "loc": ["services", "keepalived", "snmp", "enableKeepalived"], "readOnly": false, "type": "boolean"}, "services.keepalived.snmp.enableRfc": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SNMP handling of RFC2787 and RFC6527 VRRP MIBs.\n"}, "loc": ["services", "keepalived", "snmp", "enableRfc"], "readOnly": false, "type": "boolean"}, "services.keepalived.snmp.enableRfcV2": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SNMP handling of RFC2787 VRRP MIB.\n"}, "loc": ["services", "keepalived", "snmp", "enableRfcV2"], "readOnly": false, "type": "boolean"}, "services.keepalived.snmp.enableRfcV3": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SNMP handling of RFC6527 VRRP MIB.\n"}, "loc": ["services", "keepalived", "snmp", "enableRfcV3"], "readOnly": false, "type": "boolean"}, "services.keepalived.snmp.enableTraps": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SNMP traps.\n"}, "loc": ["services", "keepalived", "snmp", "enableTraps"], "readOnly": false, "type": "boolean"}, "services.keepalived.snmp.socket": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Socket to use for connecting to SNMP master agent. If this value is\nset to null, keepalived's default will be used, which is\nunix:/var/agentx/master, unless using a network namespace, when the\ndefault is udp:localhost:705.\n"}, "loc": ["services", "keepalived", "snmp", "socket"], "readOnly": false, "type": "null or string"}, "services.keepalived.vrrpInstances": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative vhost config"}, "loc": ["services", "keepalived", "vrrpInstances"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.keepalived.vrrpInstances.<name>.extraConfig": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to the vrrp_instance section.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.keepalived.vrrpInstances.<name>.interface": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "description": {"_type": "mdDoc", "text": "Interface for inside_network, bound by vrrp.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "interface"], "readOnly": false, "type": "string"}, "services.keepalived.vrrpInstances.<name>.noPreempt": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "VRRP will normally preempt a lower priority machine when a higher\npriority machine comes online. \"nopreempt\" allows the lower priority\nmachine to maintain the master role, even when a higher priority machine\ncomes back online. NOTE: For this to work, the initial state of this\nentry must be BACKUP.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "noPreempt"], "readOnly": false, "type": "boolean"}, "services.keepalived.vrrpInstances.<name>.priority": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "100"}, "description": {"_type": "mdDoc", "text": "For electing MASTER, highest priority wins. To be MASTER, make 50 more\nthan other machines.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.keepalived.vrrpInstances.<name>.state": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "\"BACKUP\""}, "description": {"_type": "mdDoc", "text": "Initial state. As soon as the other machine(s) come up, an election will\nbe held and the machine with the highest \"priority\" will become MASTER.\nSo the entry here doesn't matter a whole lot.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "state"], "readOnly": false, "type": "one of \"MASTER\", \"BACKUP\""}, "services.keepalived.vrrpInstances.<name>.trackInterfaces": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of network interfaces to monitor for health tracking."}, "example": {"_type": "literalExpression", "text": "[\n  \"eth0\"\n  \"eth1\"\n]"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "trackInterfaces"], "readOnly": false, "type": "list of string"}, "services.keepalived.vrrpInstances.<name>.trackScripts": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of script names to invoke for health tracking."}, "example": {"_type": "literalExpression", "text": "[\n  \"chk_cmd1\"\n  \"chk_cmd2\"\n]"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "trackScripts"], "readOnly": false, "type": "list of string"}, "services.keepalived.vrrpInstances.<name>.unicastPeers": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Do not send VRRP adverts over VRRP multicast group. Instead it sends\nadverts to the following list of ip addresses using unicast design\nfashion. It can be cool to use VRRP FSM and features in a networking\nenvironment where multicast is not supported! IP Addresses specified can\nIPv4 as well as IPv6.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "unicastPeers"], "readOnly": false, "type": "list of string"}, "services.keepalived.vrrpInstances.<name>.unicastSrcIp": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Default IP for binding vrrpd is the primary IP on interface. If you\nwant to hide location of vrrpd, use this IP as src_addr for unicast\nvrrp packets.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "unicastSrcIp"], "readOnly": false, "type": "null or string"}, "services.keepalived.vrrpInstances.<name>.useVmac": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use VRRP Virtual MAC.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "useVmac"], "readOnly": false, "type": "boolean"}, "services.keepalived.vrrpInstances.<name>.virtualIps": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Declarative vhost config"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "virtualIps"], "readOnly": false, "type": "list of (submodule)"}, "services.keepalived.vrrpInstances.<name>.virtualIps.*.addr": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "description": {"_type": "mdDoc", "text": "IP address, optionally with a netmask: IPADDR[/MASK]\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "virtualIps", "*", "addr"], "readOnly": false, "type": "string"}, "services.keepalived.vrrpInstances.<name>.virtualIps.*.brd": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The broadcast address on the interface.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "virtualIps", "*", "brd"], "readOnly": false, "type": "null or string"}, "services.keepalived.vrrpInstances.<name>.virtualIps.*.dev": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the device to add the address to.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "virtualIps", "*", "dev"], "readOnly": false, "type": "null or string"}, "services.keepalived.vrrpInstances.<name>.virtualIps.*.label": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Each address may be tagged with a label string. In order to preserve\ncompatibility with Linux-2.0 net aliases, this string must coincide with\nthe name of the device or must be prefixed with the device name followed\nby colon.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "virtualIps", "*", "label"], "readOnly": false, "type": "null or string"}, "services.keepalived.vrrpInstances.<name>.virtualIps.*.scope": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The scope of the area where this address is valid.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "virtualIps", "*", "scope"], "readOnly": false, "type": "null or string"}, "services.keepalived.vrrpInstances.<name>.virtualRouterId": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "description": {"_type": "mdDoc", "text": "Arbitrary unique number 0..255. Used to differentiate multiple instances\nof vrrpd running on the same NIC (and hence same socket).\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "virtualRouterId"], "readOnly": false, "type": "signed integer"}, "services.keepalived.vrrpInstances.<name>.vmacInterface": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the vmac interface to use. keepalived will come up with a name\nif you don't specify one.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "vmacInterface"], "readOnly": false, "type": "null or string"}, "services.keepalived.vrrpInstances.<name>.vmacXmitBase": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Send/Recv VRRP messages from base interface instead of VMAC interface.\n"}, "loc": ["services", "keepalived", "vrrpInstances", "<name>", "vmacXmitBase"], "readOnly": false, "type": "boolean"}, "services.keepalived.vrrpScripts": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative vrrp script config"}, "loc": ["services", "keepalived", "vrrpScripts"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.keepalived.vrrpScripts.<name>.extraConfig": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to the vrrp_script section."}, "loc": ["services", "keepalived", "vrrpScripts", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.keepalived.vrrpScripts.<name>.fall": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Required number of failures for KO transition."}, "loc": ["services", "keepalived", "vrrpScripts", "<name>", "fall"], "readOnly": false, "type": "signed integer"}, "services.keepalived.vrrpScripts.<name>.group": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of group to run the script under. Defaults to user group."}, "loc": ["services", "keepalived", "vrrpScripts", "<name>", "group"], "readOnly": false, "type": "null or string"}, "services.keepalived.vrrpScripts.<name>.interval": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Seconds between script invocations."}, "loc": ["services", "keepalived", "vrrpScripts", "<name>", "interval"], "readOnly": false, "type": "signed integer"}, "services.keepalived.vrrpScripts.<name>.rise": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Required number of successes for OK transition."}, "loc": ["services", "keepalived", "vrrpScripts", "<name>", "rise"], "readOnly": false, "type": "signed integer"}, "services.keepalived.vrrpScripts.<name>.script": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "description": {"_type": "mdDoc", "text": "(Path of) Script command to execute followed by args, i.e. cmd [args]..."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.curl} -f http://localhost:80\""}, "loc": ["services", "keepalived", "vrrpScripts", "<name>", "script"], "readOnly": false, "type": "string"}, "services.keepalived.vrrpScripts.<name>.timeout": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Seconds after which script is considered to have failed."}, "loc": ["services", "keepalived", "vrrpScripts", "<name>", "timeout"], "readOnly": false, "type": "signed integer"}, "services.keepalived.vrrpScripts.<name>.user": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "\"keepalived_script\""}, "description": {"_type": "mdDoc", "text": "Name of user to run the script under."}, "loc": ["services", "keepalived", "vrrpScripts", "<name>", "user"], "readOnly": false, "type": "string"}, "services.keepalived.vrrpScripts.<name>.weight": {"declarations": ["nixos/modules/services/networking/keepalived/default.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Following a failure, adjust the priority by this weight."}, "loc": ["services", "keepalived", "vrrpScripts", "<name>", "weight"], "readOnly": false, "type": "signed integer"}, "services.kerberos_server.enable": {"declarations": ["nixos/modules/services/system/kerberos/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the kerberos authentication server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kerberos_server", "enable"], "readOnly": false, "type": "boolean"}, "services.kerberos_server.realms": {"declarations": ["nixos/modules/services/system/kerberos/default.nix"], "description": {"_type": "mdDoc", "text": "The realm(s) to serve keys for.\n"}, "loc": ["services", "kerberos_server", "realms"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.kerberos_server.realms.<name>.acl": {"declarations": ["nixos/modules/services/system/kerberos/default.nix"], "default": {"_type": "literalExpression", "text": "[\n  {\n    access = \"all\";\n    principal = \"*/admin\";\n  }\n  {\n    access = \"all\";\n    principal = \"admin\";\n  }\n]"}, "description": {"_type": "mdDoc", "text": "The privileges granted to a user.\n"}, "loc": ["services", "kerberos_server", "realms", "<name>", "acl"], "readOnly": false, "type": "list of (submodule)"}, "services.kerberos_server.realms.<name>.acl.*.access": {"declarations": ["nixos/modules/services/system/kerberos/default.nix"], "default": {"_type": "literalExpression", "text": "\"all\""}, "description": {"_type": "mdDoc", "text": "The changes the principal is allowed to make."}, "loc": ["services", "kerberos_server", "realms", "<name>", "acl", "*", "access"], "readOnly": false, "type": "(list of (one of \"add\", \"cpw\", \"delete\", \"get\", \"list\", \"modify\")) or value \"all\" (singular enum)"}, "services.kerberos_server.realms.<name>.acl.*.principal": {"declarations": ["nixos/modules/services/system/kerberos/default.nix"], "description": {"_type": "mdDoc", "text": "Which principal the rule applies to"}, "loc": ["services", "kerberos_server", "realms", "<name>", "acl", "*", "principal"], "readOnly": false, "type": "string"}, "services.kerberos_server.realms.<name>.acl.*.target": {"declarations": ["nixos/modules/services/system/kerberos/default.nix"], "default": {"_type": "literalExpression", "text": "\"*\""}, "description": {"_type": "mdDoc", "text": "The principals that 'access' applies to."}, "loc": ["services", "kerberos_server", "realms", "<name>", "acl", "*", "target"], "readOnly": false, "type": "string"}, "services.keter.bundle.appName": {"declarations": ["nixos/modules/services/web-servers/keter"], "default": {"_type": "literalExpression", "text": "\"myapp\""}, "description": {"_type": "mdDoc", "text": "The name keter assigns to this bundle"}, "loc": ["services", "keter", "bundle", "appName"], "readOnly": false, "type": "string"}, "services.keter.bundle.domain": {"declarations": ["nixos/modules/services/web-servers/keter"], "default": {"_type": "literalExpression", "text": "\"example.com\""}, "description": {"_type": "mdDoc", "text": "The domain keter will bind to"}, "loc": ["services", "keter", "bundle", "domain"], "readOnly": false, "type": "string"}, "services.keter.bundle.executable": {"declarations": ["nixos/modules/services/web-servers/keter"], "description": {"_type": "mdDoc", "text": "The executable to be run"}, "loc": ["services", "keter", "bundle", "executable"], "readOnly": false, "type": "path"}, "services.keter.bundle.publicScript": {"declarations": ["nixos/modules/services/web-servers/keter"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Allows loading of public environment variables,\nthese are emitted to the log so it shouldn't contain secrets.\n"}, "example": {"_type": "literalExpression", "text": "\"ADMIN_EMAIL=hi@example.com\""}, "loc": ["services", "keter", "bundle", "publicScript"], "readOnly": false, "type": "string"}, "services.keter.bundle.secretScript": {"declarations": ["nixos/modules/services/web-servers/keter"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Allows loading of private environment variables"}, "example": {"_type": "literalExpression", "text": "\"MY_AWS_KEY=$(cat /run/keys/AWS_ACCESS_KEY_ID)\""}, "loc": ["services", "keter", "bundle", "secretScript"], "readOnly": false, "type": "string"}, "services.keter.enable": {"declarations": ["nixos/modules/services/web-servers/keter"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable keter, a web app deployment manager.\nNote that this module only support loading of webapps:\nKeep an old app running and swap the ports when the new one is booted.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "keter", "enable"], "readOnly": false, "type": "boolean"}, "services.keter.globalKeterConfig": {"declarations": ["nixos/modules/services/web-servers/keter"], "default": {"_type": "literalExpression", "text": "{\n  ip-from-header = true;\n  listeners = [{\n    host = \"*4\";\n    port = 6981;\n  }];\n}\n"}, "description": {"_type": "mdDoc", "text": "Global config for keter"}, "loc": ["services", "keter", "globalKeterConfig"], "readOnly": false, "type": "attribute set"}, "services.keter.keterPackage": {"declarations": ["nixos/modules/services/web-servers/keter"], "default": {"_type": "literalExpression", "text": "pkgs.haskellPackages.keter"}, "description": {"_type": "mdDoc", "text": "The keter package to be used"}, "loc": ["services", "keter", "keterPackage"], "readOnly": false, "type": "package"}, "services.keter.keterRoot": {"declarations": ["nixos/modules/services/web-servers/keter"], "default": {"_type": "literalExpression", "text": "\"/var/lib/keter\""}, "description": {"_type": "mdDoc", "text": "Mutable state folder for keter"}, "loc": ["services", "keter", "keterRoot"], "readOnly": false, "type": "string"}, "services.keybase.enable": {"declarations": ["nixos/modules/services/networking/keybase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to start the Keybase service."}, "loc": ["services", "keybase", "enable"], "readOnly": false, "type": "boolean"}, "services.keycloak.database.caCert": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The SSL / TLS CA certificate that verifies the identity of the\ndatabase server.\n\nRequired when PostgreSQL is used and SSL is turned on.\n\nFor MySQL, if left at `null`, the default\nJava keystore is used, which should suffice if the server\ncertificate is issued by an official CA.\n"}, "loc": ["services", "keycloak", "database", "caCert"], "readOnly": false, "type": "null or path"}, "services.keycloak.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether a database should be automatically created on the\nlocal host. Set this to false if you plan on provisioning a\nlocal database yourself. This has no effect if\nservices.keycloak.database.host is customized.\n"}, "loc": ["services", "keycloak", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.keycloak.database.host": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Hostname of the database to connect to.\n"}, "loc": ["services", "keycloak", "database", "host"], "readOnly": false, "type": "string"}, "services.keycloak.database.name": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "\"keycloak\""}, "description": {"_type": "mdDoc", "text": "Database name to use when connecting to an external or\nmanually provisioned database; has no effect when a local\ndatabase is automatically provisioned.\n\nTo use this with a local database, set [](#opt-services.keycloak.database.createLocally) to\n`false` and create the database and user\nmanually.\n"}, "loc": ["services", "keycloak", "database", "name"], "readOnly": false, "type": "string"}, "services.keycloak.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "description": {"_type": "mdDoc", "text": "The path to a file containing the database password.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/db_password\""}, "loc": ["services", "keycloak", "database", "passwordFile"], "readOnly": false, "type": "path"}, "services.keycloak.database.port": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalMD", "text": "default port of selected database"}, "description": {"_type": "mdDoc", "text": "Port of the database to connect to.\n"}, "loc": ["services", "keycloak", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.keycloak.database.type": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "\"postgresql\""}, "description": {"_type": "mdDoc", "text": "The type of database Keycloak should connect to.\n"}, "example": {"_type": "literalExpression", "text": "\"mariadb\""}, "loc": ["services", "keycloak", "database", "type"], "readOnly": false, "type": "one of \"mysql\", \"mariadb\", \"postgresql\""}, "services.keycloak.database.useSSL": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "config.services.keycloak.database.host != \"localhost\""}, "description": {"_type": "mdDoc", "text": "Whether the database connection should be secured by SSL /\nTLS.\n"}, "loc": ["services", "keycloak", "database", "useSSL"], "readOnly": false, "type": "boolean"}, "services.keycloak.database.username": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "\"keycloak\""}, "description": {"_type": "mdDoc", "text": "Username to use when connecting to an external or manually\nprovisioned database; has no effect when a local database is\nautomatically provisioned.\n\nTo use this with a local database, set [](#opt-services.keycloak.database.createLocally) to\n`false` and create the database and user\nmanually.\n"}, "loc": ["services", "keycloak", "database", "username"], "readOnly": false, "type": "string"}, "services.keycloak.enable": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Keycloak identity and access management\nserver.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "keycloak", "enable"], "readOnly": false, "type": "boolean"}, "services.keycloak.initialAdminPassword": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "\"changeme\""}, "description": {"_type": "mdDoc", "text": "Initial password set for the `admin`\nuser. The password is not stored safely and should be changed\nimmediately in the admin panel.\n"}, "loc": ["services", "keycloak", "initialAdminPassword"], "readOnly": false, "type": "string"}, "services.keycloak.package": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "pkgs.keycloak"}, "description": {"_type": "mdDoc", "text": "Keycloak package to use.\n"}, "loc": ["services", "keycloak", "package"], "readOnly": false, "type": "package"}, "services.keycloak.plugins": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Keycloak plugin jar, ear files or derivations containing\nthem. Packaged plugins are available through\n`pkgs.keycloak.plugins`.\n"}, "loc": ["services", "keycloak", "plugins"], "readOnly": false, "type": "list of path"}, "services.keycloak.settings": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "description": {"_type": "mdDoc", "text": "Configuration options corresponding to parameters set in\n{file}`conf/keycloak.conf`.\n\nMost available options are documented at <https://www.keycloak.org/server/all-config>.\n\nOptions containing secret data should be set to an attribute\nset containing the attribute `_secret` - a\nstring pointing to a file containing the value the option\nshould be set to. See the example to get a better picture of\nthis: in the resulting\n{file}`conf/keycloak.conf` file, the\n`https-key-store-password` key will be set\nto the contents of the\n{file}`/run/keys/store_password` file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  hostname = \"keycloak.example.com\";\n  proxy = \"reencrypt\";\n  https-key-store-file = \"/path/to/file\";\n  https-key-store-password = { _secret = \"/run/keys/store_password\"; };\n}\n"}, "loc": ["services", "keycloak", "settings"], "readOnly": false, "type": "attribute set of (null or string or signed integer or boolean or attribute set of path)"}, "services.keycloak.settings.hostname": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "description": {"_type": "mdDoc", "text": "The hostname part of the public URL used as base for\nall frontend requests.\n\nSee <https://www.keycloak.org/server/hostname>\nfor more information about hostname configuration.\n"}, "example": {"_type": "literalExpression", "text": "\"keycloak.example.com\""}, "loc": ["services", "keycloak", "settings", "hostname"], "readOnly": false, "type": "string"}, "services.keycloak.settings.hostname-strict-backchannel": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether Keycloak should force all requests to go\nthrough the frontend URL. By default, Keycloak allows\nbackend requests to instead use its local hostname or\nIP address and may also advertise it to clients\nthrough its OpenID Connect Discovery endpoint.\n\nSee <https://www.keycloak.org/server/hostname>\nfor more information about hostname configuration.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "keycloak", "settings", "hostname-strict-backchannel"], "readOnly": false, "type": "boolean"}, "services.keycloak.settings.http-host": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "On which address Keycloak should accept new connections.\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "keycloak", "settings", "http-host"], "readOnly": false, "type": "string"}, "services.keycloak.settings.http-port": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "On which port Keycloak should listen for new HTTP connections.\n"}, "example": {"_type": "literalExpression", "text": "8080"}, "loc": ["services", "keycloak", "settings", "http-port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.keycloak.settings.http-relative-path": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "\"/\""}, "description": {"_type": "mdDoc", "text": "The path relative to `/` for serving\nresources.\n\n::: {.note}\nIn versions of Keycloak using Wildfly (&lt;17),\nthis defaulted to `/auth`. If\nupgrading from the Wildfly version of Keycloak,\ni.e. a NixOS version before 22.05, you'll likely\nwant to set this to `/auth` to\nkeep compatibility with your clients.\n\nSee <https://www.keycloak.org/migration/migrating-to-quarkus>\nfor more information on migrating from Wildfly to Quarkus.\n:::\n"}, "example": {"_type": "literalExpression", "text": "\"/auth\""}, "loc": ["services", "keycloak", "settings", "http-relative-path"], "readOnly": false, "type": "string"}, "services.keycloak.settings.https-port": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "443"}, "description": {"_type": "mdDoc", "text": "On which port Keycloak should listen for new HTTPS connections.\n"}, "example": {"_type": "literalExpression", "text": "8443"}, "loc": ["services", "keycloak", "settings", "https-port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.keycloak.settings.proxy": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "\"none\""}, "description": {"_type": "mdDoc", "text": "The proxy address forwarding mode if the server is\nbehind a reverse proxy.\n\n- `edge`:\n  Enables communication through HTTP between the\n  proxy and Keycloak.\n- `reencrypt`:\n  Requires communication through HTTPS between the\n  proxy and Keycloak.\n- `passthrough`:\n  Enables communication through HTTP or HTTPS between\n  the proxy and Keycloak.\n\nSee <https://www.keycloak.org/server/reverseproxy> for more information.\n"}, "example": {"_type": "literalExpression", "text": "\"edge\""}, "loc": ["services", "keycloak", "settings", "proxy"], "readOnly": false, "type": "one of \"edge\", \"reencrypt\", \"passthrough\", \"none\""}, "services.keycloak.sslCertificate": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to a PEM formatted certificate to use for TLS/SSL\nconnections.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/ssl_cert\""}, "loc": ["services", "keycloak", "sslCertificate"], "readOnly": false, "type": "null or path"}, "services.keycloak.sslCertificateKey": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to a PEM formatted private key to use for TLS/SSL\nconnections.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/ssl_key\""}, "loc": ["services", "keycloak", "sslCertificateKey"], "readOnly": false, "type": "null or path"}, "services.keycloak.themes": {"declarations": ["nixos/modules/services/web-apps/keycloak.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional theme packages for Keycloak. Each theme is linked into\nsubdirectory with a corresponding attribute name.\n\nTheme packages consist of several subdirectories which provide\ndifferent theme types: for example, `account`,\n`login` etc. After adding a theme to this option you\ncan select it by its name in Keycloak administration console.\n"}, "loc": ["services", "keycloak", "themes"], "readOnly": false, "type": "attribute set of package"}, "services.keyd.enable": {"declarations": ["nixos/modules/services/hardware/keyd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable keyd, a key remapping daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "keyd", "enable"], "readOnly": false, "type": "boolean"}, "services.keyd.ids": {"declarations": ["nixos/modules/services/hardware/keyd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*\"\n]"}, "description": {"_type": "mdDoc", "text": "Device identifiers, as shown by {manpage}`keyd(1)`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"*\"\n  \"-0123:0456\"\n]"}, "loc": ["services", "keyd", "ids"], "readOnly": false, "type": "list of Concatenated string"}, "services.keyd.settings": {"declarations": ["nixos/modules/services/hardware/keyd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration, except `ids` section, that is written to {file}`/etc/keyd/default.conf`.\nSee <https://github.com/rvaiya/keyd> how to configure.\n"}, "example": {"_type": "literalExpression", "text": "{\n  main = {\n    capslock = \"overload(control, esc)\";\n    rightalt = \"layer(rightalt)\";\n  };\n  rightalt = {\n    h = \"left\";\n    j = \"down\";\n    k = \"up\";\n    l = \"right\";\n  };\n}"}, "loc": ["services", "keyd", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.kibana.cert": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kibana ssl certificate."}, "loc": ["services", "kibana", "cert"], "readOnly": false, "type": "null or path"}, "services.kibana.dataDir": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/kibana\""}, "description": {"_type": "mdDoc", "text": "Kibana data directory"}, "loc": ["services", "kibana", "dataDir"], "readOnly": false, "type": "path"}, "services.kibana.defaultAppId": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "\"discover\""}, "description": {"_type": "mdDoc", "text": "Elasticsearch default application id."}, "loc": ["services", "kibana", "defaultAppId"], "readOnly": false, "type": "string"}, "services.kibana.elasticsearch.ca": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA file to auth against elasticsearch.\n\nIt's recommended to use the {option}`certificateAuthorities` option\nwhen using kibana-5.4 or newer.\n"}, "loc": ["services", "kibana", "elasticsearch", "ca"], "readOnly": false, "type": "null or path"}, "services.kibana.elasticsearch.cert": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file to auth against elasticsearch."}, "loc": ["services", "kibana", "elasticsearch", "cert"], "readOnly": false, "type": "null or path"}, "services.kibana.elasticsearch.certificateAuthorities": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "if config.services.kibana.elasticsearch.ca == null then [ ] else [ ca ]\n"}, "description": {"_type": "mdDoc", "text": "CA files to auth against elasticsearch.\n\nPlease use the {option}`ca` option when using kibana \\< 5.4\nbecause those old versions don't support setting multiple CA's.\n\nThis defaults to the singleton list [ca] when the {option}`ca` option is defined.\n"}, "loc": ["services", "kibana", "elasticsearch", "certificateAuthorities"], "readOnly": false, "type": "list of path"}, "services.kibana.elasticsearch.hosts": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URLs of the Elasticsearch instances to use for all your queries.\nAll nodes listed here must be on the same cluster.\n\nDefaults to `[ \"http://localhost:9200\" ]`.\n\nThis option is only valid when using kibana >= 6.6.\n"}, "loc": ["services", "kibana", "elasticsearch", "hosts"], "readOnly": false, "type": "null or (list of string)"}, "services.kibana.elasticsearch.key": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file to auth against elasticsearch."}, "loc": ["services", "kibana", "elasticsearch", "key"], "readOnly": false, "type": "null or path"}, "services.kibana.elasticsearch.password": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password for elasticsearch basic auth."}, "loc": ["services", "kibana", "elasticsearch", "password"], "readOnly": false, "type": "null or string"}, "services.kibana.elasticsearch.url": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Elasticsearch url.\n\nDefaults to `\"http://localhost:9200\"`.\n\nDon't set this when using Kibana >= 7.0.0 because it will result in a\nconfiguration error. Use {option}`services.kibana.elasticsearch.hosts`\ninstead.\n"}, "loc": ["services", "kibana", "elasticsearch", "url"], "readOnly": false, "type": "null or string"}, "services.kibana.elasticsearch.username": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Username for elasticsearch basic auth."}, "loc": ["services", "kibana", "elasticsearch", "username"], "readOnly": false, "type": "null or string"}, "services.kibana.enable": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kibana service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kibana", "enable"], "readOnly": false, "type": "boolean"}, "services.kibana.extraConf": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Kibana extra configuration"}, "loc": ["services", "kibana", "extraConf"], "readOnly": false, "type": "attribute set"}, "services.kibana.index": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "\".kibana\""}, "description": {"_type": "mdDoc", "text": "Elasticsearch index to use for saving kibana config."}, "loc": ["services", "kibana", "index"], "readOnly": false, "type": "string"}, "services.kibana.key": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kibana ssl key."}, "loc": ["services", "kibana", "key"], "readOnly": false, "type": "null or path"}, "services.kibana.listenAddress": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Kibana listening host"}, "loc": ["services", "kibana", "listenAddress"], "readOnly": false, "type": "string"}, "services.kibana.package": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "pkgs.kibana"}, "description": {"_type": "mdDoc", "text": "Kibana package to use"}, "loc": ["services", "kibana", "package"], "readOnly": false, "type": "package"}, "services.kibana.port": {"declarations": ["nixos/modules/services/search/kibana.nix"], "default": {"_type": "literalExpression", "text": "5601"}, "description": {"_type": "mdDoc", "text": "Kibana listening port"}, "loc": ["services", "kibana", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.klipper.apiSocket": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "\"/run/klipper/api\""}, "description": {"_type": "mdDoc", "text": "Path of the API socket to create."}, "loc": ["services", "klipper", "apiSocket"], "readOnly": false, "type": "null or path"}, "services.klipper.configFile": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to default Klipper config.\n"}, "loc": ["services", "klipper", "configFile"], "readOnly": false, "type": "null or path"}, "services.klipper.enable": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Klipper, the 3D printer firmware."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "klipper", "enable"], "readOnly": false, "type": "boolean"}, "services.klipper.firmwares": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Firmwares klipper should manage"}, "loc": ["services", "klipper", "firmwares"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.klipper.firmwares.<name>.configFile": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "description": {"_type": "mdDoc", "text": "Path to firmware config which is generated using `klipper-genconf`"}, "loc": ["services", "klipper", "firmwares", "<name>", "configFile"], "readOnly": false, "type": "path"}, "services.klipper.firmwares.<name>.enable": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable building of firmware and addition of klipper-flash tools for manual flashing.\nThis will add `klipper-flash-$mcu` scripts to your environment which can be called to flash the firmware.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "klipper", "firmwares", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.klipper.firmwares.<name>.serial": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "description": {"_type": "mdDoc", "text": "Path to serial port this printer is connected to. Leave `null` to derive it from `service.klipper.settings`."}, "loc": ["services", "klipper", "firmwares", "<name>", "serial"], "readOnly": false, "type": "null or path"}, "services.klipper.group": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Group account under which Klipper runs.\n\nIf null is specified (default), a temporary user will be created by systemd.\n"}, "loc": ["services", "klipper", "group"], "readOnly": false, "type": "null or string"}, "services.klipper.inputTTY": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "\"/run/klipper/tty\""}, "description": {"_type": "mdDoc", "text": "Path of the virtual printer symlink to create."}, "loc": ["services", "klipper", "inputTTY"], "readOnly": false, "type": "path"}, "services.klipper.logFile": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path of the file Klipper should log to.\nIf `null`, it logs to stdout, which is not recommended by upstream.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/klipper/klipper.log\""}, "loc": ["services", "klipper", "logFile"], "readOnly": false, "type": "null or path"}, "services.klipper.mutableConfig": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to copy the config to a mutable directory instead of using the one directly from the nix store.\nThis will only copy the config if the file at `services.klipper.mutableConfigPath` doesn't exist.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "klipper", "mutableConfig"], "readOnly": false, "type": "boolean"}, "services.klipper.mutableConfigFolder": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/klipper\""}, "description": {"_type": "mdDoc", "text": "Path to mutable Klipper config file."}, "loc": ["services", "klipper", "mutableConfigFolder"], "readOnly": false, "type": "path"}, "services.klipper.octoprintIntegration": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allows Octoprint to control Klipper."}, "loc": ["services", "klipper", "octoprintIntegration"], "readOnly": false, "type": "boolean"}, "services.klipper.package": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "pkgs.klipper"}, "description": {"_type": "mdDoc", "text": "The Klipper package."}, "loc": ["services", "klipper", "package"], "readOnly": false, "type": "package"}, "services.klipper.settings": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration for Klipper. See the [documentation](https://www.klipper3d.org/Overview.html#configuration-and-tuning-guides)\nfor supported values.\n"}, "loc": ["services", "klipper", "settings"], "readOnly": false, "type": "null or (attribute set of attribute set of (INI atom (null, bool, int, float or string) or a non-empty list of them))"}, "services.klipper.user": {"declarations": ["nixos/modules/services/misc/klipper.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "User account under which Klipper runs.\n\nIf null is specified (default), a temporary user will be created by systemd.\n"}, "loc": ["services", "klipper", "user"], "readOnly": false, "type": "null or string"}, "services.kmscon.autologinUser": {"declarations": ["nixos/modules/services/ttys/kmscon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Username of the account that will be automatically logged in at the console.\nIf unspecified, a login prompt is shown as usual.\n"}, "loc": ["services", "kmscon", "autologinUser"], "readOnly": false, "type": "null or string"}, "services.kmscon.enable": {"declarations": ["nixos/modules/services/ttys/kmscon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use kmscon as the virtual console instead of gettys.\nkmscon is a kms/dri-based userspace virtual terminal implementation.\nIt supports a richer feature set than the standard linux console VT,\nincluding full unicode support, and when the video card supports drm\nshould be much faster.\n"}, "loc": ["services", "kmscon", "enable"], "readOnly": false, "type": "boolean"}, "services.kmscon.extraConfig": {"declarations": ["nixos/modules/services/ttys/kmscon.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra contents of the kmscon.conf file."}, "example": {"_type": "literalExpression", "text": "\"font-size=14\""}, "loc": ["services", "kmscon", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.kmscon.extraOptions": {"declarations": ["nixos/modules/services/ttys/kmscon.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra flags to pass to kmscon."}, "example": {"_type": "literalExpression", "text": "\"--term xterm-256color\""}, "loc": ["services", "kmscon", "extraOptions"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.kmscon.fonts": {"declarations": ["nixos/modules/services/ttys/kmscon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Fonts used by kmscon, in order of priority."}, "example": {"_type": "literalExpression", "text": "[ { name = \"Source Code Pro\"; package = pkgs.source-code-pro; } ]"}, "loc": ["services", "kmscon", "fonts"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.kmscon.fonts.*.name": {"declarations": ["nixos/modules/services/ttys/kmscon.nix"], "description": {"_type": "mdDoc", "text": "Font name, as used by fontconfig."}, "loc": ["services", "kmscon", "fonts", "*", "name"], "readOnly": false, "type": "string"}, "services.kmscon.fonts.*.package": {"declarations": ["nixos/modules/services/ttys/kmscon.nix"], "description": {"_type": "mdDoc", "text": "Package providing the font."}, "loc": ["services", "kmscon", "fonts", "*", "package"], "readOnly": false, "type": "package"}, "services.kmscon.hwRender": {"declarations": ["nixos/modules/services/ttys/kmscon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use 3D hardware acceleration to render the console."}, "loc": ["services", "kmscon", "hwRender"], "readOnly": false, "type": "boolean"}, "services.knot.enable": {"declarations": ["nixos/modules/services/networking/knot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Knot authoritative-only DNS server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "knot", "enable"], "readOnly": false, "type": "boolean"}, "services.knot.extraArgs": {"declarations": ["nixos/modules/services/networking/knot.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of additional command line parameters for knotd\n"}, "loc": ["services", "knot", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.knot.extraConfig": {"declarations": ["nixos/modules/services/networking/knot.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to knot.conf\n"}, "loc": ["services", "knot", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.knot.keyFiles": {"declarations": ["nixos/modules/services/networking/knot.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of files containing additional configuration\nto be included using the include directive. This option\nallows to include configuration like TSIG keys without\nexposing them to the nix store readable to any process.\nNote that using this option will also disable configuration\nchecks at build time.\n"}, "loc": ["services", "knot", "keyFiles"], "readOnly": false, "type": "list of path"}, "services.knot.package": {"declarations": ["nixos/modules/services/networking/knot.nix"], "default": {"_type": "literalExpression", "text": "pkgs.knot-dns"}, "description": {"_type": "mdDoc", "text": "Which Knot DNS package to use\n"}, "loc": ["services", "knot", "package"], "readOnly": false, "type": "package"}, "services.komga.enable": {"declarations": ["nixos/modules/services/web-apps/komga.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Komga, a free and open source comics/mangas media server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "komga", "enable"], "readOnly": false, "type": "boolean"}, "services.komga.group": {"declarations": ["nixos/modules/services/web-apps/komga.nix"], "default": {"_type": "literalExpression", "text": "\"komga\""}, "description": {"_type": "mdDoc", "text": "Group under which Komga runs.\n"}, "loc": ["services", "komga", "group"], "readOnly": false, "type": "string"}, "services.komga.openFirewall": {"declarations": ["nixos/modules/services/web-apps/komga.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the firewall for the port in {option}`services.komga.port`.\n"}, "loc": ["services", "komga", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.komga.port": {"declarations": ["nixos/modules/services/web-apps/komga.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "The port that Komga will listen on.\n"}, "loc": ["services", "komga", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.komga.stateDir": {"declarations": ["nixos/modules/services/web-apps/komga.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/komga\""}, "description": {"_type": "mdDoc", "text": "State and configuration directory Komga will use.\n"}, "loc": ["services", "komga", "stateDir"], "readOnly": false, "type": "string"}, "services.komga.user": {"declarations": ["nixos/modules/services/web-apps/komga.nix"], "default": {"_type": "literalExpression", "text": "\"komga\""}, "description": {"_type": "mdDoc", "text": "User account under which Komga runs.\n"}, "loc": ["services", "komga", "user"], "readOnly": false, "type": "string"}, "services.kresd.enable": {"declarations": ["nixos/modules/services/networking/kresd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable knot-resolver domain name server.\nDNSSEC validation is turned on by default.\nYou can run `sudo nc -U /run/knot-resolver/control/1`\nand give commands interactively to kresd@1.service.\n"}, "loc": ["services", "kresd", "enable"], "readOnly": false, "type": "boolean"}, "services.kresd.extraConfig": {"declarations": ["nixos/modules/services/networking/kresd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to the generated configuration file.\n"}, "loc": ["services", "kresd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.kresd.instances": {"declarations": ["nixos/modules/services/networking/kresd.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "The number of instances to start.  They will be called kresd@{1,2,...}.service.\nKnot Resolver uses no threads, so this is the way to scale.\nYou can dynamically start/stop them at will, so this is just system default.\n"}, "loc": ["services", "kresd", "instances"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.kresd.listenDoH": {"declarations": ["nixos/modules/services/networking/kresd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Addresses and ports on which kresd should provide DNS over HTTPS/2 (see RFC 8484).\nFor detailed syntax see ListenStream in {manpage}`systemd.socket(5)`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"198.51.100.1:443\"\n  \"[2001:db8::1]:443\"\n  \"443\"\n]"}, "loc": ["services", "kresd", "listenDoH"], "readOnly": false, "type": "list of string"}, "services.kresd.listenPlain": {"declarations": ["nixos/modules/services/networking/kresd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"[::1]:53\"\n  \"127.0.0.1:53\"\n]"}, "description": {"_type": "mdDoc", "text": "What addresses and ports the server should listen on.\nFor detailed syntax see ListenStream in {manpage}`systemd.socket(5)`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"53\"\n]"}, "loc": ["services", "kresd", "listenPlain"], "readOnly": false, "type": "list of string"}, "services.kresd.listenTLS": {"declarations": ["nixos/modules/services/networking/kresd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Addresses and ports on which kresd should provide DNS over TLS (see RFC 7858).\nFor detailed syntax see ListenStream in {manpage}`systemd.socket(5)`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"198.51.100.1:853\"\n  \"[2001:db8::1]:853\"\n  \"853\"\n]"}, "loc": ["services", "kresd", "listenTLS"], "readOnly": false, "type": "list of string"}, "services.kresd.package": {"declarations": ["nixos/modules/services/networking/kresd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.knot-resolver"}, "description": {"_type": "mdDoc", "text": "knot-resolver package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.knot-resolver.override { extraFeatures = true; }"}, "loc": ["services", "kresd", "package"], "readOnly": false, "type": "package"}, "services.kthxbye.alertmanager.timeout": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "\"1m0s\""}, "description": {"_type": "mdDoc", "text": "Alertmanager request timeout duration in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.\n"}, "example": {"_type": "literalExpression", "text": "\"30s\""}, "loc": ["services", "kthxbye", "alertmanager", "timeout"], "readOnly": false, "type": "string"}, "services.kthxbye.alertmanager.uri": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:9093\""}, "description": {"_type": "mdDoc", "text": "Alertmanager URI to use.\n"}, "example": {"_type": "literalExpression", "text": "\"https://alertmanager.example.com\""}, "loc": ["services", "kthxbye", "alertmanager", "uri"], "readOnly": false, "type": "string"}, "services.kthxbye.enable": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kthxbye alert acknowledgement management daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kthxbye", "enable"], "readOnly": false, "type": "boolean"}, "services.kthxbye.extendBy": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "\"15m0s\""}, "description": {"_type": "mdDoc", "text": "Extend silences by adding DURATION seconds.\n\nDURATION should be provided in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.\n"}, "example": {"_type": "literalExpression", "text": "\"6h0m0s\""}, "loc": ["services", "kthxbye", "extendBy"], "readOnly": false, "type": "string"}, "services.kthxbye.extendIfExpiringIn": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "\"5m0s\""}, "description": {"_type": "mdDoc", "text": "Extend silences that are about to expire in the next DURATION seconds.\n\nDURATION should be provided in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.\n"}, "example": {"_type": "literalExpression", "text": "\"1m0s\""}, "loc": ["services", "kthxbye", "extendIfExpiringIn"], "readOnly": false, "type": "string"}, "services.kthxbye.extendWithPrefix": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "\"ACK!\""}, "description": {"_type": "mdDoc", "text": "Extend silences with comment starting with PREFIX string.\n"}, "example": {"_type": "literalExpression", "text": "\"!perma-silence\""}, "loc": ["services", "kthxbye", "extendWithPrefix"], "readOnly": false, "type": "string"}, "services.kthxbye.extraOptions": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line options.\n\nDocumentation can be found [here](https://github.com/prymitive/kthxbye/blob/main/README.md).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-extend-with-prefix 'ACK!'\"\n];\n"}, "loc": ["services", "kthxbye", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.kthxbye.interval": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "\"45s\""}, "description": {"_type": "mdDoc", "text": "Silence check interval duration in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.\n"}, "example": {"_type": "literalExpression", "text": "\"30s\""}, "loc": ["services", "kthxbye", "interval"], "readOnly": false, "type": "string"}, "services.kthxbye.listenAddress": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "The address to listen on for HTTP requests.\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "kthxbye", "listenAddress"], "readOnly": false, "type": "string"}, "services.kthxbye.logJSON": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Format logged messages as JSON.\n"}, "loc": ["services", "kthxbye", "logJSON"], "readOnly": false, "type": "boolean"}, "services.kthxbye.maxDuration": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum duration of a silence, it won't be extended anymore after reaching it.\n\nDuration should be provided in the [time.Duration](https://pkg.go.dev/time#ParseDuration) format.\n"}, "example": {"_type": "literalExpression", "text": "\"30d\""}, "loc": ["services", "kthxbye", "maxDuration"], "readOnly": false, "type": "null or string"}, "services.kthxbye.openFirewall": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open ports in the firewall needed for the daemon to function.\n"}, "loc": ["services", "kthxbye", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.kthxbye.package": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "pkgs.kthxbye"}, "description": {"_type": "mdDoc", "text": "The kthxbye package that should be used.\n"}, "loc": ["services", "kthxbye", "package"], "readOnly": false, "type": "package"}, "services.kthxbye.port": {"declarations": ["nixos/modules/services/monitoring/kthxbye.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "The port to listen on for HTTP requests.\n"}, "loc": ["services", "kthxbye", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.kubo.autoMigrate": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether Kubo should try to run the fs-repo-migration at startup."}, "loc": ["services", "kubo", "autoMigrate"], "readOnly": false, "type": "boolean"}, "services.kubo.autoMount": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether Kubo should try to mount /ipfs and /ipns at startup."}, "loc": ["services", "kubo", "autoMount"], "readOnly": false, "type": "boolean"}, "services.kubo.dataDir": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "if versionAtLeast config.system.stateVersion \"17.09\"\nthen \"/var/lib/ipfs\"\nelse \"/var/lib/ipfs/.ipfs\"\n"}, "description": {"_type": "mdDoc", "text": "The data dir for Kubo"}, "loc": ["services", "kubo", "dataDir"], "readOnly": false, "type": "string"}, "services.kubo.defaultMode": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "\"online\""}, "description": {"_type": "mdDoc", "text": "systemd service that is enabled by default"}, "loc": ["services", "kubo", "defaultMode"], "readOnly": false, "type": "one of \"online\", \"offline\", \"norouting\""}, "services.kubo.emptyRepo": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, the repo will be initialized with help files"}, "loc": ["services", "kubo", "emptyRepo"], "readOnly": false, "type": "boolean"}, "services.kubo.enable": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Interplanetary File System (WARNING: may cause severe network degradation)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kubo", "enable"], "readOnly": false, "type": "boolean"}, "services.kubo.enableGC": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic garbage collection"}, "loc": ["services", "kubo", "enableGC"], "readOnly": false, "type": "boolean"}, "services.kubo.extraFlags": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags passed to the Kubo daemon"}, "loc": ["services", "kubo", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.kubo.group": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "\"ipfs\""}, "description": {"_type": "mdDoc", "text": "Group under which the Kubo daemon runs"}, "loc": ["services", "kubo", "group"], "readOnly": false, "type": "string"}, "services.kubo.ipfsMountDir": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "\"/ipfs\""}, "description": {"_type": "mdDoc", "text": "Where to mount the IPFS namespace to"}, "loc": ["services", "kubo", "ipfsMountDir"], "readOnly": false, "type": "string"}, "services.kubo.ipnsMountDir": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "\"/ipns\""}, "description": {"_type": "mdDoc", "text": "Where to mount the IPNS namespace to"}, "loc": ["services", "kubo", "ipnsMountDir"], "readOnly": false, "type": "string"}, "services.kubo.localDiscovery": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable local discovery for the Kubo daemon.\n          This will allow Kubo to scan ports on your local network. Some hosting services will ban you if you do this.\n"}, "loc": ["services", "kubo", "localDiscovery"], "readOnly": false, "type": "boolean"}, "services.kubo.package": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "pkgs.kubo"}, "description": {"_type": "mdDoc", "text": "Which Kubo package to use."}, "loc": ["services", "kubo", "package"], "readOnly": false, "type": "package"}, "services.kubo.serviceFdlimit": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The fdlimit for the Kubo systemd unit or `null` to have the daemon attempt to manage it"}, "example": {"_type": "literalExpression", "text": "65536"}, "loc": ["services", "kubo", "serviceFdlimit"], "readOnly": false, "type": "null or signed integer"}, "services.kubo.settings": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attrset of daemon configuration.\nSee [https://github.com/ipfs/kubo/blob/master/docs/config.md](https://github.com/ipfs/kubo/blob/master/docs/config.md) for reference.\nYou can't set `Identity` or `Pinning`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Bootstrap = [\n    \"/ip4/128.199.219.111/tcp/4001/ipfs/QmSoLSafTMBsPKadTEgaXctDQVcqN88CNLHXMkTNwMKPnu\"\n    \"/ip4/162.243.248.213/tcp/4001/ipfs/QmSoLueR4xBeUbY9WZ9xGUUxunbKWcrNFTDAadQJmocnWm\"\n  ];\n  Datastore = {\n    StorageMax = \"100GB\";\n  };\n  Discovery = {\n    MDNS = {\n      Enabled = false;\n    };\n  };\n  Swarm = {\n    AddrFilters = null;\n  };\n}"}, "loc": ["services", "kubo", "settings"], "readOnly": false, "type": "JSON value"}, "services.kubo.settings.Addresses.API": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Multiaddr or array of multiaddrs describing the address to serve the local HTTP API on.\nIn addition to the multiaddrs listed here, the daemon will also listen on a Unix domain socket.\nTo allow the ipfs CLI tools to communicate with the daemon over that socket,\nadd your user to the correct group, e.g. `users.users.alice.extraGroups = [ config.services.kubo.group ];`\n"}, "loc": ["services", "kubo", "settings", "Addresses", "API"], "readOnly": false, "type": "string or list of string"}, "services.kubo.settings.Addresses.Gateway": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "\"/ip4/127.0.0.1/tcp/8080\""}, "description": {"_type": "mdDoc", "text": "Where the IPFS Gateway can be reached"}, "loc": ["services", "kubo", "settings", "Addresses", "Gateway"], "readOnly": false, "type": "string or list of string"}, "services.kubo.settings.Addresses.Swarm": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"/ip4/0.0.0.0/tcp/4001\"\n  \"/ip6/::/tcp/4001\"\n  \"/ip4/0.0.0.0/udp/4001/quic\"\n  \"/ip4/0.0.0.0/udp/4001/quic-v1\"\n  \"/ip4/0.0.0.0/udp/4001/quic-v1/webtransport\"\n  \"/ip6/::/udp/4001/quic\"\n  \"/ip6/::/udp/4001/quic-v1\"\n  \"/ip6/::/udp/4001/quic-v1/webtransport\"\n]"}, "description": {"_type": "mdDoc", "text": "Where Kubo listens for incoming p2p connections"}, "loc": ["services", "kubo", "settings", "Addresses", "Swarm"], "readOnly": false, "type": "list of string"}, "services.kubo.startWhenNeeded": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use socket activation to start Kubo when needed."}, "loc": ["services", "kubo", "startWhenNeeded"], "readOnly": false, "type": "boolean"}, "services.kubo.user": {"declarations": ["nixos/modules/services/network-filesystems/kubo.nix"], "default": {"_type": "literalExpression", "text": "\"ipfs\""}, "description": {"_type": "mdDoc", "text": "User under which the Kubo daemon runs"}, "loc": ["services", "kubo", "user"], "readOnly": false, "type": "string"}, "services.lambdabot.enable": {"declarations": ["nixos/modules/services/networking/lambdabot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the Lambdabot IRC bot"}, "loc": ["services", "lambdabot", "enable"], "readOnly": false, "type": "boolean"}, "services.lambdabot.package": {"declarations": ["nixos/modules/services/networking/lambdabot.nix"], "default": {"_type": "literalExpression", "text": "pkgs.lambdabot"}, "description": {"_type": "mdDoc", "text": "Used lambdabot package"}, "loc": ["services", "lambdabot", "package"], "readOnly": false, "type": "package"}, "services.lambdabot.script": {"declarations": ["nixos/modules/services/networking/lambdabot.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Lambdabot script"}, "loc": ["services", "lambdabot", "script"], "readOnly": false, "type": "string"}, "services.languagetool.allowOrigin": {"declarations": ["nixos/modules/services/misc/languagetool.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the Access-Control-Allow-Origin header in the HTTP response,\nused for direct (non-proxy) JavaScript-based access from browsers.\n`null` to allow access from all sites.\n"}, "example": {"_type": "literalExpression", "text": "\"https://my-website.org\""}, "loc": ["services", "languagetool", "allowOrigin"], "readOnly": false, "type": "null or string"}, "services.languagetool.enable": {"declarations": ["nixos/modules/services/misc/languagetool.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the LanguageTool server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "languagetool", "enable"], "readOnly": false, "type": "boolean"}, "services.languagetool.port": {"declarations": ["nixos/modules/services/misc/languagetool.nix"], "default": {"_type": "literalExpression", "text": "8081"}, "description": {"_type": "mdDoc", "text": "Port on which LanguageTool listens.\n"}, "example": {"_type": "literalExpression", "text": "8081"}, "loc": ["services", "languagetool", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.languagetool.public": {"declarations": ["nixos/modules/services/misc/languagetool.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable access from anywhere (rather than just localhost)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "languagetool", "public"], "readOnly": false, "type": "boolean"}, "services.languagetool.settings": {"declarations": ["nixos/modules/services/misc/languagetool.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration file options for LanguageTool, see\n'languagetool-http-server --help'\nfor supported settings.\n"}, "loc": ["services", "languagetool", "settings"], "readOnly": false, "type": "attribute set of (string, package, bool, int or float)"}, "services.languagetool.settings.cacheSize": {"declarations": ["nixos/modules/services/misc/languagetool.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Number of sentences cached."}, "loc": ["services", "languagetool", "settings", "cacheSize"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.leaps.address": {"declarations": ["nixos/modules/services/misc/leaps.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Hostname or IP-address to listen to. By default it will listen on all interfaces."}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "leaps", "address"], "readOnly": false, "type": "string"}, "services.leaps.enable": {"declarations": ["nixos/modules/services/misc/leaps.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable leaps."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "leaps", "enable"], "readOnly": false, "type": "boolean"}, "services.leaps.path": {"declarations": ["nixos/modules/services/misc/leaps.nix"], "default": {"_type": "literalExpression", "text": "\"/\""}, "description": {"_type": "mdDoc", "text": "Subdirectory used for reverse proxy setups"}, "loc": ["services", "leaps", "path"], "readOnly": false, "type": "path"}, "services.leaps.port": {"declarations": ["nixos/modules/services/misc/leaps.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "A port where leaps listens for incoming http requests"}, "loc": ["services", "leaps", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.lemmy.caddy.enable": {"declarations": ["nixos/modules/services/web-apps/lemmy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable exposing lemmy with the caddy reverse proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lemmy", "caddy", "enable"], "readOnly": false, "type": "boolean"}, "services.lemmy.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/lemmy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable creation of database on the instance."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lemmy", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.lemmy.database.uri": {"declarations": ["nixos/modules/services/web-apps/lemmy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The connection URI to use. Takes priority over the configuration file if set."}, "loc": ["services", "lemmy", "database", "uri"], "readOnly": false, "type": "null or string"}, "services.lemmy.enable": {"declarations": ["nixos/modules/services/web-apps/lemmy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable lemmy a federated alternative to reddit in rust."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lemmy", "enable"], "readOnly": false, "type": "boolean"}, "services.lemmy.server.package": {"declarations": ["nixos/modules/services/web-apps/lemmy.nix"], "default": {"_type": "literalExpression", "text": "pkgs.lemmy-server"}, "description": {"_type": "mdDoc", "text": "The lemmy-server package to use."}, "loc": ["services", "lemmy", "server", "package"], "readOnly": false, "type": "package"}, "services.lemmy.settings": {"declarations": ["nixos/modules/services/web-apps/lemmy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Lemmy configuration"}, "loc": ["services", "lemmy", "settings"], "readOnly": false, "type": "JSON value"}, "services.lemmy.settings.captcha.difficulty": {"declarations": ["nixos/modules/services/web-apps/lemmy.nix"], "default": {"_type": "literalExpression", "text": "\"medium\""}, "description": {"_type": "mdDoc", "text": "The difficultly of the captcha to solve."}, "loc": ["services", "lemmy", "settings", "captcha", "difficulty"], "readOnly": false, "type": "one of \"easy\", \"medium\", \"hard\""}, "services.lemmy.settings.captcha.enabled": {"declarations": ["nixos/modules/services/web-apps/lemmy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable Captcha."}, "loc": ["services", "lemmy", "settings", "captcha", "enabled"], "readOnly": false, "type": "boolean"}, "services.lemmy.settings.hostname": {"declarations": ["nixos/modules/services/web-apps/lemmy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The domain name of your instance (eg 'lemmy.ml')."}, "loc": ["services", "lemmy", "settings", "hostname"], "readOnly": false, "type": "string"}, "services.lemmy.settings.port": {"declarations": ["nixos/modules/services/web-apps/lemmy.nix"], "default": {"_type": "literalExpression", "text": "8536"}, "description": {"_type": "mdDoc", "text": "Port where lemmy should listen for incoming requests."}, "loc": ["services", "lemmy", "settings", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.lemmy.ui.package": {"declarations": ["nixos/modules/services/web-apps/lemmy.nix"], "default": {"_type": "literalExpression", "text": "pkgs.lemmy-ui"}, "description": {"_type": "mdDoc", "text": "The lemmy-ui package to use."}, "loc": ["services", "lemmy", "ui", "package"], "readOnly": false, "type": "package"}, "services.lemmy.ui.port": {"declarations": ["nixos/modules/services/web-apps/lemmy.nix"], "default": {"_type": "literalExpression", "text": "1234"}, "description": {"_type": "mdDoc", "text": "Port where lemmy-ui should listen for incoming requests."}, "loc": ["services", "lemmy", "ui", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.libreddit.address": {"declarations": ["nixos/modules/services/misc/libreddit.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "The address to listen on"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "libreddit", "address"], "readOnly": false, "type": "string"}, "services.libreddit.enable": {"declarations": ["nixos/modules/services/misc/libreddit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Private front-end for Reddit."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "libreddit", "enable"], "readOnly": false, "type": "boolean"}, "services.libreddit.openFirewall": {"declarations": ["nixos/modules/services/misc/libreddit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the libreddit web interface"}, "loc": ["services", "libreddit", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.libreddit.package": {"declarations": ["nixos/modules/services/misc/libreddit.nix"], "default": {"_type": "literalExpression", "text": "pkgs.libreddit"}, "description": {"_type": "mdDoc", "text": "Libreddit package to use."}, "loc": ["services", "libreddit", "package"], "readOnly": false, "type": "package"}, "services.libreddit.port": {"declarations": ["nixos/modules/services/misc/libreddit.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "The port to listen on"}, "example": {"_type": "literalExpression", "text": "8000"}, "loc": ["services", "libreddit", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.libreswan.configSetup": {"declarations": ["nixos/modules/services/networking/libreswan.nix"], "default": {"_type": "literalExpression", "text": "''\n  protostack=netkey\n  virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:25.0.0.0/8,%v4:100.64.0.0/10,%v6:fd00::/8,%v6:fe80::/10\n''"}, "description": {"_type": "mdDoc", "text": "Options to go in the 'config setup' section of the Libreswan IPsec configuration"}, "example": {"_type": "literalExpression", "text": "''\n  secretsfile=/root/ipsec.secrets\n  protostack=netkey\n  virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,%v4:25.0.0.0/8,%v4:100.64.0.0/10,%v6:fd00::/8,%v6:fe80::/10\n''"}, "loc": ["services", "libreswan", "configSetup"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.libreswan.connections": {"declarations": ["nixos/modules/services/networking/libreswan.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of connections to define for the Libreswan IPsec service"}, "example": {"_type": "literalExpression", "text": "{ myconnection = ''\n    auto=add\n    left=%defaultroute\n    leftid=@user\n\n    right=my.vpn.com\n\n    ikev2=no\n    ikelifetime=8h\n  '';\n}\n"}, "loc": ["services", "libreswan", "connections"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.libreswan.disableRedirects": {"declarations": ["nixos/modules/services/networking/libreswan.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to disable send and accept redirects for all network interfaces.\nSee the Libreswan [\nFAQ](https://libreswan.org/wiki/FAQ#Why_is_it_recommended_to_disable_send_redirects_in_.2Fproc.2Fsys.2Fnet_.3F) page for why this is recommended.\n"}, "loc": ["services", "libreswan", "disableRedirects"], "readOnly": false, "type": "boolean"}, "services.libreswan.enable": {"declarations": ["nixos/modules/services/networking/libreswan.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Libreswan IPsec service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "libreswan", "enable"], "readOnly": false, "type": "boolean"}, "services.libreswan.policies": {"declarations": ["nixos/modules/services/networking/libreswan.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of policies to apply to the IPsec connections.\n\n::: {.note}\nThe policy name must match the one of connection it needs to apply to.\n:::\n"}, "example": {"_type": "literalExpression", "text": "{ private-or-clear = ''\n    # Attempt opportunistic IPsec for the entire Internet\n    0.0.0.0/0\n    ::/0\n  '';\n}\n"}, "loc": ["services", "libreswan", "policies"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.lidarr.dataDir": {"declarations": ["nixos/modules/services/misc/lidarr.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/lidarr/.config/Lidarr\""}, "description": {"_type": "mdDoc", "text": "The directory where Lidarr stores its data files."}, "loc": ["services", "lidarr", "dataDir"], "readOnly": false, "type": "string"}, "services.lidarr.enable": {"declarations": ["nixos/modules/services/misc/lidarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Lidarr."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lidarr", "enable"], "readOnly": false, "type": "boolean"}, "services.lidarr.group": {"declarations": ["nixos/modules/services/misc/lidarr.nix"], "default": {"_type": "literalExpression", "text": "\"lidarr\""}, "description": {"_type": "mdDoc", "text": "Group under which Lidarr runs.\n"}, "loc": ["services", "lidarr", "group"], "readOnly": false, "type": "string"}, "services.lidarr.openFirewall": {"declarations": ["nixos/modules/services/misc/lidarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for Lidarr\n"}, "loc": ["services", "lidarr", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.lidarr.package": {"declarations": ["nixos/modules/services/misc/lidarr.nix"], "default": {"_type": "literalExpression", "text": "pkgs.lidarr"}, "description": {"_type": "mdDoc", "text": "The Lidarr package to use"}, "loc": ["services", "lidarr", "package"], "readOnly": false, "type": "package"}, "services.lidarr.user": {"declarations": ["nixos/modules/services/misc/lidarr.nix"], "default": {"_type": "literalExpression", "text": "\"lidarr\""}, "description": {"_type": "mdDoc", "text": "User account under which Lidarr runs.\n"}, "loc": ["services", "lidarr", "user"], "readOnly": false, "type": "string"}, "services.lifecycled.awsRegion": {"declarations": ["nixos/modules/services/misc/lifecycled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The region used for accessing AWS services.\n"}, "loc": ["services", "lifecycled", "awsRegion"], "readOnly": false, "type": "null or string"}, "services.lifecycled.cloudwatchGroup": {"declarations": ["nixos/modules/services/misc/lifecycled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Write logs to a specific Cloudwatch Logs group.\n"}, "loc": ["services", "lifecycled", "cloudwatchGroup"], "readOnly": false, "type": "null or string"}, "services.lifecycled.cloudwatchStream": {"declarations": ["nixos/modules/services/misc/lifecycled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Write logs to a specific Cloudwatch Logs stream. Defaults to the instance ID.\n"}, "loc": ["services", "lifecycled", "cloudwatchStream"], "readOnly": false, "type": "null or string"}, "services.lifecycled.debug": {"declarations": ["nixos/modules/services/misc/lifecycled.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable debugging information.\n"}, "loc": ["services", "lifecycled", "debug"], "readOnly": false, "type": "boolean"}, "services.lifecycled.enable": {"declarations": ["nixos/modules/services/misc/lifecycled.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable lifecycled."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lifecycled", "enable"], "readOnly": false, "type": "boolean"}, "services.lifecycled.handler": {"declarations": ["nixos/modules/services/misc/lifecycled.nix"], "description": {"_type": "mdDoc", "text": "The script to invoke to handle events.\n"}, "loc": ["services", "lifecycled", "handler"], "readOnly": false, "type": "path"}, "services.lifecycled.instanceId": {"declarations": ["nixos/modules/services/misc/lifecycled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The instance ID to listen for events for.\n"}, "loc": ["services", "lifecycled", "instanceId"], "readOnly": false, "type": "null or string"}, "services.lifecycled.json": {"declarations": ["nixos/modules/services/misc/lifecycled.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable JSON logging.\n"}, "loc": ["services", "lifecycled", "json"], "readOnly": false, "type": "boolean"}, "services.lifecycled.noSpot": {"declarations": ["nixos/modules/services/misc/lifecycled.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable the spot termination listener.\n"}, "loc": ["services", "lifecycled", "noSpot"], "readOnly": false, "type": "boolean"}, "services.lifecycled.queueCleaner.enable": {"declarations": ["nixos/modules/services/misc/lifecycled.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable lifecycled-queue-cleaner."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lifecycled", "queueCleaner", "enable"], "readOnly": false, "type": "boolean"}, "services.lifecycled.queueCleaner.frequency": {"declarations": ["nixos/modules/services/misc/lifecycled.nix"], "default": {"_type": "literalExpression", "text": "\"hourly\""}, "description": {"_type": "mdDoc", "text": "How often to trigger the queue cleaner.\n\nNOTE: This string should be a valid value for a systemd\ntimer's `OnCalendar` configuration. See\n{manpage}`systemd.timer(5)`\nfor more information.\n"}, "loc": ["services", "lifecycled", "queueCleaner", "frequency"], "readOnly": false, "type": "string"}, "services.lifecycled.queueCleaner.parallel": {"declarations": ["nixos/modules/services/misc/lifecycled.nix"], "default": {"_type": "literalExpression", "text": "20"}, "description": {"_type": "mdDoc", "text": "The number of parallel deletes to run.\n"}, "loc": ["services", "lifecycled", "queueCleaner", "parallel"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.lifecycled.snsTopic": {"declarations": ["nixos/modules/services/misc/lifecycled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The SNS topic that receives events.\n"}, "loc": ["services", "lifecycled", "snsTopic"], "readOnly": false, "type": "null or string"}, "services.lighthouse.beacon": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Beacon node"}, "loc": ["services", "lighthouse", "beacon"], "readOnly": false, "type": "submodule"}, "services.lighthouse.beacon.address": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Listen address of Beacon node.\n"}, "loc": ["services", "lighthouse", "beacon", "address"], "readOnly": false, "type": "string"}, "services.lighthouse.beacon.dataDir": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/lighthouse-beacon\""}, "description": {"_type": "mdDoc", "text": "Directory where data will be stored. Each chain will be stored under it's own specific subdirectory.\n"}, "loc": ["services", "lighthouse", "beacon", "dataDir"], "readOnly": false, "type": "string"}, "services.lighthouse.beacon.disableDepositContractSync": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Explicitly disables syncing of deposit logs from the execution node.\nThis overrides any previous option that depends on it.\nUseful if you intend to run a non-validating beacon node.\n"}, "loc": ["services", "lighthouse", "beacon", "disableDepositContractSync"], "readOnly": false, "type": "boolean"}, "services.lighthouse.beacon.enable": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Lightouse Beacon node."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lighthouse", "beacon", "enable"], "readOnly": false, "type": "boolean"}, "services.lighthouse.beacon.execution.address": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listen address for the execution layer.\n"}, "loc": ["services", "lighthouse", "beacon", "execution", "address"], "readOnly": false, "type": "string"}, "services.lighthouse.beacon.execution.jwtPath": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Path for the jwt secret required to connect to the execution layer.\n"}, "loc": ["services", "lighthouse", "beacon", "execution", "jwtPath"], "readOnly": false, "type": "string"}, "services.lighthouse.beacon.execution.port": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "8551"}, "description": {"_type": "mdDoc", "text": "Port number the Beacon node will be listening on for the execution layer.\n"}, "loc": ["services", "lighthouse", "beacon", "execution", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.lighthouse.beacon.extraArgs": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional arguments passed to the lighthouse beacon command.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "lighthouse", "beacon", "extraArgs"], "readOnly": false, "type": "string"}, "services.lighthouse.beacon.http.address": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listen address of Beacon node RPC service.\n"}, "loc": ["services", "lighthouse", "beacon", "http", "address"], "readOnly": false, "type": "string"}, "services.lighthouse.beacon.http.enable": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Beacon node http api."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lighthouse", "beacon", "http", "enable"], "readOnly": false, "type": "boolean"}, "services.lighthouse.beacon.http.port": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "5052"}, "description": {"_type": "mdDoc", "text": "Port number of Beacon node RPC service.\n"}, "loc": ["services", "lighthouse", "beacon", "http", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.lighthouse.beacon.metrics.address": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listen address of Beacon node metrics service.\n"}, "loc": ["services", "lighthouse", "beacon", "metrics", "address"], "readOnly": false, "type": "string"}, "services.lighthouse.beacon.metrics.enable": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Beacon node prometheus metrics."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lighthouse", "beacon", "metrics", "enable"], "readOnly": false, "type": "boolean"}, "services.lighthouse.beacon.metrics.port": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "5054"}, "description": {"_type": "mdDoc", "text": "Port number of Beacon node metrics service.\n"}, "loc": ["services", "lighthouse", "beacon", "metrics", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.lighthouse.beacon.openFirewall": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open the port in the firewall\n"}, "loc": ["services", "lighthouse", "beacon", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.lighthouse.beacon.port": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "9000"}, "description": {"_type": "mdDoc", "text": "Port number the Beacon node will be listening on.\n"}, "loc": ["services", "lighthouse", "beacon", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.lighthouse.extraArgs": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional arguments passed to every lighthouse command.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "lighthouse", "extraArgs"], "readOnly": false, "type": "string"}, "services.lighthouse.network": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "\"mainnet\""}, "description": {"_type": "mdDoc", "text": "The network to connect to. Mainnet is the default ethereum network.\n"}, "loc": ["services", "lighthouse", "network"], "readOnly": false, "type": "one of \"mainnet\", \"prater\", \"goerli\", \"gnosis\", \"kiln\", \"ropsten\", \"sepolia\""}, "services.lighthouse.validator": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Validator node"}, "loc": ["services", "lighthouse", "validator"], "readOnly": false, "type": "submodule"}, "services.lighthouse.validator.beaconNodes": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"http://localhost:5052\"\n]"}, "description": {"_type": "mdDoc", "text": "Beacon nodes to connect to.\n"}, "loc": ["services", "lighthouse", "validator", "beaconNodes"], "readOnly": false, "type": "list of string"}, "services.lighthouse.validator.dataDir": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/lighthouse-validator\""}, "description": {"_type": "mdDoc", "text": "Directory where data will be stored. Each chain will be stored under it's own specific subdirectory.\n"}, "loc": ["services", "lighthouse", "validator", "dataDir"], "readOnly": false, "type": "string"}, "services.lighthouse.validator.enable": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Lightouse Validator node."}, "loc": ["services", "lighthouse", "validator", "enable"], "readOnly": false, "type": "boolean"}, "services.lighthouse.validator.extraArgs": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional arguments passed to the lighthouse validator command.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "lighthouse", "validator", "extraArgs"], "readOnly": false, "type": "string"}, "services.lighthouse.validator.metrics.address": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listen address of Validator node metrics service.\n"}, "loc": ["services", "lighthouse", "validator", "metrics", "address"], "readOnly": false, "type": "string"}, "services.lighthouse.validator.metrics.enable": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Validator node prometheus metrics."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lighthouse", "validator", "metrics", "enable"], "readOnly": false, "type": "boolean"}, "services.lighthouse.validator.metrics.port": {"declarations": ["nixos/modules/services/blockchain/ethereum/lighthouse.nix"], "default": {"_type": "literalExpression", "text": "5056"}, "description": {"_type": "mdDoc", "text": "Port number of Validator node metrics service.\n"}, "loc": ["services", "lighthouse", "validator", "metrics", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.lighttpd.cgit.configText": {"declarations": ["nixos/modules/services/web-servers/lighttpd/cgit.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim contents of the cgit runtime configuration file. Documentation\n(with cgitrc example file) is available in \"man cgitrc\". Or online:\nhttp://git.zx2c4.com/cgit/tree/cgitrc.5.txt\n"}, "example": {"_type": "literalExpression", "text": "''\n  source-filter=${pkgs.cgit}/lib/cgit/filters/syntax-highlighting.py\n  about-filter=${pkgs.cgit}/lib/cgit/filters/about-formatting.sh\n  cache-size=1000\n  scan-path=/srv/git\n''\n"}, "loc": ["services", "lighttpd", "cgit", "configText"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.lighttpd.cgit.enable": {"declarations": ["nixos/modules/services/web-servers/lighttpd/cgit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If true, enable cgit (fast web interface for git repositories) as a\nsub-service in lighttpd.\n"}, "loc": ["services", "lighttpd", "cgit", "enable"], "readOnly": false, "type": "boolean"}, "services.lighttpd.cgit.subdir": {"declarations": ["nixos/modules/services/web-servers/lighttpd/cgit.nix"], "default": {"_type": "literalExpression", "text": "\"cgit\""}, "description": {"_type": "mdDoc", "text": "The subdirectory in which to serve cgit. The web application will be\naccessible at http://yourserver/${subdir}\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "lighttpd", "cgit", "subdir"], "readOnly": false, "type": "string"}, "services.lighttpd.collectd.collectionCgi": {"declarations": ["nixos/modules/services/web-servers/lighttpd/collectd.nix"], "default": {"_type": "literalMD", "text": "`config.services.collectd.package` configured for lighttpd\n"}, "description": {"_type": "mdDoc", "text": "Path to collection.cgi script from (collectd sources)/contrib/collection.cgi\nThis option allows to use a customized version\n"}, "loc": ["services", "lighttpd", "collectd", "collectionCgi"], "readOnly": false, "type": "path"}, "services.lighttpd.collectd.enable": {"declarations": ["nixos/modules/services/web-servers/lighttpd/collectd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable collectd subservice accessible at http://yourserver/collectd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lighttpd", "collectd", "enable"], "readOnly": false, "type": "boolean"}, "services.lighttpd.configText": {"declarations": ["nixos/modules/services/web-servers/lighttpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Overridable config file contents to use for lighttpd. By default, use\nthe contents automatically generated by NixOS.\n"}, "example": {"_type": "literalExpression", "text": "\"...verbatim config file contents...\""}, "loc": ["services", "lighttpd", "configText"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.lighttpd.document-root": {"declarations": ["nixos/modules/services/web-servers/lighttpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"/srv/www\""}, "description": {"_type": "mdDoc", "text": "Document-root of the web server. Must be readable by the \"lighttpd\" user.\n"}, "loc": ["services", "lighttpd", "document-root"], "readOnly": false, "type": "path"}, "services.lighttpd.enable": {"declarations": ["nixos/modules/services/web-servers/lighttpd/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the lighttpd web server.\n"}, "loc": ["services", "lighttpd", "enable"], "readOnly": false, "type": "boolean"}, "services.lighttpd.enableModules": {"declarations": ["nixos/modules/services/web-servers/lighttpd/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of lighttpd modules to enable. Sub-services take care of\nenabling modules as needed, so this option is mainly for when you\nwant to add custom stuff to\n{option}`services.lighttpd.extraConfig` that depends on a\ncertain module.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"mod_cgi\"\n  \"mod_status\"\n]"}, "loc": ["services", "lighttpd", "enableModules"], "readOnly": false, "type": "list of string"}, "services.lighttpd.enableUpstreamMimeTypes": {"declarations": ["nixos/modules/services/web-servers/lighttpd/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to include the list of mime types bundled with lighttpd\n(upstream). If you disable this, no mime types will be added by\nNixOS and you will have to add your own mime types in\n{option}`services.lighttpd.extraConfig`.\n"}, "loc": ["services", "lighttpd", "enableUpstreamMimeTypes"], "readOnly": false, "type": "boolean"}, "services.lighttpd.extraConfig": {"declarations": ["nixos/modules/services/web-servers/lighttpd/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These configuration lines will be appended to the generated lighttpd\nconfig file. Note that this mechanism does not work when the manual\n{option}`configText` option is used.\n"}, "loc": ["services", "lighttpd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.lighttpd.gitweb.enable": {"declarations": ["nixos/modules/services/web-servers/lighttpd/gitweb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If true, enable gitweb in lighttpd. Access it at http://yourserver/gitweb\n"}, "loc": ["services", "lighttpd", "gitweb", "enable"], "readOnly": false, "type": "boolean"}, "services.lighttpd.mod_status": {"declarations": ["nixos/modules/services/web-servers/lighttpd/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Show server status overview at /server-status, statistics at\n/server-statistics and list of loaded modules at /server-config.\n"}, "loc": ["services", "lighttpd", "mod_status"], "readOnly": false, "type": "boolean"}, "services.lighttpd.mod_userdir": {"declarations": ["nixos/modules/services/web-servers/lighttpd/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If true, requests in the form /~user/page.html are rewritten to take\nthe file public_html/page.html from the home directory of the user.\n"}, "loc": ["services", "lighttpd", "mod_userdir"], "readOnly": false, "type": "boolean"}, "services.lighttpd.package": {"declarations": ["nixos/modules/services/web-servers/lighttpd/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.lighttpd"}, "description": {"_type": "mdDoc", "text": "lighttpd package to use.\n"}, "loc": ["services", "lighttpd", "package"], "readOnly": false, "type": "package"}, "services.lighttpd.port": {"declarations": ["nixos/modules/services/web-servers/lighttpd/default.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "TCP port number for lighttpd to bind to.\n"}, "loc": ["services", "lighttpd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.limesurvey.config": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "LimeSurvey configuration. Refer to\n<https://manual.limesurvey.org/Optional_settings>\nfor details on supported values.\n"}, "loc": ["services", "limesurvey", "config"], "readOnly": false, "type": "limesurvey config type (str, int, bool or attribute set thereof)"}, "services.limesurvey.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally.\nThis currently only applies if database type \"mysql\" is selected.\n"}, "loc": ["services", "limesurvey", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.limesurvey.database.dbEngine": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"InnoDB\""}, "description": {"_type": "mdDoc", "text": "Database storage engine to use."}, "loc": ["services", "limesurvey", "database", "dbEngine"], "readOnly": false, "type": "one of \"MyISAM\", \"InnoDB\""}, "services.limesurvey.database.host": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "limesurvey", "database", "host"], "readOnly": false, "type": "string"}, "services.limesurvey.database.name": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"limesurvey\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "limesurvey", "database", "name"], "readOnly": false, "type": "string"}, "services.limesurvey.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/limesurvey-dbpassword\""}, "loc": ["services", "limesurvey", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.limesurvey.database.port": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "3306"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "limesurvey", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.limesurvey.database.socket": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "/run/mysqld/mysqld.sock"}, "description": {"_type": "mdDoc", "text": "Path to the unix socket file to use for authentication."}, "loc": ["services", "limesurvey", "database", "socket"], "readOnly": false, "type": "null or path"}, "services.limesurvey.database.type": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"mysql\""}, "description": {"_type": "mdDoc", "text": "Database engine to use."}, "example": {"_type": "literalExpression", "text": "\"pgsql\""}, "loc": ["services", "limesurvey", "database", "type"], "readOnly": false, "type": "one of \"mysql\", \"pgsql\", \"odbc\", \"mssql\""}, "services.limesurvey.database.user": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"limesurvey\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "limesurvey", "database", "user"], "readOnly": false, "type": "string"}, "services.limesurvey.enable": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Limesurvey web application."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "limesurvey", "enable"], "readOnly": false, "type": "boolean"}, "services.limesurvey.encryptionKey": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"E17687FC77CEE247F0E22BB3ECF27FDE8BEC310A892347EC13013ABA11AA7EB5\""}, "description": {"_type": "mdDoc", "text": "This is a 32-byte key used to encrypt variables in the database.\nYou _must_ change this from the default value.\n"}, "loc": ["services", "limesurvey", "encryptionKey"], "readOnly": false, "type": "string"}, "services.limesurvey.encryptionNonce": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"1ACC8555619929DB91310BE848025A427B0F364A884FFA77\""}, "description": {"_type": "mdDoc", "text": "This is a 24-byte nonce used to encrypt variables in the database.\nYou _must_ change this from the default value.\n"}, "loc": ["services", "limesurvey", "encryptionNonce"], "readOnly": false, "type": "string"}, "services.limesurvey.poolConfig": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = 32;\n  \"pm.max_requests\" = 500;\n  \"pm.max_spare_servers\" = 4;\n  \"pm.min_spare_servers\" = 2;\n  \"pm.start_servers\" = 2;\n}"}, "description": {"_type": "mdDoc", "text": "Options for the LimeSurvey PHP pool. See the documentation on `php-fpm.conf`\nfor details on configuration directives.\n"}, "loc": ["services", "limesurvey", "poolConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.limesurvey.virtualHost": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "description": {"_type": "mdDoc", "text": "Apache configuration can be done by adapting `services.httpd.virtualHosts.<name>`.\nSee [](#opt-services.httpd.virtualHosts) for further information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  hostName = \"survey.example.org\";\n  adminAddr = \"webmaster@example.org\";\n  forceSSL = true;\n  enableACME = true;\n}\n"}, "loc": ["services", "limesurvey", "virtualHost"], "readOnly": false, "type": "submodule"}, "services.limesurvey.virtualHost.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the acme challenge which is PUBLIC, don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "limesurvey", "virtualHost", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.limesurvey.virtualHost.addSSL": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "limesurvey", "virtualHost", "addSSL"], "readOnly": false, "type": "boolean"}, "services.limesurvey.virtualHost.adminAddr": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "E-mail address of the server administrator."}, "example": {"_type": "literalExpression", "text": "\"admin@example.org\""}, "loc": ["services", "limesurvey", "virtualHost", "adminAddr"], "readOnly": false, "type": "null or string"}, "services.limesurvey.virtualHost.documentRoot": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of Apache's document root directory.  If left undefined,\nan empty directory in the Nix store will be used as root.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "limesurvey", "virtualHost", "documentRoot"], "readOnly": false, "type": "null or path"}, "services.limesurvey.virtualHost.enableACME": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "limesurvey", "virtualHost", "enableACME"], "readOnly": false, "type": "boolean"}, "services.limesurvey.virtualHost.enableUserDir": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable serving {file}`~/public_html` as\n`/~\u00abusername\u00bb`.\n"}, "loc": ["services", "limesurvey", "virtualHost", "enableUserDir"], "readOnly": false, "type": "boolean"}, "services.limesurvey.virtualHost.extraConfig": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to httpd.conf verbatim. They will go after\ndirectories and directory aliases defined by default.\n"}, "example": {"_type": "literalExpression", "text": "''\n  <Directory /home>\n    Options FollowSymlinks\n    AllowOverride All\n  </Directory>\n''"}, "loc": ["services", "limesurvey", "virtualHost", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.limesurvey.virtualHost.forceSSL": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "limesurvey", "virtualHost", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.limesurvey.virtualHost.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given URL.\n"}, "example": {"_type": "literalExpression", "text": "\"http://newserver.example.org/\""}, "loc": ["services", "limesurvey", "virtualHost", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.limesurvey.virtualHost.hostName": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Canonical hostname for the server."}, "loc": ["services", "limesurvey", "virtualHost", "hostName"], "readOnly": false, "type": "string"}, "services.limesurvey.virtualHost.http2": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTP 2. HTTP/2 is supported in all multi-processing modules that come with httpd. *However, if you use the prefork mpm, there will\nbe severe restrictions.* Refer to <https://httpd.apache.org/docs/2.4/howto/http2.html#mpm-config> for details.\n"}, "loc": ["services", "limesurvey", "virtualHost", "http2"], "readOnly": false, "type": "boolean"}, "services.limesurvey.virtualHost.listen": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\n\n::: {.note}\nThis option overrides `addSSL`, `forceSSL` and `onlySSL`.\n\nIf you only want to set the addresses manually and not the ports, take a look at `listenAddresses`.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    ip = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    ip = \"192.154.1.1\";\n    port = 80;\n  }\n  {\n    ip = \"*\";\n    port = 8080;\n  }\n]"}, "loc": ["services", "limesurvey", "virtualHost", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.limesurvey.virtualHost.listen.*.ip": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"*\""}, "description": {"_type": "mdDoc", "text": "IP to listen on. 0.0.0.0 for IPv4 only, * for all."}, "loc": ["services", "limesurvey", "virtualHost", "listen", "*", "ip"], "readOnly": false, "type": "string"}, "services.limesurvey.virtualHost.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "description": {"_type": "mdDoc", "text": "Port to listen on"}, "loc": ["services", "limesurvey", "virtualHost", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.limesurvey.virtualHost.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SSL (https) support."}, "loc": ["services", "limesurvey", "virtualHost", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.limesurvey.virtualHost.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*\"\n]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "loc": ["services", "limesurvey", "virtualHost", "listenAddresses"], "readOnly": false, "type": "non-empty (list of string)"}, "services.limesurvey.virtualHost.locations": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config. See <https://httpd.apache.org/docs/2.4/mod/core.html#location> for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n  \"/foo/bar.png\" = {\n    alias = \"/home/eelco/some-file.png\";\n  };\n};\n"}, "loc": ["services", "limesurvey", "virtualHost", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.limesurvey.virtualHost.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests. See <https://httpd.apache.org/docs/2.4/mod/mod_alias.html#alias>.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "limesurvey", "virtualHost", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.limesurvey.virtualHost.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "limesurvey", "virtualHost", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.limesurvey.virtualHost.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds DirectoryIndex directive. See <https://httpd.apache.org/docs/2.4/mod/mod_dir.html#directoryindex>.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "limesurvey", "virtualHost", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.limesurvey.virtualHost.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "limesurvey", "virtualHost", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.limesurvey.virtualHost.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets up a simple reverse proxy as described by <https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple>.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "limesurvey", "virtualHost", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.limesurvey.virtualHost.logFormat": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"common\""}, "description": {"_type": "mdDoc", "text": "Log format for Apache's log files. Possible values are: combined, common, referer, agent.\n"}, "example": {"_type": "literalExpression", "text": "\"combined\""}, "loc": ["services", "limesurvey", "virtualHost", "logFormat"], "readOnly": false, "type": "string"}, "services.limesurvey.virtualHost.onlySSL": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "limesurvey", "virtualHost", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.limesurvey.virtualHost.robotsEntries": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Specification of pages to be ignored by web crawlers. See <http://www.robotstxt.org/> for details.\n"}, "example": {"_type": "literalExpression", "text": "\"Disallow: /foo/\""}, "loc": ["services", "limesurvey", "virtualHost", "robotsEntries"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.limesurvey.virtualHost.servedDirs": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve static directories.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    dir = \"/home/eelco/Dev/nix-homepage\";\n    urlPath = \"/nix\";\n  }\n]"}, "loc": ["services", "limesurvey", "virtualHost", "servedDirs"], "readOnly": false, "type": "list of (attribute set)"}, "services.limesurvey.virtualHost.servedFiles": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve individual, static files.\n\n::: {.note}\nThis option has been deprecated and will be removed in a future\nversion of NixOS. You can achieve the same result by making use of\nthe `locations.<name>.alias` option.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    file = \"/home/eelco/some-file.png\";\n    urlPath = \"/foo/bar.png\";\n  }\n]"}, "loc": ["services", "limesurvey", "virtualHost", "servedFiles"], "readOnly": false, "type": "list of (attribute set)"}, "services.limesurvey.virtualHost.serverAliases": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"www.example.org:8080\"\n  \"example.org\"\n]"}, "loc": ["services", "limesurvey", "virtualHost", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.limesurvey.virtualHost.sslServerCert": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "limesurvey", "virtualHost", "sslServerCert"], "readOnly": false, "type": "path"}, "services.limesurvey.virtualHost.sslServerChain": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to server SSL chain file."}, "example": {"_type": "literalExpression", "text": "\"/var/ca.pem\""}, "loc": ["services", "limesurvey", "virtualHost", "sslServerChain"], "readOnly": false, "type": "null or path"}, "services.limesurvey.virtualHost.sslServerKey": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "limesurvey", "virtualHost", "sslServerKey"], "readOnly": false, "type": "path"}, "services.limesurvey.virtualHost.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/limesurvey.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "limesurvey", "virtualHost", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.liquidsoap.streams": {"declarations": ["nixos/modules/services/audio/liquidsoap.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of Liquidsoap streams to start,\none systemd service per stream.\n"}, "example": {"_type": "literalExpression", "text": "{\n  myStream1 = \"/etc/liquidsoap/myStream1.liq\";\n  myStream2 = ./myStream2.liq;\n  myStream3 = \"out(playlist(\\\"/srv/music/\\\"))\";\n}\n"}, "loc": ["services", "liquidsoap", "streams"], "readOnly": false, "type": "attribute set of (path or string)"}, "services.lirc.configs": {"declarations": ["nixos/modules/services/hardware/lirc.nix"], "description": {"_type": "mdDoc", "text": "Configurations for lircd to load, see man:lircd.conf(5) for details ({file}`lircd.conf`)"}, "loc": ["services", "lirc", "configs"], "readOnly": false, "type": "list of strings concatenated with \"\\n\""}, "services.lirc.enable": {"declarations": ["nixos/modules/services/hardware/lirc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable LIRC daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lirc", "enable"], "readOnly": false, "type": "boolean"}, "services.lirc.extraArguments": {"declarations": ["nixos/modules/services/hardware/lirc.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra arguments to lircd."}, "loc": ["services", "lirc", "extraArguments"], "readOnly": false, "type": "list of string"}, "services.lirc.options": {"declarations": ["nixos/modules/services/hardware/lirc.nix"], "description": {"_type": "mdDoc", "text": "LIRC default options described in man:lircd(8) ({file}`lirc_options.conf`)"}, "example": {"_type": "literalExpression", "text": "''\n  [lircd]\n  nodaemon = False\n''"}, "loc": ["services", "lirc", "options"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.listmonk.database.createLocally": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create the PostgreSQL database and database user locally."}, "loc": ["services", "listmonk", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.listmonk.database.mutableSettings": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Database settings will be reset to the value set in this module if this is not enabled.\nEnable this if you want to persist changes you have done in the application.\n"}, "loc": ["services", "listmonk", "database", "mutableSettings"], "readOnly": false, "type": "boolean"}, "services.listmonk.database.settings": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Dynamic settings in the PostgreSQL database, set by a SQL script, see <https://github.com/knadh/listmonk/blob/master/schema.sql#L177-L230> for details."}, "loc": ["services", "listmonk", "database", "settings"], "readOnly": false, "type": "null or ((list of string) or list of attribute set of anything or string or signed integer or boolean)"}, "services.listmonk.database.settings.\"app.notify_emails\"": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Administrator emails for system notifications"}, "loc": ["services", "listmonk", "database", "settings", "app.notify_emails"], "readOnly": false, "type": "list of string"}, "services.listmonk.database.settings.\"bounce.mailboxes\"": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of bounce mailboxes"}, "loc": ["services", "listmonk", "database", "settings", "bounce.mailboxes"], "readOnly": false, "type": "list of (string or signed integer or boolean)"}, "services.listmonk.database.settings.\"privacy.domain_blocklist\"": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "E-mail addresses with these domains are disallowed from subscribing."}, "loc": ["services", "listmonk", "database", "settings", "privacy.domain_blocklist"], "readOnly": false, "type": "list of string"}, "services.listmonk.database.settings.\"privacy.exportable\"": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"profile\"\n  \"subscriptions\"\n  \"campaign_views\"\n  \"link_clicks\"\n]"}, "description": {"_type": "mdDoc", "text": "List of fields which can be exported through an automatic export request"}, "loc": ["services", "listmonk", "database", "settings", "privacy.exportable"], "readOnly": false, "type": "list of string"}, "services.listmonk.database.settings.messengers": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of messengers, see: <https://github.com/knadh/listmonk/blob/master/models/settings.go#L64-L74> for options."}, "loc": ["services", "listmonk", "database", "settings", "messengers"], "readOnly": false, "type": "list of string"}, "services.listmonk.database.settings.smtp": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "description": {"_type": "mdDoc", "text": "List of outgoing SMTP servers"}, "loc": ["services", "listmonk", "database", "settings", "smtp"], "readOnly": false, "type": "list of (attribute set of (string or signed integer or boolean))"}, "services.listmonk.database.settings.smtp.*.enabled": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable this SMTP server for listmonk."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "listmonk", "database", "settings", "smtp", "*", "enabled"], "readOnly": false, "type": "boolean"}, "services.listmonk.database.settings.smtp.*.host": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "description": {"_type": "mdDoc", "text": "Hostname for the SMTP server"}, "loc": ["services", "listmonk", "database", "settings", "smtp", "*", "host"], "readOnly": false, "type": "string"}, "services.listmonk.database.settings.smtp.*.max_conns": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Maximum number of simultaneous connections, defaults to 1"}, "loc": ["services", "listmonk", "database", "settings", "smtp", "*", "max_conns"], "readOnly": false, "type": "signed integer"}, "services.listmonk.database.settings.smtp.*.port": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "description": {"_type": "mdDoc", "text": "Port for the SMTP server"}, "loc": ["services", "listmonk", "database", "settings", "smtp", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.listmonk.database.settings.smtp.*.tls_type": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "description": {"_type": "mdDoc", "text": "Type of TLS authentication with the SMTP server"}, "loc": ["services", "listmonk", "database", "settings", "smtp", "*", "tls_type"], "readOnly": false, "type": "one of \"none\", \"STARTTLS\", \"TLS\""}, "services.listmonk.enable": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Listmonk, this module assumes a reverse proxy to be set."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "listmonk", "enable"], "readOnly": false, "type": "boolean"}, "services.listmonk.package": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "default": {"_type": "literalExpression", "text": "pkgs.listmonk"}, "description": {"_type": "mdDoc", "text": "The listmonk package to use."}, "loc": ["services", "listmonk", "package"], "readOnly": false, "type": "package"}, "services.listmonk.secretFile": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing secrets as environment variables. See <https://listmonk.app/docs/configuration/#environment-variables> for details on supported values."}, "loc": ["services", "listmonk", "secretFile"], "readOnly": false, "type": "null or string"}, "services.listmonk.settings": {"declarations": ["nixos/modules/services/mail/listmonk.nix"], "description": {"_type": "mdDoc", "text": "Static settings set in the config.toml, see <https://github.com/knadh/listmonk/blob/master/config.toml.sample> for details.\nYou can set secrets using the secretFile option with environment variables following <https://listmonk.app/docs/configuration/#environment-variables>.\n"}, "loc": ["services", "listmonk", "settings"], "readOnly": false, "type": "TOML value"}, "services.litestream.enable": {"declarations": ["nixos/modules/services/network-filesystems/litestream/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable litestream."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "litestream", "enable"], "readOnly": false, "type": "boolean"}, "services.litestream.environmentFile": {"declarations": ["nixos/modules/services/network-filesystems/litestream/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file as defined in {manpage}`systemd.exec(5)`.\n\nSecrets may be passed to the service without adding them to the\nworld-readable Nix store, by specifying placeholder variables as\nthe option value in Nix and setting these variables accordingly in the\nenvironment file.\n\nBy default, Litestream will perform environment variable expansion\nwithin the config file before reading it. Any references to $VAR or\n${VAR} formatted variables will be replaced with their environment\nvariable values. If no value is set then it will be replaced with an\nempty string.\n\n```\n  # Content of the environment file\n  LITESTREAM_ACCESS_KEY_ID=AKIAxxxxxxxxxxxxxxxx\n  LITESTREAM_SECRET_ACCESS_KEY=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx/xxxxxxxxx\n```\n\nNote that this file needs to be available on the host on which\nthis exporter is running.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/secrets/litestream\""}, "loc": ["services", "litestream", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.litestream.package": {"declarations": ["nixos/modules/services/network-filesystems/litestream/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.litestream"}, "description": {"_type": "mdDoc", "text": "Package to use."}, "loc": ["services", "litestream", "package"], "readOnly": false, "type": "package"}, "services.litestream.settings": {"declarations": ["nixos/modules/services/network-filesystems/litestream/default.nix"], "description": {"_type": "mdDoc", "text": "See the [documentation](https://litestream.io/reference/config/).\n"}, "example": {"_type": "literalExpression", "text": "{\n  dbs = [\n    {\n      path = \"/var/lib/db1\";\n      replicas = [\n        {\n          url = \"s3://mybkt.litestream.io/db1\";\n        }\n      ];\n    }\n  ];\n}"}, "loc": ["services", "litestream", "settings"], "readOnly": false, "type": "YAML value"}, "services.lldap.enable": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable lldap."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lldap", "enable"], "readOnly": false, "type": "boolean"}, "services.lldap.environment": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables passed to the service.\nAny config option name prefixed with `LLDAP_` takes priority over the one in the configuration file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  LLDAP_JWT_SECRET_FILE = \"/run/lldap/jwt_secret\";\n  LLDAP_LDAP_USER_PASS_FILE = \"/run/lldap/user_password\";\n}"}, "loc": ["services", "lldap", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.lldap.environmentFile": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file as defined in {manpage}`systemd.exec(5)` passed to the service.\n"}, "loc": ["services", "lldap", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.lldap.package": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "default": {"_type": "literalExpression", "text": "pkgs.lldap"}, "description": {"_type": "mdDoc", "text": "The lldap package to use."}, "loc": ["services", "lldap", "package"], "readOnly": false, "type": "package"}, "services.lldap.settings": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Free-form settings written directly to the `lldap_config.toml` file.\nRefer to <https://github.com/lldap/lldap/blob/main/lldap_config.docker_template.toml> for supported values.\n"}, "loc": ["services", "lldap", "settings"], "readOnly": false, "type": "TOML value"}, "services.lldap.settings.database_url": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite://./users.db?mode=rwc\""}, "description": {"_type": "mdDoc", "text": "Database URL."}, "example": {"_type": "literalExpression", "text": "\"postgres://postgres-user:password@postgres-server/my-database\""}, "loc": ["services", "lldap", "settings", "database_url"], "readOnly": false, "type": "string"}, "services.lldap.settings.http_host": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "default": {"_type": "literalExpression", "text": "\"::\""}, "description": {"_type": "mdDoc", "text": "The host address that the HTTP server will be bound to."}, "loc": ["services", "lldap", "settings", "http_host"], "readOnly": false, "type": "string"}, "services.lldap.settings.http_port": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "default": {"_type": "literalExpression", "text": "17170"}, "description": {"_type": "mdDoc", "text": "The port on which to have the HTTP server, for user login and administration."}, "loc": ["services", "lldap", "settings", "http_port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.lldap.settings.http_url": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost\""}, "description": {"_type": "mdDoc", "text": "The public URL of the server, for password reset links."}, "loc": ["services", "lldap", "settings", "http_url"], "readOnly": false, "type": "string"}, "services.lldap.settings.ldap_base_dn": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "description": {"_type": "mdDoc", "text": "Base DN for LDAP."}, "example": {"_type": "literalExpression", "text": "\"dc=example,dc=com\""}, "loc": ["services", "lldap", "settings", "ldap_base_dn"], "readOnly": false, "type": "string"}, "services.lldap.settings.ldap_host": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "default": {"_type": "literalExpression", "text": "\"::\""}, "description": {"_type": "mdDoc", "text": "The host address that the LDAP server will be bound to."}, "loc": ["services", "lldap", "settings", "ldap_host"], "readOnly": false, "type": "string"}, "services.lldap.settings.ldap_port": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "default": {"_type": "literalExpression", "text": "3890"}, "description": {"_type": "mdDoc", "text": "The port on which to have the LDAP server."}, "loc": ["services", "lldap", "settings", "ldap_port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.lldap.settings.ldap_user_dn": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "default": {"_type": "literalExpression", "text": "\"admin\""}, "description": {"_type": "mdDoc", "text": "Admin username"}, "loc": ["services", "lldap", "settings", "ldap_user_dn"], "readOnly": false, "type": "string"}, "services.lldap.settings.ldap_user_email": {"declarations": ["nixos/modules/services/databases/lldap.nix"], "default": {"_type": "literalExpression", "text": "\"admin@example.com\""}, "description": {"_type": "mdDoc", "text": "Admin email."}, "loc": ["services", "lldap", "settings", "ldap_user_email"], "readOnly": false, "type": "string"}, "services.lldpd.enable": {"declarations": ["nixos/modules/services/networking/lldpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Link Layer Discovery Protocol Daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lldpd", "enable"], "readOnly": false, "type": "boolean"}, "services.lldpd.extraArgs": {"declarations": ["nixos/modules/services/networking/lldpd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of command line parameters for lldpd"}, "example": {"_type": "literalExpression", "text": "[\n  \"-c\"\n  \"-k\"\n  \"-I eth0\"\n]"}, "loc": ["services", "lldpd", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.localtimed.enable": {"declarations": ["nixos/modules/services/system/localtimed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable `localtimed`, a simple daemon for keeping the\nsystem timezone up-to-date based on the current location. It uses\ngeoclue2 to determine the current location.\n"}, "loc": ["services", "localtimed", "enable"], "readOnly": false, "type": "boolean"}, "services.locate.enable": {"declarations": ["nixos/modules/misc/locate.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, NixOS will periodically update the database of\nfiles used by the {command}`locate` command.\n"}, "loc": ["services", "locate", "enable"], "readOnly": false, "type": "boolean"}, "services.locate.extraFlags": {"declarations": ["nixos/modules/misc/locate.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags to pass to {command}`updatedb`.\n"}, "loc": ["services", "locate", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.locate.interval": {"declarations": ["nixos/modules/misc/locate.nix"], "default": {"_type": "literalExpression", "text": "\"02:15\""}, "description": {"_type": "mdDoc", "text": "Update the locate database at this interval. Updates by\ndefault at 2:15 AM every day.\n\nThe format is described in\n{manpage}`systemd.time(7)`.\n\nTo disable automatic updates, set to `\"never\"`\nand run {command}`updatedb` manually.\n"}, "example": {"_type": "literalExpression", "text": "\"hourly\""}, "loc": ["services", "locate", "interval"], "readOnly": false, "type": "string"}, "services.locate.localuser": {"declarations": ["nixos/modules/misc/locate.nix"], "default": {"_type": "literalExpression", "text": "\"nobody\""}, "description": {"_type": "mdDoc", "text": "The user to search non-network directories as, using\n{command}`su`.\n"}, "loc": ["services", "locate", "localuser"], "readOnly": false, "type": "null or string"}, "services.locate.locate": {"declarations": ["nixos/modules/misc/locate.nix"], "default": {"_type": "literalExpression", "text": "pkgs.findutils"}, "description": {"_type": "mdDoc", "text": "The locate implementation to use\n"}, "example": {"_type": "literalExpression", "text": "pkgs.mlocate"}, "loc": ["services", "locate", "locate"], "readOnly": false, "type": "package"}, "services.locate.output": {"declarations": ["nixos/modules/misc/locate.nix"], "default": {"_type": "literalExpression", "text": "\"/var/cache/locatedb\""}, "description": {"_type": "mdDoc", "text": "The database file to build.\n"}, "loc": ["services", "locate", "output"], "readOnly": false, "type": "path"}, "services.locate.pruneBindMounts": {"declarations": ["nixos/modules/misc/locate.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether not to index bind mounts\n"}, "loc": ["services", "locate", "pruneBindMounts"], "readOnly": false, "type": "boolean"}, "services.locate.pruneFS": {"declarations": ["nixos/modules/misc/locate.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"afs\"\n  \"anon_inodefs\"\n  \"auto\"\n  \"autofs\"\n  \"bdev\"\n  \"binfmt\"\n  \"binfmt_misc\"\n  \"ceph\"\n  \"cgroup\"\n  \"cgroup2\"\n  \"cifs\"\n  \"coda\"\n  \"configfs\"\n  \"cramfs\"\n  \"cpuset\"\n  \"curlftpfs\"\n  \"debugfs\"\n  \"devfs\"\n  \"devpts\"\n  \"devtmpfs\"\n  \"ecryptfs\"\n  \"eventpollfs\"\n  \"exofs\"\n  \"futexfs\"\n  \"ftpfs\"\n  \"fuse\"\n  \"fusectl\"\n  \"fusesmb\"\n  \"fuse.ceph\"\n  \"fuse.glusterfs\"\n  \"fuse.gvfsd-fuse\"\n  \"fuse.mfs\"\n  \"fuse.rclone\"\n  \"fuse.rozofs\"\n  \"fuse.sshfs\"\n  \"gfs\"\n  \"gfs2\"\n  \"hostfs\"\n  \"hugetlbfs\"\n  \"inotifyfs\"\n  \"iso9660\"\n  \"jffs2\"\n  \"lustre\"\n  \"lustre_lite\"\n  \"misc\"\n  \"mfs\"\n  \"mqueue\"\n  \"ncpfs\"\n  \"nfs\"\n  \"NFS\"\n  \"nfs4\"\n  \"nfsd\"\n  \"nnpfs\"\n  \"ocfs\"\n  \"ocfs2\"\n  \"pipefs\"\n  \"proc\"\n  \"ramfs\"\n  \"rpc_pipefs\"\n  \"securityfs\"\n  \"selinuxfs\"\n  \"sfs\"\n  \"shfs\"\n  \"smbfs\"\n  \"sockfs\"\n  \"spufs\"\n  \"sshfs\"\n  \"subfs\"\n  \"supermount\"\n  \"sysfs\"\n  \"tmpfs\"\n  \"tracefs\"\n  \"ubifs\"\n  \"udev\"\n  \"udf\"\n  \"usbfs\"\n  \"vboxsf\"\n  \"vperfctrfs\"\n]"}, "description": {"_type": "mdDoc", "text": "Which filesystem types to exclude from indexing\n"}, "loc": ["services", "locate", "pruneFS"], "readOnly": false, "type": "list of string"}, "services.locate.pruneNames": {"declarations": ["nixos/modules/misc/locate.nix"], "default": {"_type": "literalMD", "text": "`[ \".bzr\" \".cache\" \".git\" \".hg\" \".svn\" ]`, if\nsupported by the locate implementation (i.e. mlocate or plocate).\n"}, "description": {"_type": "mdDoc", "text": "Directory components which should exclude paths containing them from indexing\n"}, "loc": ["services", "locate", "pruneNames"], "readOnly": false, "type": "list of string"}, "services.locate.prunePaths": {"declarations": ["nixos/modules/misc/locate.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"/tmp\"\n  \"/var/tmp\"\n  \"/var/cache\"\n  \"/var/lock\"\n  \"/var/run\"\n  \"/var/spool\"\n  \"/nix/store\"\n  \"/nix/var/log/nix\"\n]"}, "description": {"_type": "mdDoc", "text": "Which paths to exclude from indexing\n"}, "loc": ["services", "locate", "prunePaths"], "readOnly": false, "type": "list of path"}, "services.logcheck.config": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "\"FQDN=1\""}, "description": {"_type": "mdDoc", "text": "Config options that you would like in logcheck.conf.\n"}, "loc": ["services", "logcheck", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.logcheck.enable": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable logcheck cron job."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "logcheck", "enable"], "readOnly": false, "type": "boolean"}, "services.logcheck.extraGroups": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra groups for the logcheck user, for example to be able to use sendmail,\nor to access certain log files.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"postdrop\"\n  \"mongodb\"\n]"}, "loc": ["services", "logcheck", "extraGroups"], "readOnly": false, "type": "list of string"}, "services.logcheck.extraRulesDirs": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Directories with extra rules.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/etc/logcheck\"\n]"}, "loc": ["services", "logcheck", "extraRulesDirs"], "readOnly": false, "type": "list of path"}, "services.logcheck.files": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"/var/log/messages\"\n]"}, "description": {"_type": "mdDoc", "text": "Which log files to check.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/var/log/messages\"\n  \"/var/log/mail\"\n]"}, "loc": ["services", "logcheck", "files"], "readOnly": false, "type": "list of path"}, "services.logcheck.ignore": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option defines extra ignore rules.\n"}, "loc": ["services", "logcheck", "ignore"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.logcheck.ignore.<name>.level": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "\"server\""}, "description": {"_type": "mdDoc", "text": "Set the logcheck level.\n"}, "loc": ["services", "logcheck", "ignore", "<name>", "level"], "readOnly": false, "type": "one of \"workstation\", \"server\", \"paranoid\""}, "services.logcheck.ignore.<name>.regex": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Regex specifying which log lines to ignore.\n"}, "loc": ["services", "logcheck", "ignore", "<name>", "regex"], "readOnly": false, "type": "string"}, "services.logcheck.ignoreCron": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option defines extra ignore rules for cronjobs.\n"}, "loc": ["services", "logcheck", "ignoreCron"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.logcheck.ignoreCron.<name>.cmdline": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Command line for the cron job. Will be turned into a regex for the logcheck ignore rule.\n"}, "loc": ["services", "logcheck", "ignoreCron", "<name>", "cmdline"], "readOnly": false, "type": "string"}, "services.logcheck.ignoreCron.<name>.timeArgs": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "\"min hr dom mon dow\" crontab time args, to auto-create a cronjob too.\nLeave at null to not do this and just add a logcheck ignore rule.\n"}, "example": {"_type": "literalExpression", "text": "\"02 06 * * *\""}, "loc": ["services", "logcheck", "ignoreCron", "<name>", "timeArgs"], "readOnly": false, "type": "null or string"}, "services.logcheck.ignoreCron.<name>.user": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "User that runs the cronjob.\n"}, "loc": ["services", "logcheck", "ignoreCron", "<name>", "user"], "readOnly": false, "type": "string"}, "services.logcheck.level": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "\"server\""}, "description": {"_type": "mdDoc", "text": "Set the logcheck level. Either \"workstation\", \"server\", or \"paranoid\".\n"}, "loc": ["services", "logcheck", "level"], "readOnly": false, "type": "string"}, "services.logcheck.mailTo": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "Email address to send reports to.\n"}, "example": {"_type": "literalExpression", "text": "\"you@domain.com\""}, "loc": ["services", "logcheck", "mailTo"], "readOnly": false, "type": "string"}, "services.logcheck.timeOfDay": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "\"*\""}, "description": {"_type": "mdDoc", "text": "Time of day to run logcheck. A logcheck will be scheduled at xx:02 each day.\nLeave default (*) to run every hour. Of course when nothing special was logged,\nlogcheck will be silent.\n"}, "example": {"_type": "literalExpression", "text": "\"6\""}, "loc": ["services", "logcheck", "timeOfDay"], "readOnly": false, "type": "string"}, "services.logcheck.user": {"declarations": ["nixos/modules/services/logging/logcheck.nix"], "default": {"_type": "literalExpression", "text": "\"logcheck\""}, "description": {"_type": "mdDoc", "text": "Username for the logcheck user.\n"}, "loc": ["services", "logcheck", "user"], "readOnly": false, "type": "string"}, "services.logind.extraConfig": {"declarations": ["nixos/modules/system/boot/systemd/logind.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config options for systemd-logind. See\n[\nlogind.conf(5)](https://www.freedesktop.org/software/systemd/man/logind.conf.html) for available options.\n"}, "example": {"_type": "literalExpression", "text": "\"IdleAction=lock\""}, "loc": ["services", "logind", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.logind.killUserProcesses": {"declarations": ["nixos/modules/system/boot/systemd/logind.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Specifies whether the processes of a user should be killed\nwhen the user logs out.  If true, the scope unit corresponding\nto the session and all processes inside that scope will be\nterminated.  If false, the scope is \"abandoned\" (see\n[systemd.scope(5)](https://www.freedesktop.org/software/systemd/man/systemd.scope.html#)), and processes are not killed.\n\nSee [logind.conf(5)](https://www.freedesktop.org/software/systemd/man/logind.conf.html#KillUserProcesses=)\nfor more details.\n"}, "loc": ["services", "logind", "killUserProcesses"], "readOnly": false, "type": "boolean"}, "services.logind.lidSwitch": {"declarations": ["nixos/modules/system/boot/systemd/logind.nix"], "default": {"_type": "literalExpression", "text": "\"suspend\""}, "description": {"_type": "mdDoc", "text": "Specifies what to be done when the laptop lid is closed.\n"}, "example": {"_type": "literalExpression", "text": "\"ignore\""}, "loc": ["services", "logind", "lidSwitch"], "readOnly": false, "type": "one of \"ignore\", \"poweroff\", \"reboot\", \"halt\", \"kexec\", \"suspend\", \"hibernate\", \"hybrid-sleep\", \"suspend-then-hibernate\", \"lock\""}, "services.logind.lidSwitchDocked": {"declarations": ["nixos/modules/system/boot/systemd/logind.nix"], "default": {"_type": "literalExpression", "text": "\"ignore\""}, "description": {"_type": "mdDoc", "text": "Specifies what to be done when the laptop lid is closed\nand another screen is added.\n"}, "example": {"_type": "literalExpression", "text": "\"suspend\""}, "loc": ["services", "logind", "lidSwitchDocked"], "readOnly": false, "type": "one of \"ignore\", \"poweroff\", \"reboot\", \"halt\", \"kexec\", \"suspend\", \"hibernate\", \"hybrid-sleep\", \"suspend-then-hibernate\", \"lock\""}, "services.logind.lidSwitchExternalPower": {"declarations": ["nixos/modules/system/boot/systemd/logind.nix"], "default": {"_type": "literalExpression", "text": "services.logind.lidSwitch"}, "description": {"_type": "mdDoc", "text": "Specifies what to do when the laptop lid is closed and the system is\non external power. By default use the same action as specified in\nservices.logind.lidSwitch.\n"}, "example": {"_type": "literalExpression", "text": "\"ignore\""}, "loc": ["services", "logind", "lidSwitchExternalPower"], "readOnly": false, "type": "one of \"ignore\", \"poweroff\", \"reboot\", \"halt\", \"kexec\", \"suspend\", \"hibernate\", \"hybrid-sleep\", \"suspend-then-hibernate\", \"lock\""}, "services.logkeys.device": {"declarations": ["nixos/modules/services/misc/logkeys.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use the given device as keyboard input event device instead of /dev/input/eventX default."}, "example": {"_type": "literalExpression", "text": "\"/dev/input/event15\""}, "loc": ["services", "logkeys", "device"], "readOnly": false, "type": "null or string"}, "services.logkeys.enable": {"declarations": ["nixos/modules/services/misc/logkeys.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable logkeys service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "logkeys", "enable"], "readOnly": false, "type": "boolean"}, "services.logmein-hamachi.enable": {"declarations": ["nixos/modules/services/networking/logmein-hamachi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable LogMeIn Hamachi, a proprietary\n(closed source) commercial VPN software.\n"}, "loc": ["services", "logmein-hamachi", "enable"], "readOnly": false, "type": "boolean"}, "services.logrotate.checkConfig": {"declarations": ["nixos/modules/services/logging/logrotate.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the config should be checked at build time.\n\nSome options are not checkable at build time because of the build sandbox:\nfor example, the test does not know about existing files and system users are\nnot known.\nThese limitations mean we must adjust the file for tests (missingok is forced\nand users are replaced by dummy users), so tests are complemented by a\nlogrotate-checkconf service that is enabled by default.\nThis extra check can be disabled by disabling it at the systemd level with the\n{option}`services.systemd.services.logrotate-checkconf.enable` option.\n\nConversely there are still things that might make this check fail incorrectly\n(e.g. a file path where we don't have access to intermediate directories):\nin this case you can disable the failing check with this option.\n"}, "loc": ["services", "logrotate", "checkConfig"], "readOnly": false, "type": "boolean"}, "services.logrotate.configFile": {"declarations": ["nixos/modules/services/logging/logrotate.nix"], "default": {"_type": "literalExpression", "text": "''\n  A configuration file automatically generated by NixOS.\n''"}, "description": {"_type": "mdDoc", "text": "Override the configuration file used by logrotate. By default,\nNixOS generates one automatically from [](#opt-services.logrotate.settings).\n"}, "example": {"_type": "literalExpression", "text": "pkgs.writeText \"logrotate.conf\" ''\n  missingok\n  \"/var/log/*.log\" {\n    rotate 4\n    weekly\n  }\n'';\n"}, "loc": ["services", "logrotate", "configFile"], "readOnly": false, "type": "path"}, "services.logrotate.enable": {"declarations": ["nixos/modules/services/logging/logrotate.nix"], "default": {"_type": "literalExpression", "text": "cfg.settings != {}"}, "description": {"_type": "mdDoc", "text": "Whether to enable the logrotate systemd service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "logrotate", "enable"], "readOnly": false, "type": "boolean"}, "services.logrotate.settings": {"declarations": ["nixos/modules/services/logging/logrotate.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "logrotate freeform settings: each attribute here will define its own section,\nordered by priority, which can either define files to rotate with their settings\nor settings common to all further files settings.\nRefer to <https://linux.die.net/man/8/logrotate> for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  # global options\n  header = {\n    dateext = true;\n  };\n  # example custom files\n  \"/var/log/mylog.log\" = {\n    frequency = \"daily\";\n    rotate = 3;\n  };\n  \"multiple paths\" = {\n     files = [\n      \"/var/log/first*.log\"\n      \"/var/log/second.log\"\n    ];\n  };\n};\n"}, "loc": ["services", "logrotate", "settings"], "readOnly": false, "type": "attribute set of (attribute set of (null or signed integer or boolean or string))"}, "services.logrotate.settings.<name>.enable": {"declarations": ["nixos/modules/services/logging/logrotate.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable setting individual kill switch."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "logrotate", "settings", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.logrotate.settings.<name>.files": {"declarations": ["nixos/modules/services/logging/logrotate.nix"], "default": {"_type": "literalExpression", "text": "''\n  The attrset name if not specified\n''"}, "description": {"_type": "mdDoc", "text": "Single or list of files for which rules are defined.\nThe files are quoted with double-quotes in logrotate configuration,\nso globs and spaces are supported.\nNote this setting is ignored if globals is true.\n"}, "loc": ["services", "logrotate", "settings", "<name>", "files"], "readOnly": false, "type": "string or list of string"}, "services.logrotate.settings.<name>.frequency": {"declarations": ["nixos/modules/services/logging/logrotate.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How often to rotate the logs. Defaults to previously set global setting,\nwhich itself defaults to weekly.\n"}, "loc": ["services", "logrotate", "settings", "<name>", "frequency"], "readOnly": false, "type": "null or string"}, "services.logrotate.settings.<name>.global": {"declarations": ["nixos/modules/services/logging/logrotate.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether this setting is a global option or not: set to have these\nsettings apply to all files settings with a higher priority.\n"}, "loc": ["services", "logrotate", "settings", "<name>", "global"], "readOnly": false, "type": "boolean"}, "services.logrotate.settings.<name>.priority": {"declarations": ["nixos/modules/services/logging/logrotate.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this logrotate block in relation to the others. The semantics are\nthe same as with `lib.mkOrder`. Smaller values are inserted first.\n"}, "loc": ["services", "logrotate", "settings", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.logstash.dataDir": {"declarations": ["nixos/modules/services/logging/logstash.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/logstash\""}, "description": {"_type": "mdDoc", "text": "A path to directory writable by logstash that it uses to store data.\nPlugins will also have access to this path.\n"}, "loc": ["services", "logstash", "dataDir"], "readOnly": false, "type": "string"}, "services.logstash.enable": {"declarations": ["nixos/modules/services/logging/logstash.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable logstash."}, "loc": ["services", "logstash", "enable"], "readOnly": false, "type": "boolean"}, "services.logstash.extraJvmOptions": {"declarations": ["nixos/modules/services/logging/logstash.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra JVM options, one per line (jvm.options format)."}, "example": {"_type": "literalExpression", "text": "''\n  -Xms2g\n  -Xmx2g\n''"}, "loc": ["services", "logstash", "extraJvmOptions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.logstash.extraSettings": {"declarations": ["nixos/modules/services/logging/logstash.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra Logstash settings in YAML format."}, "example": {"_type": "literalExpression", "text": "''\n  pipeline:\n    batch:\n      size: 125\n      delay: 5\n''"}, "loc": ["services", "logstash", "extraSettings"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.logstash.filterConfig": {"declarations": ["nixos/modules/services/logging/logstash.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "logstash filter configuration."}, "example": {"_type": "literalExpression", "text": "''\n  if [type] == \"syslog\" {\n    # Keep only relevant systemd fields\n    # http://www.freedesktop.org/software/systemd/man/systemd.journal-fields.html\n    prune {\n      whitelist_names => [\n        \"type\", \"@timestamp\", \"@version\",\n        \"MESSAGE\", \"PRIORITY\", \"SYSLOG_FACILITY\"\n      ]\n    }\n  }\n''"}, "loc": ["services", "logstash", "filterConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.logstash.filterWorkers": {"declarations": ["nixos/modules/services/logging/logstash.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "The quantity of filter workers to run."}, "loc": ["services", "logstash", "filterWorkers"], "readOnly": false, "type": "signed integer"}, "services.logstash.inputConfig": {"declarations": ["nixos/modules/services/logging/logstash.nix"], "default": {"_type": "literalExpression", "text": "\"generator { }\""}, "description": {"_type": "mdDoc", "text": "Logstash input configuration."}, "example": {"_type": "literalExpression", "text": "''\n  # Read from journal\n  pipe {\n    command => \"${config.systemd.package}/bin/journalctl -f -o json\"\n    type => \"syslog\" codec => json {}\n  }\n''\n"}, "loc": ["services", "logstash", "inputConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.logstash.listenAddress": {"declarations": ["nixos/modules/services/logging/logstash.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address on which to start webserver."}, "loc": ["services", "logstash", "listenAddress"], "readOnly": false, "type": "string"}, "services.logstash.logLevel": {"declarations": ["nixos/modules/services/logging/logstash.nix"], "default": {"_type": "literalExpression", "text": "\"warn\""}, "description": {"_type": "mdDoc", "text": "Logging verbosity level."}, "loc": ["services", "logstash", "logLevel"], "readOnly": false, "type": "one of \"debug\", \"info\", \"warn\", \"error\", \"fatal\""}, "services.logstash.outputConfig": {"declarations": ["nixos/modules/services/logging/logstash.nix"], "default": {"_type": "literalExpression", "text": "\"stdout { codec => rubydebug }\""}, "description": {"_type": "mdDoc", "text": "Logstash output configuration."}, "example": {"_type": "literalExpression", "text": "''\n  redis { host => [\"localhost\"] data_type => \"list\" key => \"logstash\" codec => json }\n  elasticsearch { }\n''"}, "loc": ["services", "logstash", "outputConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.logstash.package": {"declarations": ["nixos/modules/services/logging/logstash.nix"], "default": {"_type": "literalExpression", "text": "pkgs.logstash"}, "description": {"_type": "mdDoc", "text": "Logstash package to use."}, "loc": ["services", "logstash", "package"], "readOnly": false, "type": "package"}, "services.logstash.plugins": {"declarations": ["nixos/modules/services/logging/logstash.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The paths to find other logstash plugins in."}, "example": {"_type": "literalExpression", "text": "[ pkgs.logstash-contrib ]"}, "loc": ["services", "logstash", "plugins"], "readOnly": false, "type": "list of path"}, "services.logstash.port": {"declarations": ["nixos/modules/services/logging/logstash.nix"], "default": {"_type": "literalExpression", "text": "\"9292\""}, "description": {"_type": "mdDoc", "text": "Port on which to start webserver."}, "loc": ["services", "logstash", "port"], "readOnly": false, "type": "string"}, "services.loki.configFile": {"declarations": ["nixos/modules/services/monitoring/loki.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a configuration file that Loki should use.\n"}, "loc": ["services", "loki", "configFile"], "readOnly": false, "type": "null or path"}, "services.loki.configuration": {"declarations": ["nixos/modules/services/monitoring/loki.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specify the configuration for Loki in Nix.\n"}, "loc": ["services", "loki", "configuration"], "readOnly": false, "type": "JSON value"}, "services.loki.dataDir": {"declarations": ["nixos/modules/services/monitoring/loki.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/loki\""}, "description": {"_type": "mdDoc", "text": "Specify the directory for Loki.\n"}, "loc": ["services", "loki", "dataDir"], "readOnly": false, "type": "path"}, "services.loki.enable": {"declarations": ["nixos/modules/services/monitoring/loki.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable loki."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "loki", "enable"], "readOnly": false, "type": "boolean"}, "services.loki.extraFlags": {"declarations": ["nixos/modules/services/monitoring/loki.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Specify a list of additional command line flags,\nwhich get escaped and are then passed to Loki.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--server.http-listen-port=3101\"\n]"}, "loc": ["services", "loki", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.loki.group": {"declarations": ["nixos/modules/services/monitoring/loki.nix"], "default": {"_type": "literalExpression", "text": "\"loki\""}, "description": {"_type": "mdDoc", "text": "Group under which the Loki service runs.\n"}, "loc": ["services", "loki", "group"], "readOnly": false, "type": "string"}, "services.loki.package": {"declarations": ["nixos/modules/services/monitoring/loki.nix"], "default": {"_type": "literalExpression", "text": "pkgs.grafana-loki"}, "description": {"_type": "mdDoc", "text": "The grafana-loki package to use."}, "loc": ["services", "loki", "package"], "readOnly": false, "type": "package"}, "services.loki.user": {"declarations": ["nixos/modules/services/monitoring/loki.nix"], "default": {"_type": "literalExpression", "text": "\"loki\""}, "description": {"_type": "mdDoc", "text": "User under which the Loki service runs.\n"}, "loc": ["services", "loki", "user"], "readOnly": false, "type": "string"}, "services.lokinet.enable": {"declarations": ["nixos/modules/services/networking/lokinet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Lokinet daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lokinet", "enable"], "readOnly": false, "type": "boolean"}, "services.lokinet.package": {"declarations": ["nixos/modules/services/networking/lokinet.nix"], "default": {"_type": "literalExpression", "text": "pkgs.lokinet"}, "description": {"_type": "mdDoc", "text": "Lokinet package to use."}, "loc": ["services", "lokinet", "package"], "readOnly": false, "type": "package"}, "services.lokinet.settings": {"declarations": ["nixos/modules/services/networking/lokinet.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for Lokinet.\nCurrently, the best way to view the available settings is by\ngenerating a config file using `lokinet -g`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  dns = {\n    bind = \"127.3.2.1\";\n    upstream = [ \"1.1.1.1\" \"8.8.8.8\" ];\n  };\n\n  network.exit-node = [ \"example.loki\" \"example2.loki\" ];\n}\n"}, "loc": ["services", "lokinet", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string) or a list of them for duplicate keys)"}, "services.lokinet.settings.dns.bind": {"declarations": ["nixos/modules/services/networking/lokinet.nix"], "default": {"_type": "literalExpression", "text": "\"127.3.2.1\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for handling DNS requests."}, "loc": ["services", "lokinet", "settings", "dns", "bind"], "readOnly": false, "type": "string"}, "services.lokinet.settings.dns.upstream": {"declarations": ["nixos/modules/services/networking/lokinet.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"9.9.9.10\"\n]"}, "description": {"_type": "mdDoc", "text": "Upstream resolver(s) to use as fallback for non-loki addresses.\nMultiple values accepted.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"1.1.1.1\"\n  \"8.8.8.8\"\n]"}, "loc": ["services", "lokinet", "settings", "dns", "upstream"], "readOnly": false, "type": "list of string"}, "services.lokinet.settings.network.exit": {"declarations": ["nixos/modules/services/networking/lokinet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to act as an exit node. Beware that this\nincreases demand on the server and may pose liability concerns.\nEnable at your own risk.\n"}, "loc": ["services", "lokinet", "settings", "network", "exit"], "readOnly": false, "type": "boolean"}, "services.lokinet.settings.network.exit-node": {"declarations": ["nixos/modules/services/networking/lokinet.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a `.loki` address and an optional ip range to use as an exit broker.\nSee <http://probably.loki/wiki/index.php?title=Exit_Nodes> for\na list of exit nodes.\n"}, "example": {"_type": "literalExpression", "text": "''\n  exit-node = [ \"example.loki\" ];              # maps all exit traffic to example.loki\n  exit-node = [ \"example.loki:100.0.0.0/24\" ]; # maps 100.0.0.0/24 to example.loki\n''"}, "loc": ["services", "lokinet", "settings", "network", "exit-node"], "readOnly": false, "type": "null or (list of string)"}, "services.lokinet.settings.network.keyfile": {"declarations": ["nixos/modules/services/networking/lokinet.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The private key to persist address with. If not specified the address will be ephemeral.\nThis keyfile is generated automatically if the specified file doesn't exist.\n"}, "example": {"_type": "literalExpression", "text": "\"snappkey.private\""}, "loc": ["services", "lokinet", "settings", "network", "keyfile"], "readOnly": false, "type": "null or string"}, "services.lokinet.useLocally": {"declarations": ["nixos/modules/services/networking/lokinet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use Lokinet locally."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lokinet", "useLocally"], "readOnly": false, "type": "boolean"}, "services.longview.apacheStatusUrl": {"declarations": ["nixos/modules/services/monitoring/longview.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The Apache status page URL. If provided, Longview will\ngather statistics from this location. This requires Apache\nmod_status to be loaded and enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"http://127.0.0.1/server-status\""}, "loc": ["services", "longview", "apacheStatusUrl"], "readOnly": false, "type": "string"}, "services.longview.apiKey": {"declarations": ["nixos/modules/services/monitoring/longview.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Longview API key. To get this, look in Longview settings which\nare found at https://manager.linode.com/longview/.\n\nWarning: this secret is stored in the world-readable Nix store!\nUse {option}`apiKeyFile` instead.\n"}, "example": {"_type": "literalExpression", "text": "\"01234567-89AB-CDEF-0123456789ABCDEF\""}, "loc": ["services", "longview", "apiKey"], "readOnly": false, "type": "string"}, "services.longview.apiKeyFile": {"declarations": ["nixos/modules/services/monitoring/longview.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the Longview API key.\nTo get this, look in Longview settings which\nare found at https://manager.linode.com/longview/.\n\n{option}`apiKeyFile` takes precedence over {option}`apiKey`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/longview-api-key\""}, "loc": ["services", "longview", "apiKeyFile"], "readOnly": false, "type": "null or path"}, "services.longview.enable": {"declarations": ["nixos/modules/services/monitoring/longview.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, system metrics will be sent to Linode LongView.\n"}, "loc": ["services", "longview", "enable"], "readOnly": false, "type": "boolean"}, "services.longview.mysqlPassword": {"declarations": ["nixos/modules/services/monitoring/longview.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The password corresponding to {option}`mysqlUser`.\nWarning: this is stored in cleartext in the Nix store!\nUse {option}`mysqlPasswordFile` instead.\n"}, "loc": ["services", "longview", "mysqlPassword"], "readOnly": false, "type": "string"}, "services.longview.mysqlPasswordFile": {"declarations": ["nixos/modules/services/monitoring/longview.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to {option}`mysqlUser`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/dbpassword\""}, "loc": ["services", "longview", "mysqlPasswordFile"], "readOnly": false, "type": "null or path"}, "services.longview.mysqlUser": {"declarations": ["nixos/modules/services/monitoring/longview.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The user for connecting to the MySQL database. If provided,\nLongview will connect to MySQL and collect statistics about\nqueries, etc. This user does not need to have been granted\nany extra privileges.\n"}, "loc": ["services", "longview", "mysqlUser"], "readOnly": false, "type": "string"}, "services.longview.nginxStatusUrl": {"declarations": ["nixos/modules/services/monitoring/longview.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The Nginx status page URL. Longview will gather statistics\nfrom this URL. This requires the Nginx stub_status module to\nbe enabled and configured at the given location.\n"}, "example": {"_type": "literalExpression", "text": "\"http://127.0.0.1/nginx_status\""}, "loc": ["services", "longview", "nginxStatusUrl"], "readOnly": false, "type": "string"}, "services.lorri.enable": {"declarations": ["nixos/modules/services/development/lorri.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables the daemon for `lorri`, a nix-shell replacement for project\ndevelopment. The socket-activated daemon starts on the first request\nissued by the `lorri` command.\n"}, "loc": ["services", "lorri", "enable"], "readOnly": false, "type": "boolean"}, "services.lorri.package": {"declarations": ["nixos/modules/services/development/lorri.nix"], "default": {"_type": "literalExpression", "text": "pkgs.lorri"}, "description": {"_type": "mdDoc", "text": "The lorri package to use.\n"}, "loc": ["services", "lorri", "package"], "readOnly": false, "type": "package"}, "services.lshd.enable": {"declarations": ["nixos/modules/services/networking/ssh/lshd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the GNU lshd SSH2 daemon, which allows\nsecure remote login.\n"}, "loc": ["services", "lshd", "enable"], "readOnly": false, "type": "boolean"}, "services.lshd.hostKey": {"declarations": ["nixos/modules/services/networking/ssh/lshd.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/lsh/host-key\""}, "description": {"_type": "mdDoc", "text": "Path to the server's private key.  Note that this key must\nhave been created, e.g., using \"lsh-keygen --server |\nlsh-writekey --server\", so that you can run lshd.\n"}, "loc": ["services", "lshd", "hostKey"], "readOnly": false, "type": "string"}, "services.lshd.interfaces": {"declarations": ["nixos/modules/services/networking/ssh/lshd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of network interfaces where listening for connections.\nWhen providing the empty list, `[]`, lshd listens on all\nnetwork interfaces.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"localhost\"\n  \"1.2.3.4:443\"\n]"}, "loc": ["services", "lshd", "interfaces"], "readOnly": false, "type": "list of string"}, "services.lshd.loginShell": {"declarations": ["nixos/modules/services/networking/ssh/lshd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If non-null, override the default login shell with the\nspecified value.\n"}, "example": {"_type": "literalExpression", "text": "\"/nix/store/xyz-bash-10.0/bin/bash10\""}, "loc": ["services", "lshd", "loginShell"], "readOnly": false, "type": "null or string"}, "services.lshd.passwordAuthentication": {"declarations": ["nixos/modules/services/networking/ssh/lshd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable password authentication."}, "loc": ["services", "lshd", "passwordAuthentication"], "readOnly": false, "type": "boolean"}, "services.lshd.portNumber": {"declarations": ["nixos/modules/services/networking/ssh/lshd.nix"], "default": {"_type": "literalExpression", "text": "22"}, "description": {"_type": "mdDoc", "text": "The port on which to listen for connections.\n"}, "loc": ["services", "lshd", "portNumber"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.lshd.publicKeyAuthentication": {"declarations": ["nixos/modules/services/networking/ssh/lshd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable public key authentication."}, "loc": ["services", "lshd", "publicKeyAuthentication"], "readOnly": false, "type": "boolean"}, "services.lshd.rootLogin": {"declarations": ["nixos/modules/services/networking/ssh/lshd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable remote root login."}, "loc": ["services", "lshd", "rootLogin"], "readOnly": false, "type": "boolean"}, "services.lshd.srpKeyExchange": {"declarations": ["nixos/modules/services/networking/ssh/lshd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SRP key exchange and user authentication.\n"}, "loc": ["services", "lshd", "srpKeyExchange"], "readOnly": false, "type": "boolean"}, "services.lshd.subsystems": {"declarations": ["nixos/modules/services/networking/ssh/lshd.nix"], "description": {"_type": "mdDoc", "text": "List of subsystem-path pairs, where the head of the pair\ndenotes the subsystem name, and the tail denotes the path to\nan executable implementing it.\n"}, "loc": ["services", "lshd", "subsystems"], "readOnly": false, "type": "list of path"}, "services.lshd.syslog": {"declarations": ["nixos/modules/services/networking/ssh/lshd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable syslog output."}, "loc": ["services", "lshd", "syslog"], "readOnly": false, "type": "boolean"}, "services.lshd.tcpForwarding": {"declarations": ["nixos/modules/services/networking/ssh/lshd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable TCP/IP forwarding."}, "loc": ["services", "lshd", "tcpForwarding"], "readOnly": false, "type": "boolean"}, "services.lshd.x11Forwarding": {"declarations": ["nixos/modules/services/networking/ssh/lshd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable X11 forwarding."}, "loc": ["services", "lshd", "x11Forwarding"], "readOnly": false, "type": "boolean"}, "services.lvm.boot.thin.enable": {"declarations": ["nixos/modules/tasks/lvm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable support for booting from ThinLVs."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lvm", "boot", "thin", "enable"], "readOnly": false, "type": "boolean"}, "services.lvm.boot.vdo.enable": {"declarations": ["nixos/modules/tasks/lvm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable support for booting from VDOLVs."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lvm", "boot", "vdo", "enable"], "readOnly": false, "type": "boolean"}, "services.lvm.dmeventd.enable": {"declarations": ["nixos/modules/tasks/lvm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the LVM dmevent daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lvm", "dmeventd", "enable"], "readOnly": false, "type": "boolean"}, "services.lvm.enable": {"declarations": ["nixos/modules/tasks/lvm.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable lvm2."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lvm", "enable"], "readOnly": false, "type": "boolean"}, "services.lxd-image-server.enable": {"declarations": ["nixos/modules/services/networking/lxd-image-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable lxd-image-server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lxd-image-server", "enable"], "readOnly": false, "type": "boolean"}, "services.lxd-image-server.group": {"declarations": ["nixos/modules/services/networking/lxd-image-server.nix"], "default": {"_type": "literalExpression", "text": "\"nginx\""}, "description": {"_type": "mdDoc", "text": "Group assigned to the user and the webroot directory."}, "example": {"_type": "literalExpression", "text": "\"www-data\""}, "loc": ["services", "lxd-image-server", "group"], "readOnly": false, "type": "string"}, "services.lxd-image-server.nginx.domain": {"declarations": ["nixos/modules/services/networking/lxd-image-server.nix"], "description": {"_type": "mdDoc", "text": "Domain to use for nginx virtual host."}, "example": {"_type": "literalExpression", "text": "\"images.example.org\""}, "loc": ["services", "lxd-image-server", "nginx", "domain"], "readOnly": false, "type": "string"}, "services.lxd-image-server.nginx.enable": {"declarations": ["nixos/modules/services/networking/lxd-image-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nginx."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "lxd-image-server", "nginx", "enable"], "readOnly": false, "type": "boolean"}, "services.lxd-image-server.settings": {"declarations": ["nixos/modules/services/networking/lxd-image-server.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for lxd-image-server.\n\nExample see <https://github.com/Avature/lxd-image-server/blob/master/config.toml>.\n"}, "loc": ["services", "lxd-image-server", "settings"], "readOnly": false, "type": "TOML value"}, "services.mackerel-agent.apiKeyFile": {"declarations": ["nixos/modules/services/monitoring/mackerel-agent.nix"], "description": {"_type": "mdDoc", "text": "Path to file containing the Mackerel API key. The file should contain a\nsingle line of the following form:\n\n`apikey = \"EXAMPLE_API_KEY\"`\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/mackerel-api-key\""}, "loc": ["services", "mackerel-agent", "apiKeyFile"], "readOnly": false, "type": "path"}, "services.mackerel-agent.autoRetirement": {"declarations": ["nixos/modules/services/monitoring/mackerel-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Whether to automatically retire the host upon OS shutdown.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mackerel-agent", "autoRetirement"], "readOnly": false, "type": "boolean"}, "services.mackerel-agent.enable": {"declarations": ["nixos/modules/services/monitoring/mackerel-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable mackerel.io agent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mackerel-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.mackerel-agent.runAsRoot": {"declarations": ["nixos/modules/services/monitoring/mackerel-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Whether to run as root."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mackerel-agent", "runAsRoot"], "readOnly": false, "type": "boolean"}, "services.mackerel-agent.settings": {"declarations": ["nixos/modules/services/monitoring/mackerel-agent.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Options for mackerel-agent.conf.\n\nDocumentation:\n<https://mackerel.io/docs/entry/spec/agent>\n"}, "example": {"_type": "literalExpression", "text": "{\n  silent = false;\n  verbose = false;\n}"}, "loc": ["services", "mackerel-agent", "settings"], "readOnly": false, "type": "TOML value"}, "services.mackerel-agent.settings.diagnostic": {"declarations": ["nixos/modules/services/monitoring/mackerel-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Collect memory usage for the agent itself."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mackerel-agent", "settings", "diagnostic"], "readOnly": false, "type": "boolean"}, "services.mackerel-agent.settings.host_status.on_start": {"declarations": ["nixos/modules/services/monitoring/mackerel-agent.nix"], "default": {"_type": "literalExpression", "text": "\"working\""}, "description": {"_type": "mdDoc", "text": "Host status after agent startup."}, "loc": ["services", "mackerel-agent", "settings", "host_status", "on_start"], "readOnly": false, "type": "one of \"working\", \"standby\", \"maintenance\", \"poweroff\""}, "services.mackerel-agent.settings.host_status.on_stop": {"declarations": ["nixos/modules/services/monitoring/mackerel-agent.nix"], "default": {"_type": "literalExpression", "text": "\"poweroff\""}, "description": {"_type": "mdDoc", "text": "Host status after agent shutdown."}, "loc": ["services", "mackerel-agent", "settings", "host_status", "on_stop"], "readOnly": false, "type": "one of \"working\", \"standby\", \"maintenance\", \"poweroff\""}, "services.maddy.config": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "''\n  # Minimal configuration with TLS disabled, adapted from upstream example\n  # configuration here https://github.com/foxcpp/maddy/blob/master/maddy.conf\n  # Do not use this in production!\n  \n  auth.pass_table local_authdb {\n    table sql_table {\n      driver sqlite3\n      dsn credentials.db\n      table_name passwords\n    }\n  }\n  \n  storage.imapsql local_mailboxes {\n    driver sqlite3\n    dsn imapsql.db\n  }\n  \n  table.chain local_rewrites {\n    optional_step regexp \"(.+)\\+(.+)@(.+)\" \"$1@$3\"\n    optional_step static {\n      entry postmaster postmaster@$(primary_domain)\n    }\n    optional_step file /etc/maddy/aliases\n  }\n  \n  msgpipeline local_routing {\n    destination postmaster $(local_domains) {\n      modify {\n        replace_rcpt &local_rewrites\n      }\n      deliver_to &local_mailboxes\n    }\n    default_destination {\n      reject 550 5.1.1 \"User doesn't exist\"\n    }\n  }\n  \n  smtp tcp://0.0.0.0:25 {\n    limits {\n      all rate 20 1s\n      all concurrency 10\n    }\n    dmarc yes\n    check {\n      require_mx_record\n      dkim\n      spf\n    }\n    source $(local_domains) {\n      reject 501 5.1.8 \"Use Submission for outgoing SMTP\"\n    }\n    default_source {\n      destination postmaster $(local_domains) {\n        deliver_to &local_routing\n      }\n      default_destination {\n        reject 550 5.1.1 \"User doesn't exist\"\n      }\n    }\n  }\n  \n  submission tcp://0.0.0.0:587 {\n    limits {\n      all rate 50 1s\n    }\n    auth &local_authdb\n    source $(local_domains) {\n      check {\n          authorize_sender {\n              prepare_email &local_rewrites\n              user_to_email identity\n          }\n      }\n      destination postmaster $(local_domains) {\n          deliver_to &local_routing\n      }\n      default_destination {\n          modify {\n              dkim $(primary_domain) $(local_domains) default\n          }\n          deliver_to &remote_queue\n      }\n    }\n    default_source {\n      reject 501 5.1.8 \"Non-local sender domain\"\n    }\n  }\n  \n  target.remote outbound_delivery {\n    limits {\n      destination rate 20 1s\n      destination concurrency 10\n    }\n    mx_auth {\n      dane\n      mtasts {\n        cache fs\n        fs_dir mtasts_cache/\n      }\n      local_policy {\n          min_tls_level encrypted\n          min_mx_level none\n      }\n    }\n  }\n  \n  target.queue remote_queue {\n    target &outbound_delivery\n    autogenerated_msg_domain $(primary_domain)\n    bounce {\n      destination postmaster $(local_domains) {\n        deliver_to &local_routing\n      }\n      default_destination {\n          reject 550 5.0.0 \"Refusing to send DSNs to non-local addresses\"\n      }\n    }\n  }\n  \n  imap tcp://0.0.0.0:143 {\n    auth &local_authdb\n    storage &local_mailboxes\n  }\n''"}, "description": {"_type": "mdDoc", "text": "Server configuration, see\n[https://maddy.email](https://maddy.email) for\nmore information. The default configuration of this module will setup\nminimal Maddy instance for mail transfer without TLS encryption.\n\n::: {.note}\nThis should not be used in a production environment.\n:::\n"}, "loc": ["services", "maddy", "config"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.maddy.enable": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Maddy, a free an open source mail server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "maddy", "enable"], "readOnly": false, "type": "boolean"}, "services.maddy.ensureAccounts": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of IMAP accounts which get automatically created. Note that for\na complete setup, user credentials for these accounts are required\nand can be created using the `ensureCredentials` option.\nThis option does not delete accounts which are not (anymore) listed.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"user1@localhost\"\n  \"user2@localhost\"\n]"}, "loc": ["services", "maddy", "ensureAccounts"], "readOnly": false, "type": "list of string"}, "services.maddy.ensureCredentials": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "List of user accounts which get automatically created if they don't\nexist yet. Note that for a complete setup, corresponding mail boxes\nhave to get created using the `ensureAccounts` option.\nThis option does not delete accounts which are not (anymore) listed.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"user1@localhost\" = {\n    passwordFile = /secrets/user1-localhost;\n  };\n  \"user2@localhost\" = {\n    passwordFile = /secrets/user2-localhost;\n  };\n}"}, "loc": ["services", "maddy", "ensureCredentials"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.maddy.ensureCredentials.<name>.passwordFile": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the path to a file containing the\nclear text password for the user.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/file\""}, "loc": ["services", "maddy", "ensureCredentials", "<name>", "passwordFile"], "readOnly": false, "type": "path"}, "services.maddy.group": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "\"maddy\""}, "description": {"_type": "mdDoc", "text": "Group account under which maddy runs.\n\n::: {.note}\nIf left as the default value this group will automatically be created\non system activation, otherwise the sysadmin is responsible for\nensuring the group exists before the maddy service starts.\n:::\n"}, "loc": ["services", "maddy", "group"], "readOnly": false, "type": "Concatenated string"}, "services.maddy.hostname": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Hostname to use. It should be FQDN.\n"}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "maddy", "hostname"], "readOnly": false, "type": "Concatenated string"}, "services.maddy.localDomains": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"$(primary_domain)\"\n]"}, "description": {"_type": "mdDoc", "text": "Define list of allowed domains.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"$(primary_domain)\"\n  \"example.com\"\n  \"other.example.com\"\n]"}, "loc": ["services", "maddy", "localDomains"], "readOnly": false, "type": "list of string"}, "services.maddy.openFirewall": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open the configured incoming and outgoing mail server ports.\n"}, "loc": ["services", "maddy", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.maddy.primaryDomain": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Primary MX domain to use. It should be FQDN.\n"}, "example": {"_type": "literalExpression", "text": "\"mail.example.com\""}, "loc": ["services", "maddy", "primaryDomain"], "readOnly": false, "type": "Concatenated string"}, "services.maddy.secrets": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of files containing the various secrets. Should be in the format\nexpected by systemd's `EnvironmentFile` directory. Secrets can be\nreferenced in the format `{env:VAR}`.\n"}, "loc": ["services", "maddy", "secrets"], "readOnly": false, "type": "list of path"}, "services.maddy.tls.certificates": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of attribute sets containing paths to TLS certificates and\nkeys. Maddy will use SNI if multiple pairs are selected.\n"}, "example": {"_type": "literalExpression", "text": "[{\n  keyPath = \"/etc/ssl/mx1.example.org.key\";\n  certPath = \"/etc/ssl/mx1.example.org.crt\";\n}]\n"}, "loc": ["services", "maddy", "tls", "certificates"], "readOnly": false, "type": "list of (submodule)"}, "services.maddy.tls.certificates.*.certPath": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "description": {"_type": "mdDoc", "text": "Path to the certificate used for TLS.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/ssl/mx1.example.org.crt\""}, "loc": ["services", "maddy", "tls", "certificates", "*", "certPath"], "readOnly": false, "type": "path"}, "services.maddy.tls.certificates.*.keyPath": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "description": {"_type": "mdDoc", "text": "Path to the private key used for TLS.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/ssl/mx1.example.org.key\""}, "loc": ["services", "maddy", "tls", "certificates", "*", "keyPath"], "readOnly": false, "type": "path"}, "services.maddy.tls.extraConfig": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Arguments for the specified certificate loader.\n\nIn case the `tls` loader is set, the defaults are considered secure\nand there is no need to change anything in most cases.\nFor available options see [upstream manual](https://maddy.email/reference/tls/).\n\nFor ACME configuration, see [following page](https://maddy.email/reference/tls-acme).\n"}, "loc": ["services", "maddy", "tls", "extraConfig"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.maddy.tls.loader": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "\"off\""}, "description": {"_type": "mdDoc", "text": "TLS certificates are obtained by modules called \"certificate\nloaders\".\n\nThe `file` loader module reads certificates from files specified by\nthe `certificates` option.\n\nAlternatively the `acme` module can be used to automatically obtain\ncertificates using the ACME protocol.\n\nModule configuration is done via the `tls.extraConfig` option.\n\nSecrets such as API keys or passwords should not be supplied in\nplaintext. Instead the `secrets` option can be used to read secrets\nat runtime as environment variables. Secrets can be referenced with\n`{env:VAR}`.\n"}, "loc": ["services", "maddy", "tls", "loader"], "readOnly": false, "type": "null or one of \"off\", \"file\", \"acme\""}, "services.maddy.user": {"declarations": ["nixos/modules/services/mail/maddy.nix"], "default": {"_type": "literalExpression", "text": "\"maddy\""}, "description": {"_type": "mdDoc", "text": "User account under which maddy runs.\n\n::: {.note}\nIf left as the default value this user will automatically be created\non system activation, otherwise the sysadmin is responsible for\nensuring the user exists before the maddy service starts.\n:::\n"}, "loc": ["services", "maddy", "user"], "readOnly": false, "type": "Concatenated string"}, "services.magic-wormhole-mailbox-server.enable": {"declarations": ["nixos/modules/services/networking/magic-wormhole-mailbox-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Magic Wormhole Mailbox Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "magic-wormhole-mailbox-server", "enable"], "readOnly": false, "type": "boolean"}, "services.magnetico.crawler.address": {"declarations": ["nixos/modules/services/torrent/magnetico.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to be used for indexing DHT nodes.\n"}, "example": {"_type": "literalExpression", "text": "\"1.2.3.4\""}, "loc": ["services", "magnetico", "crawler", "address"], "readOnly": false, "type": "string"}, "services.magnetico.crawler.extraOptions": {"declarations": ["nixos/modules/services/torrent/magnetico.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line arguments to pass to magneticod.\n"}, "loc": ["services", "magnetico", "crawler", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.magnetico.crawler.maxLeeches": {"declarations": ["nixos/modules/services/torrent/magnetico.nix"], "default": {"_type": "literalExpression", "text": "200"}, "description": {"_type": "mdDoc", "text": "Maximum number of simultaneous leeches.\n"}, "loc": ["services", "magnetico", "crawler", "maxLeeches"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.magnetico.crawler.maxNeighbors": {"declarations": ["nixos/modules/services/torrent/magnetico.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Maximum number of simultaneous neighbors of an indexer.\nBe careful changing this number: high values can very\neasily cause your network to be congested or even crash\nyour router.\n"}, "loc": ["services", "magnetico", "crawler", "maxNeighbors"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.magnetico.crawler.port": {"declarations": ["nixos/modules/services/torrent/magnetico.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Port to be used for indexing DHT nodes.\nThis port should be added to\n{option}`networking.firewall.allowedTCPPorts`.\n"}, "loc": ["services", "magnetico", "crawler", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.magnetico.enable": {"declarations": ["nixos/modules/services/torrent/magnetico.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Magnetico, Bittorrent DHT crawler."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "magnetico", "enable"], "readOnly": false, "type": "boolean"}, "services.magnetico.web.address": {"declarations": ["nixos/modules/services/torrent/magnetico.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address the web interface will listen to.\n"}, "example": {"_type": "literalExpression", "text": "\"1.2.3.4\""}, "loc": ["services", "magnetico", "web", "address"], "readOnly": false, "type": "string"}, "services.magnetico.web.credentials": {"declarations": ["nixos/modules/services/torrent/magnetico.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The credentials to access the web interface, in case authentication is\nenabled, in the format `username:hash`. If unset no\nauthentication will be required.\n\nUsernames must start with a lowercase ([a-z]) ASCII character, might\ncontain non-consecutive underscores except at the end, and consists of\nsmall-case a-z characters and digits 0-9.  The\n{command}`htpasswd` tool from the `apacheHttpd`\npackage may be used to generate the hash:\n{command}`htpasswd -bnBC 12 username password`\n\n::: {.warning}\nThe hashes will be stored world-readable in the nix store.\nConsider using the `credentialsFile` option if you\ndon't want this.\n:::\n"}, "example": {"_type": "literalExpression", "text": "{\n  myuser = \"$2y$12$YE01LZ8jrbQbx6c0s2hdZO71dSjn2p/O9XsYJpz.5968yCysUgiaG\";\n}\n"}, "loc": ["services", "magnetico", "web", "credentials"], "readOnly": false, "type": "attribute set of string"}, "services.magnetico.web.credentialsFile": {"declarations": ["nixos/modules/services/torrent/magnetico.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the file holding the credentials to access the web\ninterface. If unset no authentication will be required.\n\nThe file must contain user names and password hashes in the format\n`username:hash`, one for each line.  Usernames must\nstart with a lowecase ([a-z]) ASCII character, might contain\nnon-consecutive underscores except at the end, and consists of\nsmall-case a-z characters and digits 0-9.\nThe {command}`htpasswd` tool from the `apacheHttpd`\npackage may be used to generate the hash:\n{command}`htpasswd -bnBC 12 username password`\n"}, "loc": ["services", "magnetico", "web", "credentialsFile"], "readOnly": false, "type": "null or path"}, "services.magnetico.web.extraOptions": {"declarations": ["nixos/modules/services/torrent/magnetico.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line arguments to pass to magneticow.\n"}, "loc": ["services", "magnetico", "web", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.magnetico.web.port": {"declarations": ["nixos/modules/services/torrent/magnetico.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Port the web interface will listen to.\n"}, "loc": ["services", "magnetico", "web", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mail.sendmailSetuidWrapper.capabilities": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "A comma-separated list of capability clauses to be given to the\nwrapper program. The format for capability clauses is described in the\n\u201cTEXTUAL REPRESENTATION\u201d section of the {manpage}`cap_from_text(3)`\nmanual page. For a list of capabilities supported by the system, check\nthe {manpage}`capabilities(7)` manual page.\n\n::: {.note}\n`cap_setpcap`, which is required for the wrapper\nprogram to be able to raise caps into the Ambient set is NOT raised\nto the Ambient set so that the real program cannot modify its own\ncapabilities!! This may be too restrictive for cases in which the\nreal program needs cap_setpcap but it at least leans on the side\nsecurity paranoid vs. too relaxed.\n:::\n"}, "loc": ["services", "mail", "sendmailSetuidWrapper", "capabilities"], "readOnly": false, "type": "strings concatenated with \",\""}, "services.mail.sendmailSetuidWrapper.group": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "description": {"_type": "mdDoc", "text": "The group of the wrapper program."}, "loc": ["services", "mail", "sendmailSetuidWrapper", "group"], "readOnly": false, "type": "string"}, "services.mail.sendmailSetuidWrapper.owner": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "description": {"_type": "mdDoc", "text": "The owner of the wrapper program."}, "loc": ["services", "mail", "sendmailSetuidWrapper", "owner"], "readOnly": false, "type": "string"}, "services.mail.sendmailSetuidWrapper.permissions": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "default": {"_type": "literalExpression", "text": "\"u+rx,g+x,o+x\""}, "description": {"_type": "mdDoc", "text": "The permissions of the wrapper program. The format is that of a\nsymbolic or numeric file mode understood by {command}`chmod`.\n"}, "example": {"_type": "literalExpression", "text": "\"a+rx\""}, "loc": ["services", "mail", "sendmailSetuidWrapper", "permissions"], "readOnly": false, "type": "file mode string"}, "services.mail.sendmailSetuidWrapper.program": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The name of the wrapper program. Defaults to the attribute name.\n"}, "loc": ["services", "mail", "sendmailSetuidWrapper", "program"], "readOnly": false, "type": "null or string"}, "services.mail.sendmailSetuidWrapper.setgid": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add the setgid bit the wrapper program."}, "loc": ["services", "mail", "sendmailSetuidWrapper", "setgid"], "readOnly": false, "type": "boolean"}, "services.mail.sendmailSetuidWrapper.setuid": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add the setuid bit the wrapper program."}, "loc": ["services", "mail", "sendmailSetuidWrapper", "setuid"], "readOnly": false, "type": "boolean"}, "services.mail.sendmailSetuidWrapper.source": {"declarations": ["nixos/modules/security/wrappers/default.nix"], "description": {"_type": "mdDoc", "text": "The absolute path to the program to be wrapped."}, "loc": ["services", "mail", "sendmailSetuidWrapper", "source"], "readOnly": false, "type": "path"}, "services.mailcatcher.enable": {"declarations": ["nixos/modules/services/mail/mailcatcher.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable MailCatcher."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mailcatcher", "enable"], "readOnly": false, "type": "boolean"}, "services.mailcatcher.http.ip": {"declarations": ["nixos/modules/services/mail/mailcatcher.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The ip address of the http server."}, "loc": ["services", "mailcatcher", "http", "ip"], "readOnly": false, "type": "string"}, "services.mailcatcher.http.path": {"declarations": ["nixos/modules/services/mail/mailcatcher.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Prefix to all HTTP paths."}, "example": {"_type": "literalExpression", "text": "\"/mailcatcher\""}, "loc": ["services", "mailcatcher", "http", "path"], "readOnly": false, "type": "null or string"}, "services.mailcatcher.http.port": {"declarations": ["nixos/modules/services/mail/mailcatcher.nix"], "default": {"_type": "literalExpression", "text": "1080"}, "description": {"_type": "mdDoc", "text": "The port address of the http server."}, "loc": ["services", "mailcatcher", "http", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mailcatcher.smtp.ip": {"declarations": ["nixos/modules/services/mail/mailcatcher.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The ip address of the smtp server."}, "loc": ["services", "mailcatcher", "smtp", "ip"], "readOnly": false, "type": "string"}, "services.mailcatcher.smtp.port": {"declarations": ["nixos/modules/services/mail/mailcatcher.nix"], "default": {"_type": "literalExpression", "text": "1025"}, "description": {"_type": "mdDoc", "text": "The port address of the smtp server."}, "loc": ["services", "mailcatcher", "smtp", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mailhog.apiPort": {"declarations": ["nixos/modules/services/mail/mailhog.nix"], "default": {"_type": "literalExpression", "text": "8025"}, "description": {"_type": "mdDoc", "text": "Port on which the API endpoint will listen."}, "loc": ["services", "mailhog", "apiPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mailhog.enable": {"declarations": ["nixos/modules/services/mail/mailhog.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable MailHog."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mailhog", "enable"], "readOnly": false, "type": "boolean"}, "services.mailhog.extraArgs": {"declarations": ["nixos/modules/services/mail/mailhog.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of additional arguments to pass to the MailHog process."}, "loc": ["services", "mailhog", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.mailhog.smtpPort": {"declarations": ["nixos/modules/services/mail/mailhog.nix"], "default": {"_type": "literalExpression", "text": "1025"}, "description": {"_type": "mdDoc", "text": "Port on which the SMTP endpoint will listen."}, "loc": ["services", "mailhog", "smtpPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mailhog.storage": {"declarations": ["nixos/modules/services/mail/mailhog.nix"], "default": {"_type": "literalExpression", "text": "\"memory\""}, "description": {"_type": "mdDoc", "text": "Store mails on disk or in memory."}, "loc": ["services", "mailhog", "storage"], "readOnly": false, "type": "one of \"maildir\", \"memory\""}, "services.mailhog.uiPort": {"declarations": ["nixos/modules/services/mail/mailhog.nix"], "default": {"_type": "literalExpression", "text": "8025"}, "description": {"_type": "mdDoc", "text": "Port on which the HTTP UI will listen."}, "loc": ["services", "mailhog", "uiPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mailman.enable": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Mailman on this host. Requires an active MTA on the host (e.g. Postfix)."}, "loc": ["services", "mailman", "enable"], "readOnly": false, "type": "boolean"}, "services.mailman.enablePostfix": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable Postfix integration. Requires an active Postfix installation.\n\nIf you want to use another MTA, set this option to false and configure\nsettings in services.mailman.settings.mta.\n\nRefer to the Mailman manual for more info.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "mailman", "enablePostfix"], "readOnly": false, "type": "boolean"}, "services.mailman.extraPythonPackages": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages to add to the python environment used by mailman and mailman-web"}, "loc": ["services", "mailman", "extraPythonPackages"], "readOnly": false, "type": "list of package"}, "services.mailman.hyperkitty.baseUrl": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:18507/archives/\""}, "description": {"_type": "mdDoc", "text": "Where can Mailman connect to Hyperkitty's internal API, preferably on\nlocalhost?\n"}, "loc": ["services", "mailman", "hyperkitty", "baseUrl"], "readOnly": false, "type": "string"}, "services.mailman.hyperkitty.enable": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Hyperkitty archiver for Mailman."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mailman", "hyperkitty", "enable"], "readOnly": false, "type": "boolean"}, "services.mailman.ldap.attrMap.email": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "\"mail\""}, "description": {"_type": "mdDoc", "text": "LDAP-attribute that corresponds to the `email`-attribute in mailman.\n"}, "loc": ["services", "mailman", "ldap", "attrMap", "email"], "readOnly": false, "type": "string"}, "services.mailman.ldap.attrMap.firstName": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "\"givenName\""}, "description": {"_type": "mdDoc", "text": "LDAP-attribute that corresponds to the `firstName`-attribute in mailman.\n"}, "loc": ["services", "mailman", "ldap", "attrMap", "firstName"], "readOnly": false, "type": "string"}, "services.mailman.ldap.attrMap.lastName": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "\"sn\""}, "description": {"_type": "mdDoc", "text": "LDAP-attribute that corresponds to the `lastName`-attribute in mailman.\n"}, "loc": ["services", "mailman", "ldap", "attrMap", "lastName"], "readOnly": false, "type": "string"}, "services.mailman.ldap.attrMap.username": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "\"uid\""}, "description": {"_type": "mdDoc", "text": "LDAP-attribute that corresponds to the `username`-attribute in mailman.\n"}, "loc": ["services", "mailman", "ldap", "attrMap", "username"], "readOnly": false, "type": "string"}, "services.mailman.ldap.bindDn": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "description": {"_type": "mdDoc", "text": "Service account to bind against.\n"}, "example": {"_type": "literalExpression", "text": "\"cn=root,dc=nixos,dc=org\""}, "loc": ["services", "mailman", "ldap", "bindDn"], "readOnly": false, "type": "string"}, "services.mailman.ldap.bindPasswordFile": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "description": {"_type": "mdDoc", "text": "Path to the file containing the bind password of the service account\ndefined by [](#opt-services.mailman.ldap.bindDn).\n"}, "example": {"_type": "literalExpression", "text": "\"/run/secrets/ldap-bind\""}, "loc": ["services", "mailman", "ldap", "bindPasswordFile"], "readOnly": false, "type": "string"}, "services.mailman.ldap.enable": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable LDAP auth."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mailman", "ldap", "enable"], "readOnly": false, "type": "boolean"}, "services.mailman.ldap.groupSearch.ou": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "description": {"_type": "mdDoc", "text": "Organizational unit to look up a group.\n"}, "example": {"_type": "literalExpression", "text": "\"ou=groups,dc=nixos,dc=org\""}, "loc": ["services", "mailman", "ldap", "groupSearch", "ou"], "readOnly": false, "type": "string"}, "services.mailman.ldap.groupSearch.query": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "description": {"_type": "mdDoc", "text": "Query to find a group associated to a user in the LDAP database.\n"}, "example": {"_type": "literalExpression", "text": "\"(objectClass=groupOfNames)\""}, "loc": ["services", "mailman", "ldap", "groupSearch", "query"], "readOnly": false, "type": "string"}, "services.mailman.ldap.groupSearch.type": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "\"posixGroup\""}, "description": {"_type": "mdDoc", "text": "Type of group to perform a group search against.\n"}, "loc": ["services", "mailman", "ldap", "groupSearch", "type"], "readOnly": false, "type": "one of \"posixGroup\", \"groupOfNames\", \"memberDNGroup\", \"nestedMemberDNGroup\", \"nestedGroupOfNames\", \"groupOfUniqueNames\", \"nestedGroupOfUniqueNames\", \"activeDirectoryGroup\", \"nestedActiveDirectoryGroup\", \"organizationalRoleGroup\", \"nestedOrganizationalRoleGroup\""}, "services.mailman.ldap.serverUri": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "description": {"_type": "mdDoc", "text": "LDAP host to connect against.\n"}, "example": {"_type": "literalExpression", "text": "\"ldaps://ldap.host\""}, "loc": ["services", "mailman", "ldap", "serverUri"], "readOnly": false, "type": "string"}, "services.mailman.ldap.superUserGroup": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Group where a user must be a member of to gain superuser rights.\n"}, "example": {"_type": "literalExpression", "text": "\"cn=admin,ou=groups,dc=nixos,dc=org\""}, "loc": ["services", "mailman", "ldap", "superUserGroup"], "readOnly": false, "type": "null or string"}, "services.mailman.ldap.userSearch.ou": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "description": {"_type": "mdDoc", "text": "Organizational unit to look up a user.\n"}, "example": {"_type": "literalExpression", "text": "\"ou=users,dc=nixos,dc=org\""}, "loc": ["services", "mailman", "ldap", "userSearch", "ou"], "readOnly": false, "type": "string"}, "services.mailman.ldap.userSearch.query": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "description": {"_type": "mdDoc", "text": "Query to find a user in the LDAP database.\n"}, "example": {"_type": "literalExpression", "text": "\"(&(objectClass=inetOrgPerson)(|(uid=%(user)s)(mail=%(user)s)))\""}, "loc": ["services", "mailman", "ldap", "userSearch", "query"], "readOnly": false, "type": "string"}, "services.mailman.restApiPassFile": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the file containing the value for `MAILMAN_REST_API_PASS`.\n"}, "loc": ["services", "mailman", "restApiPassFile"], "readOnly": false, "type": "null or string"}, "services.mailman.serve.enable": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Automatic nginx and uwsgi setup for mailman-web."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mailman", "serve", "enable"], "readOnly": false, "type": "boolean"}, "services.mailman.serve.virtualRoot": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "\"/\""}, "description": {"_type": "mdDoc", "text": "Path to mount the mailman-web django application on.\n"}, "example": {"_type": "literalExpression", "text": "/lists"}, "loc": ["services", "mailman", "serve", "virtualRoot"], "readOnly": false, "type": "string"}, "services.mailman.settings": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings for mailman.cfg"}, "loc": ["services", "mailman", "settings"], "readOnly": false, "type": "attribute set of attribute set of string"}, "services.mailman.siteOwner": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "description": {"_type": "mdDoc", "text": "Certain messages that must be delivered to a human, but which can't\nbe delivered to a list owner (e.g. a bounce from a list owner), will\nbe sent to this address. It should point to a human.\n"}, "example": {"_type": "literalExpression", "text": "\"postmaster@example.org\""}, "loc": ["services", "mailman", "siteOwner"], "readOnly": false, "type": "string"}, "services.mailman.webHosts": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The list of hostnames and/or IP addresses from which the Mailman Web\nUI will accept requests. By default, \"localhost\" and \"127.0.0.1\" are\nenabled. All additional names under which your web server accepts\nrequests for the UI must be listed here or incoming requests will be\nrejected.\n"}, "loc": ["services", "mailman", "webHosts"], "readOnly": false, "type": "list of string"}, "services.mailman.webSettings": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Overrides for the default mailman-web Django settings.\n"}, "loc": ["services", "mailman", "webSettings"], "readOnly": false, "type": "attribute set"}, "services.mailman.webUser": {"declarations": ["nixos/modules/services/mail/mailman.nix"], "default": {"_type": "literalExpression", "text": "\"mailman-web\""}, "description": {"_type": "mdDoc", "text": "User to run mailman-web as\n"}, "loc": ["services", "mailman", "webUser"], "readOnly": false, "type": "string"}, "services.mainsail.enable": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable a modern and responsive user interface for Klipper."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mainsail", "enable"], "readOnly": false, "type": "boolean"}, "services.mainsail.hostName": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Hostname to serve mainsail on"}, "loc": ["services", "mainsail", "hostName"], "readOnly": false, "type": "string"}, "services.mainsail.nginx": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration for the nginx virtual host of mainsail."}, "example": {"_type": "literalExpression", "text": "{\n  serverAliases = [ \"mainsail.${config.networking.domain}\" ];\n}\n"}, "loc": ["services", "mainsail", "nginx"], "readOnly": false, "type": "submodule"}, "services.mainsail.nginx.acmeFallbackHost": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host which to proxy requests to if ACME challenge is not found. Useful\nif you want multiple hosts to be able to verify the same domain name.\n\nWith this option, you could request certificates for the present domain\nwith an ACME client that is running on another host, which you would\nspecify here.\n"}, "loc": ["services", "mainsail", "nginx", "acmeFallbackHost"], "readOnly": false, "type": "null or string"}, "services.mainsail.nginx.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the ACME challenge, which is **public**. Don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "mainsail", "nginx", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.mainsail.nginx.addSSL": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "mainsail", "nginx", "addSSL"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.basicAuth": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "mainsail", "nginx", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.mainsail.nginx.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "mainsail", "nginx", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.mainsail.nginx.default": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Makes this vhost the default.\n"}, "loc": ["services", "mainsail", "nginx", "default"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.enableACME": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "mainsail", "nginx", "enableACME"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.extraConfig": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the vhost verbatim.\n"}, "loc": ["services", "mainsail", "nginx", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.mainsail.nginx.forceSSL": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "mainsail", "nginx", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given hostname.\n"}, "example": {"_type": "literalExpression", "text": "\"newserver.example.org\""}, "loc": ["services", "mainsail", "nginx", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.mainsail.nginx.http2": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/2 protocol.\nNote that (as of writing) due to nginx's implementation, to disable\nHTTP/2 you have to disable it on all vhosts that use a given\nIP address / port.\nIf there is one server block configured to enable http2, then it is\nenabled for all server blocks on this IP.\nSee https://stackoverflow.com/a/39466948/263061.\n"}, "loc": ["services", "mainsail", "nginx", "http2"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.http3": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/3 protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that HTTP/3 support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "mainsail", "nginx", "http3"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.http3_hq": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that special application protocol support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "mainsail", "nginx", "http3_hq"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.kTLS": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kTLS support.\nImplementing TLS in the kernel (kTLS) improves performance by significantly\nreducing the need for copying operations between user space and the kernel.\nRequired Nginx version 1.21.4 or later.\n"}, "loc": ["services", "mainsail", "nginx", "kTLS"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.listen": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\nIPv6 addresses must be enclosed in square brackets.\nNote: this option overrides `addSSL`\nand `onlySSL`.\n\nIf you only want to set the addresses manually and not\nthe ports, take a look at `listenAddresses`\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    addr = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    addr = \"192.154.1.1\";\n    port = 80;\n  }\n]"}, "loc": ["services", "mainsail", "nginx", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.mainsail.nginx.listen.*.addr": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "description": {"_type": "mdDoc", "text": "IP address."}, "loc": ["services", "mainsail", "nginx", "listen", "*", "addr"], "readOnly": false, "type": "string"}, "services.mainsail.nginx.listen.*.extraParameters": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters of this listen directive."}, "example": {"_type": "literalExpression", "text": "[\n  \"backlog=1024\"\n  \"deferred\"\n]"}, "loc": ["services", "mainsail", "nginx", "listen", "*", "extraParameters"], "readOnly": false, "type": "list of string"}, "services.mainsail.nginx.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Port number."}, "loc": ["services", "mainsail", "nginx", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mainsail.nginx.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SSL."}, "loc": ["services", "mainsail", "nginx", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n\nNote: This option overrides `enableIPv6`\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"[::1]\"\n]"}, "loc": ["services", "mainsail", "nginx", "listenAddresses"], "readOnly": false, "type": "list of string"}, "services.mainsail.nginx.locations": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n};\n"}, "loc": ["services", "mainsail", "nginx", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.mainsail.nginx.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "mainsail", "nginx", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.mainsail.nginx.locations.<name>.basicAuth": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "mainsail", "nginx", "locations", "<name>", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.mainsail.nginx.locations.<name>.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "mainsail", "nginx", "locations", "<name>", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.mainsail.nginx.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "mainsail", "nginx", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.mainsail.nginx.locations.<name>.fastcgiParams": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "FastCGI parameters to override.  Unlike in the Nginx\nconfiguration file, overriding only some default parameters\nwon't unset the default values for other parameters.\n"}, "loc": ["services", "mainsail", "nginx", "locations", "<name>", "fastcgiParams"], "readOnly": false, "type": "attribute set of (string or path)"}, "services.mainsail.nginx.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds index directive.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "mainsail", "nginx", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.mainsail.nginx.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "mainsail", "nginx", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.mainsail.nginx.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds proxy_pass directive and sets recommended proxy headers if\nrecommendedProxySettings is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "mainsail", "nginx", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.mainsail.nginx.locations.<name>.proxyWebsockets": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to support proxying websocket connections with HTTP/1.1.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mainsail", "nginx", "locations", "<name>", "proxyWebsockets"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.locations.<name>.recommendedProxySettings": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "config.services.nginx.recommendedProxySettings"}, "description": {"_type": "mdDoc", "text": "Enable recommended proxy settings.\n"}, "loc": ["services", "mainsail", "nginx", "locations", "<name>", "recommendedProxySettings"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.locations.<name>.return": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds a return directive, for e.g. redirections.\n"}, "example": {"_type": "literalExpression", "text": "\"301 http://example.com$request_uri\""}, "loc": ["services", "mainsail", "nginx", "locations", "<name>", "return"], "readOnly": false, "type": "null or string"}, "services.mainsail.nginx.locations.<name>.root": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Root directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/root/directory\""}, "loc": ["services", "mainsail", "nginx", "locations", "<name>", "root"], "readOnly": false, "type": "null or path"}, "services.mainsail.nginx.locations.<name>.tryFiles": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds try_files directive.\n"}, "example": {"_type": "literalExpression", "text": "\"$uri =404\""}, "loc": ["services", "mainsail", "nginx", "locations", "<name>", "tryFiles"], "readOnly": false, "type": "null or string"}, "services.mainsail.nginx.onlySSL": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "mainsail", "nginx", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.quic": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the QUIC transport protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.\nNote that QUIC support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "mainsail", "nginx", "quic"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.rejectSSL": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to listen for and reject all HTTPS connections to this vhost. Useful in\n[default](#opt-services.nginx.virtualHosts._name_.default)\nserver blocks to avoid serving the certificate for another vhost. Uses the\n`ssl_reject_handshake` directive available in nginx versions\n1.19.4 and above.\n"}, "loc": ["services", "mainsail", "nginx", "rejectSSL"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.reuseport": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create an individual listening socket .\nIt is required to specify only once on one of the hosts.\n"}, "loc": ["services", "mainsail", "nginx", "reuseport"], "readOnly": false, "type": "boolean"}, "services.mainsail.nginx.root": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of the web root directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "mainsail", "nginx", "root"], "readOnly": false, "type": "null or path"}, "services.mainsail.nginx.serverAliases": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"example.org\"\n]"}, "loc": ["services", "mainsail", "nginx", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.mainsail.nginx.serverName": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of this virtual host. Defaults to attribute name in virtualHosts.\n"}, "example": {"_type": "literalExpression", "text": "\"example.org\""}, "loc": ["services", "mainsail", "nginx", "serverName"], "readOnly": false, "type": "null or string"}, "services.mainsail.nginx.sslCertificate": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "mainsail", "nginx", "sslCertificate"], "readOnly": false, "type": "path"}, "services.mainsail.nginx.sslCertificateKey": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "mainsail", "nginx", "sslCertificateKey"], "readOnly": false, "type": "path"}, "services.mainsail.nginx.sslTrustedCertificate": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to root SSL certificate for stapling and client certificates."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\""}, "loc": ["services", "mainsail", "nginx", "sslTrustedCertificate"], "readOnly": false, "type": "null or path"}, "services.mainsail.nginx.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "mainsail", "nginx", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.mainsail.package": {"declarations": ["nixos/modules/services/web-apps/mainsail.nix"], "default": {"_type": "literalExpression", "text": "pkgs.mainsail"}, "description": {"_type": "mdDoc", "text": "Mainsail package to be used in the module"}, "loc": ["services", "mainsail", "package"], "readOnly": false, "type": "package"}, "services.malcontent.enable": {"declarations": ["nixos/modules/services/desktops/malcontent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Malcontent, parental control support for applications."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "malcontent", "enable"], "readOnly": false, "type": "boolean"}, "services.mame.emuAddr": {"declarations": ["nixos/modules/services/misc/mame.nix"], "description": {"_type": "mdDoc", "text": "IP address of the guest system. The same you set inside guest OS under\nMAME. Should be on the same subnet as {option}`services.mame.hostAddr`.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.31.155\""}, "loc": ["services", "mame", "emuAddr"], "readOnly": false, "type": "string"}, "services.mame.enable": {"declarations": ["nixos/modules/services/misc/mame.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to setup TUN/TAP Ethernet interface for MAME emulator.\n"}, "loc": ["services", "mame", "enable"], "readOnly": false, "type": "boolean"}, "services.mame.hostAddr": {"declarations": ["nixos/modules/services/misc/mame.nix"], "description": {"_type": "mdDoc", "text": "IP address of the host system. Usually an address of the main network\nadapter or the adapter through which you get an internet connection.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.31.156\""}, "loc": ["services", "mame", "hostAddr"], "readOnly": false, "type": "string"}, "services.mame.user": {"declarations": ["nixos/modules/services/misc/mame.nix"], "description": {"_type": "mdDoc", "text": "User from which you run MAME binary.\n"}, "loc": ["services", "mame", "user"], "readOnly": false, "type": "string"}, "services.mastodon.automaticMigrations": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Do automatic database migrations.\n"}, "loc": ["services", "mastodon", "automaticMigrations"], "readOnly": false, "type": "boolean"}, "services.mastodon.configureNginx": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Configure nginx as a reverse proxy for mastodon.\nNote that this makes some assumptions on your setup, and sets settings that will\naffect other virtualHosts running on your nginx instance, if any.\nAlternatively you can configure a reverse-proxy of your choice to serve these paths:\n\n`/ -> $(nix-instantiate --eval '<nixpkgs>' -A mastodon.outPath)/public`\n\n`/ -> 127.0.0.1:{{ webPort }} `(If there was no file in the directory above.)\n\n`/system/ -> /var/lib/mastodon/public-system/`\n\n`/api/v1/streaming/ -> 127.0.0.1:{{ streamingPort }}`\n\nMake sure that websockets are forwarded properly. You might want to set up caching\nof some requests. Take a look at mastodon's provided nginx configuration at\n`https://github.com/mastodon/mastodon/blob/master/dist/nginx.conf`.\n"}, "loc": ["services", "mastodon", "configureNginx"], "readOnly": false, "type": "boolean"}, "services.mastodon.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Configure local PostgreSQL database server for Mastodon."}, "loc": ["services", "mastodon", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.mastodon.database.host": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "\"/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "Database host address or unix socket."}, "example": {"_type": "literalExpression", "text": "\"192.168.23.42\""}, "loc": ["services", "mastodon", "database", "host"], "readOnly": false, "type": "string"}, "services.mastodon.database.name": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "\"mastodon\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "mastodon", "database", "name"], "readOnly": false, "type": "string"}, "services.mastodon.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/mastodon/secrets/db-password\""}, "loc": ["services", "mastodon", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.mastodon.database.port": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "if config.services.mastodon.database.createLocally\nthen null\nelse 5432\n"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "mastodon", "database", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mastodon.database.user": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "\"mastodon\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "mastodon", "database", "user"], "readOnly": false, "type": "string"}, "services.mastodon.elasticsearch.host": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Elasticsearch host.\nIf it is not null, Elasticsearch full text search will be enabled.\n"}, "loc": ["services", "mastodon", "elasticsearch", "host"], "readOnly": false, "type": "null or string"}, "services.mastodon.elasticsearch.port": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "9200"}, "description": {"_type": "mdDoc", "text": "Elasticsearch port."}, "loc": ["services", "mastodon", "elasticsearch", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mastodon.enable": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Mastodon, a federated social network server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mastodon", "enable"], "readOnly": false, "type": "boolean"}, "services.mastodon.enableUnixSocket": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Instead of binding to an IP address like 127.0.0.1, you may bind to a Unix socket. This variable\nis process-specific, e.g. you need different values for every process, and it works for both web (Puma)\nprocesses and streaming API (Node.js) processes.\n"}, "loc": ["services", "mastodon", "enableUnixSocket"], "readOnly": false, "type": "boolean"}, "services.mastodon.extraConfig": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables to pass to all mastodon services.\n"}, "loc": ["services", "mastodon", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.mastodon.extraEnvFiles": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra environment files to pass to all mastodon services. Useful for passing down environmental secrets.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/etc/mastodon/s3config.env\"\n]"}, "loc": ["services", "mastodon", "extraEnvFiles"], "readOnly": false, "type": "list of path"}, "services.mastodon.group": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "\"mastodon\""}, "description": {"_type": "mdDoc", "text": "Group under which mastodon runs.\n"}, "loc": ["services", "mastodon", "group"], "readOnly": false, "type": "string"}, "services.mastodon.localDomain": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "description": {"_type": "mdDoc", "text": "The domain serving your Mastodon instance."}, "example": {"_type": "literalExpression", "text": "\"social.example.org\""}, "loc": ["services", "mastodon", "localDomain"], "readOnly": false, "type": "string"}, "services.mastodon.mediaAutoRemove.enable": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Automatically remove remote media attachments and preview cards older than the configured amount of days.\n\nRecommended in https://docs.joinmastodon.org/admin/setup/.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "mastodon", "mediaAutoRemove", "enable"], "readOnly": false, "type": "boolean"}, "services.mastodon.mediaAutoRemove.olderThanDays": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "How old remote media needs to be in order to be removed.\n"}, "example": {"_type": "literalExpression", "text": "14"}, "loc": ["services", "mastodon", "mediaAutoRemove", "olderThanDays"], "readOnly": false, "type": "signed integer"}, "services.mastodon.mediaAutoRemove.startAt": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "\"daily\""}, "description": {"_type": "mdDoc", "text": "How often to remove remote media.\n\nThe format is described in {manpage}`systemd.time(7)`.\n"}, "example": {"_type": "literalExpression", "text": "\"hourly\""}, "loc": ["services", "mastodon", "mediaAutoRemove", "startAt"], "readOnly": false, "type": "string"}, "services.mastodon.otpSecretFile": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mastodon/secrets/otp-secret\""}, "description": {"_type": "mdDoc", "text": "Path to file containing the OTP secret.\nA new OTP secret can be generated by running:\n\n`nix build -f '<nixpkgs>' mastodon; cd result; bin/rake secret`\n\nIf this file does not exist, it will be created with a new OTP secret.\n"}, "loc": ["services", "mastodon", "otpSecretFile"], "readOnly": false, "type": "string"}, "services.mastodon.package": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "pkgs.mastodon"}, "description": {"_type": "mdDoc", "text": "Mastodon package to use."}, "loc": ["services", "mastodon", "package"], "readOnly": false, "type": "package"}, "services.mastodon.redis.createLocally": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Configure local Redis server for Mastodon."}, "loc": ["services", "mastodon", "redis", "createLocally"], "readOnly": false, "type": "boolean"}, "services.mastodon.redis.host": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Redis host."}, "loc": ["services", "mastodon", "redis", "host"], "readOnly": false, "type": "string"}, "services.mastodon.redis.port": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "31637"}, "description": {"_type": "mdDoc", "text": "Redis port."}, "loc": ["services", "mastodon", "redis", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mastodon.secretKeyBaseFile": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mastodon/secrets/secret-key-base\""}, "description": {"_type": "mdDoc", "text": "Path to file containing the secret key base.\nA new secret key base can be generated by running:\n\n`nix build -f '<nixpkgs>' mastodon; cd result; bin/rake secret`\n\nIf this file does not exist, it will be created with a new secret key base.\n"}, "loc": ["services", "mastodon", "secretKeyBaseFile"], "readOnly": false, "type": "string"}, "services.mastodon.sidekiqPort": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "55002"}, "description": {"_type": "mdDoc", "text": "TCP port used by the mastodon-sidekiq service."}, "loc": ["services", "mastodon", "sidekiqPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mastodon.sidekiqProcesses": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "{\n  all = {\n    jobClasses = [ ];\n    threads = null;\n  };\n}"}, "description": {"_type": "mdDoc", "text": "How many Sidekiq processes should be used to handle background jobs, and which job classes they handle. *Read the [upstream documentation](https://docs.joinmastodon.org/admin/scaling/#sidekiq) before configuring this!*"}, "example": {"_type": "literalExpression", "text": "{\n  all = {\n    jobClasses = [ ];\n    threads = null;\n  };\n  default = {\n    jobClasses = [\n      \"default\"\n    ];\n    threads = 10;\n  };\n  ingress = {\n    jobClasses = [\n      \"ingress\"\n    ];\n    threads = 5;\n  };\n  push-pull = {\n    jobClasses = [\n      \"push\"\n      \"pull\"\n    ];\n    threads = 5;\n  };\n}"}, "loc": ["services", "mastodon", "sidekiqProcesses"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.mastodon.sidekiqProcesses.<name>.jobClasses": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "description": {"_type": "mdDoc", "text": "If not empty, which job classes should be executed by this process. *Only one process should handle the 'scheduler' class. If left empty, this process will handle the 'scheduler' class.*"}, "loc": ["services", "mastodon", "sidekiqProcesses", "<name>", "jobClasses"], "readOnly": false, "type": "list of (one of \"default\", \"push\", \"pull\", \"mailers\", \"scheduler\", \"ingress\")"}, "services.mastodon.sidekiqProcesses.<name>.threads": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "description": {"_type": "mdDoc", "text": "Number of threads this process should use for executing jobs. If null, the configured `sidekiqThreads` are used."}, "loc": ["services", "mastodon", "sidekiqProcesses", "<name>", "threads"], "readOnly": false, "type": "null or signed integer"}, "services.mastodon.sidekiqThreads": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "25"}, "description": {"_type": "mdDoc", "text": "Worker threads used by the mastodon-sidekiq-all service. If `sidekiqProcesses` is configured and any processes specify null `threads`, this value is used."}, "loc": ["services", "mastodon", "sidekiqThreads"], "readOnly": false, "type": "signed integer"}, "services.mastodon.smtp.authenticate": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Authenticate with the SMTP server using username and password."}, "loc": ["services", "mastodon", "smtp", "authenticate"], "readOnly": false, "type": "boolean"}, "services.mastodon.smtp.createLocally": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Configure local Postfix SMTP server for Mastodon."}, "loc": ["services", "mastodon", "smtp", "createLocally"], "readOnly": false, "type": "boolean"}, "services.mastodon.smtp.fromAddress": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "description": {"_type": "mdDoc", "text": "\"From\" address used when sending Emails to users."}, "loc": ["services", "mastodon", "smtp", "fromAddress"], "readOnly": false, "type": "string"}, "services.mastodon.smtp.host": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "SMTP host used when sending emails to users."}, "loc": ["services", "mastodon", "smtp", "host"], "readOnly": false, "type": "string"}, "services.mastodon.smtp.passwordFile": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to file containing the SMTP password.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/mastodon/secrets/smtp-password\""}, "loc": ["services", "mastodon", "smtp", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.mastodon.smtp.port": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "25"}, "description": {"_type": "mdDoc", "text": "SMTP port used when sending emails to users."}, "loc": ["services", "mastodon", "smtp", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mastodon.smtp.user": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SMTP login name."}, "example": {"_type": "literalExpression", "text": "\"mastodon@example.com\""}, "loc": ["services", "mastodon", "smtp", "user"], "readOnly": false, "type": "null or string"}, "services.mastodon.streamingPort": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "55000"}, "description": {"_type": "mdDoc", "text": "TCP port used by the mastodon-streaming service."}, "loc": ["services", "mastodon", "streamingPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mastodon.streamingProcesses": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Processes used by the mastodon-streaming service.\nDefaults to the number of CPU cores minus one.\n"}, "loc": ["services", "mastodon", "streamingProcesses"], "readOnly": false, "type": "null or signed integer"}, "services.mastodon.trustedProxy": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "You need to set it to the IP from which your reverse proxy sends requests to Mastodon's web process,\notherwise Mastodon will record the reverse proxy's own IP as the IP of all requests, which would be\nbad because IP addresses are used for important rate limits and security functions.\n"}, "loc": ["services", "mastodon", "trustedProxy"], "readOnly": false, "type": "string"}, "services.mastodon.user": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "\"mastodon\""}, "description": {"_type": "mdDoc", "text": "User under which mastodon runs. If it is set to \"mastodon\",\nthat user will be created, otherwise it should be set to the\nname of a user created elsewhere.\nIn both cases, the `mastodon` package will be added to the user's package set\nand a tootctl wrapper to system packages that switches to the configured account\nand load the right environment.\n"}, "loc": ["services", "mastodon", "user"], "readOnly": false, "type": "string"}, "services.mastodon.vapidPrivateKeyFile": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mastodon/secrets/vapid-private-key\""}, "description": {"_type": "mdDoc", "text": "Path to file containing the private key used for Web Push\nVoluntary Application Server Identification.  A new keypair can\nbe generated by running:\n\n`nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys`\n\nIf this file does not exist, it will be created with a new\nprivate key.\n"}, "loc": ["services", "mastodon", "vapidPrivateKeyFile"], "readOnly": false, "type": "string"}, "services.mastodon.vapidPublicKeyFile": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mastodon/secrets/vapid-public-key\""}, "description": {"_type": "mdDoc", "text": "Path to file containing the public key used for Web Push\nVoluntary Application Server Identification.  A new keypair can\nbe generated by running:\n\n`nix build -f '<nixpkgs>' mastodon; cd result; bin/rake webpush:generate_keys`\n\nIf {option}`mastodon.vapidPrivateKeyFile`does not\nexist, it and this file will be created with a new keypair.\n"}, "loc": ["services", "mastodon", "vapidPublicKeyFile"], "readOnly": false, "type": "string"}, "services.mastodon.webPort": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "55001"}, "description": {"_type": "mdDoc", "text": "TCP port used by the mastodon-web service."}, "loc": ["services", "mastodon", "webPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mastodon.webProcesses": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Processes used by the mastodon-web service."}, "loc": ["services", "mastodon", "webProcesses"], "readOnly": false, "type": "signed integer"}, "services.mastodon.webThreads": {"declarations": ["nixos/modules/services/web-apps/mastodon.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Threads per process used by the mastodon-web service."}, "loc": ["services", "mastodon", "webThreads"], "readOnly": false, "type": "signed integer"}, "services.matomo.enable": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Matomo web analytics with php-fpm backend.\nEither the nginx option or the webServerUser option is mandatory.\n"}, "loc": ["services", "matomo", "enable"], "readOnly": false, "type": "boolean"}, "services.matomo.hostname": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "\"matomo.${config.networking.fqdnOrHostName}\"\n"}, "description": {"_type": "mdDoc", "text": "URL of the host, without https prefix. You may want to change it if you\nrun Matomo on a different URL than matomo.yourdomain.\n"}, "example": {"_type": "literalExpression", "text": "\"matomo.yourdomain.org\""}, "loc": ["services", "matomo", "hostname"], "readOnly": false, "type": "string"}, "services.matomo.nginx": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "With this option, you can customize an nginx virtualHost which already has sensible defaults for Matomo.\nEither this option or the webServerUser option is mandatory.\nSet this to {} to just enable the virtualHost if you don't need any customization.\nIf enabled, then by default, the {option}`serverName` is\n`${user}.${config.networking.hostName}.${config.networking.domain}`,\nSSL is active, and certificates are acquired via ACME.\nIf this is set to null (the default), no nginx virtualHost will be configured.\n"}, "example": {"_type": "literalExpression", "text": "{\n  serverAliases = [\n    \"matomo.${config.networking.domain}\"\n    \"stats.${config.networking.domain}\"\n  ];\n  enableACME = false;\n}\n"}, "loc": ["services", "matomo", "nginx"], "readOnly": false, "type": "null or (submodule)"}, "services.matomo.nginx.acmeFallbackHost": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host which to proxy requests to if ACME challenge is not found. Useful\nif you want multiple hosts to be able to verify the same domain name.\n\nWith this option, you could request certificates for the present domain\nwith an ACME client that is running on another host, which you would\nspecify here.\n"}, "loc": ["services", "matomo", "nginx", "acmeFallbackHost"], "readOnly": false, "type": "null or string"}, "services.matomo.nginx.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the ACME challenge, which is **public**. Don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "matomo", "nginx", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.matomo.nginx.addSSL": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "matomo", "nginx", "addSSL"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.basicAuth": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "matomo", "nginx", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.matomo.nginx.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "matomo", "nginx", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.matomo.nginx.default": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Makes this vhost the default.\n"}, "loc": ["services", "matomo", "nginx", "default"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.enableACME": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "matomo", "nginx", "enableACME"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.extraConfig": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the vhost verbatim.\n"}, "loc": ["services", "matomo", "nginx", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.matomo.nginx.forceSSL": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "matomo", "nginx", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given hostname.\n"}, "example": {"_type": "literalExpression", "text": "\"newserver.example.org\""}, "loc": ["services", "matomo", "nginx", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.matomo.nginx.http2": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/2 protocol.\nNote that (as of writing) due to nginx's implementation, to disable\nHTTP/2 you have to disable it on all vhosts that use a given\nIP address / port.\nIf there is one server block configured to enable http2, then it is\nenabled for all server blocks on this IP.\nSee https://stackoverflow.com/a/39466948/263061.\n"}, "loc": ["services", "matomo", "nginx", "http2"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.http3": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/3 protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that HTTP/3 support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "matomo", "nginx", "http3"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.http3_hq": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that special application protocol support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "matomo", "nginx", "http3_hq"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.kTLS": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kTLS support.\nImplementing TLS in the kernel (kTLS) improves performance by significantly\nreducing the need for copying operations between user space and the kernel.\nRequired Nginx version 1.21.4 or later.\n"}, "loc": ["services", "matomo", "nginx", "kTLS"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.listen": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\nIPv6 addresses must be enclosed in square brackets.\nNote: this option overrides `addSSL`\nand `onlySSL`.\n\nIf you only want to set the addresses manually and not\nthe ports, take a look at `listenAddresses`\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    addr = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    addr = \"192.154.1.1\";\n    port = 80;\n  }\n]"}, "loc": ["services", "matomo", "nginx", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.matomo.nginx.listen.*.addr": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "description": {"_type": "mdDoc", "text": "IP address."}, "loc": ["services", "matomo", "nginx", "listen", "*", "addr"], "readOnly": false, "type": "string"}, "services.matomo.nginx.listen.*.extraParameters": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters of this listen directive."}, "example": {"_type": "literalExpression", "text": "[\n  \"backlog=1024\"\n  \"deferred\"\n]"}, "loc": ["services", "matomo", "nginx", "listen", "*", "extraParameters"], "readOnly": false, "type": "list of string"}, "services.matomo.nginx.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Port number."}, "loc": ["services", "matomo", "nginx", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.matomo.nginx.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SSL."}, "loc": ["services", "matomo", "nginx", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n\nNote: This option overrides `enableIPv6`\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"[::1]\"\n]"}, "loc": ["services", "matomo", "nginx", "listenAddresses"], "readOnly": false, "type": "list of string"}, "services.matomo.nginx.locations": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n};\n"}, "loc": ["services", "matomo", "nginx", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.matomo.nginx.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "matomo", "nginx", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.matomo.nginx.locations.<name>.basicAuth": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "matomo", "nginx", "locations", "<name>", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.matomo.nginx.locations.<name>.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "matomo", "nginx", "locations", "<name>", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.matomo.nginx.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "matomo", "nginx", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.matomo.nginx.locations.<name>.fastcgiParams": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "FastCGI parameters to override.  Unlike in the Nginx\nconfiguration file, overriding only some default parameters\nwon't unset the default values for other parameters.\n"}, "loc": ["services", "matomo", "nginx", "locations", "<name>", "fastcgiParams"], "readOnly": false, "type": "attribute set of (string or path)"}, "services.matomo.nginx.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds index directive.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "matomo", "nginx", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.matomo.nginx.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "matomo", "nginx", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.matomo.nginx.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds proxy_pass directive and sets recommended proxy headers if\nrecommendedProxySettings is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "matomo", "nginx", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.matomo.nginx.locations.<name>.proxyWebsockets": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to support proxying websocket connections with HTTP/1.1.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "matomo", "nginx", "locations", "<name>", "proxyWebsockets"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.locations.<name>.recommendedProxySettings": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "config.services.nginx.recommendedProxySettings"}, "description": {"_type": "mdDoc", "text": "Enable recommended proxy settings.\n"}, "loc": ["services", "matomo", "nginx", "locations", "<name>", "recommendedProxySettings"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.locations.<name>.return": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds a return directive, for e.g. redirections.\n"}, "example": {"_type": "literalExpression", "text": "\"301 http://example.com$request_uri\""}, "loc": ["services", "matomo", "nginx", "locations", "<name>", "return"], "readOnly": false, "type": "null or string"}, "services.matomo.nginx.locations.<name>.root": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Root directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/root/directory\""}, "loc": ["services", "matomo", "nginx", "locations", "<name>", "root"], "readOnly": false, "type": "null or path"}, "services.matomo.nginx.locations.<name>.tryFiles": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds try_files directive.\n"}, "example": {"_type": "literalExpression", "text": "\"$uri =404\""}, "loc": ["services", "matomo", "nginx", "locations", "<name>", "tryFiles"], "readOnly": false, "type": "null or string"}, "services.matomo.nginx.onlySSL": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "matomo", "nginx", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.quic": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the QUIC transport protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.\nNote that QUIC support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "matomo", "nginx", "quic"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.rejectSSL": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to listen for and reject all HTTPS connections to this vhost. Useful in\n[default](#opt-services.nginx.virtualHosts._name_.default)\nserver blocks to avoid serving the certificate for another vhost. Uses the\n`ssl_reject_handshake` directive available in nginx versions\n1.19.4 and above.\n"}, "loc": ["services", "matomo", "nginx", "rejectSSL"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.reuseport": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create an individual listening socket .\nIt is required to specify only once on one of the hosts.\n"}, "loc": ["services", "matomo", "nginx", "reuseport"], "readOnly": false, "type": "boolean"}, "services.matomo.nginx.root": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of the web root directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "matomo", "nginx", "root"], "readOnly": false, "type": "null or path"}, "services.matomo.nginx.serverAliases": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"example.org\"\n]"}, "loc": ["services", "matomo", "nginx", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.matomo.nginx.serverName": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of this virtual host. Defaults to attribute name in virtualHosts.\n"}, "example": {"_type": "literalExpression", "text": "\"example.org\""}, "loc": ["services", "matomo", "nginx", "serverName"], "readOnly": false, "type": "null or string"}, "services.matomo.nginx.sslCertificate": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "matomo", "nginx", "sslCertificate"], "readOnly": false, "type": "path"}, "services.matomo.nginx.sslCertificateKey": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "matomo", "nginx", "sslCertificateKey"], "readOnly": false, "type": "path"}, "services.matomo.nginx.sslTrustedCertificate": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to root SSL certificate for stapling and client certificates."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\""}, "loc": ["services", "matomo", "nginx", "sslTrustedCertificate"], "readOnly": false, "type": "null or path"}, "services.matomo.nginx.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "matomo", "nginx", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.matomo.package": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "pkgs.matomo"}, "description": {"_type": "mdDoc", "text": "Matomo package for the service to use.\nThis can be used to point to newer releases from nixos-unstable,\nas they don't get backported if they are not security-relevant.\n"}, "loc": ["services", "matomo", "package"], "readOnly": false, "type": "package"}, "services.matomo.periodicArchiveProcessing": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable periodic archive processing, which generates aggregated reports from the visits.\n\nThis means that you can safely disable browser triggers for Matomo archiving,\nand safely enable to delete old visitor logs.\nBefore deleting visitor logs,\nmake sure though that you run `systemctl start matomo-archive-processing.service`\nat least once without errors if you have already collected data before.\n"}, "loc": ["services", "matomo", "periodicArchiveProcessing"], "readOnly": false, "type": "boolean"}, "services.matomo.webServerUser": {"declarations": ["nixos/modules/services/web-apps/matomo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the web server user that forwards requests to {option}`services.phpfpm.pools.<name>.socket` the fastcgi socket for Matomo if the nginx\noption is not used. Either this option or the nginx option is mandatory.\nIf you want to use another webserver than nginx, you need to set this to that server's user\nand pass fastcgi requests to `index.php`, `matomo.php` and `piwik.php` (legacy name) to this socket.\n"}, "example": {"_type": "literalExpression", "text": "\"lighttpd\""}, "loc": ["services", "matomo", "webServerUser"], "readOnly": false, "type": "null or string"}, "services.matrix-appservice-discord.enable": {"declarations": ["nixos/modules/services/matrix/appservice-discord.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable a bridge between Matrix and Discord."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "matrix-appservice-discord", "enable"], "readOnly": false, "type": "boolean"}, "services.matrix-appservice-discord.environmentFile": {"declarations": ["nixos/modules/services/matrix/appservice-discord.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing environment variables to be passed to the matrix-appservice-discord service,\nin which secret tokens can be specified securely by defining values for\n`APPSERVICE_DISCORD_AUTH_CLIENT_I_D` and\n`APPSERVICE_DISCORD_AUTH_BOT_TOKEN`.\n"}, "loc": ["services", "matrix-appservice-discord", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.matrix-appservice-discord.localpart": {"declarations": ["nixos/modules/services/matrix/appservice-discord.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The user_id localpart to assign to the AS.\n"}, "loc": ["services", "matrix-appservice-discord", "localpart"], "readOnly": false, "type": "null or string"}, "services.matrix-appservice-discord.package": {"declarations": ["nixos/modules/services/matrix/appservice-discord.nix"], "default": {"_type": "literalExpression", "text": "pkgs.matrix-appservice-discord"}, "description": {"_type": "mdDoc", "text": "Which package of matrix-appservice-discord to use.\n"}, "loc": ["services", "matrix-appservice-discord", "package"], "readOnly": false, "type": "package"}, "services.matrix-appservice-discord.port": {"declarations": ["nixos/modules/services/matrix/appservice-discord.nix"], "default": {"_type": "literalExpression", "text": "9005"}, "description": {"_type": "mdDoc", "text": "Port number on which the bridge should listen for internal communication with the Matrix homeserver.\n"}, "loc": ["services", "matrix-appservice-discord", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.matrix-appservice-discord.serviceDependencies": {"declarations": ["nixos/modules/services/matrix/appservice-discord.nix"], "default": {"_type": "literalExpression", "text": "optional config.services.matrix-synapse.enable \"matrix-synapse.service\"\n"}, "description": {"_type": "mdDoc", "text": "List of Systemd services to require and wait for when starting the application service,\nsuch as the Matrix homeserver if it's running on the same host.\n"}, "loc": ["services", "matrix-appservice-discord", "serviceDependencies"], "readOnly": false, "type": "list of string"}, "services.matrix-appservice-discord.settings": {"declarations": ["nixos/modules/services/matrix/appservice-discord.nix"], "default": {"_type": "literalExpression", "text": "{\n  auth = {\n    botToken = \"\";\n    clientID = \"\";\n  };\n  database = {\n    filename = \"/var/lib/matrix-appservice-discord/discord.db\";\n  };\n}"}, "description": {"_type": "mdDoc", "text": "{file}`config.yaml` configuration as a Nix attribute set.\n\nConfiguration options should match those described in\n[config.sample.yaml](https://github.com/Half-Shot/matrix-appservice-discord/blob/master/config/config.sample.yaml).\n\n{option}`config.bridge.domain` and {option}`config.bridge.homeserverUrl`\nshould be set to match the public host name of the Matrix homeserver for webhooks and avatars to work.\n\nSecret tokens should be specified using {option}`environmentFile`\ninstead of this world-readable attribute set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  bridge = {\n    domain = \"public-domain.tld\";\n    homeserverUrl = \"http://public-domain.tld:8008\";\n  };\n}\n"}, "loc": ["services", "matrix-appservice-discord", "settings"], "readOnly": false, "type": "attribute set"}, "services.matrix-appservice-discord.url": {"declarations": ["nixos/modules/services/matrix/appservice-discord.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:${toString config.services.matrix-appservice-discord.port}\""}, "description": {"_type": "mdDoc", "text": "The URL where the application service is listening for HS requests.\n"}, "loc": ["services", "matrix-appservice-discord", "url"], "readOnly": false, "type": "string"}, "services.matrix-conduit.enable": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable matrix-conduit."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "matrix-conduit", "enable"], "readOnly": false, "type": "boolean"}, "services.matrix-conduit.extraEnvironment": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra Environment variables to pass to the conduit server."}, "example": {"_type": "literalExpression", "text": "{\n  RUST_BACKTRACE = \"yes\";\n}"}, "loc": ["services", "matrix-conduit", "extraEnvironment"], "readOnly": false, "type": "attribute set of string"}, "services.matrix-conduit.package": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "default": {"_type": "literalExpression", "text": "pkgs.matrix-conduit"}, "description": {"_type": "mdDoc", "text": "Package of the conduit matrix server to use.\n"}, "loc": ["services", "matrix-conduit", "package"], "readOnly": false, "type": "package"}, "services.matrix-conduit.settings": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Generates the conduit.toml configuration file. Refer to\n<https://gitlab.com/famedly/conduit/-/blob/master/conduit-example.toml>\nfor details on supported values.\nNote that database_path can not be edited because the service's reliance on systemd StateDir.\n"}, "loc": ["services", "matrix-conduit", "settings"], "readOnly": false, "type": "TOML value"}, "services.matrix-conduit.settings.global.address": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "default": {"_type": "literalExpression", "text": "\"::1\""}, "description": {"_type": "mdDoc", "text": "Address to listen on for connections by the reverse proxy/tls terminator."}, "loc": ["services", "matrix-conduit", "settings", "global", "address"], "readOnly": false, "type": "string"}, "services.matrix-conduit.settings.global.allow_encryption": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether new encrypted rooms can be created. Note: existing rooms will continue to work."}, "loc": ["services", "matrix-conduit", "settings", "global", "allow_encryption"], "readOnly": false, "type": "boolean"}, "services.matrix-conduit.settings.global.allow_federation": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether this server federates with other servers.\n"}, "loc": ["services", "matrix-conduit", "settings", "global", "allow_federation"], "readOnly": false, "type": "boolean"}, "services.matrix-conduit.settings.global.allow_registration": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether new users can register on this server."}, "loc": ["services", "matrix-conduit", "settings", "global", "allow_registration"], "readOnly": false, "type": "boolean"}, "services.matrix-conduit.settings.global.database_backend": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite\""}, "description": {"_type": "mdDoc", "text": "The database backend for the service. Switching it on an existing\ninstance will require manual migration of data.\n"}, "example": {"_type": "literalExpression", "text": "\"rocksdb\""}, "loc": ["services", "matrix-conduit", "settings", "global", "database_backend"], "readOnly": false, "type": "one of \"sqlite\", \"rocksdb\""}, "services.matrix-conduit.settings.global.database_path": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/matrix-conduit/\""}, "description": {"_type": "mdDoc", "text": "Path to the conduit database, the directory where conduit will save its data.\nNote that due to using the DynamicUser feature of systemd, this value should not be changed\nand is set to be read only.\n"}, "loc": ["services", "matrix-conduit", "settings", "global", "database_path"], "readOnly": true, "type": "string"}, "services.matrix-conduit.settings.global.max_request_size": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "default": {"_type": "literalExpression", "text": "20000000"}, "description": {"_type": "mdDoc", "text": "Max request size in bytes. Don't forget to also change it in the proxy."}, "loc": ["services", "matrix-conduit", "settings", "global", "max_request_size"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.matrix-conduit.settings.global.port": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "default": {"_type": "literalExpression", "text": "6167"}, "description": {"_type": "mdDoc", "text": "The port Conduit will be running on. You need to set up a reverse proxy in your web server (e.g. apache or nginx), so all requests to /_matrix on port 443 and 8448 will be forwarded to the Conduit instance running on this port"}, "loc": ["services", "matrix-conduit", "settings", "global", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.matrix-conduit.settings.global.server_name": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "description": {"_type": "mdDoc", "text": "The server_name is the name of this server. It is used as a suffix for user # and room ids."}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "matrix-conduit", "settings", "global", "server_name"], "readOnly": false, "type": "string"}, "services.matrix-conduit.settings.global.trusted_servers": {"declarations": ["nixos/modules/services/matrix/conduit.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"matrix.org\"\n]"}, "description": {"_type": "mdDoc", "text": "Servers trusted with signing server keys."}, "loc": ["services", "matrix-conduit", "settings", "global", "trusted_servers"], "readOnly": false, "type": "list of string"}, "services.matrix-synapse.sliding-sync.createDatabase": {"declarations": ["nixos/modules/services/matrix/matrix-sliding-sync.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable and configure `services.postgres` to ensure that the database user `matrix-sliding-sync`\nand the database `matrix-sliding-sync` exist.\n"}, "loc": ["services", "matrix-synapse", "sliding-sync", "createDatabase"], "readOnly": false, "type": "boolean"}, "services.matrix-synapse.sliding-sync.enable": {"declarations": ["nixos/modules/services/matrix/matrix-sliding-sync.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sliding sync."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "matrix-synapse", "sliding-sync", "enable"], "readOnly": false, "type": "boolean"}, "services.matrix-synapse.sliding-sync.environmentFile": {"declarations": ["nixos/modules/services/matrix/matrix-sliding-sync.nix"], "description": {"_type": "mdDoc", "text": "Environment file as defined in {manpage}`systemd.exec(5)`.\n\nThis must contain the {env}`SYNCV3_SECRET` variable which should\nbe generated with {command}`openssl rand -hex 32`.\n"}, "loc": ["services", "matrix-synapse", "sliding-sync", "environmentFile"], "readOnly": false, "type": "string"}, "services.matrix-synapse.sliding-sync.package": {"declarations": ["nixos/modules/services/matrix/matrix-sliding-sync.nix"], "default": {"_type": "literalExpression", "text": "pkgs.matrix-sliding-sync"}, "description": {"_type": "mdDoc", "text": "The matrix-sliding-sync package to use."}, "loc": ["services", "matrix-synapse", "sliding-sync", "package"], "readOnly": false, "type": "package"}, "services.matrix-synapse.sliding-sync.settings": {"declarations": ["nixos/modules/services/matrix/matrix-sliding-sync.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Freeform environment variables passed to the sliding sync proxy.\nRefer to <https://github.com/matrix-org/sliding-sync#setup> for all supported values.\n"}, "loc": ["services", "matrix-synapse", "sliding-sync", "settings"], "readOnly": false, "type": "attribute set of string"}, "services.matrix-synapse.sliding-sync.settings.SYNCV3_BINDADDR": {"declarations": ["nixos/modules/services/matrix/matrix-sliding-sync.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:8009\""}, "description": {"_type": "mdDoc", "text": "The interface and port to listen on."}, "example": {"_type": "literalExpression", "text": "\"[::]:8008\""}, "loc": ["services", "matrix-synapse", "sliding-sync", "settings", "SYNCV3_BINDADDR"], "readOnly": false, "type": "string"}, "services.matrix-synapse.sliding-sync.settings.SYNCV3_DB": {"declarations": ["nixos/modules/services/matrix/matrix-sliding-sync.nix"], "default": {"_type": "literalExpression", "text": "\"postgresql:///matrix-sliding-sync?host=/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "The postgres connection string.\nRefer to <https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-CONNSTRING>.\n"}, "loc": ["services", "matrix-synapse", "sliding-sync", "settings", "SYNCV3_DB"], "readOnly": false, "type": "string"}, "services.matrix-synapse.sliding-sync.settings.SYNCV3_LOG_LEVEL": {"declarations": ["nixos/modules/services/matrix/matrix-sliding-sync.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "The level of verbosity for messages logged."}, "loc": ["services", "matrix-synapse", "sliding-sync", "settings", "SYNCV3_LOG_LEVEL"], "readOnly": false, "type": "one of \"trace\", \"debug\", \"info\", \"warn\", \"error\", \"fatal\""}, "services.matrix-synapse.sliding-sync.settings.SYNCV3_SERVER": {"declarations": ["nixos/modules/services/matrix/matrix-sliding-sync.nix"], "description": {"_type": "mdDoc", "text": "The destination homeserver to talk to not including `/_matrix/` e.g `https://matrix.example.org`.\n"}, "loc": ["services", "matrix-synapse", "sliding-sync", "settings", "SYNCV3_SERVER"], "readOnly": false, "type": "string"}, "services.matterbridge.configFile": {"declarations": ["nixos/modules/services/networking/matterbridge.nix"], "description": {"_type": "mdDoc", "text": "WARNING: THIS IS INSECURE, as your password will end up in\n{file}`/nix/store`, thus publicly readable. Use\n`services.matterbridge.configPath` instead.\n\nThe matterbridge configuration file in the TOML file format.\n"}, "example": {"_type": "literalExpression", "text": "''\n  # WARNING: as this file contains credentials, do not use this option!\n  # It is kept only for backwards compatibility, and would cause your\n  # credentials to be in the nix-store, thus with the world-readable\n  # permission bits.\n  # Use services.matterbridge.configPath instead.\n  \n  [irc]\n      [irc.libera]\n      Server=\"irc.libera.chat:6667\"\n      Nick=\"matterbot\"\n  \n  [mattermost]\n      [mattermost.work]\n       # Do not prefix it with http:// or https://\n       Server=\"yourmattermostserver.domain\"\n       Team=\"yourteam\"\n       Login=\"yourlogin\"\n       Password=\"yourpass\"\n       PrefixMessagesWithNick=true\n  \n  [[gateway]]\n  name=\"gateway1\"\n  enable=true\n      [[gateway.inout]]\n      account=\"irc.libera\"\n      channel=\"#testing\"\n  \n      [[gateway.inout]]\n      account=\"mattermost.work\"\n      channel=\"off-topic\"\n''"}, "loc": ["services", "matterbridge", "configFile"], "readOnly": false, "type": "string"}, "services.matterbridge.configPath": {"declarations": ["nixos/modules/services/networking/matterbridge.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the matterbridge configuration file.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/nixos/matterbridge.toml\""}, "loc": ["services", "matterbridge", "configPath"], "readOnly": false, "type": "null or string"}, "services.matterbridge.enable": {"declarations": ["nixos/modules/services/networking/matterbridge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Matterbridge chat platform bridge."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "matterbridge", "enable"], "readOnly": false, "type": "boolean"}, "services.matterbridge.group": {"declarations": ["nixos/modules/services/networking/matterbridge.nix"], "default": {"_type": "literalExpression", "text": "\"matterbridge\""}, "description": {"_type": "mdDoc", "text": "Group which runs the matterbridge service.\n"}, "loc": ["services", "matterbridge", "group"], "readOnly": false, "type": "string"}, "services.matterbridge.user": {"declarations": ["nixos/modules/services/networking/matterbridge.nix"], "default": {"_type": "literalExpression", "text": "\"matterbridge\""}, "description": {"_type": "mdDoc", "text": "User which runs the matterbridge service.\n"}, "loc": ["services", "matterbridge", "user"], "readOnly": false, "type": "string"}, "services.mattermost.enable": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Mattermost chat server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mattermost", "enable"], "readOnly": false, "type": "boolean"}, "services.mattermost.environmentFile": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file (see {manpage}`systemd.exec(5)`\n\"EnvironmentFile=\" section for the syntax) which sets config options\nfor mattermost (see [the mattermost documentation](https://docs.mattermost.com/configure/configuration-settings.html#environment-variables)).\n\nSettings defined in the environment file will overwrite settings\nset via nix or via the {option}`services.mattermost.extraConfig`\noption.\n\nUseful for setting config options without their value ending up in the\n(world-readable) nix store, e.g. for a database password.\n"}, "loc": ["services", "mattermost", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.mattermost.extraConfig": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional configuration options as Nix attribute set in config.json schema.\n"}, "loc": ["services", "mattermost", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.mattermost.group": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "\"mattermost\""}, "description": {"_type": "mdDoc", "text": "Group which runs the Mattermost service.\n"}, "loc": ["services", "mattermost", "group"], "readOnly": false, "type": "string"}, "services.mattermost.listenAddress": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "\":8065\""}, "description": {"_type": "mdDoc", "text": "Address and port this Mattermost instance listens to.\n"}, "example": {"_type": "literalExpression", "text": "\"[::1]:8065\""}, "loc": ["services", "mattermost", "listenAddress"], "readOnly": false, "type": "string"}, "services.mattermost.localDatabaseCreate": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Create a local PostgreSQL database for Mattermost automatically.\n"}, "loc": ["services", "mattermost", "localDatabaseCreate"], "readOnly": false, "type": "boolean"}, "services.mattermost.localDatabaseName": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "\"mattermost\""}, "description": {"_type": "mdDoc", "text": "Local Mattermost database name.\n"}, "loc": ["services", "mattermost", "localDatabaseName"], "readOnly": false, "type": "string"}, "services.mattermost.localDatabasePassword": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "\"mmpgsecret\""}, "description": {"_type": "mdDoc", "text": "Password for local Mattermost database user.\n"}, "loc": ["services", "mattermost", "localDatabasePassword"], "readOnly": false, "type": "string"}, "services.mattermost.localDatabaseUser": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "\"mattermost\""}, "description": {"_type": "mdDoc", "text": "Local Mattermost database username.\n"}, "loc": ["services", "mattermost", "localDatabaseUser"], "readOnly": false, "type": "string"}, "services.mattermost.matterircd.enable": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Mattermost IRC bridge."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mattermost", "matterircd", "enable"], "readOnly": false, "type": "boolean"}, "services.mattermost.matterircd.package": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "pkgs.matterircd"}, "description": {"_type": "mdDoc", "text": "matterircd derivation to use."}, "loc": ["services", "mattermost", "matterircd", "package"], "readOnly": false, "type": "package"}, "services.mattermost.matterircd.parameters": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Set commandline parameters to pass to matterircd. See\nhttps://github.com/42wim/matterircd#usage for more information.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-mmserver chat.example.com\"\n  \"-bind [::]:6667\"\n]"}, "loc": ["services", "mattermost", "matterircd", "parameters"], "readOnly": false, "type": "list of string"}, "services.mattermost.mutableConfig": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the Mattermost config.json is writeable by Mattermost.\n\nMost of the settings can be edited in the system console of\nMattermost if this option is enabled. A template config using\nthe options specified in services.mattermost will be generated\nbut won't be overwritten on changes or rebuilds.\n\nIf this option is disabled, changes in the system console won't\nbe possible (default). If an config.json is present, it will be\noverwritten!\n"}, "loc": ["services", "mattermost", "mutableConfig"], "readOnly": false, "type": "boolean"}, "services.mattermost.package": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "pkgs.mattermost"}, "description": {"_type": "mdDoc", "text": "Mattermost derivation to use."}, "loc": ["services", "mattermost", "package"], "readOnly": false, "type": "package"}, "services.mattermost.plugins": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Plugins to add to the configuration. Overrides any installed if non-null.\nThis is a list of paths to .tar.gz files or derivations evaluating to\n.tar.gz files.\n"}, "example": {"_type": "literalExpression", "text": "\"[ ./com.github.moussetc.mattermost.plugin.giphy-2.0.0.tar.gz ]\""}, "loc": ["services", "mattermost", "plugins"], "readOnly": false, "type": "list of (path or package)"}, "services.mattermost.preferNixConfig": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If both mutableConfig and this option are set, the Nix configuration\nwill take precedence over any settings configured in the server\nconsole.\n"}, "loc": ["services", "mattermost", "preferNixConfig"], "readOnly": false, "type": "boolean"}, "services.mattermost.siteName": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "\"Mattermost\""}, "description": {"_type": "mdDoc", "text": "Name of this Mattermost site."}, "loc": ["services", "mattermost", "siteName"], "readOnly": false, "type": "string"}, "services.mattermost.siteUrl": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "description": {"_type": "mdDoc", "text": "URL this Mattermost instance is reachable under, without trailing slash.\n"}, "example": {"_type": "literalExpression", "text": "\"https://chat.example.com\""}, "loc": ["services", "mattermost", "siteUrl"], "readOnly": false, "type": "string"}, "services.mattermost.statePath": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mattermost\""}, "description": {"_type": "mdDoc", "text": "Mattermost working directory"}, "loc": ["services", "mattermost", "statePath"], "readOnly": false, "type": "string"}, "services.mattermost.user": {"declarations": ["nixos/modules/services/web-apps/mattermost.nix"], "default": {"_type": "literalExpression", "text": "\"mattermost\""}, "description": {"_type": "mdDoc", "text": "User which runs the Mattermost service.\n"}, "loc": ["services", "mattermost", "user"], "readOnly": false, "type": "string"}, "services.mautrix-facebook.configurePostgresql": {"declarations": ["nixos/modules/services/matrix/mautrix-facebook.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable PostgreSQL and create a user and database for mautrix-facebook. The default `settings` reference this database, if you disable this option you must provide a database URL.\n"}, "loc": ["services", "mautrix-facebook", "configurePostgresql"], "readOnly": false, "type": "boolean"}, "services.mautrix-facebook.enable": {"declarations": ["nixos/modules/services/matrix/mautrix-facebook.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Mautrix-Facebook, a Matrix-Facebook hybrid puppeting/relaybot bridge."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mautrix-facebook", "enable"], "readOnly": false, "type": "boolean"}, "services.mautrix-facebook.environmentFile": {"declarations": ["nixos/modules/services/matrix/mautrix-facebook.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing environment variables to be passed to the mautrix-facebook service.\n\nAny config variable can be overridden by setting `MAUTRIX_FACEBOOK_SOME_KEY` to override the `some.key` variable.\n"}, "loc": ["services", "mautrix-facebook", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.mautrix-facebook.registrationData": {"declarations": ["nixos/modules/services/matrix/mautrix-facebook.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Output data for appservice registration. Simply make any desired changes and serialize to JSON. Note that this data contains secrets so think twice before putting it into the nix store.\n\nCurrently `as_token` and `hs_token` need to be added as they are not known to this module.\n"}, "loc": ["services", "mautrix-facebook", "registrationData"], "readOnly": false, "type": "attribute set"}, "services.mautrix-facebook.settings": {"declarations": ["nixos/modules/services/matrix/mautrix-facebook.nix"], "default": {"_type": "literalExpression", "text": "{\n  appservice = {\n    address = \"http://localhost:29319\";\n    bot_username = \"facebookbot\";\n    database = \"postgresql://\";\n    hostname = \"localhost\";\n    port = 29319;\n  };\n  bridge = {\n    encryption = {\n      allow = true;\n      default = true;\n      verification_levels = {\n        receive = \"cross-signed-tofu\";\n        send = \"cross-signed-tofu\";\n        share = \"cross-signed-tofu\";\n      };\n    };\n    username_template = \"facebook_{userid}\";\n  };\n  homeserver = {\n    address = \"http://localhost:8008\";\n    software = \"standard\";\n  };\n  logging = {\n    formatters = {\n      journal_fmt = {\n        format = \"%(name)s: %(message)s\";\n      };\n    };\n    handlers = {\n      journal = {\n        SYSLOG_IDENTIFIER = \"mautrix-facebook\";\n        class = \"systemd.journal.JournalHandler\";\n        formatter = \"journal_fmt\";\n      };\n    };\n    root = {\n      handlers = [\n        \"journal\"\n      ];\n      level = \"INFO\";\n    };\n    version = 1;\n  };\n  manhole = {\n    enabled = false;\n  };\n  metrics = {\n    enabled = false;\n  };\n}"}, "description": {"_type": "mdDoc", "text": "{file}`config.yaml` configuration as a Nix attribute set.\nConfiguration options should match those described in\n[example-config.yaml](https://github.com/mautrix/facebook/blob/master/mautrix_facebook/example-config.yaml).\n\nSecret tokens should be specified using {option}`environmentFile`\ninstead of this world-readable attribute set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  homeserver = {\n    address = \"http://localhost:8008\";\n    domain = \"mydomain.example\";\n  };\n\n  bridge.permissions = {\n    \"@admin:mydomain.example\" = \"admin\";\n    \"mydomain.example\" = \"user\";\n  };\n}\n"}, "loc": ["services", "mautrix-facebook", "settings"], "readOnly": false, "type": "JSON value"}, "services.mautrix-telegram.enable": {"declarations": ["nixos/modules/services/matrix/mautrix-telegram.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Mautrix-Telegram, a Matrix-Telegram hybrid puppeting/relaybot bridge."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mautrix-telegram", "enable"], "readOnly": false, "type": "boolean"}, "services.mautrix-telegram.environmentFile": {"declarations": ["nixos/modules/services/matrix/mautrix-telegram.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing environment variables to be passed to the mautrix-telegram service,\nin which secret tokens can be specified securely by defining values for e.g.\n`MAUTRIX_TELEGRAM_APPSERVICE_AS_TOKEN`,\n`MAUTRIX_TELEGRAM_APPSERVICE_HS_TOKEN`,\n`MAUTRIX_TELEGRAM_TELEGRAM_API_ID`,\n`MAUTRIX_TELEGRAM_TELEGRAM_API_HASH` and optionally\n`MAUTRIX_TELEGRAM_TELEGRAM_BOT_TOKEN`.\n\nThese environment variables can also be used to set other options by\nreplacing hierarchy levels by `.`, converting the name to uppercase\nand prepending `MAUTRIX_TELEGRAM_`.\nFor example, the first value above maps to\n{option}`settings.appservice.as_token`.\n\nThe environment variable values can be prefixed with `json::` to have\nthem be parsed as JSON. For example, `login_shared_secret_map` can be\nset as follows:\n`MAUTRIX_TELEGRAM_BRIDGE_LOGIN_SHARED_SECRET_MAP=json::{\"example.com\":\"secret\"}`.\n"}, "loc": ["services", "mautrix-telegram", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.mautrix-telegram.serviceDependencies": {"declarations": ["nixos/modules/services/matrix/mautrix-telegram.nix"], "default": {"_type": "literalExpression", "text": "optional config.services.matrix-synapse.enable \"matrix-synapse.service\"\n"}, "description": {"_type": "mdDoc", "text": "List of Systemd services to require and wait for when starting the application service.\n"}, "loc": ["services", "mautrix-telegram", "serviceDependencies"], "readOnly": false, "type": "list of string"}, "services.mautrix-telegram.settings": {"declarations": ["nixos/modules/services/matrix/mautrix-telegram.nix"], "default": {"_type": "literalExpression", "text": "{\n  appservice = {\n    address = \"http://localhost:8080\";\n    database = \"sqlite:////var/lib/mautrix-telegram/mautrix-telegram.db\";\n    database_opts = { };\n    hostname = \"0.0.0.0\";\n    port = 8080;\n  };\n  bridge = {\n    double_puppet_server_map = { };\n    login_shared_secret_map = { };\n    permissions = {\n      \"*\" = \"relaybot\";\n    };\n    relaybot = {\n      whitelist = [ ];\n    };\n  };\n  homeserver = {\n    software = \"standard\";\n  };\n  logging = {\n    formatters = {\n      precise = {\n        format = \"[%(levelname)s@%(name)s] %(message)s\";\n      };\n    };\n    handlers = {\n      console = {\n        class = \"logging.StreamHandler\";\n        formatter = \"precise\";\n      };\n    };\n    loggers = {\n      aiohttp = {\n        level = \"WARNING\";\n      };\n      mau = {\n        level = \"INFO\";\n      };\n      telethon = {\n        level = \"INFO\";\n      };\n    };\n    root = {\n      handlers = [\n        \"console\"\n      ];\n      level = \"INFO\";\n    };\n    version = 1;\n  };\n}"}, "description": {"_type": "mdDoc", "text": "{file}`config.yaml` configuration as a Nix attribute set.\nConfiguration options should match those described in\n[example-config.yaml](https://github.com/mautrix/telegram/blob/master/mautrix_telegram/example-config.yaml).\n\nSecret tokens should be specified using {option}`environmentFile`\ninstead of this world-readable attribute set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  homeserver = {\n    address = \"http://localhost:8008\";\n    domain = \"public-domain.tld\";\n  };\n\n  appservice.public = {\n    prefix = \"/public\";\n    external = \"https://public-appservice-address/public\";\n  };\n\n  bridge.permissions = {\n    \"example.com\" = \"full\";\n    \"@admin:example.com\" = \"admin\";\n  };\n}\n"}, "loc": ["services", "mautrix-telegram", "settings"], "readOnly": false, "type": "JSON value"}, "services.mbpfan.aggressive": {"declarations": ["nixos/modules/services/misc/mbpfan.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If true, favors higher default fan speeds."}, "loc": ["services", "mbpfan", "aggressive"], "readOnly": false, "type": "boolean"}, "services.mbpfan.enable": {"declarations": ["nixos/modules/services/misc/mbpfan.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable mbpfan, fan controller daemon for Apple Macs and MacBooks."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mbpfan", "enable"], "readOnly": false, "type": "boolean"}, "services.mbpfan.package": {"declarations": ["nixos/modules/services/misc/mbpfan.nix"], "default": {"_type": "literalExpression", "text": "pkgs.mbpfan"}, "description": {"_type": "mdDoc", "text": "The package used for the mbpfan daemon."}, "loc": ["services", "mbpfan", "package"], "readOnly": false, "type": "package"}, "services.mbpfan.settings": {"declarations": ["nixos/modules/services/misc/mbpfan.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "INI configuration for Mbpfan."}, "loc": ["services", "mbpfan", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.mbpfan.settings.general.high_temp": {"declarations": ["nixos/modules/services/misc/mbpfan.nix"], "default": {"_type": "literalExpression", "text": "66"}, "description": {"_type": "mdDoc", "text": "If temperature is above this, fan speed will gradually increase."}, "loc": ["services", "mbpfan", "settings", "general", "high_temp"], "readOnly": false, "type": "signed integer"}, "services.mbpfan.settings.general.low_temp": {"declarations": ["nixos/modules/services/misc/mbpfan.nix"], "default": {"_type": "literalExpression", "text": "63"}, "description": {"_type": "mdDoc", "text": "If temperature is below this, fans will run at minimum speed."}, "loc": ["services", "mbpfan", "settings", "general", "low_temp"], "readOnly": false, "type": "signed integer"}, "services.mbpfan.settings.general.max_temp": {"declarations": ["nixos/modules/services/misc/mbpfan.nix"], "default": {"_type": "literalExpression", "text": "86"}, "description": {"_type": "mdDoc", "text": "If temperature is above this, fans will run at maximum speed."}, "loc": ["services", "mbpfan", "settings", "general", "max_temp"], "readOnly": false, "type": "signed integer"}, "services.mbpfan.settings.general.polling_interval": {"declarations": ["nixos/modules/services/misc/mbpfan.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "The polling interval."}, "loc": ["services", "mbpfan", "settings", "general", "polling_interval"], "readOnly": false, "type": "signed integer"}, "services.mbpfan.verbose": {"declarations": ["nixos/modules/services/misc/mbpfan.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If true, sets the log level to verbose."}, "loc": ["services", "mbpfan", "verbose"], "readOnly": false, "type": "boolean"}, "services.mediamtx.enable": {"declarations": ["nixos/modules/services/video/mediamtx.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable MediaMTX."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mediamtx", "enable"], "readOnly": false, "type": "boolean"}, "services.mediamtx.env": {"declarations": ["nixos/modules/services/video/mediamtx.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables for MediaMTX"}, "example": {"_type": "literalExpression", "text": "{\n  MTX_CONFKEY = \"mykey\";\n}"}, "loc": ["services", "mediamtx", "env"], "readOnly": false, "type": "attribute set of anything"}, "services.mediamtx.settings": {"declarations": ["nixos/modules/services/video/mediamtx.nix"], "default": {"_type": "literalExpression", "text": "{\n  logDestinations = [\n    \"stdout\"\n  ];\n  logFile = \"/var/log/mediamtx/mediamtx.log\";\n  logLevel = \"info\";\n}"}, "description": {"_type": "mdDoc", "text": "Settings for MediaMTX.\nRead more at <https://github.com/aler9/mediamtx/blob/main/mediamtx.yml>\n"}, "example": {"_type": "literalExpression", "text": "{\n  paths = {\n    cam = {\n      runOnInit = \"ffmpeg -f v4l2 -i /dev/video0 -f rtsp rtsp://localhost:$RTSP_PORT/$RTSP_PATH\";\n      runOnInitRestart = true;\n    };\n  };\n}"}, "loc": ["services", "mediamtx", "settings"], "readOnly": false, "type": "YAML value"}, "services.mediatomb.customCfg": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow the service to create and use its own config file inside the `dataDir` as\nconfigured by {option}`services.mediatomb.dataDir`.\nDeactivated by default, the service then runs with the configuration generated from this module.\nOtherwise, when enabled, no service configuration is generated. Gerbera/Mediatomb then starts using\nconfig.xml within the configured `dataDir`. It's up to the user to make a correct\nconfiguration file.\n"}, "loc": ["services", "mediatomb", "customCfg"], "readOnly": false, "type": "boolean"}, "services.mediatomb.dataDir": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/${config.services.mediatomb.package.pname}\""}, "description": {"_type": "mdDoc", "text": "The directory where Gerbera/Mediatomb stores its state, data, etc.\n"}, "loc": ["services", "mediatomb", "dataDir"], "readOnly": false, "type": "path"}, "services.mediatomb.dsmSupport": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable D-Link DSM 320 specific tweaks.\nWARNING: incompatible with ps3 support.\n"}, "loc": ["services", "mediatomb", "dsmSupport"], "readOnly": false, "type": "boolean"}, "services.mediatomb.enable": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Gerbera/Mediatomb DLNA server.\n"}, "loc": ["services", "mediatomb", "enable"], "readOnly": false, "type": "boolean"}, "services.mediatomb.group": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "\"mediatomb\""}, "description": {"_type": "mdDoc", "text": "Group account under which the service runs."}, "loc": ["services", "mediatomb", "group"], "readOnly": false, "type": "string"}, "services.mediatomb.interface": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "A specific interface to bind to.\n"}, "loc": ["services", "mediatomb", "interface"], "readOnly": false, "type": "string"}, "services.mediatomb.mediaDirectories": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Declare media directories to index.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    hidden-files = false;\n    path = \"/data/pictures\";\n    recursive = false;\n  }\n  {\n    hidden-files = false;\n    path = \"/data/audio\";\n    recursive = true;\n  }\n]"}, "loc": ["services", "mediatomb", "mediaDirectories"], "readOnly": false, "type": "list of (submodule)"}, "services.mediatomb.mediaDirectories.*.hidden-files": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to index the hidden files or not."}, "loc": ["services", "mediatomb", "mediaDirectories", "*", "hidden-files"], "readOnly": false, "type": "boolean"}, "services.mediatomb.mediaDirectories.*.path": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "description": {"_type": "mdDoc", "text": "Absolute directory path to the media directory to index.\n"}, "loc": ["services", "mediatomb", "mediaDirectories", "*", "path"], "readOnly": false, "type": "string"}, "services.mediatomb.mediaDirectories.*.recursive": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the indexation must take place recursively or not."}, "loc": ["services", "mediatomb", "mediaDirectories", "*", "recursive"], "readOnly": false, "type": "boolean"}, "services.mediatomb.openFirewall": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If false (the default), this is up to the user to declare the firewall rules.\nIf true, this opens port 1900 (tcp and udp) and the port specified by\n{option}`sercvices.mediatomb.port`.\n\nIf the option {option}`services.mediatomb.interface` is set,\nthe firewall rules opened are dedicated to that interface. Otherwise,\nthose rules are opened globally.\n"}, "loc": ["services", "mediatomb", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.mediatomb.package": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gerbera"}, "description": {"_type": "mdDoc", "text": "Underlying package to be used with the module.\n"}, "loc": ["services", "mediatomb", "package"], "readOnly": false, "type": "package"}, "services.mediatomb.pcDirectoryHide": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to list the top-level directory or not (from upnp client standpoint).\n"}, "loc": ["services", "mediatomb", "pcDirectoryHide"], "readOnly": false, "type": "boolean"}, "services.mediatomb.port": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "49152"}, "description": {"_type": "mdDoc", "text": "The network port to listen on.\n"}, "loc": ["services", "mediatomb", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mediatomb.ps3Support": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ps3 specific tweaks.\nWARNING: incompatible with DSM 320 support.\n"}, "loc": ["services", "mediatomb", "ps3Support"], "readOnly": false, "type": "boolean"}, "services.mediatomb.serverName": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "\"Gerbera (Mediatomb)\""}, "description": {"_type": "mdDoc", "text": "How to identify the server on the network.\n"}, "loc": ["services", "mediatomb", "serverName"], "readOnly": false, "type": "string"}, "services.mediatomb.tg100Support": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Telegent TG100 specific tweaks.\n"}, "loc": ["services", "mediatomb", "tg100Support"], "readOnly": false, "type": "boolean"}, "services.mediatomb.transcoding": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable transcoding.\n"}, "loc": ["services", "mediatomb", "transcoding"], "readOnly": false, "type": "boolean"}, "services.mediatomb.user": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "\"mediatomb\""}, "description": {"_type": "mdDoc", "text": "User account under which the service runs."}, "loc": ["services", "mediatomb", "user"], "readOnly": false, "type": "string"}, "services.mediatomb.uuid": {"declarations": ["nixos/modules/services/misc/mediatomb.nix"], "default": {"_type": "literalExpression", "text": "\"fdfc8a4e-a3ad-4c1d-b43d-a2eedb03a687\""}, "description": {"_type": "mdDoc", "text": "A unique (on your network) to identify the server by.\n"}, "loc": ["services", "mediatomb", "uuid"], "readOnly": false, "type": "string"}, "services.mediawiki.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally.\nThis currently only applies if database type \"mysql\" is selected.\n"}, "loc": ["services", "mediawiki", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.mediawiki.database.host": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "mediawiki", "database", "host"], "readOnly": false, "type": "string"}, "services.mediawiki.database.name": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"mediawiki\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "mediawiki", "database", "name"], "readOnly": false, "type": "string"}, "services.mediawiki.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/mediawiki-dbpassword\""}, "loc": ["services", "mediawiki", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.mediawiki.database.port": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "3306"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "mediawiki", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mediawiki.database.socket": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "/run/mysqld/mysqld.sock"}, "description": {"_type": "mdDoc", "text": "Path to the unix socket file to use for authentication."}, "loc": ["services", "mediawiki", "database", "socket"], "readOnly": false, "type": "null or path"}, "services.mediawiki.database.tablePrefix": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If you only have access to a single database and wish to install more than\none version of MediaWiki, or have other applications that also use the\ndatabase, you can give the table names a unique prefix to stop any naming\nconflicts or confusion.\nSee <https://www.mediawiki.org/wiki/Manual:$wgDBprefix>.\n"}, "loc": ["services", "mediawiki", "database", "tablePrefix"], "readOnly": false, "type": "null or string"}, "services.mediawiki.database.type": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"mysql\""}, "description": {"_type": "mdDoc", "text": "Database engine to use. MySQL/MariaDB is the database of choice by MediaWiki developers."}, "loc": ["services", "mediawiki", "database", "type"], "readOnly": false, "type": "one of \"mysql\", \"postgres\", \"sqlite\", \"mssql\", \"oracle\""}, "services.mediawiki.database.user": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"mediawiki\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "mediawiki", "database", "user"], "readOnly": false, "type": "string"}, "services.mediawiki.enable": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable MediaWiki."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mediawiki", "enable"], "readOnly": false, "type": "boolean"}, "services.mediawiki.extensions": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute set of paths whose content is copied to the {file}`extensions`\nsubdirectory of the MediaWiki installation and enabled in configuration.\n\nUse `null` instead of path to enable extensions that are part of MediaWiki.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Matomo = pkgs.fetchzip {\n    url = \"https://github.com/DaSchTour/matomo-mediawiki-extension/archive/v4.0.1.tar.gz\";\n    sha256 = \"0g5rd3zp0avwlmqagc59cg9bbkn3r7wx7p6yr80s644mj6dlvs1b\";\n  };\n  ParserFunctions = null;\n}\n"}, "loc": ["services", "mediawiki", "extensions"], "readOnly": false, "type": "attribute set of (null or path)"}, "services.mediawiki.extraConfig": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Any additional text to be appended to MediaWiki's\nLocalSettings.php configuration file. For configuration\nsettings, see <https://www.mediawiki.org/wiki/Manual:Configuration_settings>.\n"}, "example": {"_type": "literalExpression", "text": "''\n  $wgEnableEmail = false;\n''"}, "loc": ["services", "mediawiki", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.mediawiki.finalPackage": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "pkg"}, "description": {"_type": "mdDoc", "text": "The final package used by the module. This is the package that will have extensions and skins installed.\n"}, "loc": ["services", "mediawiki", "finalPackage"], "readOnly": true, "type": "package"}, "services.mediawiki.httpd.virtualHost": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "description": {"_type": "mdDoc", "text": "Apache configuration can be done by adapting {option}`services.httpd.virtualHosts`.\nSee [](#opt-services.httpd.virtualHosts) for further information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  hostName = \"mediawiki.example.org\";\n  adminAddr = \"webmaster@example.org\";\n  forceSSL = true;\n  enableACME = true;\n}\n"}, "loc": ["services", "mediawiki", "httpd", "virtualHost"], "readOnly": false, "type": "submodule"}, "services.mediawiki.httpd.virtualHost.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the acme challenge which is PUBLIC, don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.mediawiki.httpd.virtualHost.addSSL": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "addSSL"], "readOnly": false, "type": "boolean"}, "services.mediawiki.httpd.virtualHost.adminAddr": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "E-mail address of the server administrator."}, "example": {"_type": "literalExpression", "text": "\"admin@example.org\""}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "adminAddr"], "readOnly": false, "type": "null or string"}, "services.mediawiki.httpd.virtualHost.documentRoot": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of Apache's document root directory.  If left undefined,\nan empty directory in the Nix store will be used as root.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "documentRoot"], "readOnly": false, "type": "null or path"}, "services.mediawiki.httpd.virtualHost.enableACME": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "enableACME"], "readOnly": false, "type": "boolean"}, "services.mediawiki.httpd.virtualHost.enableUserDir": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable serving {file}`~/public_html` as\n`/~\u00abusername\u00bb`.\n"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "enableUserDir"], "readOnly": false, "type": "boolean"}, "services.mediawiki.httpd.virtualHost.extraConfig": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to httpd.conf verbatim. They will go after\ndirectories and directory aliases defined by default.\n"}, "example": {"_type": "literalExpression", "text": "''\n  <Directory /home>\n    Options FollowSymlinks\n    AllowOverride All\n  </Directory>\n''"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.mediawiki.httpd.virtualHost.forceSSL": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.mediawiki.httpd.virtualHost.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given URL.\n"}, "example": {"_type": "literalExpression", "text": "\"http://newserver.example.org/\""}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.mediawiki.httpd.virtualHost.hostName": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Canonical hostname for the server."}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "hostName"], "readOnly": false, "type": "string"}, "services.mediawiki.httpd.virtualHost.http2": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTP 2. HTTP/2 is supported in all multi-processing modules that come with httpd. *However, if you use the prefork mpm, there will\nbe severe restrictions.* Refer to <https://httpd.apache.org/docs/2.4/howto/http2.html#mpm-config> for details.\n"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "http2"], "readOnly": false, "type": "boolean"}, "services.mediawiki.httpd.virtualHost.listen": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\n\n::: {.note}\nThis option overrides `addSSL`, `forceSSL` and `onlySSL`.\n\nIf you only want to set the addresses manually and not the ports, take a look at `listenAddresses`.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    ip = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    ip = \"192.154.1.1\";\n    port = 80;\n  }\n  {\n    ip = \"*\";\n    port = 8080;\n  }\n]"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.mediawiki.httpd.virtualHost.listen.*.ip": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"*\""}, "description": {"_type": "mdDoc", "text": "IP to listen on. 0.0.0.0 for IPv4 only, * for all."}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "listen", "*", "ip"], "readOnly": false, "type": "string"}, "services.mediawiki.httpd.virtualHost.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "description": {"_type": "mdDoc", "text": "Port to listen on"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mediawiki.httpd.virtualHost.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SSL (https) support."}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.mediawiki.httpd.virtualHost.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*\"\n]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "listenAddresses"], "readOnly": false, "type": "non-empty (list of string)"}, "services.mediawiki.httpd.virtualHost.locations": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config. See <https://httpd.apache.org/docs/2.4/mod/core.html#location> for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n  \"/foo/bar.png\" = {\n    alias = \"/home/eelco/some-file.png\";\n  };\n};\n"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.mediawiki.httpd.virtualHost.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests. See <https://httpd.apache.org/docs/2.4/mod/mod_alias.html#alias>.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.mediawiki.httpd.virtualHost.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.mediawiki.httpd.virtualHost.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds DirectoryIndex directive. See <https://httpd.apache.org/docs/2.4/mod/mod_dir.html#directoryindex>.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.mediawiki.httpd.virtualHost.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.mediawiki.httpd.virtualHost.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets up a simple reverse proxy as described by <https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple>.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.mediawiki.httpd.virtualHost.logFormat": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"common\""}, "description": {"_type": "mdDoc", "text": "Log format for Apache's log files. Possible values are: combined, common, referer, agent.\n"}, "example": {"_type": "literalExpression", "text": "\"combined\""}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "logFormat"], "readOnly": false, "type": "string"}, "services.mediawiki.httpd.virtualHost.onlySSL": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.mediawiki.httpd.virtualHost.robotsEntries": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Specification of pages to be ignored by web crawlers. See <http://www.robotstxt.org/> for details.\n"}, "example": {"_type": "literalExpression", "text": "\"Disallow: /foo/\""}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "robotsEntries"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.mediawiki.httpd.virtualHost.servedDirs": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve static directories.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    dir = \"/home/eelco/Dev/nix-homepage\";\n    urlPath = \"/nix\";\n  }\n]"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "servedDirs"], "readOnly": false, "type": "list of (attribute set)"}, "services.mediawiki.httpd.virtualHost.servedFiles": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve individual, static files.\n\n::: {.note}\nThis option has been deprecated and will be removed in a future\nversion of NixOS. You can achieve the same result by making use of\nthe `locations.<name>.alias` option.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    file = \"/home/eelco/some-file.png\";\n    urlPath = \"/foo/bar.png\";\n  }\n]"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "servedFiles"], "readOnly": false, "type": "list of (attribute set)"}, "services.mediawiki.httpd.virtualHost.serverAliases": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"www.example.org:8080\"\n  \"example.org\"\n]"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.mediawiki.httpd.virtualHost.sslServerCert": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "sslServerCert"], "readOnly": false, "type": "path"}, "services.mediawiki.httpd.virtualHost.sslServerChain": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to server SSL chain file."}, "example": {"_type": "literalExpression", "text": "\"/var/ca.pem\""}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "sslServerChain"], "readOnly": false, "type": "null or path"}, "services.mediawiki.httpd.virtualHost.sslServerKey": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "sslServerKey"], "readOnly": false, "type": "path"}, "services.mediawiki.httpd.virtualHost.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "mediawiki", "httpd", "virtualHost", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.mediawiki.name": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"MediaWiki\""}, "description": {"_type": "mdDoc", "text": "Name of the wiki."}, "example": {"_type": "literalExpression", "text": "\"Foobar Wiki\""}, "loc": ["services", "mediawiki", "name"], "readOnly": false, "type": "string"}, "services.mediawiki.package": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "pkgs.mediawiki"}, "description": {"_type": "mdDoc", "text": "Which MediaWiki package to use."}, "loc": ["services", "mediawiki", "package"], "readOnly": false, "type": "package"}, "services.mediawiki.passwordFile": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "description": {"_type": "mdDoc", "text": "A file containing the initial password for the admin user."}, "example": {"_type": "literalExpression", "text": "\"/run/keys/mediawiki-password\""}, "loc": ["services", "mediawiki", "passwordFile"], "readOnly": false, "type": "path"}, "services.mediawiki.passwordSender": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "if cfg.webserver == \"apache\" then\n  if cfg.httpd.virtualHost.adminAddr != null then\n    cfg.httpd.virtualHost.adminAddr\n  else\n    config.services.httpd.adminAddr else \"root@localhost\"\n"}, "description": {"_type": "mdDoc", "text": "Contact address for password reset."}, "loc": ["services", "mediawiki", "passwordSender"], "readOnly": false, "type": "string"}, "services.mediawiki.poolConfig": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = 32;\n  \"pm.max_requests\" = 500;\n  \"pm.max_spare_servers\" = 4;\n  \"pm.min_spare_servers\" = 2;\n  \"pm.start_servers\" = 2;\n}"}, "description": {"_type": "mdDoc", "text": "Options for the MediaWiki PHP pool. See the documentation on `php-fpm.conf`\nfor details on configuration directives.\n"}, "loc": ["services", "mediawiki", "poolConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.mediawiki.skins": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute set of paths whose content is copied to the {file}`skins`\nsubdirectory of the MediaWiki installation in addition to the default skins.\n"}, "loc": ["services", "mediawiki", "skins"], "readOnly": false, "type": "attribute set of path"}, "services.mediawiki.uploadsDir": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mediawiki/uploads\""}, "description": {"_type": "mdDoc", "text": "This directory is used for uploads of pictures. The directory passed here is automatically\ncreated and permissions adjusted as required.\n"}, "loc": ["services", "mediawiki", "uploadsDir"], "readOnly": false, "type": "null or path"}, "services.mediawiki.url": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "if cfg.webserver == \"apache\" then\n  \"${if cfg.httpd.virtualHost.addSSL || cfg.httpd.virtualHost.forceSSL || cfg.httpd.virtualHost.onlySSL then \"https\" else \"http\"}://${cfg.httpd.virtualHost.hostName}\"\nelse\n  \"http://localhost\";\n"}, "description": {"_type": "mdDoc", "text": "URL of the wiki."}, "example": {"_type": "literalExpression", "text": "\"https://wiki.example.org\""}, "loc": ["services", "mediawiki", "url"], "readOnly": false, "type": "string"}, "services.mediawiki.webserver": {"declarations": ["nixos/modules/services/web-apps/mediawiki.nix"], "default": {"_type": "literalExpression", "text": "\"apache\""}, "description": {"_type": "mdDoc", "text": "Webserver to use."}, "loc": ["services", "mediawiki", "webserver"], "readOnly": false, "type": "one of \"apache\", \"none\""}, "services.meilisearch.enable": {"declarations": ["nixos/modules/services/search/meilisearch.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable MeiliSearch - a RESTful search API."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "meilisearch", "enable"], "readOnly": false, "type": "boolean"}, "services.meilisearch.environment": {"declarations": ["nixos/modules/services/search/meilisearch.nix"], "default": {"_type": "literalExpression", "text": "\"development\""}, "description": {"_type": "mdDoc", "text": "Defines the running environment of MeiliSearch."}, "loc": ["services", "meilisearch", "environment"], "readOnly": false, "type": "one of \"development\", \"production\""}, "services.meilisearch.listenAddress": {"declarations": ["nixos/modules/services/search/meilisearch.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "MeiliSearch listen address."}, "loc": ["services", "meilisearch", "listenAddress"], "readOnly": false, "type": "string"}, "services.meilisearch.listenPort": {"declarations": ["nixos/modules/services/search/meilisearch.nix"], "default": {"_type": "literalExpression", "text": "7700"}, "description": {"_type": "mdDoc", "text": "MeiliSearch port to listen on."}, "loc": ["services", "meilisearch", "listenPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.meilisearch.logLevel": {"declarations": ["nixos/modules/services/search/meilisearch.nix"], "default": {"_type": "literalExpression", "text": "\"INFO\""}, "description": {"_type": "mdDoc", "text": "Defines how much detail should be present in MeiliSearch's logs.\nMeiliSearch currently supports four log levels, listed in order of increasing verbosity:\n- 'ERROR': only log unexpected events indicating MeiliSearch is not functioning as expected\n- 'WARN:' log all unexpected events, regardless of their severity\n- 'INFO:' log all events. This is the default value\n- 'DEBUG': log all events and including detailed information on MeiliSearch's internal processes.\n  Useful when diagnosing issues and debugging\n"}, "loc": ["services", "meilisearch", "logLevel"], "readOnly": false, "type": "string"}, "services.meilisearch.masterKeyEnvironmentFile": {"declarations": ["nixos/modules/services/search/meilisearch.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to file which contains the master key.\nBy doing so, all routes will be protected and will require a key to be accessed.\nIf no master key is provided, all routes can be accessed without requiring any key.\nThe format is the following:\nMEILI_MASTER_KEY=my_secret_key\n"}, "loc": ["services", "meilisearch", "masterKeyEnvironmentFile"], "readOnly": false, "type": "null or path"}, "services.meilisearch.maxIndexSize": {"declarations": ["nixos/modules/services/search/meilisearch.nix"], "default": {"_type": "literalExpression", "text": "\"107374182400\""}, "description": {"_type": "mdDoc", "text": "Sets the maximum size of the index.\nValue must be given in bytes or explicitly stating a base unit.\nFor example, the default value can be written as 107374182400, '107.7Gb', or '107374 Mb'.\nDefault is 100 GiB\n"}, "loc": ["services", "meilisearch", "maxIndexSize"], "readOnly": false, "type": "string"}, "services.meilisearch.noAnalytics": {"declarations": ["nixos/modules/services/search/meilisearch.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Deactivates analytics.\nAnalytics allow MeiliSearch to know how many users are using MeiliSearch,\nwhich versions and which platforms are used.\nThis process is entirely anonymous.\n"}, "loc": ["services", "meilisearch", "noAnalytics"], "readOnly": false, "type": "boolean"}, "services.meilisearch.package": {"declarations": ["nixos/modules/services/search/meilisearch.nix"], "default": {"_type": "literalExpression", "text": "pkgs.meilisearch"}, "description": {"_type": "mdDoc", "text": "The package to use for meilisearch. Use this if you require specific features to be enabled. The default package has no features."}, "loc": ["services", "meilisearch", "package"], "readOnly": false, "type": "package"}, "services.meilisearch.payloadSizeLimit": {"declarations": ["nixos/modules/services/search/meilisearch.nix"], "default": {"_type": "literalExpression", "text": "\"104857600\""}, "description": {"_type": "mdDoc", "text": "Sets the maximum size of accepted JSON payloads.\nValue must be given in bytes or explicitly stating a base unit.\nFor example, the default value can be written as 107374182400, '107.7Gb', or '107374 Mb'.\nDefault is ~ 100 MB\n"}, "loc": ["services", "meilisearch", "payloadSizeLimit"], "readOnly": false, "type": "string"}, "services.memcached.enable": {"declarations": ["nixos/modules/services/databases/memcached.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Memcached."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "memcached", "enable"], "readOnly": false, "type": "boolean"}, "services.memcached.enableUnixSocket": {"declarations": ["nixos/modules/services/databases/memcached.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable unix socket at /run/memcached/memcached.sock."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "memcached", "enableUnixSocket"], "readOnly": false, "type": "boolean"}, "services.memcached.extraOptions": {"declarations": ["nixos/modules/services/databases/memcached.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of extra options that will be added as a suffix when running memcached."}, "loc": ["services", "memcached", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.memcached.listen": {"declarations": ["nixos/modules/services/databases/memcached.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The IP address to bind to."}, "loc": ["services", "memcached", "listen"], "readOnly": false, "type": "string"}, "services.memcached.maxConnections": {"declarations": ["nixos/modules/services/databases/memcached.nix"], "default": {"_type": "literalExpression", "text": "1024"}, "description": {"_type": "mdDoc", "text": "The maximum number of simultaneous connections."}, "loc": ["services", "memcached", "maxConnections"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.memcached.maxMemory": {"declarations": ["nixos/modules/services/databases/memcached.nix"], "default": {"_type": "literalExpression", "text": "64"}, "description": {"_type": "mdDoc", "text": "The maximum amount of memory to use for storage, in megabytes."}, "loc": ["services", "memcached", "maxMemory"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.memcached.port": {"declarations": ["nixos/modules/services/databases/memcached.nix"], "default": {"_type": "literalExpression", "text": "11211"}, "description": {"_type": "mdDoc", "text": "The port to bind to."}, "loc": ["services", "memcached", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.memcached.user": {"declarations": ["nixos/modules/services/databases/memcached.nix"], "default": {"_type": "literalExpression", "text": "\"memcached\""}, "description": {"_type": "mdDoc", "text": "The user to run Memcached as"}, "loc": ["services", "memcached", "user"], "readOnly": false, "type": "string"}, "services.merecat.enable": {"declarations": ["nixos/modules/services/web-servers/merecat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Merecat HTTP server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "merecat", "enable"], "readOnly": false, "type": "boolean"}, "services.merecat.settings": {"declarations": ["nixos/modules/services/web-servers/merecat.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Merecat configuration. Refer to merecat(8) for details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  directory = \"/srv/www\";\n  hostname = \"localhost\";\n  port = 8080;\n  virtual-host = true;\n}"}, "loc": ["services", "merecat", "settings"], "readOnly": false, "type": "attribute set of (atom (null, bool, int, float or string))"}, "services.meshcentral.enable": {"declarations": ["nixos/modules/services/admin/meshcentral.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable MeshCentral computer management server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "meshcentral", "enable"], "readOnly": false, "type": "boolean"}, "services.meshcentral.package": {"declarations": ["nixos/modules/services/admin/meshcentral.nix"], "default": {"_type": "literalExpression", "text": "pkgs.meshcentral"}, "description": {"_type": "mdDoc", "text": "MeshCentral package to use. Replacing this may be necessary to add dependencies for extra functionality."}, "loc": ["services", "meshcentral", "package"], "readOnly": false, "type": "package"}, "services.meshcentral.settings": {"declarations": ["nixos/modules/services/admin/meshcentral.nix"], "description": {"_type": "mdDoc", "text": "Settings for MeshCentral. Refer to upstream documentation for details:\n\n- [JSON Schema definition](https://github.com/Ylianst/MeshCentral/blob/master/meshcentral-config-schema.json)\n- [simple sample configuration](https://github.com/Ylianst/MeshCentral/blob/master/sample-config.json)\n- [complex sample configuration](https://github.com/Ylianst/MeshCentral/blob/master/sample-config-advanced.json)\n- [Old homepage with documentation link](https://www.meshcommander.com/meshcentral2)\n"}, "example": {"_type": "literalExpression", "text": "{\n  domains = {\n    \"\" = {\n      certUrl = \"https://meshcentral.example.com/\";\n    };\n  };\n  settings = {\n    Cert = \"meshcentral.example.com\";\n    Port = 4430;\n    TlsOffload = \"10.0.0.2,fd42::2\";\n    WANonly = true;\n  };\n}"}, "loc": ["services", "meshcentral", "settings"], "readOnly": false, "type": "JSON value"}, "services.metabase.enable": {"declarations": ["nixos/modules/services/misc/metabase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Metabase service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "metabase", "enable"], "readOnly": false, "type": "boolean"}, "services.metabase.listen.ip": {"declarations": ["nixos/modules/services/misc/metabase.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IP address that Metabase should listen on.\n"}, "loc": ["services", "metabase", "listen", "ip"], "readOnly": false, "type": "string"}, "services.metabase.listen.port": {"declarations": ["nixos/modules/services/misc/metabase.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Listen port for Metabase.\n"}, "loc": ["services", "metabase", "listen", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.metabase.openFirewall": {"declarations": ["nixos/modules/services/misc/metabase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for Metabase.\n"}, "loc": ["services", "metabase", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.metabase.ssl.enable": {"declarations": ["nixos/modules/services/misc/metabase.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SSL (https) support.\n"}, "loc": ["services", "metabase", "ssl", "enable"], "readOnly": false, "type": "boolean"}, "services.metabase.ssl.keystore": {"declarations": ["nixos/modules/services/misc/metabase.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/metabase/metabase.jks\""}, "description": {"_type": "mdDoc", "text": "[Java KeyStore](https://www.digitalocean.com/community/tutorials/java-keytool-essentials-working-with-java-keystores) file containing the certificates.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/secrets/keystore.jks\""}, "loc": ["services", "metabase", "ssl", "keystore"], "readOnly": false, "type": "null or path"}, "services.metabase.ssl.port": {"declarations": ["nixos/modules/services/misc/metabase.nix"], "default": {"_type": "literalExpression", "text": "8443"}, "description": {"_type": "mdDoc", "text": "Listen port over SSL (https) for Metabase.\n"}, "loc": ["services", "metabase", "ssl", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.metricbeat.enable": {"declarations": ["nixos/modules/services/monitoring/metricbeat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable metricbeat."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "metricbeat", "enable"], "readOnly": false, "type": "boolean"}, "services.metricbeat.modules": {"declarations": ["nixos/modules/services/monitoring/metricbeat.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Metricbeat modules are responsible for reading metrics from the various sources.\n\nThis is like `services.metricbeat.settings.metricbeat.modules`,\nbut structured as an attribute set. This has the benefit that multiple\nNixOS modules can contribute settings to a single metricbeat module.\n\nA module can be specified multiple times by choosing a different `<name>`\nfor each, but setting [](#opt-services.metricbeat.modules._name_.module) to the same value.\n\nSee <https://www.elastic.co/guide/en/beats/metricbeat/current/metricbeat-modules.html>.\n"}, "example": {"_type": "literalExpression", "text": "{\n  system = {\n    core = {\n      metrics = [\n        \"percentages\"\n      ];\n    };\n    cpu = {\n      metrics = [\n        \"percentages\"\n        \"normalized_percentages\"\n      ];\n    };\n    enabled = true;\n    metricsets = [\n      \"cpu\"\n      \"load\"\n      \"memory\"\n      \"network\"\n      \"process\"\n      \"process_summary\"\n      \"uptime\"\n      \"socket_summary\"\n    ];\n    period = \"10s\";\n    processes = [\n      \".*\"\n    ];\n  };\n}"}, "loc": ["services", "metricbeat", "modules"], "readOnly": false, "type": "attribute set of (YAML value)"}, "services.metricbeat.modules.<name>.module": {"declarations": ["nixos/modules/services/monitoring/metricbeat.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The name of the module.\n\nLook for the value after `module:` on the individual\nmodule pages linked from <https://www.elastic.co/guide/en/beats/metricbeat/current/metricbeat-modules.html>.\n"}, "loc": ["services", "metricbeat", "modules", "<name>", "module"], "readOnly": false, "type": "string"}, "services.metricbeat.package": {"declarations": ["nixos/modules/services/monitoring/metricbeat.nix"], "default": {"_type": "literalExpression", "text": "pkgs.metricbeat"}, "description": {"_type": "mdDoc", "text": "The metricbeat package to use\n"}, "example": {"_type": "literalExpression", "text": "pkgs.metricbeat7"}, "loc": ["services", "metricbeat", "package"], "readOnly": false, "type": "package"}, "services.metricbeat.settings": {"declarations": ["nixos/modules/services/monitoring/metricbeat.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for metricbeat. See <https://www.elastic.co/guide/en/beats/metricbeat/current/configuring-howto-metricbeat.html> for supported values.\n"}, "loc": ["services", "metricbeat", "settings"], "readOnly": false, "type": "YAML value"}, "services.metricbeat.settings.name": {"declarations": ["nixos/modules/services/monitoring/metricbeat.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Name of the beat. Defaults to the hostname.\nSee <https://www.elastic.co/guide/en/beats/metricbeat/current/configuration-general-options.html#_name>.\n"}, "loc": ["services", "metricbeat", "settings", "name"], "readOnly": false, "type": "string"}, "services.metricbeat.settings.tags": {"declarations": ["nixos/modules/services/monitoring/metricbeat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Tags to place on the shipped metrics.\nSee <https://www.elastic.co/guide/en/beats/metricbeat/current/configuration-general-options.html#_tags_2>.\n"}, "loc": ["services", "metricbeat", "settings", "tags"], "readOnly": false, "type": "list of string"}, "services.mighttpd2.config": {"declarations": ["nixos/modules/services/web-servers/mighttpd2.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim config file to use\n(see http://www.mew.org/~kazu/proj/mighttpd/en/config.html)\n"}, "example": {"_type": "literalExpression", "text": "''\n  # Example configuration for Mighttpd 2\n  Port: 80\n  # IP address or \"*\"\n  Host: *\n  Debug_Mode: Yes # Yes or No\n  # If available, \"nobody\" is much more secure for User:.\n  User: root\n  # If available, \"nobody\" is much more secure for Group:.\n  Group: root\n  Pid_File: /run/mighty.pid\n  Logging: Yes # Yes or No\n  Log_File: /var/log/mighty # The directory must be writable by User:\n  Log_File_Size: 16777216 # bytes\n  Log_Backup_Number: 10\n  Index_File: index.html\n  Index_Cgi: index.cgi\n  Status_File_Dir: /usr/local/share/mighty/status\n  Connection_Timeout: 30 # seconds\n  Fd_Cache_Duration: 10 # seconds\n  # Server_Name: Mighttpd/3.x.y\n  Tls_Port: 443\n  Tls_Cert_File: cert.pem # should change this with an absolute path\n  # should change this with comma-separated absolute paths\n  Tls_Chain_Files: chain.pem\n  # Currently, Tls_Key_File must not be encrypted.\n  Tls_Key_File: privkey.pem # should change this with an absolute path\n  Service: 0 # 0 is HTTP only, 1 is HTTPS only, 2 is both\n''"}, "loc": ["services", "mighttpd2", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.mighttpd2.cores": {"declarations": ["nixos/modules/services/web-servers/mighttpd2.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How many cores to use.\nIf null it will be determined automatically\n"}, "loc": ["services", "mighttpd2", "cores"], "readOnly": false, "type": "null or signed integer"}, "services.mighttpd2.enable": {"declarations": ["nixos/modules/services/web-servers/mighttpd2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Mighttpd2 web server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mighttpd2", "enable"], "readOnly": false, "type": "boolean"}, "services.mighttpd2.routing": {"declarations": ["nixos/modules/services/web-servers/mighttpd2.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim routing file to use\n(see http://www.mew.org/~kazu/proj/mighttpd/en/config.html)\n"}, "example": {"_type": "literalExpression", "text": "''\n  # Example routing for Mighttpd 2\n  \n  # Domain lists\n  [localhost www.example.com]\n  \n  # Entries are looked up in the specified order\n  # All paths must end with \"/\"\n  \n  # A path to CGI scripts should be specified with \"=>\"\n  /~alice/cgi-bin/ => /home/alice/public_html/cgi-bin/\n  \n  # A path to static files should be specified with \"->\"\n  /~alice/         -> /home/alice/public_html/\n  /cgi-bin/        => /export/cgi-bin/\n  \n  # Reverse proxy rules should be specified with \">>\"\n  # /path >> host:port/path2\n  # Either \"host\" or \":port\" can be committed, but not both.\n  /app/cal/        >> example.net/calendar/\n  # Yesod app in the same server\n  /app/wiki/       >> 127.0.0.1:3000/\n  \n  /                -> /export/www/\n''"}, "loc": ["services", "mighttpd2", "routing"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.mimir.configFile": {"declarations": ["nixos/modules/services/monitoring/mimir.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a configuration file that Mimir should use.\n"}, "loc": ["services", "mimir", "configFile"], "readOnly": false, "type": "null or path"}, "services.mimir.configuration": {"declarations": ["nixos/modules/services/monitoring/mimir.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specify the configuration for Mimir in Nix.\n"}, "loc": ["services", "mimir", "configuration"], "readOnly": false, "type": "JSON value"}, "services.mimir.enable": {"declarations": ["nixos/modules/services/monitoring/mimir.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable mimir."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mimir", "enable"], "readOnly": false, "type": "boolean"}, "services.mimir.package": {"declarations": ["nixos/modules/services/monitoring/mimir.nix"], "default": {"_type": "literalExpression", "text": "pkgs.mimir"}, "description": {"_type": "mdDoc", "text": "Mimir package to use."}, "loc": ["services", "mimir", "package"], "readOnly": false, "type": "package"}, "services.minecraft-server.dataDir": {"declarations": ["nixos/modules/services/games/minecraft-server.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/minecraft\""}, "description": {"_type": "mdDoc", "text": "Directory to store Minecraft database and other state/data files.\n"}, "loc": ["services", "minecraft-server", "dataDir"], "readOnly": false, "type": "path"}, "services.minecraft-server.declarative": {"declarations": ["nixos/modules/services/games/minecraft-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use a declarative Minecraft server configuration.\nOnly if set to `true`, the options\n{option}`services.minecraft-server.whitelist` and\n{option}`services.minecraft-server.serverProperties` will be\napplied.\n"}, "loc": ["services", "minecraft-server", "declarative"], "readOnly": false, "type": "boolean"}, "services.minecraft-server.enable": {"declarations": ["nixos/modules/services/games/minecraft-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, start a Minecraft Server. The server\ndata will be loaded from and saved to\n{option}`services.minecraft-server.dataDir`.\n"}, "loc": ["services", "minecraft-server", "enable"], "readOnly": false, "type": "boolean"}, "services.minecraft-server.eula": {"declarations": ["nixos/modules/services/games/minecraft-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether you agree to\n[\nMojangs EULA](https://account.mojang.com/documents/minecraft_eula). This option must be set to\n`true` to run Minecraft server.\n"}, "loc": ["services", "minecraft-server", "eula"], "readOnly": false, "type": "boolean"}, "services.minecraft-server.jvmOpts": {"declarations": ["nixos/modules/services/games/minecraft-server.nix"], "default": {"_type": "literalExpression", "text": "\"-Xmx2048M -Xms2048M\""}, "description": {"_type": "mdDoc", "text": "JVM options for the Minecraft server."}, "example": {"_type": "literalExpression", "text": "\"-Xms4092M -Xmx4092M -XX:+UseG1GC -XX:+CMSIncrementalPacing -XX:+CMSClassUnloadingEnabled -XX:ParallelGCThreads=2 -XX:MinHeapFreeRatio=5 -XX:MaxHeapFreeRatio=10\""}, "loc": ["services", "minecraft-server", "jvmOpts"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.minecraft-server.openFirewall": {"declarations": ["nixos/modules/services/games/minecraft-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open ports in the firewall for the server.\n"}, "loc": ["services", "minecraft-server", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.minecraft-server.package": {"declarations": ["nixos/modules/services/games/minecraft-server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.minecraft-server"}, "description": {"_type": "mdDoc", "text": "Version of minecraft-server to run."}, "example": {"_type": "literalExpression", "text": "pkgs.minecraft-server_1_12_2"}, "loc": ["services", "minecraft-server", "package"], "readOnly": false, "type": "package"}, "services.minecraft-server.serverProperties": {"declarations": ["nixos/modules/services/games/minecraft-server.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Minecraft server properties for the server.properties file. Only has\nan effect when {option}`services.minecraft-server.declarative`\nis set to `true`. See\n<https://minecraft.gamepedia.com/Server.properties#Java_Edition_3>\nfor documentation on these values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  server-port = 43000;\n  difficulty = 3;\n  gamemode = 1;\n  max-players = 5;\n  motd = \"NixOS Minecraft server!\";\n  white-list = true;\n  enable-rcon = true;\n  \"rcon.password\" = \"hunter2\";\n}\n"}, "loc": ["services", "minecraft-server", "serverProperties"], "readOnly": false, "type": "attribute set of (boolean or signed integer or string)"}, "services.minecraft-server.whitelist": {"declarations": ["nixos/modules/services/games/minecraft-server.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Whitelisted players, only has an effect when\n{option}`services.minecraft-server.declarative` is\n`true` and the whitelist is enabled\nvia {option}`services.minecraft-server.serverProperties` by\nsetting `white-list` to `true`.\nThis is a mapping from Minecraft usernames to UUIDs.\nYou can use <https://mcuuid.net/> to get a\nMinecraft UUID for a username.\n"}, "example": {"_type": "literalExpression", "text": "{\n  username1 = \"xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\";\n  username2 = \"yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyyyyyyy\";\n};\n"}, "loc": ["services", "minecraft-server", "whitelist"], "readOnly": false, "type": "attribute set of Minecraft UUID"}, "services.minetest-server.configPath": {"declarations": ["nixos/modules/services/games/minetest-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the config to use.\n\nIf set to null, the config of the running user will be used:\n`~/.minetest/minetest.conf`.\n"}, "loc": ["services", "minetest-server", "configPath"], "readOnly": false, "type": "null or path"}, "services.minetest-server.enable": {"declarations": ["nixos/modules/services/games/minetest-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, starts a Minetest Server."}, "loc": ["services", "minetest-server", "enable"], "readOnly": false, "type": "boolean"}, "services.minetest-server.gameId": {"declarations": ["nixos/modules/services/games/minetest-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Id of the game to use. To list available games run\n`minetestserver --gameid list`.\n\nIf only one game exists, this option can be null.\n"}, "loc": ["services", "minetest-server", "gameId"], "readOnly": false, "type": "null or string"}, "services.minetest-server.logPath": {"declarations": ["nixos/modules/services/games/minetest-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to logfile for logging.\n\nIf set to null, logging will be output to stdout which means\nall output will be caught by systemd.\n"}, "loc": ["services", "minetest-server", "logPath"], "readOnly": false, "type": "null or path"}, "services.minetest-server.port": {"declarations": ["nixos/modules/services/games/minetest-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port number to bind to.\n\nIf set to null, the default 30000 will be used.\n"}, "loc": ["services", "minetest-server", "port"], "readOnly": false, "type": "null or signed integer"}, "services.minetest-server.world": {"declarations": ["nixos/modules/services/games/minetest-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the world to use. To list available worlds run\n`minetestserver --world list`.\n\nIf only one world exists, this option can be null.\n"}, "loc": ["services", "minetest-server", "world"], "readOnly": false, "type": "null or path"}, "services.minidlna.enable": {"declarations": ["nixos/modules/services/networking/minidlna.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable MiniDLNA, a simple DLNA server.\nIt serves media files such as video and music to DLNA client devices\nsuch as televisions and media players. If you use the firewall, consider\nadding the following: `services.minidlna.openFirewall = true;`\n"}, "loc": ["services", "minidlna", "enable"], "readOnly": false, "type": "boolean"}, "services.minidlna.openFirewall": {"declarations": ["nixos/modules/services/networking/minidlna.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open both HTTP (TCP) and SSDP (UDP) ports in the firewall.\n"}, "loc": ["services", "minidlna", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.minidlna.settings": {"declarations": ["nixos/modules/services/networking/minidlna.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The contents of MiniDLNA's configuration file.\nWhen the service is activated, a basic template is generated from the current options opened here.\n"}, "loc": ["services", "minidlna", "settings"], "readOnly": false, "type": "attribute set of (atom (null, bool, int, float or string) or a list of them for duplicate keys)"}, "services.minidlna.settings.db_dir": {"declarations": ["nixos/modules/services/networking/minidlna.nix"], "default": {"_type": "literalExpression", "text": "\"/var/cache/minidlna\""}, "description": {"_type": "mdDoc", "text": "Specify the directory where you want MiniDLNA to store its database and album art cache."}, "example": {"_type": "literalExpression", "text": "\"/tmp/minidlna\""}, "loc": ["services", "minidlna", "settings", "db_dir"], "readOnly": false, "type": "path"}, "services.minidlna.settings.enable_tivo": {"declarations": ["nixos/modules/services/networking/minidlna.nix"], "default": {"_type": "literalExpression", "text": "\"no\""}, "description": {"_type": "mdDoc", "text": "Support for streaming .jpg and .mp3 files to a TiVo supporting HMO."}, "loc": ["services", "minidlna", "settings", "enable_tivo"], "readOnly": false, "type": "one of \"yes\", \"no\""}, "services.minidlna.settings.friendly_name": {"declarations": ["nixos/modules/services/networking/minidlna.nix"], "default": {"_type": "literalExpression", "text": "config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "Name that the DLNA server presents to clients."}, "example": {"_type": "literalExpression", "text": "\"rpi3\""}, "loc": ["services", "minidlna", "settings", "friendly_name"], "readOnly": false, "type": "string"}, "services.minidlna.settings.inotify": {"declarations": ["nixos/modules/services/networking/minidlna.nix"], "default": {"_type": "literalExpression", "text": "\"no\""}, "description": {"_type": "mdDoc", "text": "Whether to enable inotify monitoring to automatically discover new files."}, "loc": ["services", "minidlna", "settings", "inotify"], "readOnly": false, "type": "one of \"yes\", \"no\""}, "services.minidlna.settings.log_level": {"declarations": ["nixos/modules/services/networking/minidlna.nix"], "default": {"_type": "literalExpression", "text": "\"warn\""}, "description": {"_type": "mdDoc", "text": "Defines the type of messages that should be logged and down to which level of importance."}, "example": {"_type": "literalExpression", "text": "\"general,artwork,database,inotify,scanner,metadata,http,ssdp,tivo=warn\""}, "loc": ["services", "minidlna", "settings", "log_level"], "readOnly": false, "type": "string"}, "services.minidlna.settings.media_dir": {"declarations": ["nixos/modules/services/networking/minidlna.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Directories to be scanned for media files.\nThe `A,` `V,` `P,` prefixes restrict a directory to audio, video or image files.\nThe directories must be accessible to the `minidlna` user account.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/data/media\"\n  \"V,/home/alice/video\"\n]"}, "loc": ["services", "minidlna", "settings", "media_dir"], "readOnly": false, "type": "list of string"}, "services.minidlna.settings.notify_interval": {"declarations": ["nixos/modules/services/networking/minidlna.nix"], "default": {"_type": "literalExpression", "text": "90000"}, "description": {"_type": "mdDoc", "text": "The interval between announces (in seconds).\nInstead of waiting for announces, you should set `openFirewall` option to use SSDP discovery.\nLower values (e.g. 30 seconds) should be used if your network blocks the discovery unicast.\nSome relevant information can be found here:\nhttps://sourceforge.net/p/minidlna/discussion/879957/thread/1389d197/\n"}, "loc": ["services", "minidlna", "settings", "notify_interval"], "readOnly": false, "type": "signed integer"}, "services.minidlna.settings.port": {"declarations": ["nixos/modules/services/networking/minidlna.nix"], "default": {"_type": "literalExpression", "text": "8200"}, "description": {"_type": "mdDoc", "text": "Port number for HTTP traffic (descriptions, SOAP, media transfer)."}, "loc": ["services", "minidlna", "settings", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.minidlna.settings.root_container": {"declarations": ["nixos/modules/services/networking/minidlna.nix"], "default": {"_type": "literalExpression", "text": "\"B\""}, "description": {"_type": "mdDoc", "text": "Use a different container as the root of the directory tree presented to clients."}, "example": {"_type": "literalExpression", "text": "\".\""}, "loc": ["services", "minidlna", "settings", "root_container"], "readOnly": false, "type": "string"}, "services.minidlna.settings.wide_links": {"declarations": ["nixos/modules/services/networking/minidlna.nix"], "default": {"_type": "literalExpression", "text": "\"no\""}, "description": {"_type": "mdDoc", "text": "Set this to yes to allow symlinks that point outside user-defined `media_dir`."}, "loc": ["services", "minidlna", "settings", "wide_links"], "readOnly": false, "type": "one of \"yes\", \"no\""}, "services.miniflux.adminCredentialsFile": {"declarations": ["nixos/modules/services/web-apps/miniflux.nix"], "description": {"_type": "mdDoc", "text": "File containing the ADMIN_USERNAME and\nADMIN_PASSWORD (length >= 6) in the format of\nan EnvironmentFile=, as described by systemd.exec(5).\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/nixos/miniflux-admin-credentials\""}, "loc": ["services", "miniflux", "adminCredentialsFile"], "readOnly": false, "type": "path"}, "services.miniflux.config": {"declarations": ["nixos/modules/services/web-apps/miniflux.nix"], "description": {"_type": "mdDoc", "text": "Configuration for Miniflux, refer to\n<https://miniflux.app/docs/configuration.html>\nfor documentation on the supported values.\n\nCorrect configuration for the database is already provided.\nBy default, listens on localhost:8080.\n"}, "example": {"_type": "literalExpression", "text": "{\n  CLEANUP_FREQUENCY = \"48\";\n  LISTEN_ADDR = \"localhost:8080\";\n}\n"}, "loc": ["services", "miniflux", "config"], "readOnly": false, "type": "attribute set of string"}, "services.miniflux.enable": {"declarations": ["nixos/modules/services/web-apps/miniflux.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable miniflux and creates a local postgres database for it."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "miniflux", "enable"], "readOnly": false, "type": "boolean"}, "services.miniflux.package": {"declarations": ["nixos/modules/services/web-apps/miniflux.nix"], "default": {"_type": "literalExpression", "text": "pkgs.miniflux"}, "description": {"_type": "mdDoc", "text": "Miniflux package to use."}, "loc": ["services", "miniflux", "package"], "readOnly": false, "type": "package"}, "services.minio.accessKey": {"declarations": ["nixos/modules/services/web-servers/minio.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Access key of 5 to 20 characters in length that clients use to access the server.\nThis overrides the access key that is generated by minio on first startup and stored inside the\n`configDir` directory.\n"}, "loc": ["services", "minio", "accessKey"], "readOnly": false, "type": "string"}, "services.minio.browser": {"declarations": ["nixos/modules/services/web-servers/minio.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable or disable access to web UI."}, "loc": ["services", "minio", "browser"], "readOnly": false, "type": "boolean"}, "services.minio.configDir": {"declarations": ["nixos/modules/services/web-servers/minio.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/minio/config\""}, "description": {"_type": "mdDoc", "text": "The config directory, for the access keys and other settings."}, "loc": ["services", "minio", "configDir"], "readOnly": false, "type": "path"}, "services.minio.consoleAddress": {"declarations": ["nixos/modules/services/web-servers/minio.nix"], "default": {"_type": "literalExpression", "text": "\":9001\""}, "description": {"_type": "mdDoc", "text": "IP address and port of the web UI (console)."}, "loc": ["services", "minio", "consoleAddress"], "readOnly": false, "type": "string"}, "services.minio.dataDir": {"declarations": ["nixos/modules/services/web-servers/minio.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"/var/lib/minio/data\"\n]"}, "description": {"_type": "mdDoc", "text": "The list of data directories for storing the objects. Use one path for regular operation and the minimum of 4 endpoints for Erasure Code mode."}, "loc": ["services", "minio", "dataDir"], "readOnly": false, "type": "list of path"}, "services.minio.enable": {"declarations": ["nixos/modules/services/web-servers/minio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Minio Object Storage."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "minio", "enable"], "readOnly": false, "type": "boolean"}, "services.minio.listenAddress": {"declarations": ["nixos/modules/services/web-servers/minio.nix"], "default": {"_type": "literalExpression", "text": "\":9000\""}, "description": {"_type": "mdDoc", "text": "IP address and port of the server."}, "loc": ["services", "minio", "listenAddress"], "readOnly": false, "type": "string"}, "services.minio.package": {"declarations": ["nixos/modules/services/web-servers/minio.nix"], "default": {"_type": "literalExpression", "text": "pkgs.minio"}, "description": {"_type": "mdDoc", "text": "Minio package to use."}, "loc": ["services", "minio", "package"], "readOnly": false, "type": "package"}, "services.minio.region": {"declarations": ["nixos/modules/services/web-servers/minio.nix"], "default": {"_type": "literalExpression", "text": "\"us-east-1\""}, "description": {"_type": "mdDoc", "text": "The physical location of the server. By default it is set to us-east-1, which is same as AWS S3's and Minio's default region.\n"}, "loc": ["services", "minio", "region"], "readOnly": false, "type": "string"}, "services.minio.rootCredentialsFile": {"declarations": ["nixos/modules/services/web-servers/minio.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing the MINIO_ROOT_USER, default is \"minioadmin\", and\nMINIO_ROOT_PASSWORD (length >= 8), default is \"minioadmin\"; in the format of\nan EnvironmentFile=, as described by systemd.exec(5).\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/nixos/minio-root-credentials\""}, "loc": ["services", "minio", "rootCredentialsFile"], "readOnly": false, "type": "null or path"}, "services.minio.secretKey": {"declarations": ["nixos/modules/services/web-servers/minio.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Specify the Secret key of 8 to 40 characters in length that clients use to access the server.\nThis overrides the secret key that is generated by minio on first startup and stored inside the\n`configDir` directory.\n"}, "loc": ["services", "minio", "secretKey"], "readOnly": false, "type": "string"}, "services.miniupnpd.appendConfig": {"declarations": ["nixos/modules/services/networking/miniupnpd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration lines appended to the MiniUPnP config.\n"}, "loc": ["services", "miniupnpd", "appendConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.miniupnpd.enable": {"declarations": ["nixos/modules/services/networking/miniupnpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable MiniUPnP daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "miniupnpd", "enable"], "readOnly": false, "type": "boolean"}, "services.miniupnpd.externalInterface": {"declarations": ["nixos/modules/services/networking/miniupnpd.nix"], "description": {"_type": "mdDoc", "text": "Name of the external interface.\n"}, "loc": ["services", "miniupnpd", "externalInterface"], "readOnly": false, "type": "string"}, "services.miniupnpd.internalIPs": {"declarations": ["nixos/modules/services/networking/miniupnpd.nix"], "description": {"_type": "mdDoc", "text": "The IP address ranges to listen on.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168.1.1/24\"\n  \"enp1s0\"\n]"}, "loc": ["services", "miniupnpd", "internalIPs"], "readOnly": false, "type": "list of string"}, "services.miniupnpd.natpmp": {"declarations": ["nixos/modules/services/networking/miniupnpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable NAT-PMP support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "miniupnpd", "natpmp"], "readOnly": false, "type": "boolean"}, "services.miniupnpd.upnp": {"declarations": ["nixos/modules/services/networking/miniupnpd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable UPNP support.\n"}, "loc": ["services", "miniupnpd", "upnp"], "readOnly": false, "type": "boolean"}, "services.mirakurun.allowSmartCardAccess": {"declarations": ["nixos/modules/services/video/mirakurun.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Install polkit rules to allow Mirakurun to access smart card readers\nwhich is commonly used along with tuner devices.\n"}, "loc": ["services", "mirakurun", "allowSmartCardAccess"], "readOnly": false, "type": "boolean"}, "services.mirakurun.channelSettings": {"declarations": ["nixos/modules/services/video/mirakurun.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Options which are added to channels.yml. If none is specified, it\nwill automatically be generated at runtime.\n\nDocumentation:\n<https://github.com/Chinachu/Mirakurun/blob/master/doc/Configuration.md>\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    name = \"channel\";\n    types = \"GR\";\n    channel = \"0\";\n  }\n];\n"}, "loc": ["services", "mirakurun", "channelSettings"], "readOnly": false, "type": "null or YAML value"}, "services.mirakurun.enable": {"declarations": ["nixos/modules/services/video/mirakurun.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Mirakurun DVR Tuner Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mirakurun", "enable"], "readOnly": false, "type": "boolean"}, "services.mirakurun.openFirewall": {"declarations": ["nixos/modules/services/video/mirakurun.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for Mirakurun.\n\n::: {.warning}\nExposing Mirakurun to the open internet is generally advised\nagainst. Only use it inside a trusted local network, or\nconsider putting it behind a VPN if you want remote access.\n:::\n"}, "loc": ["services", "mirakurun", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.mirakurun.port": {"declarations": ["nixos/modules/services/video/mirakurun.nix"], "default": {"_type": "literalExpression", "text": "40772"}, "description": {"_type": "mdDoc", "text": "Port to listen on. If `null`, it won't listen on\nany port.\n"}, "loc": ["services", "mirakurun", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mirakurun.serverSettings": {"declarations": ["nixos/modules/services/video/mirakurun.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Options for server.yml.\n\nDocumentation:\n<https://github.com/Chinachu/Mirakurun/blob/master/doc/Configuration.md>\n"}, "example": {"_type": "literalExpression", "text": "{\n  highWaterMark = 25165824;\n  overflowTimeLimit = 30000;\n};\n"}, "loc": ["services", "mirakurun", "serverSettings"], "readOnly": false, "type": "YAML value"}, "services.mirakurun.tunerSettings": {"declarations": ["nixos/modules/services/video/mirakurun.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Options which are added to tuners.yml. If none is specified, it will\nautomatically be generated at runtime.\n\nDocumentation:\n<https://github.com/Chinachu/Mirakurun/blob/master/doc/Configuration.md>\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    name = \"tuner-name\";\n    types = [ \"GR\" \"BS\" \"CS\" \"SKY\" ];\n    dvbDevicePath = \"/dev/dvb/adapterX/dvrX\";\n  }\n];\n"}, "loc": ["services", "mirakurun", "tunerSettings"], "readOnly": false, "type": "null or YAML value"}, "services.mirakurun.unixSocket": {"declarations": ["nixos/modules/services/video/mirakurun.nix"], "default": {"_type": "literalExpression", "text": "\"/var/run/mirakurun/mirakurun.sock\""}, "description": {"_type": "mdDoc", "text": "Path to unix socket to listen on. If `null`, it\nwon't listen on any unix sockets.\n"}, "loc": ["services", "mirakurun", "unixSocket"], "readOnly": false, "type": "null or path"}, "services.miredo.bindAddress": {"declarations": ["nixos/modules/services/networking/miredo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Depending on the local firewall/NAT rules, you might need to force\nMiredo to use a fixed UDP port and or IPv4 address.\n"}, "loc": ["services", "miredo", "bindAddress"], "readOnly": false, "type": "null or string"}, "services.miredo.bindPort": {"declarations": ["nixos/modules/services/networking/miredo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Depending on the local firewall/NAT rules, you might need to force\nMiredo to use a fixed UDP port and or IPv4 address.\n"}, "loc": ["services", "miredo", "bindPort"], "readOnly": false, "type": "null or string"}, "services.miredo.enable": {"declarations": ["nixos/modules/services/networking/miredo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Miredo IPv6 tunneling service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "miredo", "enable"], "readOnly": false, "type": "boolean"}, "services.miredo.interfaceName": {"declarations": ["nixos/modules/services/networking/miredo.nix"], "default": {"_type": "literalExpression", "text": "\"teredo\""}, "description": {"_type": "mdDoc", "text": "Name of the network tunneling interface.\n"}, "loc": ["services", "miredo", "interfaceName"], "readOnly": false, "type": "string"}, "services.miredo.package": {"declarations": ["nixos/modules/services/networking/miredo.nix"], "default": {"_type": "literalExpression", "text": "pkgs.miredo"}, "description": {"_type": "mdDoc", "text": "The package to use for the miredo daemon's binary.\n"}, "loc": ["services", "miredo", "package"], "readOnly": false, "type": "package"}, "services.miredo.serverAddress": {"declarations": ["nixos/modules/services/networking/miredo.nix"], "default": {"_type": "literalExpression", "text": "\"teredo.remlab.net\""}, "description": {"_type": "mdDoc", "text": "The hostname or primary IPv4 address of the Teredo server.\nThis setting is required if Miredo runs as a Teredo client.\n\"teredo.remlab.net\" is an experimental service for testing only.\nPlease use another server for production and/or large scale deployments.\n"}, "loc": ["services", "miredo", "serverAddress"], "readOnly": false, "type": "string"}, "services.mjolnir.accessTokenFile": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing the matrix access token for the `mjolnir` user.\n"}, "loc": ["services", "mjolnir", "accessTokenFile"], "readOnly": false, "type": "null or path"}, "services.mjolnir.dataPath": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mjolnir\""}, "description": {"_type": "mdDoc", "text": "The directory the bot should store various bits of information in.\n"}, "loc": ["services", "mjolnir", "dataPath"], "readOnly": false, "type": "path"}, "services.mjolnir.enable": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Mjolnir, a moderation tool for Matrix."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mjolnir", "enable"], "readOnly": false, "type": "boolean"}, "services.mjolnir.homeserverUrl": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "\"https://matrix.org\""}, "description": {"_type": "mdDoc", "text": "Where the homeserver is located (client-server URL).\n\nIf `pantalaimon.enable` is `true`, this option will become the homeserver to which `pantalaimon` connects.\nThe listen address of `pantalaimon` will then become the `homeserverUrl` of `mjolnir`.\n"}, "loc": ["services", "mjolnir", "homeserverUrl"], "readOnly": false, "type": "string"}, "services.mjolnir.managementRoom": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "\"#moderators:example.org\""}, "description": {"_type": "mdDoc", "text": "The room ID where people can use the bot. The bot has no access controls, so\nanyone in this room can use the bot - secure your room!\nThis should be a room alias or room ID - not a matrix.to URL.\nNote: `mjolnir` is fairly verbose - expect a lot of messages from it.\n"}, "loc": ["services", "mjolnir", "managementRoom"], "readOnly": false, "type": "string"}, "services.mjolnir.pantalaimon": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "`pantalaimon` options (enables E2E Encryption support).\n\nThis will create a `pantalaimon` instance with the name \"mjolnir\".\n"}, "loc": ["services", "mjolnir", "pantalaimon"], "readOnly": false, "type": "submodule"}, "services.mjolnir.pantalaimon.enable": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable If true, accessToken is ignored and the username/password below will be\nused instead. The access token of the bot will be stored in the dataPath.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mjolnir", "pantalaimon", "enable"], "readOnly": false, "type": "boolean"}, "services.mjolnir.pantalaimon.options": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "passthrough additional options to the `pantalaimon` service.\n"}, "loc": ["services", "mjolnir", "pantalaimon", "options"], "readOnly": false, "type": "submodule"}, "services.mjolnir.pantalaimon.options.dataPath": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/pantalaimon-\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The directory where `pantalaimon` should store its state such as the database file.\n"}, "loc": ["services", "mjolnir", "pantalaimon", "options", "dataPath"], "readOnly": false, "type": "path"}, "services.mjolnir.pantalaimon.options.extraSettings": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration options. See\n[pantalaimon(5)](https://github.com/matrix-org/pantalaimon/blob/master/docs/man/pantalaimon.5.md)\nfor available options.\n"}, "loc": ["services", "mjolnir", "pantalaimon", "options", "extraSettings"], "readOnly": false, "type": "attribute set"}, "services.mjolnir.pantalaimon.options.homeserver": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "description": {"_type": "mdDoc", "text": "The URI of the homeserver that the `pantalaimon` proxy should\nforward requests to, without the matrix API path but including\nthe http(s) schema.\n"}, "example": {"_type": "literalExpression", "text": "\"https://matrix.org\""}, "loc": ["services", "mjolnir", "pantalaimon", "options", "homeserver"], "readOnly": false, "type": "string"}, "services.mjolnir.pantalaimon.options.listenAddress": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The address where the daemon will listen to client connections\nfor this homeserver.\n"}, "loc": ["services", "mjolnir", "pantalaimon", "options", "listenAddress"], "readOnly": false, "type": "string"}, "services.mjolnir.pantalaimon.options.listenPort": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "8009"}, "description": {"_type": "mdDoc", "text": "The port where the daemon will listen to client connections for\nthis homeserver. Note that the listen address/port combination\nneeds to be unique between different homeservers.\n"}, "loc": ["services", "mjolnir", "pantalaimon", "options", "listenPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mjolnir.pantalaimon.options.logLevel": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "\"warning\""}, "description": {"_type": "mdDoc", "text": "Set the log level of the daemon.\n"}, "loc": ["services", "mjolnir", "pantalaimon", "options", "logLevel"], "readOnly": false, "type": "one of \"info\", \"warning\", \"error\", \"debug\""}, "services.mjolnir.pantalaimon.options.ssl": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether or not SSL verification should be enabled for outgoing\nconnections to the homeserver.\n"}, "loc": ["services", "mjolnir", "pantalaimon", "options", "ssl"], "readOnly": false, "type": "boolean"}, "services.mjolnir.pantalaimon.passwordFile": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing the matrix password for the `mjolnir` user.\n"}, "loc": ["services", "mjolnir", "pantalaimon", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.mjolnir.pantalaimon.username": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "description": {"_type": "mdDoc", "text": "The username to login with."}, "loc": ["services", "mjolnir", "pantalaimon", "username"], "readOnly": false, "type": "string"}, "services.mjolnir.protectedRooms": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of rooms to protect (matrix.to URLs).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"https://matrix.to/#/#yourroom:example.org\"\n  \"https://matrix.to/#/#anotherroom:example.org\"\n]\n"}, "loc": ["services", "mjolnir", "protectedRooms"], "readOnly": false, "type": "list of string"}, "services.mjolnir.settings": {"declarations": ["nixos/modules/services/matrix/mjolnir.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional settings (see [mjolnir default config](https://github.com/matrix-org/mjolnir/blob/main/config/default.yaml) for available settings). These settings will override settings made by the module config.\n"}, "example": {"_type": "literalExpression", "text": "{\n  autojoinOnlyIfManager = true;\n  automaticallyRedactForReasons = [ \"spam\" \"advertising\" ];\n}\n"}, "loc": ["services", "mjolnir", "settings"], "readOnly": false, "type": "YAML value"}, "services.mjpg-streamer.enable": {"declarations": ["nixos/modules/services/networking/mjpg-streamer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable mjpg-streamer webcam streamer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mjpg-streamer", "enable"], "readOnly": false, "type": "boolean"}, "services.mjpg-streamer.group": {"declarations": ["nixos/modules/services/networking/mjpg-streamer.nix"], "default": {"_type": "literalExpression", "text": "\"video\""}, "description": {"_type": "mdDoc", "text": "mjpg-streamer group name."}, "loc": ["services", "mjpg-streamer", "group"], "readOnly": false, "type": "string"}, "services.mjpg-streamer.inputPlugin": {"declarations": ["nixos/modules/services/networking/mjpg-streamer.nix"], "default": {"_type": "literalExpression", "text": "\"input_uvc.so\""}, "description": {"_type": "mdDoc", "text": "Input plugin. See plugins documentation for more information.\n"}, "loc": ["services", "mjpg-streamer", "inputPlugin"], "readOnly": false, "type": "string"}, "services.mjpg-streamer.outputPlugin": {"declarations": ["nixos/modules/services/networking/mjpg-streamer.nix"], "default": {"_type": "literalExpression", "text": "\"output_http.so -w @www@ -n -p 5050\""}, "description": {"_type": "mdDoc", "text": "Output plugin. `@www@` is substituted for default mjpg-streamer www directory.\nSee plugins documentation for more information.\n"}, "loc": ["services", "mjpg-streamer", "outputPlugin"], "readOnly": false, "type": "string"}, "services.mjpg-streamer.user": {"declarations": ["nixos/modules/services/networking/mjpg-streamer.nix"], "default": {"_type": "literalExpression", "text": "\"mjpg-streamer\""}, "description": {"_type": "mdDoc", "text": "mjpg-streamer user name."}, "loc": ["services", "mjpg-streamer", "user"], "readOnly": false, "type": "string"}, "services.mlmmj.enable": {"declarations": ["nixos/modules/services/mail/mlmmj.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable mlmmj"}, "loc": ["services", "mlmmj", "enable"], "readOnly": false, "type": "boolean"}, "services.mlmmj.group": {"declarations": ["nixos/modules/services/mail/mlmmj.nix"], "default": {"_type": "literalExpression", "text": "\"mlmmj\""}, "description": {"_type": "mdDoc", "text": "mailinglist local group"}, "loc": ["services", "mlmmj", "group"], "readOnly": false, "type": "string"}, "services.mlmmj.listDomain": {"declarations": ["nixos/modules/services/mail/mlmmj.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Set the mailing list domain"}, "loc": ["services", "mlmmj", "listDomain"], "readOnly": false, "type": "string"}, "services.mlmmj.mailLists": {"declarations": ["nixos/modules/services/mail/mlmmj.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The collection of hosted maillists"}, "loc": ["services", "mlmmj", "mailLists"], "readOnly": false, "type": "list of string"}, "services.mlmmj.maintInterval": {"declarations": ["nixos/modules/services/mail/mlmmj.nix"], "default": {"_type": "literalExpression", "text": "\"20min\""}, "description": {"_type": "mdDoc", "text": "Time interval between mlmmj-maintd runs, see\n{manpage}`systemd.time(7)` for format information.\n"}, "loc": ["services", "mlmmj", "maintInterval"], "readOnly": false, "type": "string"}, "services.mlmmj.user": {"declarations": ["nixos/modules/services/mail/mlmmj.nix"], "default": {"_type": "literalExpression", "text": "\"mlmmj\""}, "description": {"_type": "mdDoc", "text": "mailinglist local user"}, "loc": ["services", "mlmmj", "user"], "readOnly": false, "type": "string"}, "services.mmsd.enable": {"declarations": ["nixos/modules/services/networking/mmsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Multimedia Messaging Service Daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mmsd", "enable"], "readOnly": false, "type": "boolean"}, "services.mmsd.extraArgs": {"declarations": ["nixos/modules/services/networking/mmsd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to `mmsd-tng`"}, "example": {"_type": "literalExpression", "text": "[\n  \"--debug\"\n]"}, "loc": ["services", "mmsd", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.molly-brown.certPath": {"declarations": ["nixos/modules/services/web-servers/molly-brown.nix"], "description": {"_type": "mdDoc", "text": "Path to TLS certificate. An ACME certificate and key may be\nshared with an HTTP server, but only if molly-brown has\npermissions allowing it to read such keys.\n\nAs an example:\n```\nsystemd.services.molly-brown.serviceConfig.SupplementaryGroups =\n  [ config.security.acme.certs.\"example.com\".group ];\n```\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/acme/example.com/cert.pem\""}, "loc": ["services", "molly-brown", "certPath"], "readOnly": false, "type": "path"}, "services.molly-brown.docBase": {"declarations": ["nixos/modules/services/web-servers/molly-brown.nix"], "description": {"_type": "mdDoc", "text": "Base directory for Gemini content."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/molly-brown\""}, "loc": ["services", "molly-brown", "docBase"], "readOnly": false, "type": "path"}, "services.molly-brown.enable": {"declarations": ["nixos/modules/services/web-servers/molly-brown.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Molly-Brown Gemini server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "molly-brown", "enable"], "readOnly": false, "type": "boolean"}, "services.molly-brown.hostName": {"declarations": ["nixos/modules/services/web-servers/molly-brown.nix"], "default": {"_type": "literalExpression", "text": "config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "The hostname to respond to requests for. Requests for URLs with\nother hosts will result in a status 53 (PROXY REQUEST REFUSED)\nresponse.\n"}, "loc": ["services", "molly-brown", "hostName"], "readOnly": false, "type": "string"}, "services.molly-brown.keyPath": {"declarations": ["nixos/modules/services/web-servers/molly-brown.nix"], "description": {"_type": "mdDoc", "text": "Path to TLS key. See {option}`CertPath`."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/acme/example.com/key.pem\""}, "loc": ["services", "molly-brown", "keyPath"], "readOnly": false, "type": "path"}, "services.molly-brown.port": {"declarations": ["nixos/modules/services/web-servers/molly-brown.nix"], "default": {"_type": "literalExpression", "text": "1965"}, "description": {"_type": "mdDoc", "text": "TCP port for molly-brown to bind to.\n"}, "loc": ["services", "molly-brown", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.molly-brown.settings": {"declarations": ["nixos/modules/services/web-servers/molly-brown.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "molly-brown configuration. Refer to\n<https://tildegit.org/solderpunk/molly-brown/src/branch/master/example.conf>\nfor details on supported values.\n"}, "loc": ["services", "molly-brown", "settings"], "readOnly": false, "type": "TOML value"}, "services.monero.dataDir": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/monero\""}, "description": {"_type": "mdDoc", "text": "The directory where Monero stores its data files.\n"}, "loc": ["services", "monero", "dataDir"], "readOnly": false, "type": "string"}, "services.monero.enable": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Monero node daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "monero", "enable"], "readOnly": false, "type": "boolean"}, "services.monero.exclusiveNodes": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of peer IP addresses to connect to *only*.\nIf given the other peer options will be ignored.\n"}, "loc": ["services", "monero", "exclusiveNodes"], "readOnly": false, "type": "list of string"}, "services.monero.extraConfig": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to monerod configuration.\n"}, "loc": ["services", "monero", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.monero.extraNodes": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of additional peer IP addresses to add to the local list.\n"}, "loc": ["services", "monero", "extraNodes"], "readOnly": false, "type": "list of string"}, "services.monero.limits.download": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "-1"}, "description": {"_type": "mdDoc", "text": "Limit of the download rate in kB/s.\nSet to `-1` to leave unlimited.\n"}, "loc": ["services", "monero", "limits", "download"], "readOnly": false, "type": "signed integer"}, "services.monero.limits.syncSize": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Maximum number of blocks to sync at once.\nSet to `0` for adaptive.\n"}, "loc": ["services", "monero", "limits", "syncSize"], "readOnly": false, "type": "signed integer"}, "services.monero.limits.threads": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Maximum number of threads used for a parallel job.\nSet to `0` to leave unlimited.\n"}, "loc": ["services", "monero", "limits", "threads"], "readOnly": false, "type": "signed integer"}, "services.monero.limits.upload": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "-1"}, "description": {"_type": "mdDoc", "text": "Limit of the upload rate in kB/s.\nSet to `-1` to leave unlimited.\n"}, "loc": ["services", "monero", "limits", "upload"], "readOnly": false, "type": "signed integer"}, "services.monero.mining.address": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Monero address where to send mining rewards.\n"}, "loc": ["services", "monero", "mining", "address"], "readOnly": false, "type": "string"}, "services.monero.mining.enable": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to mine monero.\n"}, "loc": ["services", "monero", "mining", "enable"], "readOnly": false, "type": "boolean"}, "services.monero.mining.threads": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Number of threads used for mining.\nSet to `0` to use all available.\n"}, "loc": ["services", "monero", "mining", "threads"], "readOnly": false, "type": "signed integer"}, "services.monero.priorityNodes": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of peer IP addresses to connect to and\nattempt to keep the connection open.\n"}, "loc": ["services", "monero", "priorityNodes"], "readOnly": false, "type": "list of string"}, "services.monero.rpc.address": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "IP address the RPC server will bind to.\n"}, "loc": ["services", "monero", "rpc", "address"], "readOnly": false, "type": "string"}, "services.monero.rpc.password": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password for RPC connections.\n"}, "loc": ["services", "monero", "rpc", "password"], "readOnly": false, "type": "null or string"}, "services.monero.rpc.port": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "18081"}, "description": {"_type": "mdDoc", "text": "Port the RPC server will bind to.\n"}, "loc": ["services", "monero", "rpc", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.monero.rpc.restricted": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to restrict RPC to view only commands.\n"}, "loc": ["services", "monero", "rpc", "restricted"], "readOnly": false, "type": "boolean"}, "services.monero.rpc.user": {"declarations": ["nixos/modules/services/networking/monero.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "User name for RPC connections.\n"}, "loc": ["services", "monero", "rpc", "user"], "readOnly": false, "type": "null or string"}, "services.monetdb.dataDir": {"declarations": ["nixos/modules/services/databases/monetdb.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/monetdb\""}, "description": {"_type": "mdDoc", "text": "Data directory for the dbfarm."}, "loc": ["services", "monetdb", "dataDir"], "readOnly": false, "type": "path"}, "services.monetdb.enable": {"declarations": ["nixos/modules/services/databases/monetdb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the MonetDB database server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "monetdb", "enable"], "readOnly": false, "type": "boolean"}, "services.monetdb.group": {"declarations": ["nixos/modules/services/databases/monetdb.nix"], "default": {"_type": "literalExpression", "text": "\"monetdb\""}, "description": {"_type": "mdDoc", "text": "Group under which MonetDB runs."}, "loc": ["services", "monetdb", "group"], "readOnly": false, "type": "string"}, "services.monetdb.listenAddress": {"declarations": ["nixos/modules/services/databases/monetdb.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address to listen on."}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "monetdb", "listenAddress"], "readOnly": false, "type": "string"}, "services.monetdb.package": {"declarations": ["nixos/modules/services/databases/monetdb.nix"], "default": {"_type": "literalExpression", "text": "pkgs.monetdb"}, "description": {"_type": "mdDoc", "text": "MonetDB package to use."}, "loc": ["services", "monetdb", "package"], "readOnly": false, "type": "package"}, "services.monetdb.port": {"declarations": ["nixos/modules/services/databases/monetdb.nix"], "default": {"_type": "literalExpression", "text": "50000"}, "description": {"_type": "mdDoc", "text": "Port to listen on."}, "loc": ["services", "monetdb", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.monetdb.user": {"declarations": ["nixos/modules/services/databases/monetdb.nix"], "default": {"_type": "literalExpression", "text": "\"monetdb\""}, "description": {"_type": "mdDoc", "text": "User account under which MonetDB runs."}, "loc": ["services", "monetdb", "user"], "readOnly": false, "type": "string"}, "services.mongodb.bind_ip": {"declarations": ["nixos/modules/services/databases/mongodb.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "IP to bind to"}, "loc": ["services", "mongodb", "bind_ip"], "readOnly": false, "type": "string"}, "services.mongodb.dbpath": {"declarations": ["nixos/modules/services/databases/mongodb.nix"], "default": {"_type": "literalExpression", "text": "\"/var/db/mongodb\""}, "description": {"_type": "mdDoc", "text": "Location where MongoDB stores its files"}, "loc": ["services", "mongodb", "dbpath"], "readOnly": false, "type": "string"}, "services.mongodb.enable": {"declarations": ["nixos/modules/services/databases/mongodb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the MongoDB server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mongodb", "enable"], "readOnly": false, "type": "boolean"}, "services.mongodb.enableAuth": {"declarations": ["nixos/modules/services/databases/mongodb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable client authentication. Creates a default superuser with username root!"}, "loc": ["services", "mongodb", "enableAuth"], "readOnly": false, "type": "boolean"}, "services.mongodb.extraConfig": {"declarations": ["nixos/modules/services/databases/mongodb.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "MongoDB extra configuration in YAML format"}, "example": {"_type": "literalExpression", "text": "''\n  storage.journal.enabled: false\n''"}, "loc": ["services", "mongodb", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.mongodb.initialRootPassword": {"declarations": ["nixos/modules/services/databases/mongodb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password for the root user if auth is enabled."}, "loc": ["services", "mongodb", "initialRootPassword"], "readOnly": false, "type": "null or string"}, "services.mongodb.initialScript": {"declarations": ["nixos/modules/services/databases/mongodb.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing MongoDB statements to execute on first startup.\n"}, "loc": ["services", "mongodb", "initialScript"], "readOnly": false, "type": "null or path"}, "services.mongodb.package": {"declarations": ["nixos/modules/services/databases/mongodb.nix"], "default": {"_type": "literalExpression", "text": "pkgs.mongodb"}, "description": {"_type": "mdDoc", "text": "Which MongoDB derivation to use.\n"}, "loc": ["services", "mongodb", "package"], "readOnly": false, "type": "package"}, "services.mongodb.pidFile": {"declarations": ["nixos/modules/services/databases/mongodb.nix"], "default": {"_type": "literalExpression", "text": "\"/run/mongodb.pid\""}, "description": {"_type": "mdDoc", "text": "Location of MongoDB pid file"}, "loc": ["services", "mongodb", "pidFile"], "readOnly": false, "type": "string"}, "services.mongodb.quiet": {"declarations": ["nixos/modules/services/databases/mongodb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "quieter output"}, "loc": ["services", "mongodb", "quiet"], "readOnly": false, "type": "boolean"}, "services.mongodb.replSetName": {"declarations": ["nixos/modules/services/databases/mongodb.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "If this instance is part of a replica set, set its name here.\nOtherwise, leave empty to run as single node.\n"}, "loc": ["services", "mongodb", "replSetName"], "readOnly": false, "type": "string"}, "services.mongodb.user": {"declarations": ["nixos/modules/services/databases/mongodb.nix"], "default": {"_type": "literalExpression", "text": "\"mongodb\""}, "description": {"_type": "mdDoc", "text": "User account under which MongoDB runs"}, "loc": ["services", "mongodb", "user"], "readOnly": false, "type": "string"}, "services.monica.appKeyFile": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "description": {"_type": "mdDoc", "text": "A file containing the Laravel APP_KEY - a 32 character long,\nbase64 encoded key used for encryption where needed. Can be\ngenerated with <code>head -c 32 /dev/urandom | base64</code>.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/monica-appkey\""}, "loc": ["services", "monica", "appKeyFile"], "readOnly": false, "type": "path"}, "services.monica.appURL": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"http\\${lib.optionalString tlsEnabled \\\"s\\\"}://\\${cfg.hostname}\""}, "description": {"_type": "mdDoc", "text": "The root URL that you want to host monica on. All URLs in monica will be generated using this value.\nIf you change this in the future you may need to run a command to update stored URLs in the database.\nCommand example: <code>php artisan monica:update-url https://old.example.com https://new.example.com</code>\n"}, "example": {"_type": "literalExpression", "text": "\"https://example.com\""}, "loc": ["services", "monica", "appURL"], "readOnly": false, "type": "string"}, "services.monica.config": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "monica configuration options to set in the\n<filename>.env</filename> file.\n\nRefer to <link xlink:href=\"https://github.com/monicahq/monica\"/>\nfor details on supported values.\n\nSettings containing secret data should be set to an attribute\nset containing the attribute <literal>_secret</literal> - a\nstring pointing to a file containing the value the option\nshould be set to. See the example to get a better picture of\nthis: in the resulting <filename>.env</filename> file, the\n<literal>OIDC_CLIENT_SECRET</literal> key will be set to the\ncontents of the <filename>/run/keys/oidc_secret</filename>\nfile.\n"}, "example": {"_type": "literalExpression", "text": "''\n  {\n    ALLOWED_IFRAME_HOSTS = \"https://example.com\";\n    WKHTMLTOPDF = \"/home/user/bins/wkhtmltopdf\";\n    AUTH_METHOD = \"oidc\";\n    OIDC_NAME = \"MyLogin\";\n    OIDC_DISPLAY_NAME_CLAIMS = \"name\";\n    OIDC_CLIENT_ID = \"monica\";\n    OIDC_CLIENT_SECRET = {_secret = \"/run/keys/oidc_secret\"};\n    OIDC_ISSUER = \"https://keycloak.example.com/auth/realms/My%20Realm\";\n    OIDC_ISSUER_DISCOVER = true;\n  }\n''"}, "loc": ["services", "monica", "config"], "readOnly": false, "type": "attribute set of (null or boolean or signed integer or 16 bit unsigned integer; between 0 and 65535 (both inclusive) or path or string or (submodule))"}, "services.monica.dataDir": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/monica\""}, "description": {"_type": "mdDoc", "text": "monica data directory"}, "loc": ["services", "monica", "dataDir"], "readOnly": false, "type": "path"}, "services.monica.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally."}, "loc": ["services", "monica", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.monica.database.host": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "monica", "database", "host"], "readOnly": false, "type": "string"}, "services.monica.database.name": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"monica\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "monica", "database", "name"], "readOnly": false, "type": "string"}, "services.monica.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n<option>database.user</option>.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/monica-dbpassword\""}, "loc": ["services", "monica", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.monica.database.port": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "3306"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "monica", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.monica.database.user": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "user"}, "description": {"_type": "mdDoc", "text": "Database username."}, "loc": ["services", "monica", "database", "user"], "readOnly": false, "type": "string"}, "services.monica.enable": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable monica."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "monica", "enable"], "readOnly": false, "type": "boolean"}, "services.monica.group": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"monica\""}, "description": {"_type": "mdDoc", "text": "Group monica runs as."}, "loc": ["services", "monica", "group"], "readOnly": false, "type": "string"}, "services.monica.hostname": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "config.networking.fqdn"}, "description": {"_type": "mdDoc", "text": "The hostname to serve monica on.\n"}, "example": {"_type": "literalExpression", "text": "\"monica.example.com\""}, "loc": ["services", "monica", "hostname"], "readOnly": false, "type": "string"}, "services.monica.mail.driver": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"smtp\""}, "description": {"_type": "mdDoc", "text": "Mail driver to use."}, "loc": ["services", "monica", "mail", "driver"], "readOnly": false, "type": "one of \"smtp\", \"sendmail\""}, "services.monica.mail.encryption": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SMTP encryption mechanism to use."}, "loc": ["services", "monica", "mail", "encryption"], "readOnly": false, "type": "null or value \"tls\" (singular enum)"}, "services.monica.mail.from": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"mail@monica.com\""}, "description": {"_type": "mdDoc", "text": "Mail \"from\" email."}, "loc": ["services", "monica", "mail", "from"], "readOnly": false, "type": "string"}, "services.monica.mail.fromName": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"monica\""}, "description": {"_type": "mdDoc", "text": "Mail \"from\" name."}, "loc": ["services", "monica", "mail", "fromName"], "readOnly": false, "type": "string"}, "services.monica.mail.host": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Mail host address."}, "loc": ["services", "monica", "mail", "host"], "readOnly": false, "type": "string"}, "services.monica.mail.passwordFile": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n<option>mail.user</option>.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/monica-mailpassword\""}, "loc": ["services", "monica", "mail", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.monica.mail.port": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "1025"}, "description": {"_type": "mdDoc", "text": "Mail host port."}, "loc": ["services", "monica", "mail", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.monica.mail.user": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Mail username."}, "example": {"_type": "literalExpression", "text": "\"monica\""}, "loc": ["services", "monica", "mail", "user"], "readOnly": false, "type": "null or string"}, "services.monica.maxUploadSize": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"18M\""}, "description": {"_type": "mdDoc", "text": "The maximum size for uploads (e.g. images)."}, "example": {"_type": "literalExpression", "text": "\"1G\""}, "loc": ["services", "monica", "maxUploadSize"], "readOnly": false, "type": "string"}, "services.monica.nginx": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "With this option, you can customize the nginx virtualHost settings.\n"}, "example": {"_type": "literalExpression", "text": "''\n  {\n    serverAliases = [\n      \"monica.''${config.networking.domain}\"\n    ];\n    # To enable encryption and let let's encrypt take care of certificate\n    forceSSL = true;\n    enableACME = true;\n  }\n''"}, "loc": ["services", "monica", "nginx"], "readOnly": false, "type": "submodule"}, "services.monica.nginx.acmeFallbackHost": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host which to proxy requests to if ACME challenge is not found. Useful\nif you want multiple hosts to be able to verify the same domain name.\n\nWith this option, you could request certificates for the present domain\nwith an ACME client that is running on another host, which you would\nspecify here.\n"}, "loc": ["services", "monica", "nginx", "acmeFallbackHost"], "readOnly": false, "type": "null or string"}, "services.monica.nginx.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the ACME challenge, which is **public**. Don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "monica", "nginx", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.monica.nginx.addSSL": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "monica", "nginx", "addSSL"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.basicAuth": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "monica", "nginx", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.monica.nginx.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "monica", "nginx", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.monica.nginx.default": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Makes this vhost the default.\n"}, "loc": ["services", "monica", "nginx", "default"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.enableACME": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "monica", "nginx", "enableACME"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.extraConfig": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the vhost verbatim.\n"}, "loc": ["services", "monica", "nginx", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.monica.nginx.forceSSL": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "monica", "nginx", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given hostname.\n"}, "example": {"_type": "literalExpression", "text": "\"newserver.example.org\""}, "loc": ["services", "monica", "nginx", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.monica.nginx.http2": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/2 protocol.\nNote that (as of writing) due to nginx's implementation, to disable\nHTTP/2 you have to disable it on all vhosts that use a given\nIP address / port.\nIf there is one server block configured to enable http2, then it is\nenabled for all server blocks on this IP.\nSee https://stackoverflow.com/a/39466948/263061.\n"}, "loc": ["services", "monica", "nginx", "http2"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.http3": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/3 protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that HTTP/3 support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "monica", "nginx", "http3"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.http3_hq": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that special application protocol support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "monica", "nginx", "http3_hq"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.kTLS": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kTLS support.\nImplementing TLS in the kernel (kTLS) improves performance by significantly\nreducing the need for copying operations between user space and the kernel.\nRequired Nginx version 1.21.4 or later.\n"}, "loc": ["services", "monica", "nginx", "kTLS"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.listen": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\nIPv6 addresses must be enclosed in square brackets.\nNote: this option overrides `addSSL`\nand `onlySSL`.\n\nIf you only want to set the addresses manually and not\nthe ports, take a look at `listenAddresses`\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    addr = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    addr = \"192.154.1.1\";\n    port = 80;\n  }\n]"}, "loc": ["services", "monica", "nginx", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.monica.nginx.listen.*.addr": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "description": {"_type": "mdDoc", "text": "IP address."}, "loc": ["services", "monica", "nginx", "listen", "*", "addr"], "readOnly": false, "type": "string"}, "services.monica.nginx.listen.*.extraParameters": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters of this listen directive."}, "example": {"_type": "literalExpression", "text": "[\n  \"backlog=1024\"\n  \"deferred\"\n]"}, "loc": ["services", "monica", "nginx", "listen", "*", "extraParameters"], "readOnly": false, "type": "list of string"}, "services.monica.nginx.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Port number."}, "loc": ["services", "monica", "nginx", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.monica.nginx.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SSL."}, "loc": ["services", "monica", "nginx", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n\nNote: This option overrides `enableIPv6`\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"[::1]\"\n]"}, "loc": ["services", "monica", "nginx", "listenAddresses"], "readOnly": false, "type": "list of string"}, "services.monica.nginx.locations": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n};\n"}, "loc": ["services", "monica", "nginx", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.monica.nginx.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "monica", "nginx", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.monica.nginx.locations.<name>.basicAuth": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "monica", "nginx", "locations", "<name>", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.monica.nginx.locations.<name>.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "monica", "nginx", "locations", "<name>", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.monica.nginx.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "monica", "nginx", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.monica.nginx.locations.<name>.fastcgiParams": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "FastCGI parameters to override.  Unlike in the Nginx\nconfiguration file, overriding only some default parameters\nwon't unset the default values for other parameters.\n"}, "loc": ["services", "monica", "nginx", "locations", "<name>", "fastcgiParams"], "readOnly": false, "type": "attribute set of (string or path)"}, "services.monica.nginx.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds index directive.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "monica", "nginx", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.monica.nginx.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "monica", "nginx", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.monica.nginx.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds proxy_pass directive and sets recommended proxy headers if\nrecommendedProxySettings is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "monica", "nginx", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.monica.nginx.locations.<name>.proxyWebsockets": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to support proxying websocket connections with HTTP/1.1.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "monica", "nginx", "locations", "<name>", "proxyWebsockets"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.locations.<name>.recommendedProxySettings": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "config.services.nginx.recommendedProxySettings"}, "description": {"_type": "mdDoc", "text": "Enable recommended proxy settings.\n"}, "loc": ["services", "monica", "nginx", "locations", "<name>", "recommendedProxySettings"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.locations.<name>.return": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds a return directive, for e.g. redirections.\n"}, "example": {"_type": "literalExpression", "text": "\"301 http://example.com$request_uri\""}, "loc": ["services", "monica", "nginx", "locations", "<name>", "return"], "readOnly": false, "type": "null or string"}, "services.monica.nginx.locations.<name>.root": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Root directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/root/directory\""}, "loc": ["services", "monica", "nginx", "locations", "<name>", "root"], "readOnly": false, "type": "null or path"}, "services.monica.nginx.locations.<name>.tryFiles": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds try_files directive.\n"}, "example": {"_type": "literalExpression", "text": "\"$uri =404\""}, "loc": ["services", "monica", "nginx", "locations", "<name>", "tryFiles"], "readOnly": false, "type": "null or string"}, "services.monica.nginx.onlySSL": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "monica", "nginx", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.quic": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the QUIC transport protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.\nNote that QUIC support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "monica", "nginx", "quic"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.rejectSSL": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to listen for and reject all HTTPS connections to this vhost. Useful in\n[default](#opt-services.nginx.virtualHosts._name_.default)\nserver blocks to avoid serving the certificate for another vhost. Uses the\n`ssl_reject_handshake` directive available in nginx versions\n1.19.4 and above.\n"}, "loc": ["services", "monica", "nginx", "rejectSSL"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.reuseport": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create an individual listening socket .\nIt is required to specify only once on one of the hosts.\n"}, "loc": ["services", "monica", "nginx", "reuseport"], "readOnly": false, "type": "boolean"}, "services.monica.nginx.root": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of the web root directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "monica", "nginx", "root"], "readOnly": false, "type": "null or path"}, "services.monica.nginx.serverAliases": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"example.org\"\n]"}, "loc": ["services", "monica", "nginx", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.monica.nginx.serverName": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of this virtual host. Defaults to attribute name in virtualHosts.\n"}, "example": {"_type": "literalExpression", "text": "\"example.org\""}, "loc": ["services", "monica", "nginx", "serverName"], "readOnly": false, "type": "null or string"}, "services.monica.nginx.sslCertificate": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "monica", "nginx", "sslCertificate"], "readOnly": false, "type": "path"}, "services.monica.nginx.sslCertificateKey": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "monica", "nginx", "sslCertificateKey"], "readOnly": false, "type": "path"}, "services.monica.nginx.sslTrustedCertificate": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to root SSL certificate for stapling and client certificates."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\""}, "loc": ["services", "monica", "nginx", "sslTrustedCertificate"], "readOnly": false, "type": "null or path"}, "services.monica.nginx.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "monica", "nginx", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.monica.poolConfig": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = 32;\n  \"pm.max_requests\" = 500;\n  \"pm.max_spare_servers\" = 4;\n  \"pm.min_spare_servers\" = 2;\n  \"pm.start_servers\" = 2;\n}"}, "description": {"_type": "mdDoc", "text": "Options for the monica PHP pool. See the documentation on <literal>php-fpm.conf</literal>\nfor details on configuration directives.\n"}, "loc": ["services", "monica", "poolConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.monica.user": {"declarations": ["nixos/modules/services/web-apps/monica.nix"], "default": {"_type": "literalExpression", "text": "\"monica\""}, "description": {"_type": "mdDoc", "text": "User monica runs as."}, "loc": ["services", "monica", "user"], "readOnly": false, "type": "string"}, "services.monit.config": {"declarations": ["nixos/modules/services/monitoring/monit.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "monitrc content"}, "loc": ["services", "monit", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.monit.enable": {"declarations": ["nixos/modules/services/monitoring/monit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Monit."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "monit", "enable"], "readOnly": false, "type": "boolean"}, "services.moodle.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally."}, "loc": ["services", "moodle", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.moodle.database.host": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "moodle", "database", "host"], "readOnly": false, "type": "string"}, "services.moodle.database.name": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "\"moodle\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "moodle", "database", "name"], "readOnly": false, "type": "string"}, "services.moodle.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/moodle-dbpassword\""}, "loc": ["services", "moodle", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.moodle.database.port": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "3306"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "moodle", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.moodle.database.socket": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "/run/mysqld/mysqld.sock"}, "description": {"_type": "mdDoc", "text": "Path to the unix socket file to use for authentication."}, "loc": ["services", "moodle", "database", "socket"], "readOnly": false, "type": "null or path"}, "services.moodle.database.type": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "\"mysql\""}, "description": {"_type": "mdDoc", "text": "Database engine to use."}, "loc": ["services", "moodle", "database", "type"], "readOnly": false, "type": "one of \"mysql\", \"pgsql\""}, "services.moodle.database.user": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "\"moodle\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "moodle", "database", "user"], "readOnly": false, "type": "string"}, "services.moodle.enable": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Moodle web application."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "moodle", "enable"], "readOnly": false, "type": "boolean"}, "services.moodle.extraConfig": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Any additional text to be appended to the config.php\nconfiguration file. This is a PHP script. For configuration\ndetails, see <https://docs.moodle.org/37/en/Configuration_file>.\n"}, "example": {"_type": "literalExpression", "text": "''\n  $CFG->disableupdatenotifications = true;\n''"}, "loc": ["services", "moodle", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.moodle.initialPassword": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "description": {"_type": "mdDoc", "text": "Specifies the initial password for the admin, i.e. the password assigned if the user does not already exist.\nThe password specified here is world-readable in the Nix store, so it should be changed promptly.\n"}, "example": {"_type": "literalExpression", "text": "\"correcthorsebatterystaple\""}, "loc": ["services", "moodle", "initialPassword"], "readOnly": false, "type": "string"}, "services.moodle.package": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "pkgs.moodle"}, "description": {"_type": "mdDoc", "text": "The Moodle package to use."}, "loc": ["services", "moodle", "package"], "readOnly": false, "type": "package"}, "services.moodle.poolConfig": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = 32;\n  \"pm.max_requests\" = 500;\n  \"pm.max_spare_servers\" = 4;\n  \"pm.min_spare_servers\" = 2;\n  \"pm.start_servers\" = 2;\n}"}, "description": {"_type": "mdDoc", "text": "Options for the Moodle PHP pool. See the documentation on `php-fpm.conf`\nfor details on configuration directives.\n"}, "loc": ["services", "moodle", "poolConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.moodle.virtualHost": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "description": {"_type": "mdDoc", "text": "Apache configuration can be done by adapting {option}`services.httpd.virtualHosts`.\nSee [](#opt-services.httpd.virtualHosts) for further information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  hostName = \"moodle.example.org\";\n  adminAddr = \"webmaster@example.org\";\n  forceSSL = true;\n  enableACME = true;\n}\n"}, "loc": ["services", "moodle", "virtualHost"], "readOnly": false, "type": "submodule"}, "services.moodle.virtualHost.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the acme challenge which is PUBLIC, don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "moodle", "virtualHost", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.moodle.virtualHost.addSSL": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "moodle", "virtualHost", "addSSL"], "readOnly": false, "type": "boolean"}, "services.moodle.virtualHost.adminAddr": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "E-mail address of the server administrator."}, "example": {"_type": "literalExpression", "text": "\"admin@example.org\""}, "loc": ["services", "moodle", "virtualHost", "adminAddr"], "readOnly": false, "type": "null or string"}, "services.moodle.virtualHost.documentRoot": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of Apache's document root directory.  If left undefined,\nan empty directory in the Nix store will be used as root.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "moodle", "virtualHost", "documentRoot"], "readOnly": false, "type": "null or path"}, "services.moodle.virtualHost.enableACME": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "moodle", "virtualHost", "enableACME"], "readOnly": false, "type": "boolean"}, "services.moodle.virtualHost.enableUserDir": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable serving {file}`~/public_html` as\n`/~\u00abusername\u00bb`.\n"}, "loc": ["services", "moodle", "virtualHost", "enableUserDir"], "readOnly": false, "type": "boolean"}, "services.moodle.virtualHost.extraConfig": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to httpd.conf verbatim. They will go after\ndirectories and directory aliases defined by default.\n"}, "example": {"_type": "literalExpression", "text": "''\n  <Directory /home>\n    Options FollowSymlinks\n    AllowOverride All\n  </Directory>\n''"}, "loc": ["services", "moodle", "virtualHost", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.moodle.virtualHost.forceSSL": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "moodle", "virtualHost", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.moodle.virtualHost.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given URL.\n"}, "example": {"_type": "literalExpression", "text": "\"http://newserver.example.org/\""}, "loc": ["services", "moodle", "virtualHost", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.moodle.virtualHost.hostName": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Canonical hostname for the server."}, "loc": ["services", "moodle", "virtualHost", "hostName"], "readOnly": false, "type": "string"}, "services.moodle.virtualHost.http2": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTP 2. HTTP/2 is supported in all multi-processing modules that come with httpd. *However, if you use the prefork mpm, there will\nbe severe restrictions.* Refer to <https://httpd.apache.org/docs/2.4/howto/http2.html#mpm-config> for details.\n"}, "loc": ["services", "moodle", "virtualHost", "http2"], "readOnly": false, "type": "boolean"}, "services.moodle.virtualHost.listen": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\n\n::: {.note}\nThis option overrides `addSSL`, `forceSSL` and `onlySSL`.\n\nIf you only want to set the addresses manually and not the ports, take a look at `listenAddresses`.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    ip = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    ip = \"192.154.1.1\";\n    port = 80;\n  }\n  {\n    ip = \"*\";\n    port = 8080;\n  }\n]"}, "loc": ["services", "moodle", "virtualHost", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.moodle.virtualHost.listen.*.ip": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "\"*\""}, "description": {"_type": "mdDoc", "text": "IP to listen on. 0.0.0.0 for IPv4 only, * for all."}, "loc": ["services", "moodle", "virtualHost", "listen", "*", "ip"], "readOnly": false, "type": "string"}, "services.moodle.virtualHost.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "description": {"_type": "mdDoc", "text": "Port to listen on"}, "loc": ["services", "moodle", "virtualHost", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.moodle.virtualHost.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SSL (https) support."}, "loc": ["services", "moodle", "virtualHost", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.moodle.virtualHost.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*\"\n]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "loc": ["services", "moodle", "virtualHost", "listenAddresses"], "readOnly": false, "type": "non-empty (list of string)"}, "services.moodle.virtualHost.locations": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config. See <https://httpd.apache.org/docs/2.4/mod/core.html#location> for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n  \"/foo/bar.png\" = {\n    alias = \"/home/eelco/some-file.png\";\n  };\n};\n"}, "loc": ["services", "moodle", "virtualHost", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.moodle.virtualHost.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests. See <https://httpd.apache.org/docs/2.4/mod/mod_alias.html#alias>.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "moodle", "virtualHost", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.moodle.virtualHost.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "moodle", "virtualHost", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.moodle.virtualHost.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds DirectoryIndex directive. See <https://httpd.apache.org/docs/2.4/mod/mod_dir.html#directoryindex>.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "moodle", "virtualHost", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.moodle.virtualHost.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "moodle", "virtualHost", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.moodle.virtualHost.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets up a simple reverse proxy as described by <https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple>.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "moodle", "virtualHost", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.moodle.virtualHost.logFormat": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "\"common\""}, "description": {"_type": "mdDoc", "text": "Log format for Apache's log files. Possible values are: combined, common, referer, agent.\n"}, "example": {"_type": "literalExpression", "text": "\"combined\""}, "loc": ["services", "moodle", "virtualHost", "logFormat"], "readOnly": false, "type": "string"}, "services.moodle.virtualHost.onlySSL": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "moodle", "virtualHost", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.moodle.virtualHost.robotsEntries": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Specification of pages to be ignored by web crawlers. See <http://www.robotstxt.org/> for details.\n"}, "example": {"_type": "literalExpression", "text": "\"Disallow: /foo/\""}, "loc": ["services", "moodle", "virtualHost", "robotsEntries"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.moodle.virtualHost.servedDirs": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve static directories.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    dir = \"/home/eelco/Dev/nix-homepage\";\n    urlPath = \"/nix\";\n  }\n]"}, "loc": ["services", "moodle", "virtualHost", "servedDirs"], "readOnly": false, "type": "list of (attribute set)"}, "services.moodle.virtualHost.servedFiles": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve individual, static files.\n\n::: {.note}\nThis option has been deprecated and will be removed in a future\nversion of NixOS. You can achieve the same result by making use of\nthe `locations.<name>.alias` option.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    file = \"/home/eelco/some-file.png\";\n    urlPath = \"/foo/bar.png\";\n  }\n]"}, "loc": ["services", "moodle", "virtualHost", "servedFiles"], "readOnly": false, "type": "list of (attribute set)"}, "services.moodle.virtualHost.serverAliases": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"www.example.org:8080\"\n  \"example.org\"\n]"}, "loc": ["services", "moodle", "virtualHost", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.moodle.virtualHost.sslServerCert": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "moodle", "virtualHost", "sslServerCert"], "readOnly": false, "type": "path"}, "services.moodle.virtualHost.sslServerChain": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to server SSL chain file."}, "example": {"_type": "literalExpression", "text": "\"/var/ca.pem\""}, "loc": ["services", "moodle", "virtualHost", "sslServerChain"], "readOnly": false, "type": "null or path"}, "services.moodle.virtualHost.sslServerKey": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "moodle", "virtualHost", "sslServerKey"], "readOnly": false, "type": "path"}, "services.moodle.virtualHost.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/moodle.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "moodle", "virtualHost", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.moonraker.address": {"declarations": ["nixos/modules/services/misc/moonraker.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The IP or host to listen on."}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "moonraker", "address"], "readOnly": false, "type": "string"}, "services.moonraker.allowSystemControl": {"declarations": ["nixos/modules/services/misc/moonraker.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow Moonraker to perform system-level operations.\n\nMoonraker exposes APIs to perform system-level operations, such as\nreboot, shutdown, and management of systemd units. See the\n[documentation](https://moonraker.readthedocs.io/en/latest/web_api/#machine-commands)\nfor details on what clients are able to do.\n"}, "loc": ["services", "moonraker", "allowSystemControl"], "readOnly": false, "type": "boolean"}, "services.moonraker.configDir": {"declarations": ["nixos/modules/services/misc/moonraker.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Deprecated directory containing client-writable configuration files.\n\nClients will be able to edit files in this directory via the API. This directory must be writable.\n"}, "loc": ["services", "moonraker", "configDir"], "readOnly": false, "type": "null or path"}, "services.moonraker.enable": {"declarations": ["nixos/modules/services/misc/moonraker.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Moonraker, an API web server for Klipper."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "moonraker", "enable"], "readOnly": false, "type": "boolean"}, "services.moonraker.group": {"declarations": ["nixos/modules/services/misc/moonraker.nix"], "default": {"_type": "literalExpression", "text": "\"moonraker\""}, "description": {"_type": "mdDoc", "text": "Group account under which Moonraker runs."}, "loc": ["services", "moonraker", "group"], "readOnly": false, "type": "string"}, "services.moonraker.klipperSocket": {"declarations": ["nixos/modules/services/misc/moonraker.nix"], "default": {"_type": "literalExpression", "text": "config.services.klipper.apiSocket"}, "description": {"_type": "mdDoc", "text": "Path to Klipper's API socket."}, "loc": ["services", "moonraker", "klipperSocket"], "readOnly": false, "type": "path"}, "services.moonraker.port": {"declarations": ["nixos/modules/services/misc/moonraker.nix"], "default": {"_type": "literalExpression", "text": "7125"}, "description": {"_type": "mdDoc", "text": "The port to listen on."}, "loc": ["services", "moonraker", "port"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.moonraker.settings": {"declarations": ["nixos/modules/services/misc/moonraker.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for Moonraker. See the [documentation](https://moonraker.readthedocs.io/en/latest/configuration/)\nfor supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  authorization = {\n    cors_domains = [\n      \"https://app.fluidd.xyz\"\n      \"https://my.mainsail.xyz\"\n    ];\n    trusted_clients = [\n      \"10.0.0.0/24\"\n    ];\n  };\n}"}, "loc": ["services", "moonraker", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string) or a non-empty list of them)"}, "services.moonraker.stateDir": {"declarations": ["nixos/modules/services/misc/moonraker.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/moonraker\""}, "description": {"_type": "mdDoc", "text": "The directory containing the Moonraker databases."}, "loc": ["services", "moonraker", "stateDir"], "readOnly": false, "type": "path"}, "services.moonraker.user": {"declarations": ["nixos/modules/services/misc/moonraker.nix"], "default": {"_type": "literalExpression", "text": "\"moonraker\""}, "description": {"_type": "mdDoc", "text": "User account under which Moonraker runs."}, "loc": ["services", "moonraker", "user"], "readOnly": false, "type": "string"}, "services.moosefs.chunkserver.enable": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Moosefs chunkserver daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "moosefs", "chunkserver", "enable"], "readOnly": false, "type": "boolean"}, "services.moosefs.chunkserver.hdds": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Mount points to be used by chunkserver for storage (see mfshdd.cfg)."}, "example": {"_type": "literalExpression", "text": "[\n  \"/mnt/hdd1\"\n]"}, "loc": ["services", "moosefs", "chunkserver", "hdds"], "readOnly": false, "type": "list of string"}, "services.moosefs.chunkserver.openFirewall": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to automatically open the necessary ports in the firewall."}, "loc": ["services", "moosefs", "chunkserver", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.moosefs.chunkserver.settings": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "description": {"_type": "mdDoc", "text": "Contents of chunkserver config file (mfschunkserver.cfg)."}, "loc": ["services", "moosefs", "chunkserver", "settings"], "readOnly": false, "type": "attribute set of (Flat key-value file)"}, "services.moosefs.chunkserver.settings.DATA_PATH": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mfs\""}, "description": {"_type": "mdDoc", "text": "Directory for lock file."}, "loc": ["services", "moosefs", "chunkserver", "settings", "DATA_PATH"], "readOnly": false, "type": "string"}, "services.moosefs.client.enable": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Moosefs client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "moosefs", "client", "enable"], "readOnly": false, "type": "boolean"}, "services.moosefs.master.enable": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Moosefs master daemon.\n\nYou need to run `mfsmaster-init` on a freshly installed master server to\ninitialize the `DATA_PATH` directory.\n"}, "loc": ["services", "moosefs", "master", "enable"], "readOnly": false, "type": "boolean"}, "services.moosefs.master.exports": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Paths to export (see mfsexports.cfg)."}, "example": {"_type": "literalExpression", "text": "[\n  \"* / rw,alldirs,admin,maproot=0:0\"\n  \"* . rw\"\n]"}, "loc": ["services", "moosefs", "master", "exports"], "readOnly": false, "type": "list of string"}, "services.moosefs.master.openFirewall": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to automatically open the necessary ports in the firewall."}, "loc": ["services", "moosefs", "master", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.moosefs.master.settings": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "description": {"_type": "mdDoc", "text": "Contents of config file (mfsmaster.cfg)."}, "loc": ["services", "moosefs", "master", "settings"], "readOnly": false, "type": "attribute set of (Flat key-value file)"}, "services.moosefs.master.settings.DATA_PATH": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mfs\""}, "description": {"_type": "mdDoc", "text": "Data storage directory."}, "loc": ["services", "moosefs", "master", "settings", "DATA_PATH"], "readOnly": false, "type": "string"}, "services.moosefs.masterHost": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IP or DNS name of master host."}, "loc": ["services", "moosefs", "masterHost"], "readOnly": false, "type": "string"}, "services.moosefs.metalogger.enable": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Moosefs metalogger daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "moosefs", "metalogger", "enable"], "readOnly": false, "type": "boolean"}, "services.moosefs.metalogger.settings": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "description": {"_type": "mdDoc", "text": "Contents of metalogger config file (mfsmetalogger.cfg)."}, "loc": ["services", "moosefs", "metalogger", "settings"], "readOnly": false, "type": "attribute set of (Flat key-value file)"}, "services.moosefs.metalogger.settings.DATA_PATH": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mfs\""}, "description": {"_type": "mdDoc", "text": "Data storage directory"}, "loc": ["services", "moosefs", "metalogger", "settings", "DATA_PATH"], "readOnly": false, "type": "string"}, "services.moosefs.runAsUser": {"declarations": ["nixos/modules/services/network-filesystems/moosefs.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Run daemons as user moosefs instead of root."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "moosefs", "runAsUser"], "readOnly": false, "type": "boolean"}, "services.mopidy.configuration": {"declarations": ["nixos/modules/services/audio/mopidy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The configuration that Mopidy should use.\n"}, "loc": ["services", "mopidy", "configuration"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.mopidy.dataDir": {"declarations": ["nixos/modules/services/audio/mopidy.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mopidy\""}, "description": {"_type": "mdDoc", "text": "The directory where Mopidy stores its state.\n"}, "loc": ["services", "mopidy", "dataDir"], "readOnly": false, "type": "string"}, "services.mopidy.enable": {"declarations": ["nixos/modules/services/audio/mopidy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Mopidy, a music player daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mopidy", "enable"], "readOnly": false, "type": "boolean"}, "services.mopidy.extensionPackages": {"declarations": ["nixos/modules/services/audio/mopidy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Mopidy extensions that should be loaded by the service.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.mopidy-spotify ]"}, "loc": ["services", "mopidy", "extensionPackages"], "readOnly": false, "type": "list of package"}, "services.mopidy.extraConfigFiles": {"declarations": ["nixos/modules/services/audio/mopidy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra config file read by Mopidy when the service starts.\nLater files in the list overrides earlier configuration.\n"}, "loc": ["services", "mopidy", "extraConfigFiles"], "readOnly": false, "type": "list of string"}, "services.morty.enable": {"declarations": ["nixos/modules/services/networking/morty.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Morty proxy server. See https://github.com/asciimoo/morty."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "morty", "enable"], "readOnly": false, "type": "boolean"}, "services.morty.ipv6": {"declarations": ["nixos/modules/services/networking/morty.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow IPv6 HTTP requests?"}, "loc": ["services", "morty", "ipv6"], "readOnly": false, "type": "boolean"}, "services.morty.key": {"declarations": ["nixos/modules/services/networking/morty.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "HMAC url validation key (hexadecimal encoded).\nLeave blank to disable. Without validation key, anyone can\nsubmit proxy requests. Leave blank to disable.\nGenerate with `printf %s somevalue | openssl dgst -sha1 -hmac somekey`\n"}, "loc": ["services", "morty", "key"], "readOnly": false, "type": "string"}, "services.morty.listenAddress": {"declarations": ["nixos/modules/services/networking/morty.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The address on which the service listens"}, "loc": ["services", "morty", "listenAddress"], "readOnly": false, "type": "string"}, "services.morty.package": {"declarations": ["nixos/modules/services/networking/morty.nix"], "default": {"_type": "literalExpression", "text": "pkgs.morty"}, "description": {"_type": "mdDoc", "text": "morty package to use."}, "loc": ["services", "morty", "package"], "readOnly": false, "type": "package"}, "services.morty.port": {"declarations": ["nixos/modules/services/networking/morty.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Listing port"}, "loc": ["services", "morty", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.morty.timeout": {"declarations": ["nixos/modules/services/networking/morty.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Request timeout in seconds."}, "loc": ["services", "morty", "timeout"], "readOnly": false, "type": "signed integer"}, "services.mosquitto.bridges": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Bridges to build to other MQTT brokers.\n"}, "loc": ["services", "mosquitto", "bridges"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.mosquitto.bridges.<name>.addresses": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Remote endpoints for the bridge.\n"}, "loc": ["services", "mosquitto", "bridges", "<name>", "addresses"], "readOnly": false, "type": "list of (submodule)"}, "services.mosquitto.bridges.<name>.addresses.*.address": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "description": {"_type": "mdDoc", "text": "Address of the remote MQTT broker.\n"}, "loc": ["services", "mosquitto", "bridges", "<name>", "addresses", "*", "address"], "readOnly": false, "type": "single-line string"}, "services.mosquitto.bridges.<name>.addresses.*.port": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "1883"}, "description": {"_type": "mdDoc", "text": "Port of the remote MQTT broker.\n"}, "loc": ["services", "mosquitto", "bridges", "<name>", "addresses", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mosquitto.bridges.<name>.settings": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional settings for this bridge.\n"}, "loc": ["services", "mosquitto", "bridges", "<name>", "settings"], "readOnly": false, "type": "attribute set of (string, path, bool, or integer)"}, "services.mosquitto.bridges.<name>.topics": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Topic patterns to be shared between the two brokers.\nRefer to the [\nmosquitto.conf documentation](https://mosquitto.org/man/mosquitto-conf-5.html) for details on the format.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"# both 2 local/topic/ remote/topic/\"\n]"}, "loc": ["services", "mosquitto", "bridges", "<name>", "topics"], "readOnly": false, "type": "list of single-line string"}, "services.mosquitto.dataDir": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mosquitto\""}, "description": {"_type": "mdDoc", "text": "The data directory.\n"}, "loc": ["services", "mosquitto", "dataDir"], "readOnly": false, "type": "path"}, "services.mosquitto.enable": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the MQTT Mosquitto broker."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mosquitto", "enable"], "readOnly": false, "type": "boolean"}, "services.mosquitto.includeDirs": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Directories to be scanned for further config files to include.\nDirectories will processed in the order given,\n`*.conf` files in the directory will be\nread in case-sensitive alphabetical order.\n"}, "loc": ["services", "mosquitto", "includeDirs"], "readOnly": false, "type": "list of path"}, "services.mosquitto.listeners": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Listeners to configure on this broker.\n"}, "loc": ["services", "mosquitto", "listeners"], "readOnly": false, "type": "list of (submodule)"}, "services.mosquitto.listeners.*.acl": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional ACL items to prepend to the generated ACL file.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"pattern read #\"\n  \"topic readwrite anon/report/#\"\n]"}, "loc": ["services", "mosquitto", "listeners", "*", "acl"], "readOnly": false, "type": "list of single-line string"}, "services.mosquitto.listeners.*.address": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to listen on. Listen on `0.0.0.0`/`::`\nwhen unset.\n"}, "loc": ["services", "mosquitto", "listeners", "*", "address"], "readOnly": false, "type": "null or single-line string"}, "services.mosquitto.listeners.*.authPlugins": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Authentication plugin to attach to this listener.\nRefer to the [mosquitto.conf documentation](https://mosquitto.org/man/mosquitto-conf-5.html)\nfor details on authentication plugins.\n"}, "loc": ["services", "mosquitto", "listeners", "*", "authPlugins"], "readOnly": false, "type": "list of (submodule)"}, "services.mosquitto.listeners.*.authPlugins.*.denySpecialChars": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Automatically disallow all clients using `#`\nor `+` in their name/id.\n"}, "loc": ["services", "mosquitto", "listeners", "*", "authPlugins", "*", "denySpecialChars"], "readOnly": false, "type": "boolean"}, "services.mosquitto.listeners.*.authPlugins.*.options": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Options for the auth plugin. Each key turns into a `auth_opt_*`\n line in the config.\n"}, "loc": ["services", "mosquitto", "listeners", "*", "authPlugins", "*", "options"], "readOnly": false, "type": "attribute set of (string, path, bool, or integer)"}, "services.mosquitto.listeners.*.authPlugins.*.plugin": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "description": {"_type": "mdDoc", "text": "Plugin path to load, should be a `.so` file.\n"}, "loc": ["services", "mosquitto", "listeners", "*", "authPlugins", "*", "plugin"], "readOnly": false, "type": "path"}, "services.mosquitto.listeners.*.omitPasswordAuth": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Omits password checking, allowing anyone to log in with any user name unless\nother mandatory authentication methods (eg TLS client certificates) are configured.\n"}, "loc": ["services", "mosquitto", "listeners", "*", "omitPasswordAuth"], "readOnly": false, "type": "boolean"}, "services.mosquitto.listeners.*.port": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "1883"}, "description": {"_type": "mdDoc", "text": "Port to listen on. Must be set to 0 to listen on a unix domain socket.\n"}, "loc": ["services", "mosquitto", "listeners", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mosquitto.listeners.*.settings": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional settings for this listener.\n"}, "loc": ["services", "mosquitto", "listeners", "*", "settings"], "readOnly": false, "type": "attribute set of (string, path, bool, or integer)"}, "services.mosquitto.listeners.*.users": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of users and their passwords and ACLs.\n"}, "example": {"_type": "literalExpression", "text": "{\n  john = {\n    acl = [\n      \"readwrite john/#\"\n    ];\n    password = \"123456\";\n  };\n}"}, "loc": ["services", "mosquitto", "listeners", "*", "users"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.mosquitto.listeners.*.users.<name>.acl": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Control client access to topics on the broker.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"read A/B\"\n  \"readwrite A/#\"\n]"}, "loc": ["services", "mosquitto", "listeners", "*", "users", "<name>", "acl"], "readOnly": false, "type": "list of single-line string"}, "services.mosquitto.listeners.*.users.<name>.hashedPassword": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the hashed password for the MQTT User.\nTo generate hashed password install the `mosquitto`\npackage and use `mosquitto_passwd`, then extract\nthe second field (after the `:`) from the generated\nfile.\n"}, "loc": ["services", "mosquitto", "listeners", "*", "users", "<name>", "hashedPassword"], "readOnly": false, "type": "null or single-line string"}, "services.mosquitto.listeners.*.users.<name>.hashedPasswordFile": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the path to a file containing the\nhashed password for the MQTT user.\nTo generate hashed password install the `mosquitto`\npackage and use `mosquitto_passwd`, then remove the\n`username:` prefix from the generated file.\nThe file is securely passed to mosquitto by\nleveraging systemd credentials. No special\npermissions need to be set on this file.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/file\""}, "loc": ["services", "mosquitto", "listeners", "*", "users", "<name>", "hashedPasswordFile"], "readOnly": false, "type": "null or path"}, "services.mosquitto.listeners.*.users.<name>.password": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the (clear text) password for the MQTT User.\n"}, "loc": ["services", "mosquitto", "listeners", "*", "users", "<name>", "password"], "readOnly": false, "type": "null or single-line string"}, "services.mosquitto.listeners.*.users.<name>.passwordFile": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the path to a file containing the\nclear text password for the MQTT user.\nThe file is securely passed to mosquitto by\nleveraging systemd credentials. No special\npermissions need to be set on this file.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/file\""}, "loc": ["services", "mosquitto", "listeners", "*", "users", "<name>", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.mosquitto.logDest": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"stderr\"\n]"}, "description": {"_type": "mdDoc", "text": "Destinations to send log messages to.\n"}, "loc": ["services", "mosquitto", "logDest"], "readOnly": false, "type": "list of (path or one of \"stdout\", \"stderr\", \"syslog\", \"topic\", \"dlt\")"}, "services.mosquitto.logType": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Types of messages to log.\n"}, "loc": ["services", "mosquitto", "logType"], "readOnly": false, "type": "list of (one of \"debug\", \"error\", \"warning\", \"notice\", \"information\", \"subscribe\", \"unsubscribe\", \"websockets\", \"none\", \"all\")"}, "services.mosquitto.package": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "pkgs.mosquitto"}, "description": {"_type": "mdDoc", "text": "Mosquitto package to use.\n"}, "loc": ["services", "mosquitto", "package"], "readOnly": false, "type": "package"}, "services.mosquitto.persistence": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable persistent storage of subscriptions and messages.\n"}, "loc": ["services", "mosquitto", "persistence"], "readOnly": false, "type": "boolean"}, "services.mosquitto.settings": {"declarations": ["nixos/modules/services/networking/mosquitto.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Global configuration options for the mosquitto broker.\n"}, "loc": ["services", "mosquitto", "settings"], "readOnly": false, "type": "attribute set of (string, path, bool, or integer)"}, "services.mozillavpn.enable": {"declarations": ["nixos/modules/services/networking/mozillavpn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Mozilla VPN daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mozillavpn", "enable"], "readOnly": false, "type": "boolean"}, "services.mpd.credentials": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Credentials and permissions for accessing the mpd server.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    passwordFile = \"/var/lib/secrets/mpd_readonly_password\";\n    permissions = [\n      \"read\"\n    ];\n  }\n  {\n    passwordFile = \"/var/lib/secrets/mpd_admin_password\";\n    permissions = [\n      \"read\"\n      \"add\"\n      \"control\"\n      \"admin\"\n    ];\n  }\n]"}, "loc": ["services", "mpd", "credentials"], "readOnly": false, "type": "list of (submodule)"}, "services.mpd.credentials.*.passwordFile": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "description": {"_type": "mdDoc", "text": "Path to file containing the password.\n"}, "loc": ["services", "mpd", "credentials", "*", "passwordFile"], "readOnly": false, "type": "path"}, "services.mpd.credentials.*.permissions": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"read\"\n]"}, "description": {"_type": "mdDoc", "text": "List of permissions that are granted with this password.\nPermissions can be \"read\", \"add\", \"control\", \"admin\".\n"}, "loc": ["services", "mpd", "credentials", "*", "permissions"], "readOnly": false, "type": "list of (one of \"read\", \"add\", \"control\", \"admin\")"}, "services.mpd.dataDir": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mpd\""}, "description": {"_type": "mdDoc", "text": "The directory where MPD stores its state, tag cache, playlists etc. If\nleft as the default value this directory will automatically be created\nbefore the MPD server starts, otherwise the sysadmin is responsible for\nensuring the directory exists with appropriate ownership and permissions.\n"}, "loc": ["services", "mpd", "dataDir"], "readOnly": false, "type": "path"}, "services.mpd.dbFile": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "\"${dataDir}/tag_cache\""}, "description": {"_type": "mdDoc", "text": "The path to MPD's database. If set to `null` the\nparameter is omitted from the configuration.\n"}, "loc": ["services", "mpd", "dbFile"], "readOnly": false, "type": "null or string"}, "services.mpd.enable": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable MPD, the music player daemon.\n"}, "loc": ["services", "mpd", "enable"], "readOnly": false, "type": "boolean"}, "services.mpd.extraConfig": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra directives added to to the end of MPD's configuration file,\nmpd.conf. Basic configuration like file location and uid/gid\nis added automatically to the beginning of the file. For available\noptions see {manpage}`mpd.conf(5)`.\n"}, "loc": ["services", "mpd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.mpd.fluidsynth": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, add fluidsynth soundfont and configure the plugin.\n"}, "loc": ["services", "mpd", "fluidsynth"], "readOnly": false, "type": "boolean"}, "services.mpd.group": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "\"mpd\""}, "description": {"_type": "mdDoc", "text": "Group account under which MPD runs."}, "loc": ["services", "mpd", "group"], "readOnly": false, "type": "string"}, "services.mpd.musicDirectory": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "\"${dataDir}/music\""}, "description": {"_type": "mdDoc", "text": "The directory or NFS/SMB network share where MPD reads music from. If left\nas the default value this directory will automatically be created before\nthe MPD server starts, otherwise the sysadmin is responsible for ensuring\nthe directory exists with appropriate ownership and permissions.\n"}, "loc": ["services", "mpd", "musicDirectory"], "readOnly": false, "type": "path or string matching the pattern (http|https|nfs|smb)://.+"}, "services.mpd.network.listenAddress": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The address for the daemon to listen on.\nUse `any` to listen on all addresses.\n"}, "example": {"_type": "literalExpression", "text": "\"any\""}, "loc": ["services", "mpd", "network", "listenAddress"], "readOnly": false, "type": "string"}, "services.mpd.network.port": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "6600"}, "description": {"_type": "mdDoc", "text": "This setting is the TCP port that is desired for the daemon to get assigned\nto.\n"}, "loc": ["services", "mpd", "network", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mpd.playlistDirectory": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "\"${dataDir}/playlists\""}, "description": {"_type": "mdDoc", "text": "The directory where MPD stores playlists. If left as the default value\nthis directory will automatically be created before the MPD server starts,\notherwise the sysadmin is responsible for ensuring the directory exists\nwith appropriate ownership and permissions.\n"}, "loc": ["services", "mpd", "playlistDirectory"], "readOnly": false, "type": "path"}, "services.mpd.startWhenNeeded": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, {command}`mpd` is socket-activated; that\nis, instead of having it permanently running as a daemon,\nsystemd will start it on the first incoming connection.\n"}, "loc": ["services", "mpd", "startWhenNeeded"], "readOnly": false, "type": "boolean"}, "services.mpd.user": {"declarations": ["nixos/modules/services/audio/mpd.nix"], "default": {"_type": "literalExpression", "text": "\"mpd\""}, "description": {"_type": "mdDoc", "text": "User account under which MPD runs."}, "loc": ["services", "mpd", "user"], "readOnly": false, "type": "string"}, "services.mpdscribble.enable": {"declarations": ["nixos/modules/services/audio/mpdscribble.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable mpdscribble."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mpdscribble", "enable"], "readOnly": false, "type": "boolean"}, "services.mpdscribble.endpoints": {"declarations": ["nixos/modules/services/audio/mpdscribble.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Endpoints to scrobble to.\nIf the endpoint is one of \"jamendo\", \"last.fm\", \"libre.fm\", \"listenbrainz\" the url is set automatically.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"last.fm\" = {\n    passwordFile = \"/run/secrets/lastfm_password\";\n    username = \"foo\";\n  };\n}"}, "loc": ["services", "mpdscribble", "endpoints"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.mpdscribble.endpoints.<name>.passwordFile": {"declarations": ["nixos/modules/services/audio/mpdscribble.nix"], "description": {"_type": "mdDoc", "text": "File containing the password, either as MD5SUM or cleartext."}, "loc": ["services", "mpdscribble", "endpoints", "<name>", "passwordFile"], "readOnly": false, "type": "null or string"}, "services.mpdscribble.endpoints.<name>.url": {"declarations": ["nixos/modules/services/audio/mpdscribble.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The url endpoint where the scrobble API is listening."}, "loc": ["services", "mpdscribble", "endpoints", "<name>", "url"], "readOnly": false, "type": "string"}, "services.mpdscribble.endpoints.<name>.username": {"declarations": ["nixos/modules/services/audio/mpdscribble.nix"], "description": {"_type": "mdDoc", "text": "Username for the scrobble service.\n"}, "loc": ["services", "mpdscribble", "endpoints", "<name>", "username"], "readOnly": false, "type": "string"}, "services.mpdscribble.host": {"declarations": ["nixos/modules/services/audio/mpdscribble.nix"], "default": {"_type": "literalExpression", "text": "if config.services.mpd.network.listenAddress != \"any\"\nthen config.services.mpd.network.listenAddress\nelse \"localhost\"\n"}, "description": {"_type": "mdDoc", "text": "Host for the mpdscribble daemon to search for a mpd daemon on.\n"}, "loc": ["services", "mpdscribble", "host"], "readOnly": false, "type": "string"}, "services.mpdscribble.journalInterval": {"declarations": ["nixos/modules/services/audio/mpdscribble.nix"], "default": {"_type": "literalExpression", "text": "600"}, "description": {"_type": "mdDoc", "text": "How often should mpdscribble save the journal file? [seconds]\n"}, "example": {"_type": "literalExpression", "text": "60"}, "loc": ["services", "mpdscribble", "journalInterval"], "readOnly": false, "type": "signed integer"}, "services.mpdscribble.passwordFile": {"declarations": ["nixos/modules/services/audio/mpdscribble.nix"], "default": {"_type": "literalMD", "text": "The first password file with read access configured for MPD when using a local instance,\notherwise `null`.\n"}, "description": {"_type": "mdDoc", "text": "File containing the password for the mpd daemon.\nIf there is a local mpd configured using {option}`services.mpd.credentials`\nthe default is automatically set to a matching passwordFile of the local mpd.\n"}, "loc": ["services", "mpdscribble", "passwordFile"], "readOnly": false, "type": "null or string"}, "services.mpdscribble.port": {"declarations": ["nixos/modules/services/audio/mpdscribble.nix"], "default": {"_type": "literalExpression", "text": "config.services.mpd.network.port"}, "description": {"_type": "mdDoc", "text": "Port for the mpdscribble daemon to search for a mpd daemon on.\n"}, "loc": ["services", "mpdscribble", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mpdscribble.proxy": {"declarations": ["nixos/modules/services/audio/mpdscribble.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP proxy URL.\n"}, "loc": ["services", "mpdscribble", "proxy"], "readOnly": false, "type": "null or string"}, "services.mpdscribble.verbose": {"declarations": ["nixos/modules/services/audio/mpdscribble.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Log level for the mpdscribble daemon.\n"}, "loc": ["services", "mpdscribble", "verbose"], "readOnly": false, "type": "signed integer"}, "services.mstpd.enable": {"declarations": ["nixos/modules/services/networking/mstpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the multiple spanning tree protocol daemon.\n"}, "loc": ["services", "mstpd", "enable"], "readOnly": false, "type": "boolean"}, "services.mtprotoproxy.adTag": {"declarations": ["nixos/modules/services/networking/mtprotoproxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Tag for advertising that can be obtained from @MTProxybot.\n"}, "example": {"_type": "literalExpression", "text": "\"3c09c680b76ee91a4c25ad51f742267d\""}, "loc": ["services", "mtprotoproxy", "adTag"], "readOnly": false, "type": "null or string"}, "services.mtprotoproxy.enable": {"declarations": ["nixos/modules/services/networking/mtprotoproxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable mtprotoproxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mtprotoproxy", "enable"], "readOnly": false, "type": "boolean"}, "services.mtprotoproxy.extraConfig": {"declarations": ["nixos/modules/services/networking/mtprotoproxy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration options for mtprotoproxy.\n"}, "example": {"_type": "literalExpression", "text": "{\n  STATS_PRINT_PERIOD = 600;\n}"}, "loc": ["services", "mtprotoproxy", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.mtprotoproxy.port": {"declarations": ["nixos/modules/services/networking/mtprotoproxy.nix"], "default": {"_type": "literalExpression", "text": "3256"}, "description": {"_type": "mdDoc", "text": "TCP port to accept mtproto connections on.\n"}, "loc": ["services", "mtprotoproxy", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mtprotoproxy.secureOnly": {"declarations": ["nixos/modules/services/networking/mtprotoproxy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Don't allow users to connect in non-secure mode (without random padding).\n"}, "loc": ["services", "mtprotoproxy", "secureOnly"], "readOnly": false, "type": "boolean"}, "services.mtprotoproxy.users": {"declarations": ["nixos/modules/services/networking/mtprotoproxy.nix"], "description": {"_type": "mdDoc", "text": "Allowed users and their secrets. A secret is a 32 characters long hex string.\n"}, "example": {"_type": "literalExpression", "text": "{\n  tg = \"00000000000000000000000000000000\";\n  tg2 = \"0123456789abcdef0123456789abcdef\";\n}"}, "loc": ["services", "mtprotoproxy", "users"], "readOnly": false, "type": "attribute set of string"}, "services.mtr-exporter.address": {"declarations": ["nixos/modules/services/networking/mtr-exporter.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Listen address for MTR exporter."}, "loc": ["services", "mtr-exporter", "address"], "readOnly": false, "type": "string"}, "services.mtr-exporter.enable": {"declarations": ["nixos/modules/services/networking/mtr-exporter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable a Prometheus exporter for MTR."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mtr-exporter", "enable"], "readOnly": false, "type": "boolean"}, "services.mtr-exporter.interval": {"declarations": ["nixos/modules/services/networking/mtr-exporter.nix"], "default": {"_type": "literalExpression", "text": "60"}, "description": {"_type": "mdDoc", "text": "Interval between MTR checks in seconds."}, "loc": ["services", "mtr-exporter", "interval"], "readOnly": false, "type": "signed integer"}, "services.mtr-exporter.mtrFlags": {"declarations": ["nixos/modules/services/networking/mtr-exporter.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional flags to pass to MTR."}, "example": {"_type": "literalExpression", "text": "[\n  \"-G1\"\n]"}, "loc": ["services", "mtr-exporter", "mtrFlags"], "readOnly": false, "type": "list of string"}, "services.mtr-exporter.port": {"declarations": ["nixos/modules/services/networking/mtr-exporter.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Listen port for MTR exporter."}, "loc": ["services", "mtr-exporter", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mtr-exporter.target": {"declarations": ["nixos/modules/services/networking/mtr-exporter.nix"], "description": {"_type": "mdDoc", "text": "Target to check using MTR."}, "example": {"_type": "literalExpression", "text": "\"example.org\""}, "loc": ["services", "mtr-exporter", "target"], "readOnly": false, "type": "string"}, "services.mullvad-vpn.enable": {"declarations": ["nixos/modules/services/networking/mullvad-vpn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This option enables Mullvad VPN daemon.\nThis sets {option}`networking.firewall.checkReversePath` to \"loose\", which might be undesirable for security.\n"}, "loc": ["services", "mullvad-vpn", "enable"], "readOnly": false, "type": "boolean"}, "services.mullvad-vpn.enableExcludeWrapper": {"declarations": ["nixos/modules/services/networking/mullvad-vpn.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "This option activates the wrapper that allows the use of mullvad-exclude.\nMight have minor security impact, so consider disabling if you do not use the feature.\n"}, "loc": ["services", "mullvad-vpn", "enableExcludeWrapper"], "readOnly": false, "type": "boolean"}, "services.mullvad-vpn.package": {"declarations": ["nixos/modules/services/networking/mullvad-vpn.nix"], "default": {"_type": "literalExpression", "text": "pkgs.mullvad"}, "description": {"_type": "mdDoc", "text": "The Mullvad package to use. `pkgs.mullvad` only provides the CLI tool, `pkgs.mullvad-vpn` provides both the CLI and the GUI.\n"}, "loc": ["services", "mullvad-vpn", "package"], "readOnly": false, "type": "package"}, "services.multipath.blacklist": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This section defines which devices should be excluded from the\nmultipath topology discovery.\n"}, "loc": ["services", "multipath", "blacklist"], "readOnly": false, "type": "null or string"}, "services.multipath.blacklist_exceptions": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This section defines which devices should be included in the\nmultipath topology discovery, despite being listed in the\nblacklist section.\n"}, "loc": ["services", "multipath", "blacklist_exceptions"], "readOnly": false, "type": "null or string"}, "services.multipath.defaults": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This section defines default values for attributes which are used\nwhenever no values are given in the appropriate device or multipath\nsections.\n"}, "loc": ["services", "multipath", "defaults"], "readOnly": false, "type": "null or string"}, "services.multipath.devices": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option allows you to define arrays for use in multipath\ngroups.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    vendor = \"\\\"COMPELNT\\\"\";\n    product = \"\\\"Compellent Vol\\\"\";\n    path_checker = \"tur\";\n    no_path_retry = \"queue\";\n    max_sectors_kb = 256;\n  }, ...\n]\n"}, "loc": ["services", "multipath", "devices"], "readOnly": false, "type": "list of (submodule)"}, "services.multipath.devices.*.alias_prefix": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The user_friendly_names prefix to use for this device type, instead of the default mpath"}, "loc": ["services", "multipath", "devices", "*", "alias_prefix"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.all_tg_pt": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the 'all targets ports' flag when registering keys with mpathpersist"}, "loc": ["services", "multipath", "devices", "*", "all_tg_pt"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.deferred_remove": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set to \"yes\", multipathd will do a deferred remove instead of a\nregular remove when the last path device has been deleted. This means\nthat if the multipath device is still in use, it will be freed when\nthe last user closes it. If path is added to the multipath device\nbefore the last user closes it, the deferred remove will be canceled.\n"}, "loc": ["services", "multipath", "devices", "*", "deferred_remove"], "readOnly": false, "type": "null or one of \"yes\", \"no\""}, "services.multipath.devices.*.delay_wait_checks": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This option is deprecated, and mapped to san_path_err_recovery_time"}, "loc": ["services", "multipath", "devices", "*", "delay_wait_checks"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.delay_watch_checks": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This option is deprecated, and mapped to san_path_err_forget_rate"}, "loc": ["services", "multipath", "devices", "*", "delay_watch_checks"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.detect_checker": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set to \"yes\", multipath will try to detect if the device supports\nSCSI-3 ALUA. If so, the device will automatically use the tur checker.\nIf set to \"no\", the checker will be selected as usual.\n"}, "loc": ["services", "multipath", "devices", "*", "detect_checker"], "readOnly": false, "type": "null or one of \"yes\", \"no\""}, "services.multipath.devices.*.detect_prio": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set to \"yes\", multipath will try to detect if the device supports\nSCSI-3 ALUA. If so, the device will automatically use the sysfs\nprioritizer if the required sysf attributes access_state and\npreferred_path are supported, or the alua prioritizer if not. If set\nto \"no\", the prioritizer will be selected as usual.\n"}, "loc": ["services", "multipath", "devices", "*", "detect_prio"], "readOnly": false, "type": "null or one of \"yes\", \"no\""}, "services.multipath.devices.*.dev_loss_tmo": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the number of seconds the SCSI layer will wait after a problem has\nbeen detected on a FC remote port before removing it from the system. This\ncan be set to \"infinity\" which sets it to the max value of 2147483647\nseconds, or 68 years. It will be automatically adjusted to the overall\nretry interval no_path_retry * polling_interval\nif a number of retries is given with no_path_retry and the\noverall retry interval is longer than the specified dev_loss_tmo value.\nThe Linux kernel will cap this value to 600 if fast_io_fail_tmo\nis not set.\n"}, "loc": ["services", "multipath", "devices", "*", "dev_loss_tmo"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.failback": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Tell multipathd how to manage path group failback. Quote integers as strings"}, "loc": ["services", "multipath", "devices", "*", "failback"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.fast_io_fail_tmo": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the number of seconds the SCSI layer will wait after a problem has been\ndetected on a FC remote port before failing I/O to devices on that remote port.\nThis should be smaller than dev_loss_tmo. Setting this to \"off\" will disable\nthe timeout. Quote integers as strings.\n"}, "loc": ["services", "multipath", "devices", "*", "fast_io_fail_tmo"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.features": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify any device-mapper features to be used"}, "loc": ["services", "multipath", "devices", "*", "features"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.flush_on_last_del": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set to \"yes\" multipathd will disable queueing when the last path to a\ndevice has been deleted.\n"}, "loc": ["services", "multipath", "devices", "*", "flush_on_last_del"], "readOnly": false, "type": "null or one of \"yes\", \"no\""}, "services.multipath.devices.*.getuid_callout": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "(Superseded by uid_attribute) The default program and args to callout\nto obtain a unique path identifier. Should be specified with an absolute path.\n"}, "loc": ["services", "multipath", "devices", "*", "getuid_callout"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.ghost_delay": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the number of seconds that multipath will wait after creating a device with only ghost paths before marking it ready for use in systemd"}, "loc": ["services", "multipath", "devices", "*", "ghost_delay"], "readOnly": false, "type": "null or signed integer"}, "services.multipath.devices.*.hardware_handler": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The hardware handler to use for this device type"}, "loc": ["services", "multipath", "devices", "*", "hardware_handler"], "readOnly": false, "type": "null or one of \"emc\", \"rdac\", \"hp_sw\", \"alua\", \"ana\""}, "services.multipath.devices.*.marginal_path_double_failed_time": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "One of the four parameters of supporting path check based on accounting IO error such as intermittent error"}, "loc": ["services", "multipath", "devices", "*", "marginal_path_double_failed_time"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.marginal_path_err_rate_threshold": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The error rate threshold as a permillage (1/1000)"}, "loc": ["services", "multipath", "devices", "*", "marginal_path_err_rate_threshold"], "readOnly": false, "type": "null or signed integer"}, "services.multipath.devices.*.marginal_path_err_recheck_gap_time": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "One of the four parameters of supporting path check based on accounting IO error such as intermittent error"}, "loc": ["services", "multipath", "devices", "*", "marginal_path_err_recheck_gap_time"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.marginal_path_err_sample_time": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "One of the four parameters of supporting path check based on accounting IO error such as intermittent error"}, "loc": ["services", "multipath", "devices", "*", "marginal_path_err_sample_time"], "readOnly": false, "type": "null or signed integer"}, "services.multipath.devices.*.max_sectors_kb": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the max_sectors_kb device parameter on all path devices and the multipath device to the specified value"}, "loc": ["services", "multipath", "devices", "*", "max_sectors_kb"], "readOnly": false, "type": "null or signed integer"}, "services.multipath.devices.*.no_path_retry": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify what to do when all paths are down. Quote integers as strings"}, "loc": ["services", "multipath", "devices", "*", "no_path_retry"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.path_checker": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "\"tur\""}, "description": {"_type": "mdDoc", "text": "The default method used to determine the paths state"}, "loc": ["services", "multipath", "devices", "*", "path_checker"], "readOnly": false, "type": "one of \"readsector0\", \"tur\", \"emc_clariion\", \"hp_sw\", \"rdac\", \"directio\", \"cciss_tur\", \"none\""}, "services.multipath.devices.*.path_grouping_policy": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The default path grouping policy to apply to unspecified multipaths"}, "loc": ["services", "multipath", "devices", "*", "path_grouping_policy"], "readOnly": false, "type": "null or one of \"failover\", \"multibus\", \"group_by_serial\", \"group_by_prio\", \"group_by_node_name\""}, "services.multipath.devices.*.path_selector": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The default path selector algorithm to use; they are offered by the kernel multipath target"}, "loc": ["services", "multipath", "devices", "*", "path_selector"], "readOnly": false, "type": "null or one of \"\"round-robin 0\"\", \"\"queue-length 0\"\", \"\"service-time 0\"\", \"\"historical-service-time 0\"\""}, "services.multipath.devices.*.prio": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the path priority routine"}, "loc": ["services", "multipath", "devices", "*", "prio"], "readOnly": false, "type": "null or one of \"none\", \"const\", \"sysfs\", \"emc\", \"alua\", \"ontap\", \"rdac\", \"hp_sw\", \"hds\", \"random\", \"weightedpath\", \"path_latency\", \"ana\", \"datacore\", \"iet\""}, "services.multipath.devices.*.prio_args": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Arguments to pass to to the prio function"}, "loc": ["services", "multipath", "devices", "*", "prio_args"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.product": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "description": {"_type": "mdDoc", "text": "Regular expression to match the product name"}, "example": {"_type": "literalExpression", "text": "\"Compellent Vol\""}, "loc": ["services", "multipath", "devices", "*", "product"], "readOnly": false, "type": "string"}, "services.multipath.devices.*.product_blacklist": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Products with the given vendor matching this string are blacklisted"}, "loc": ["services", "multipath", "devices", "*", "product_blacklist"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.revision": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Regular expression to match the product revision"}, "loc": ["services", "multipath", "devices", "*", "revision"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.rr_min_io": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of I/O requests to route to a path before switching to the next in the\nsame path group. This is only for Block I/O (BIO) based multipath and\nonly apply to round-robin path_selector.\n"}, "loc": ["services", "multipath", "devices", "*", "rr_min_io"], "readOnly": false, "type": "null or signed integer"}, "services.multipath.devices.*.rr_min_io_rq": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of I/O requests to route to a path before switching to the next in the\nsame path group. This is only for Request based multipath and\nonly apply to round-robin path_selector.\n"}, "loc": ["services", "multipath", "devices", "*", "rr_min_io_rq"], "readOnly": false, "type": "null or signed integer"}, "services.multipath.devices.*.rr_weight": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set to priorities the multipath configurator will assign path weights\nas \"path prio * rr_min_io\".\n"}, "loc": ["services", "multipath", "devices", "*", "rr_weight"], "readOnly": false, "type": "null or one of \"priorities\", \"uniform\""}, "services.multipath.devices.*.san_path_err_forget_rate": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set to a value greater than 0, multipathd will check whether the path\nfailures has exceeded the san_path_err_threshold within this many checks\ni.e san_path_err_forget_rate. If so we will not reinstante the path till\nsan_path_err_recovery_time.\n"}, "loc": ["services", "multipath", "devices", "*", "san_path_err_forget_rate"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.san_path_err_recovery_time": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set to a value greater than 0, multipathd will make sure that when\npath failures has exceeded the san_path_err_threshold within\nsan_path_err_forget_rate then the path will be placed in failed state\nfor san_path_err_recovery_time duration. Once san_path_err_recovery_time\nhas timeout we will reinstante the failed path. san_path_err_recovery_time\nvalue should be in secs.\n"}, "loc": ["services", "multipath", "devices", "*", "san_path_err_recovery_time"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.san_path_err_threshold": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set to a value greater than 0, multipathd will watch paths and check\nhow many times a path has been failed due to errors.If the number of\nfailures on a particular path is greater then the san_path_err_threshold,\nthen the path will not reinstate till san_path_err_recovery_time. These\npath failures should occur within a san_path_err_forget_rate checks, if\nnot we will consider the path is good enough to reinstantate.\n"}, "loc": ["services", "multipath", "devices", "*", "san_path_err_threshold"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.skip_kpartx": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set to yes, kpartx will not automatically create partitions on the device"}, "loc": ["services", "multipath", "devices", "*", "skip_kpartx"], "readOnly": false, "type": "null or one of \"yes\", \"no\""}, "services.multipath.devices.*.uid_attribute": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The udev attribute providing a unique path identifier (WWID)"}, "loc": ["services", "multipath", "devices", "*", "uid_attribute"], "readOnly": false, "type": "null or string"}, "services.multipath.devices.*.user_friendly_names": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set to \"yes\", using the bindings file /etc/multipath/bindings\nto assign a persistent and unique alias to the multipath, in the\nform of mpath. If set to \"no\" use the WWID as the alias. In either\ncase this be will be overridden by any specific aliases in the\nmultipaths section.\n"}, "loc": ["services", "multipath", "devices", "*", "user_friendly_names"], "readOnly": false, "type": "null or one of \"yes\", \"no\""}, "services.multipath.devices.*.vendor": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "description": {"_type": "mdDoc", "text": "Regular expression to match the vendor name"}, "example": {"_type": "literalExpression", "text": "\"COMPELNT\""}, "loc": ["services", "multipath", "devices", "*", "vendor"], "readOnly": false, "type": "string"}, "services.multipath.devices.*.vpd_vendor": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The vendor specific vpd page information, using the vpd page abbreviation"}, "loc": ["services", "multipath", "devices", "*", "vpd_vendor"], "readOnly": false, "type": "null or string"}, "services.multipath.enable": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the device mapper multipath (DM-MP) daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "multipath", "enable"], "readOnly": false, "type": "boolean"}, "services.multipath.extraConfig": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Lines to append to default multipath.conf"}, "loc": ["services", "multipath", "extraConfig"], "readOnly": false, "type": "null or string"}, "services.multipath.extraConfigFile": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Append an additional file's contents to /etc/multipath.conf"}, "loc": ["services", "multipath", "extraConfigFile"], "readOnly": false, "type": "null or string"}, "services.multipath.overrides": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This section defines values for attributes that should override the\ndevice-specific settings for all devices.\n"}, "loc": ["services", "multipath", "overrides"], "readOnly": false, "type": "null or string"}, "services.multipath.package": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "pkgs.multipath-tools"}, "description": {"_type": "mdDoc", "text": "multipath-tools package to use"}, "loc": ["services", "multipath", "package"], "readOnly": false, "type": "package"}, "services.multipath.pathGroups": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "description": {"_type": "mdDoc", "text": "This option allows you to define multipath groups as described\nin http://christophe.varoqui.free.fr/usage.html.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    wwid = \"360080e500043b35c0123456789abcdef\";\n    alias = 10001234;\n    array = \"bigarray.example.com\";\n    fsType = \"zfs\"; # optional\n    options = \"ro\"; # optional\n  }, ...\n]\n"}, "loc": ["services", "multipath", "pathGroups"], "readOnly": false, "type": "list of (submodule)"}, "services.multipath.pathGroups.*.alias": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "description": {"_type": "mdDoc", "text": "The name of the multipath device"}, "example": {"_type": "literalExpression", "text": "1001234"}, "loc": ["services", "multipath", "pathGroups", "*", "alias"], "readOnly": false, "type": "signed integer"}, "services.multipath.pathGroups.*.array": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The DNS name of the storage array"}, "example": {"_type": "literalExpression", "text": "\"bigarray.example.com\""}, "loc": ["services", "multipath", "pathGroups", "*", "array"], "readOnly": false, "type": "string"}, "services.multipath.pathGroups.*.fsType": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Type of the filesystem"}, "example": {"_type": "literalExpression", "text": "\"zfs\""}, "loc": ["services", "multipath", "pathGroups", "*", "fsType"], "readOnly": false, "type": "null or string"}, "services.multipath.pathGroups.*.options": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Options used to mount the file system"}, "example": {"_type": "literalExpression", "text": "\"ro\""}, "loc": ["services", "multipath", "pathGroups", "*", "options"], "readOnly": false, "type": "null or string"}, "services.multipath.pathGroups.*.wwid": {"declarations": ["nixos/modules/services/networking/multipath.nix"], "description": {"_type": "mdDoc", "text": "The identifier for the multipath device"}, "example": {"_type": "literalExpression", "text": "\"360080e500043b35c0123456789abcdef\""}, "loc": ["services", "multipath", "pathGroups", "*", "wwid"], "readOnly": false, "type": "string (with check: hexadecimal string)"}, "services.munge.enable": {"declarations": ["nixos/modules/services/security/munge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable munge service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "munge", "enable"], "readOnly": false, "type": "boolean"}, "services.munge.password": {"declarations": ["nixos/modules/services/security/munge.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/munge/munge.key\""}, "description": {"_type": "mdDoc", "text": "The path to a daemon's secret key.\n"}, "loc": ["services", "munge", "password"], "readOnly": false, "type": "path"}, "services.munin-cron.enable": {"declarations": ["nixos/modules/services/monitoring/munin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable munin-cron. Takes care of all heavy lifting to collect data from\nnodes and draws graphs to html. Runs munin-update, munin-limits,\nmunin-graphs and munin-html in that order.\n\nHTML output is in {file}`/var/www/munin/`, configure your\nfavourite webserver to serve static files.\n"}, "loc": ["services", "munin-cron", "enable"], "readOnly": false, "type": "boolean"}, "services.munin-cron.extraCSS": {"declarations": ["nixos/modules/services/monitoring/munin.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Custom styling for the HTML that munin-cron generates. This will be\nappended to the CSS files used by munin-cron and will thus take\nprecedence over the builtin styles.\n"}, "example": {"_type": "literalExpression", "text": "''\n  /* A simple dark theme. */\n  html, body { background: #222222; }\n  #header, #footer { background: #333333; }\n  img.i, img.iwarn, img.icrit, img.iunkn {\n    filter: invert(100%) hue-rotate(-30deg);\n  }\n''"}, "loc": ["services", "munin-cron", "extraCSS"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.munin-cron.extraGlobalConfig": {"declarations": ["nixos/modules/services/monitoring/munin.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "{file}`munin.conf` extra global configuration.\nSee <http://guide.munin-monitoring.org/en/latest/reference/munin.conf.html>.\nUseful to setup notifications, see\n<http://guide.munin-monitoring.org/en/latest/tutorial/alert.html>\n"}, "example": {"_type": "literalExpression", "text": "''\n  contact.email.command mail -s \"Munin notification for ''${var:host}\" someone@example.com\n''"}, "loc": ["services", "munin-cron", "extraGlobalConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.munin-cron.hosts": {"declarations": ["nixos/modules/services/monitoring/munin.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Definitions of hosts of nodes to collect data from. Needs at least one\nhost for cron to succeed. See\n<http://guide.munin-monitoring.org/en/latest/reference/munin.conf.html>\n"}, "example": {"_type": "literalExpression", "text": "''\n  [${config.networking.hostName}]\n  address localhost\n''\n"}, "loc": ["services", "munin-cron", "hosts"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.munin-node.disabledPlugins": {"declarations": ["nixos/modules/services/monitoring/munin.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"munin_stats\"\n]"}, "description": {"_type": "mdDoc", "text": "Munin plugins to disable, even if\n`munin-node-configure --suggest` tries to enable\nthem. To disable a wildcard plugin, use an actual wildcard, as in\nthe example.\n\nmunin_stats is disabled by default as it tries to read\n`/var/log/munin/munin-update.log` for timing\ninformation, and the NixOS build of Munin does not write this file.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"diskstats\"\n  \"zfs_usage_*\"\n]"}, "loc": ["services", "munin-node", "disabledPlugins"], "readOnly": false, "type": "list of string"}, "services.munin-node.enable": {"declarations": ["nixos/modules/services/monitoring/munin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Munin Node agent. Munin node listens on 0.0.0.0 and\nby default accepts connections only from 127.0.0.1 for security reasons.\n\nSee <http://guide.munin-monitoring.org/en/latest/architecture/index.html>.\n"}, "loc": ["services", "munin-node", "enable"], "readOnly": false, "type": "boolean"}, "services.munin-node.extraAutoPlugins": {"declarations": ["nixos/modules/services/monitoring/munin.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional Munin plugins to autoconfigure, using\n`munin-node-configure --suggest`. These should be\nthe actual paths to the plugin files (or directories containing them),\nnot just their names.\n\nIf you want to manually enable individual plugins instead, use\n{option}`services.munin-node.extraPlugins`.\n\nNote that only plugins that have the 'autoconfig' capability will do\nanything if listed here, since plugins that cannot autoconfigure\nwon't be automatically enabled by\n`munin-node-configure`.\n\nPlugins will be copied into the Nix store, and it will attempt to\nmodify them to run properly by fixing hardcoded references to\n`/bin`, `/usr/bin`,\n`/sbin`, and `/usr/sbin`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  /src/munin-contrib/plugins/zfs\n  /src/munin-contrib/plugins/ssh\n];\n"}, "loc": ["services", "munin-node", "extraAutoPlugins"], "readOnly": false, "type": "list of path"}, "services.munin-node.extraConfig": {"declarations": ["nixos/modules/services/monitoring/munin.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "{file}`munin-node.conf` extra configuration. See\n<http://guide.munin-monitoring.org/en/latest/reference/munin-node.conf.html>\n"}, "loc": ["services", "munin-node", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.munin-node.extraPluginConfig": {"declarations": ["nixos/modules/services/monitoring/munin.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "{file}`plugin-conf.d` extra plugin configuration. See\n<http://guide.munin-monitoring.org/en/latest/plugin/use.html>\n"}, "example": {"_type": "literalExpression", "text": "''\n  [fail2ban_*]\n  user root\n''"}, "loc": ["services", "munin-node", "extraPluginConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.munin-node.extraPlugins": {"declarations": ["nixos/modules/services/monitoring/munin.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional Munin plugins to activate. Keys are the name of the plugin\nsymlink, values are the path to the underlying plugin script. You\ncan use the same plugin script multiple times (e.g. for wildcard\nplugins).\n\nNote that these plugins do not participate in autoconfiguration. If\nyou want to autoconfigure additional plugins, use\n{option}`services.munin-node.extraAutoPlugins`.\n\nPlugins enabled in this manner take precedence over autoconfigured\nplugins.\n\nPlugins will be copied into the Nix store, and it will attempt to\nmodify them to run properly by fixing hardcoded references to\n`/bin`, `/usr/bin`,\n`/sbin`, and `/usr/sbin`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  zfs_usage_bigpool = /src/munin-contrib/plugins/zfs/zfs_usage_;\n  zfs_usage_smallpool = /src/munin-contrib/plugins/zfs/zfs_usage_;\n  zfs_list = /src/munin-contrib/plugins/zfs/zfs_list;\n};\n"}, "loc": ["services", "munin-node", "extraPlugins"], "readOnly": false, "type": "attribute set of path"}, "services.murmur.allowHtml": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow HTML in client messages, comments, and channel\ndescriptions.\n"}, "loc": ["services", "murmur", "allowHtml"], "readOnly": false, "type": "boolean"}, "services.murmur.autobanAttempts": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Number of attempts a client is allowed to make in\n`autobanTimeframe` seconds, before being\nbanned for `autobanTime`.\n"}, "loc": ["services", "murmur", "autobanAttempts"], "readOnly": false, "type": "signed integer"}, "services.murmur.autobanTime": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "300"}, "description": {"_type": "mdDoc", "text": "The amount of time an IP ban lasts (in seconds)."}, "loc": ["services", "murmur", "autobanTime"], "readOnly": false, "type": "signed integer"}, "services.murmur.autobanTimeframe": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "120"}, "description": {"_type": "mdDoc", "text": "Timeframe in which a client can connect without being banned\nfor repeated attempts (in seconds).\n"}, "loc": ["services", "murmur", "autobanTimeframe"], "readOnly": false, "type": "signed integer"}, "services.murmur.bandwidth": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "72000"}, "description": {"_type": "mdDoc", "text": "Maximum bandwidth (in bits per second) that clients may send\nspeech at.\n"}, "loc": ["services", "murmur", "bandwidth"], "readOnly": false, "type": "signed integer"}, "services.murmur.bonjour": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Bonjour auto-discovery, which allows clients over\nyour LAN to automatically discover Murmur servers.\n"}, "loc": ["services", "murmur", "bonjour"], "readOnly": false, "type": "boolean"}, "services.murmur.clientCertRequired": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Require clients to authenticate via certificates."}, "loc": ["services", "murmur", "clientCertRequired"], "readOnly": false, "type": "boolean"}, "services.murmur.dbus": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Enable D-Bus remote control. Set to the bus you want Murmur to connect to."}, "loc": ["services", "murmur", "dbus"], "readOnly": false, "type": "one of <null>, \"session\", \"system\""}, "services.murmur.enable": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, start the Murmur Mumble server."}, "loc": ["services", "murmur", "enable"], "readOnly": false, "type": "boolean"}, "services.murmur.environmentFile": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file as defined in {manpage}`systemd.exec(5)`.\n\nSecrets may be passed to the service without adding them to the world-readable\nNix store, by specifying placeholder variables as the option value in Nix and\nsetting these variables accordingly in the environment file.\n\n```\n  # snippet of murmur-related config\n  services.murmur.password = \"$MURMURD_PASSWORD\";\n```\n\n```\n  # content of the environment file\n  MURMURD_PASSWORD=verysecretpassword\n```\n\nNote that this file needs to be available on the host on which\n`murmur` is running.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/murmur/murmurd.env\""}, "loc": ["services", "murmur", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.murmur.extraConfig": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to put into murmur.ini."}, "loc": ["services", "murmur", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.murmur.hostName": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Host to bind to. Defaults binding on all addresses."}, "loc": ["services", "murmur", "hostName"], "readOnly": false, "type": "string"}, "services.murmur.imgMsgLength": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "131072"}, "description": {"_type": "mdDoc", "text": "Max length of image messages. Set 0 for no limit."}, "loc": ["services", "murmur", "imgMsgLength"], "readOnly": false, "type": "signed integer"}, "services.murmur.logDays": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "31"}, "description": {"_type": "mdDoc", "text": "How long to store RPC logs for in the database. Set 0 to\nkeep logs forever, or -1 to disable DB logging.\n"}, "loc": ["services", "murmur", "logDays"], "readOnly": false, "type": "signed integer"}, "services.murmur.logFile": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the log file for Murmur daemon. Empty means log to journald."}, "example": {"_type": "literalExpression", "text": "\"/var/log/murmur/murmurd.log\""}, "loc": ["services", "murmur", "logFile"], "readOnly": false, "type": "null or path"}, "services.murmur.openFirewall": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the Murmur Mumble server.\n"}, "loc": ["services", "murmur", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.murmur.package": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "pkgs.murmur"}, "description": {"_type": "mdDoc", "text": "Overridable attribute of the murmur package to use."}, "loc": ["services", "murmur", "package"], "readOnly": false, "type": "package"}, "services.murmur.password": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Required password to join server, if specified."}, "loc": ["services", "murmur", "password"], "readOnly": false, "type": "string"}, "services.murmur.port": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "64738"}, "description": {"_type": "mdDoc", "text": "Ports to bind to (UDP and TCP)."}, "loc": ["services", "murmur", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.murmur.registerHostname": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "DNS hostname where your server can be reached. This is only\nneeded if you want your server to be accessed by its\nhostname and not IP - but the name *must* resolve on the\ninternet properly.\n"}, "loc": ["services", "murmur", "registerHostname"], "readOnly": false, "type": "string"}, "services.murmur.registerName": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Public server registration name, and also the name of the\nRoot channel. Even if you don't publicly register your\nserver, you probably still want to set this.\n"}, "loc": ["services", "murmur", "registerName"], "readOnly": false, "type": "string"}, "services.murmur.registerPassword": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Public server registry password, used authenticate your\nserver to the registry to prevent impersonation; required for\nsubsequent registry updates.\n"}, "loc": ["services", "murmur", "registerPassword"], "readOnly": false, "type": "string"}, "services.murmur.registerUrl": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "URL website for your server."}, "loc": ["services", "murmur", "registerUrl"], "readOnly": false, "type": "string"}, "services.murmur.sendVersion": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Send Murmur version in UDP response."}, "loc": ["services", "murmur", "sendVersion"], "readOnly": false, "type": "boolean"}, "services.murmur.sslCa": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Path to your SSL CA certificate."}, "loc": ["services", "murmur", "sslCa"], "readOnly": false, "type": "string"}, "services.murmur.sslCert": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Path to your SSL certificate."}, "loc": ["services", "murmur", "sslCert"], "readOnly": false, "type": "string"}, "services.murmur.sslKey": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Path to your SSL key."}, "loc": ["services", "murmur", "sslKey"], "readOnly": false, "type": "string"}, "services.murmur.textMsgLength": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Max length of text messages. Set 0 for no limit."}, "loc": ["services", "murmur", "textMsgLength"], "readOnly": false, "type": "signed integer"}, "services.murmur.users": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "100"}, "description": {"_type": "mdDoc", "text": "Maximum number of concurrent clients allowed."}, "loc": ["services", "murmur", "users"], "readOnly": false, "type": "signed integer"}, "services.murmur.welcometext": {"declarations": ["nixos/modules/services/networking/murmur.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Welcome message for connected clients."}, "loc": ["services", "murmur", "welcometext"], "readOnly": false, "type": "string"}, "services.mx-puppet-discord.enable": {"declarations": ["nixos/modules/services/matrix/mx-puppet-discord.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable mx-puppet-discord is a discord puppeting bridge for matrix.\nIt handles bridging private and group DMs, as well as Guilds (servers)\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mx-puppet-discord", "enable"], "readOnly": false, "type": "boolean"}, "services.mx-puppet-discord.serviceDependencies": {"declarations": ["nixos/modules/services/matrix/mx-puppet-discord.nix"], "default": {"_type": "literalExpression", "text": "optional config.services.matrix-synapse.enable \"matrix-synapse.service\"\n"}, "description": {"_type": "mdDoc", "text": "List of Systemd services to require and wait for when starting the application service.\n"}, "loc": ["services", "mx-puppet-discord", "serviceDependencies"], "readOnly": false, "type": "list of string"}, "services.mx-puppet-discord.settings": {"declarations": ["nixos/modules/services/matrix/mx-puppet-discord.nix"], "default": {"_type": "literalExpression", "text": "{\n  bridge = {\n    port = 8434;\n  };\n  database = {\n    filename = \"/var/lib/mx-puppet-discord/database.db\";\n  };\n  logging = {\n    console = \"info\";\n    lineDateFormat = \"MMM-D HH:mm:ss.SSS\";\n  };\n  namePatterns = {\n    group = \":name\";\n    room = \":name\";\n    user = \":name\";\n    userOverride = \":displayname\";\n  };\n  presence = {\n    enabled = true;\n    interval = 500;\n  };\n  provisioning = {\n    whitelist = [ ];\n  };\n  relay = {\n    whitelist = [ ];\n  };\n}"}, "description": {"_type": "mdDoc", "text": "{file}`config.yaml` configuration as a Nix attribute set.\nConfiguration options should match those described in\n[\nsample.config.yaml](https://github.com/matrix-discord/mx-puppet-discord/blob/master/sample.config.yaml).\n"}, "example": {"_type": "literalExpression", "text": "{\n  bridge = {\n    bindAddress = \"localhost\";\n    domain = \"example.com\";\n    homeserverUrl = \"https://example.com\";\n  };\n\n  provisioning.whitelist = [ \"@admin:example.com\" ];\n  relay.whitelist = [ \"@.*:example.com\" ];\n}\n"}, "loc": ["services", "mx-puppet-discord", "settings"], "readOnly": false, "type": "JSON value"}, "services.mxisd.dataDir": {"declarations": ["nixos/modules/services/networking/mxisd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/mxisd\""}, "description": {"_type": "mdDoc", "text": "Where data mxisd/ma1sd uses resides"}, "loc": ["services", "mxisd", "dataDir"], "readOnly": false, "type": "string"}, "services.mxisd.enable": {"declarations": ["nixos/modules/services/networking/mxisd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable matrix federated identity server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mxisd", "enable"], "readOnly": false, "type": "boolean"}, "services.mxisd.environmentFile": {"declarations": ["nixos/modules/services/networking/mxisd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to an environment-file which may contain secrets to be\nsubstituted via `envsubst`.\n"}, "loc": ["services", "mxisd", "environmentFile"], "readOnly": false, "type": "null or string"}, "services.mxisd.extraConfig": {"declarations": ["nixos/modules/services/networking/mxisd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra options merged into the mxisd/ma1sd configuration"}, "loc": ["services", "mxisd", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.mxisd.matrix.domain": {"declarations": ["nixos/modules/services/networking/mxisd.nix"], "description": {"_type": "mdDoc", "text": "the domain of the matrix homeserver\n"}, "loc": ["services", "mxisd", "matrix", "domain"], "readOnly": false, "type": "string"}, "services.mxisd.package": {"declarations": ["nixos/modules/services/networking/mxisd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ma1sd"}, "description": {"_type": "mdDoc", "text": "The mxisd/ma1sd package to use"}, "loc": ["services", "mxisd", "package"], "readOnly": false, "type": "package"}, "services.mxisd.server.name": {"declarations": ["nixos/modules/services/networking/mxisd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Public hostname of mxisd/ma1sd, if different from the Matrix domain.\n"}, "loc": ["services", "mxisd", "server", "name"], "readOnly": false, "type": "null or string"}, "services.mxisd.server.port": {"declarations": ["nixos/modules/services/networking/mxisd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP port to listen on (unencrypted)\n"}, "loc": ["services", "mxisd", "server", "port"], "readOnly": false, "type": "null or signed integer"}, "services.mysql.configFile": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "''\n  A configuration file automatically generated by NixOS.\n''"}, "description": {"_type": "mdDoc", "text": "Override the configuration file used by MySQL. By default,\nNixOS generates one automatically from {option}`services.mysql.settings`.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.writeText \"my.cnf\" ''\n  [mysqld]\n  datadir = /var/lib/mysql\n  bind-address = 127.0.0.1\n  port = 3336\n\n  !includedir /etc/mysql/conf.d/\n'';\n"}, "loc": ["services", "mysql", "configFile"], "readOnly": false, "type": "path"}, "services.mysql.dataDir": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "description": {"_type": "mdDoc", "text": "The data directory for MySQL.\n\n::: {.note}\nIf left as the default value of `/var/lib/mysql` this directory will automatically be created before the MySQL\nserver starts, otherwise you are responsible for ensuring the directory exists with appropriate ownership and permissions.\n:::\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/mysql\""}, "loc": ["services", "mysql", "dataDir"], "readOnly": false, "type": "path"}, "services.mysql.enable": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable MySQL server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mysql", "enable"], "readOnly": false, "type": "boolean"}, "services.mysql.ensureDatabases": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Ensures that the specified databases exist.\nThis option will never delete existing databases, especially not when the value of this\noption is changed. This means that databases created once through this option or\notherwise have to be removed manually.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"nextcloud\"\n  \"matomo\"\n]"}, "loc": ["services", "mysql", "ensureDatabases"], "readOnly": false, "type": "list of string"}, "services.mysql.ensureUsers": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Ensures that the specified users exist and have at least the ensured permissions.\nThe MySQL users will be identified using Unix socket authentication. This authenticates the Unix user with the\nsame name only, and that without the need for a password.\nThis option will never delete existing users or remove permissions, especially not when the value of this\noption is changed. This means that users created and permissions assigned once through this option or\notherwise have to be removed manually.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    name = \"nextcloud\";\n    ensurePermissions = {\n      \"nextcloud.*\" = \"ALL PRIVILEGES\";\n    };\n  }\n  {\n    name = \"backup\";\n    ensurePermissions = {\n      \"*.*\" = \"SELECT, LOCK TABLES\";\n    };\n  }\n]\n"}, "loc": ["services", "mysql", "ensureUsers"], "readOnly": false, "type": "list of (submodule)"}, "services.mysql.ensureUsers.*.ensurePermissions": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Permissions to ensure for the user, specified as attribute set.\nThe attribute names specify the database and tables to grant the permissions for,\nseparated by a dot. You may use wildcards here.\nThe attribute values specfiy the permissions to grant.\nYou may specify one or multiple comma-separated SQL privileges here.\n\nFor more information on how to specify the target\nand on which privileges exist, see the\n[GRANT syntax](https://mariadb.com/kb/en/library/grant/).\nThe attributes are used as `GRANT ${attrName} ON ${attrValue}`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"database.*\" = \"ALL PRIVILEGES\";\n  \"*.*\" = \"SELECT, LOCK TABLES\";\n}\n"}, "loc": ["services", "mysql", "ensureUsers", "*", "ensurePermissions"], "readOnly": false, "type": "attribute set of string"}, "services.mysql.ensureUsers.*.name": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "description": {"_type": "mdDoc", "text": "Name of the user to ensure.\n"}, "loc": ["services", "mysql", "ensureUsers", "*", "name"], "readOnly": false, "type": "string"}, "services.mysql.group": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "\"mysql\""}, "description": {"_type": "mdDoc", "text": "Group account under which MySQL runs.\n\n::: {.note}\nIf left as the default value this group will automatically be created\non system activation, otherwise you are responsible for\nensuring the user exists before the MySQL service starts.\n:::\n"}, "loc": ["services", "mysql", "group"], "readOnly": false, "type": "string"}, "services.mysql.initialDatabases": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of database names and their initial schemas that should be used to create databases on the first startup\nof MySQL. The schema attribute is optional: If not specified, an empty database is created.\n"}, "example": {"_type": "literalExpression", "text": "[\n  { name = \"foodatabase\"; schema = ./foodatabase.sql; }\n  { name = \"bardatabase\"; }\n]\n"}, "loc": ["services", "mysql", "initialDatabases"], "readOnly": false, "type": "list of (submodule)"}, "services.mysql.initialDatabases.*.name": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "description": {"_type": "mdDoc", "text": "The name of the database to create.\n"}, "loc": ["services", "mysql", "initialDatabases", "*", "name"], "readOnly": false, "type": "string"}, "services.mysql.initialDatabases.*.schema": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The initial schema of the database; if null (the default),\nan empty database is created.\n"}, "loc": ["services", "mysql", "initialDatabases", "*", "schema"], "readOnly": false, "type": "null or path"}, "services.mysql.initialScript": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing SQL statements to be executed on the first startup. Can be used for granting certain permissions on the database."}, "loc": ["services", "mysql", "initialScript"], "readOnly": false, "type": "null or path"}, "services.mysql.package": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "description": {"_type": "mdDoc", "text": "Which MySQL derivation to use. MariaDB packages are supported too.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.mariadb"}, "loc": ["services", "mysql", "package"], "readOnly": false, "type": "package"}, "services.mysql.replication.masterHost": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "description": {"_type": "mdDoc", "text": "Hostname of the MySQL master server."}, "loc": ["services", "mysql", "replication", "masterHost"], "readOnly": false, "type": "string"}, "services.mysql.replication.masterPassword": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "description": {"_type": "mdDoc", "text": "Password of the MySQL replication user."}, "loc": ["services", "mysql", "replication", "masterPassword"], "readOnly": false, "type": "string"}, "services.mysql.replication.masterPort": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "3306"}, "description": {"_type": "mdDoc", "text": "Port number on which the MySQL master server runs."}, "loc": ["services", "mysql", "replication", "masterPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.mysql.replication.masterUser": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "description": {"_type": "mdDoc", "text": "Username of the MySQL replication user."}, "loc": ["services", "mysql", "replication", "masterUser"], "readOnly": false, "type": "string"}, "services.mysql.replication.role": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "\"none\""}, "description": {"_type": "mdDoc", "text": "Role of the MySQL server instance."}, "loc": ["services", "mysql", "replication", "role"], "readOnly": false, "type": "one of \"master\", \"slave\", \"none\""}, "services.mysql.replication.serverId": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Id of the MySQL server instance. This number must be unique for each instance."}, "loc": ["services", "mysql", "replication", "serverId"], "readOnly": false, "type": "signed integer"}, "services.mysql.replication.slaveHost": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "description": {"_type": "mdDoc", "text": "Hostname of the MySQL slave server."}, "loc": ["services", "mysql", "replication", "slaveHost"], "readOnly": false, "type": "string"}, "services.mysql.settings": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "MySQL configuration. Refer to\n<https://dev.mysql.com/doc/refman/5.7/en/server-system-variables.html>,\n<https://dev.mysql.com/doc/refman/8.0/en/server-system-variables.html>,\nand <https://mariadb.com/kb/en/server-system-variables/>\nfor details on supported values.\n\n::: {.note}\nMySQL configuration options such as `--quick` should be treated as\nboolean options and provided values such as `true`, `false`,\n`1`, or `0`. See the provided example below.\n:::\n"}, "example": {"_type": "literalExpression", "text": "{\n  mysqld = {\n    key_buffer_size = \"6G\";\n    table_cache = 1600;\n    log-error = \"/var/log/mysql_err.log\";\n    plugin-load-add = [ \"server_audit\" \"ed25519=auth_ed25519\" ];\n  };\n  mysqldump = {\n    quick = true;\n    max_allowed_packet = \"16M\";\n  };\n}\n"}, "loc": ["services", "mysql", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string) or a list of them for duplicate keys)"}, "services.mysql.user": {"declarations": ["nixos/modules/services/databases/mysql.nix"], "default": {"_type": "literalExpression", "text": "\"mysql\""}, "description": {"_type": "mdDoc", "text": "User account under which MySQL runs.\n\n::: {.note}\nIf left as the default value this user will automatically be created\non system activation, otherwise you are responsible for\nensuring the user exists before the MySQL service starts.\n:::\n"}, "loc": ["services", "mysql", "user"], "readOnly": false, "type": "string"}, "services.mysqlBackup.calendar": {"declarations": ["nixos/modules/services/backup/mysql-backup.nix"], "default": {"_type": "literalExpression", "text": "\"01:15:00\""}, "description": {"_type": "mdDoc", "text": "Configured when to run the backup service systemd unit (DayOfWeek Year-Month-Day Hour:Minute:Second).\n"}, "loc": ["services", "mysqlBackup", "calendar"], "readOnly": false, "type": "string"}, "services.mysqlBackup.databases": {"declarations": ["nixos/modules/services/backup/mysql-backup.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of database names to dump.\n"}, "loc": ["services", "mysqlBackup", "databases"], "readOnly": false, "type": "list of string"}, "services.mysqlBackup.enable": {"declarations": ["nixos/modules/services/backup/mysql-backup.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable MySQL backups."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "mysqlBackup", "enable"], "readOnly": false, "type": "boolean"}, "services.mysqlBackup.location": {"declarations": ["nixos/modules/services/backup/mysql-backup.nix"], "default": {"_type": "literalExpression", "text": "\"/var/backup/mysql\""}, "description": {"_type": "mdDoc", "text": "Location to put the gzipped MySQL database dumps.\n"}, "loc": ["services", "mysqlBackup", "location"], "readOnly": false, "type": "path"}, "services.mysqlBackup.singleTransaction": {"declarations": ["nixos/modules/services/backup/mysql-backup.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to create database dump in a single transaction\n"}, "loc": ["services", "mysqlBackup", "singleTransaction"], "readOnly": false, "type": "boolean"}, "services.mysqlBackup.user": {"declarations": ["nixos/modules/services/backup/mysql-backup.nix"], "default": {"_type": "literalExpression", "text": "\"mysqlbackup\""}, "description": {"_type": "mdDoc", "text": "User to be used to perform backup.\n"}, "loc": ["services", "mysqlBackup", "user"], "readOnly": false, "type": "string"}, "services.n8n.enable": {"declarations": ["nixos/modules/services/misc/n8n.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable n8n server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "n8n", "enable"], "readOnly": false, "type": "boolean"}, "services.n8n.openFirewall": {"declarations": ["nixos/modules/services/misc/n8n.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the n8n web interface."}, "loc": ["services", "n8n", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.n8n.settings": {"declarations": ["nixos/modules/services/misc/n8n.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for n8n, see <https://docs.n8n.io/hosting/environment-variables/configuration-methods/>\nfor supported values.\n"}, "loc": ["services", "n8n", "settings"], "readOnly": false, "type": "JSON value"}, "services.nagios.cgiConfigFile": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "nagiosCGICfgFile"}, "description": {"_type": "mdDoc", "text": "Derivation for the configuration file of Nagios CGI scripts\nthat can be used in web servers for running the Nagios web interface.\n"}, "loc": ["services", "nagios", "cgiConfigFile"], "readOnly": false, "type": "package"}, "services.nagios.enable": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable [Nagios](http://www.nagios.org/) to monitor your system or network.."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nagios", "enable"], "readOnly": false, "type": "boolean"}, "services.nagios.enableWebInterface": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Nagios web interface.  You should also\nenable Apache ({option}`services.httpd.enable`).\n"}, "loc": ["services", "nagios", "enableWebInterface"], "readOnly": false, "type": "boolean"}, "services.nagios.extraConfig": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration to add to /etc/nagios.cfg"}, "example": {"_type": "literalExpression", "text": "{\n  debug_file = \"/var/log/nagios/debug.log\";\n  debug_level = \"-1\";\n}"}, "loc": ["services", "nagios", "extraConfig"], "readOnly": false, "type": "attribute set of string"}, "services.nagios.mainConfigFile": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If non-null, overrides the main configuration file of Nagios.\n"}, "loc": ["services", "nagios", "mainConfigFile"], "readOnly": false, "type": "null or package"}, "services.nagios.objectDefs": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "description": {"_type": "mdDoc", "text": "A list of Nagios object configuration files that must define\nthe hosts, host groups, services and contacts for the\nnetwork that you want Nagios to monitor.\n"}, "example": {"_type": "literalExpression", "text": "[ ./objects.cfg ]"}, "loc": ["services", "nagios", "objectDefs"], "readOnly": false, "type": "list of path"}, "services.nagios.plugins": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "[pkgs.monitoring-plugins pkgs.msmtp pkgs.mailutils]"}, "description": {"_type": "mdDoc", "text": "Packages to be added to the Nagios {env}`PATH`.\nTypically used to add plugins, but can be anything.\n"}, "loc": ["services", "nagios", "plugins"], "readOnly": false, "type": "list of package"}, "services.nagios.validateConfig": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "pkgs.stdenv.hostPlatform == pkgs.stdenv.buildPlatform"}, "description": {"_type": "mdDoc", "text": "if true, the syntax of the nagios configuration file is checked at build time"}, "loc": ["services", "nagios", "validateConfig"], "readOnly": false, "type": "boolean"}, "services.nagios.virtualHost": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "description": {"_type": "mdDoc", "text": "Apache configuration can be done by adapting {option}`services.httpd.virtualHosts`.\nSee [](#opt-services.httpd.virtualHosts) for further information.\n"}, "example": {"_type": "literalExpression", "text": "{ hostName = \"example.org\";\n  adminAddr = \"webmaster@example.org\";\n  enableSSL = true;\n  sslServerCert = \"/var/lib/acme/example.org/full.pem\";\n  sslServerKey = \"/var/lib/acme/example.org/key.pem\";\n}\n"}, "loc": ["services", "nagios", "virtualHost"], "readOnly": false, "type": "submodule"}, "services.nagios.virtualHost.acmeRoot": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the acme challenge which is PUBLIC, don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "nagios", "virtualHost", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.nagios.virtualHost.addSSL": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "nagios", "virtualHost", "addSSL"], "readOnly": false, "type": "boolean"}, "services.nagios.virtualHost.adminAddr": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "E-mail address of the server administrator."}, "example": {"_type": "literalExpression", "text": "\"admin@example.org\""}, "loc": ["services", "nagios", "virtualHost", "adminAddr"], "readOnly": false, "type": "null or string"}, "services.nagios.virtualHost.documentRoot": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of Apache's document root directory.  If left undefined,\nan empty directory in the Nix store will be used as root.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "nagios", "virtualHost", "documentRoot"], "readOnly": false, "type": "null or path"}, "services.nagios.virtualHost.enableACME": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "nagios", "virtualHost", "enableACME"], "readOnly": false, "type": "boolean"}, "services.nagios.virtualHost.enableUserDir": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable serving {file}`~/public_html` as\n`/~\u00abusername\u00bb`.\n"}, "loc": ["services", "nagios", "virtualHost", "enableUserDir"], "readOnly": false, "type": "boolean"}, "services.nagios.virtualHost.extraConfig": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to httpd.conf verbatim. They will go after\ndirectories and directory aliases defined by default.\n"}, "example": {"_type": "literalExpression", "text": "''\n  <Directory /home>\n    Options FollowSymlinks\n    AllowOverride All\n  </Directory>\n''"}, "loc": ["services", "nagios", "virtualHost", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nagios.virtualHost.forceSSL": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "nagios", "virtualHost", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.nagios.virtualHost.globalRedirect": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given URL.\n"}, "example": {"_type": "literalExpression", "text": "\"http://newserver.example.org/\""}, "loc": ["services", "nagios", "virtualHost", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.nagios.virtualHost.hostName": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Canonical hostname for the server."}, "loc": ["services", "nagios", "virtualHost", "hostName"], "readOnly": false, "type": "string"}, "services.nagios.virtualHost.http2": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTP 2. HTTP/2 is supported in all multi-processing modules that come with httpd. *However, if you use the prefork mpm, there will\nbe severe restrictions.* Refer to <https://httpd.apache.org/docs/2.4/howto/http2.html#mpm-config> for details.\n"}, "loc": ["services", "nagios", "virtualHost", "http2"], "readOnly": false, "type": "boolean"}, "services.nagios.virtualHost.listen": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\n\n::: {.note}\nThis option overrides `addSSL`, `forceSSL` and `onlySSL`.\n\nIf you only want to set the addresses manually and not the ports, take a look at `listenAddresses`.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    ip = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    ip = \"192.154.1.1\";\n    port = 80;\n  }\n  {\n    ip = \"*\";\n    port = 8080;\n  }\n]"}, "loc": ["services", "nagios", "virtualHost", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.nagios.virtualHost.listen.*.ip": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "\"*\""}, "description": {"_type": "mdDoc", "text": "IP to listen on. 0.0.0.0 for IPv4 only, * for all."}, "loc": ["services", "nagios", "virtualHost", "listen", "*", "ip"], "readOnly": false, "type": "string"}, "services.nagios.virtualHost.listen.*.port": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "description": {"_type": "mdDoc", "text": "Port to listen on"}, "loc": ["services", "nagios", "virtualHost", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nagios.virtualHost.listen.*.ssl": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SSL (https) support."}, "loc": ["services", "nagios", "virtualHost", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.nagios.virtualHost.listenAddresses": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*\"\n]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "loc": ["services", "nagios", "virtualHost", "listenAddresses"], "readOnly": false, "type": "non-empty (list of string)"}, "services.nagios.virtualHost.locations": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config. See <https://httpd.apache.org/docs/2.4/mod/core.html#location> for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n  \"/foo/bar.png\" = {\n    alias = \"/home/eelco/some-file.png\";\n  };\n};\n"}, "loc": ["services", "nagios", "virtualHost", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.nagios.virtualHost.locations.<name>.alias": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests. See <https://httpd.apache.org/docs/2.4/mod/mod_alias.html#alias>.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "nagios", "virtualHost", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.nagios.virtualHost.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "nagios", "virtualHost", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nagios.virtualHost.locations.<name>.index": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds DirectoryIndex directive. See <https://httpd.apache.org/docs/2.4/mod/mod_dir.html#directoryindex>.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "nagios", "virtualHost", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.nagios.virtualHost.locations.<name>.priority": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "nagios", "virtualHost", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.nagios.virtualHost.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets up a simple reverse proxy as described by <https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple>.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "nagios", "virtualHost", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.nagios.virtualHost.logFormat": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "\"common\""}, "description": {"_type": "mdDoc", "text": "Log format for Apache's log files. Possible values are: combined, common, referer, agent.\n"}, "example": {"_type": "literalExpression", "text": "\"combined\""}, "loc": ["services", "nagios", "virtualHost", "logFormat"], "readOnly": false, "type": "string"}, "services.nagios.virtualHost.onlySSL": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "nagios", "virtualHost", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.nagios.virtualHost.robotsEntries": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Specification of pages to be ignored by web crawlers. See <http://www.robotstxt.org/> for details.\n"}, "example": {"_type": "literalExpression", "text": "\"Disallow: /foo/\""}, "loc": ["services", "nagios", "virtualHost", "robotsEntries"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nagios.virtualHost.servedDirs": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve static directories.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    dir = \"/home/eelco/Dev/nix-homepage\";\n    urlPath = \"/nix\";\n  }\n]"}, "loc": ["services", "nagios", "virtualHost", "servedDirs"], "readOnly": false, "type": "list of (attribute set)"}, "services.nagios.virtualHost.servedFiles": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve individual, static files.\n\n::: {.note}\nThis option has been deprecated and will be removed in a future\nversion of NixOS. You can achieve the same result by making use of\nthe `locations.<name>.alias` option.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    file = \"/home/eelco/some-file.png\";\n    urlPath = \"/foo/bar.png\";\n  }\n]"}, "loc": ["services", "nagios", "virtualHost", "servedFiles"], "readOnly": false, "type": "list of (attribute set)"}, "services.nagios.virtualHost.serverAliases": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"www.example.org:8080\"\n  \"example.org\"\n]"}, "loc": ["services", "nagios", "virtualHost", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.nagios.virtualHost.sslServerCert": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "nagios", "virtualHost", "sslServerCert"], "readOnly": false, "type": "path"}, "services.nagios.virtualHost.sslServerChain": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to server SSL chain file."}, "example": {"_type": "literalExpression", "text": "\"/var/ca.pem\""}, "loc": ["services", "nagios", "virtualHost", "sslServerChain"], "readOnly": false, "type": "null or path"}, "services.nagios.virtualHost.sslServerKey": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "nagios", "virtualHost", "sslServerKey"], "readOnly": false, "type": "path"}, "services.nagios.virtualHost.useACMEHost": {"declarations": ["nixos/modules/services/monitoring/nagios.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "nagios", "virtualHost", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.namecoind.enable": {"declarations": ["nixos/modules/services/networking/namecoind.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable namecoind, Namecoin client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "namecoind", "enable"], "readOnly": false, "type": "boolean"}, "services.namecoind.extraNodes": {"declarations": ["nixos/modules/services/networking/namecoind.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of additional peer IP addresses to connect to.\n"}, "loc": ["services", "namecoind", "extraNodes"], "readOnly": false, "type": "list of string"}, "services.namecoind.generate": {"declarations": ["nixos/modules/services/networking/namecoind.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to generate (mine) Namecoins.\n"}, "loc": ["services", "namecoind", "generate"], "readOnly": false, "type": "boolean"}, "services.namecoind.rpc.address": {"declarations": ["nixos/modules/services/networking/namecoind.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IP address the RPC server will bind to.\n"}, "loc": ["services", "namecoind", "rpc", "address"], "readOnly": false, "type": "string"}, "services.namecoind.rpc.allowFrom": {"declarations": ["nixos/modules/services/networking/namecoind.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "description": {"_type": "mdDoc", "text": "List of IP address ranges allowed to use the RPC API.\nWiledcards (*) can be user to specify a range.\n"}, "loc": ["services", "namecoind", "rpc", "allowFrom"], "readOnly": false, "type": "list of string"}, "services.namecoind.rpc.certificate": {"declarations": ["nixos/modules/services/networking/namecoind.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for securing RPC connections.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/namecoind/server.cert\""}, "loc": ["services", "namecoind", "rpc", "certificate"], "readOnly": false, "type": "null or path"}, "services.namecoind.rpc.key": {"declarations": ["nixos/modules/services/networking/namecoind.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for securing RPC connections.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/namecoind/server.pem\""}, "loc": ["services", "namecoind", "rpc", "key"], "readOnly": false, "type": "null or path"}, "services.namecoind.rpc.password": {"declarations": ["nixos/modules/services/networking/namecoind.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password for RPC connections.\n"}, "loc": ["services", "namecoind", "rpc", "password"], "readOnly": false, "type": "null or string"}, "services.namecoind.rpc.port": {"declarations": ["nixos/modules/services/networking/namecoind.nix"], "default": {"_type": "literalExpression", "text": "8332"}, "description": {"_type": "mdDoc", "text": "Port the RPC server will bind to.\n"}, "loc": ["services", "namecoind", "rpc", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.namecoind.rpc.user": {"declarations": ["nixos/modules/services/networking/namecoind.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "User name for RPC connections.\n"}, "loc": ["services", "namecoind", "rpc", "user"], "readOnly": false, "type": "null or string"}, "services.namecoind.trustedNodes": {"declarations": ["nixos/modules/services/networking/namecoind.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of the only peer IP addresses to connect to. If specified\nno other connection will be made.\n"}, "loc": ["services", "namecoind", "trustedNodes"], "readOnly": false, "type": "list of string"}, "services.namecoind.wallet": {"declarations": ["nixos/modules/services/networking/namecoind.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/namecoind/wallet.dat\""}, "description": {"_type": "mdDoc", "text": "Wallet file. The ownership of the file has to be\nnamecoin:namecoin, and the permissions must be 0640.\n"}, "loc": ["services", "namecoind", "wallet"], "readOnly": false, "type": "path"}, "services.nar-serve.cacheURL": {"declarations": ["nixos/modules/services/networking/nar-serve.nix"], "default": {"_type": "literalExpression", "text": "\"https://cache.nixos.org/\""}, "description": {"_type": "mdDoc", "text": "Binary cache URL to connect to.\n\nThe URL format is compatible with the nix remote url style, such as:\n- http://, https:// for binary caches via HTTP or HTTPS\n- s3:// for binary caches stored in Amazon S3\n- gs:// for binary caches stored in Google Cloud Storage\n"}, "loc": ["services", "nar-serve", "cacheURL"], "readOnly": false, "type": "string"}, "services.nar-serve.enable": {"declarations": ["nixos/modules/services/networking/nar-serve.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Serve NAR file contents via HTTP."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nar-serve", "enable"], "readOnly": false, "type": "boolean"}, "services.nar-serve.port": {"declarations": ["nixos/modules/services/networking/nar-serve.nix"], "default": {"_type": "literalExpression", "text": "8383"}, "description": {"_type": "mdDoc", "text": "Port number where nar-serve will listen on.\n"}, "loc": ["services", "nar-serve", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nats.dataDir": {"declarations": ["nixos/modules/services/networking/nats.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/nats\""}, "description": {"_type": "mdDoc", "text": "The NATS data directory. Only used if JetStream is enabled, for\nstoring stream metadata and messages.\n\nIf left as the default value this directory will automatically be\ncreated before the NATS server starts, otherwise the sysadmin is\nresponsible for ensuring the directory exists with appropriate\nownership and permissions.\n"}, "loc": ["services", "nats", "dataDir"], "readOnly": false, "type": "path"}, "services.nats.enable": {"declarations": ["nixos/modules/services/networking/nats.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable NATS messaging system."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nats", "enable"], "readOnly": false, "type": "boolean"}, "services.nats.group": {"declarations": ["nixos/modules/services/networking/nats.nix"], "default": {"_type": "literalExpression", "text": "\"nats\""}, "description": {"_type": "mdDoc", "text": "Group under which NATS runs."}, "loc": ["services", "nats", "group"], "readOnly": false, "type": "string"}, "services.nats.jetstream": {"declarations": ["nixos/modules/services/networking/nats.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable JetStream."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nats", "jetstream"], "readOnly": false, "type": "boolean"}, "services.nats.port": {"declarations": ["nixos/modules/services/networking/nats.nix"], "default": {"_type": "literalExpression", "text": "4222"}, "description": {"_type": "mdDoc", "text": "Port on which to listen.\n"}, "loc": ["services", "nats", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nats.serverName": {"declarations": ["nixos/modules/services/networking/nats.nix"], "default": {"_type": "literalExpression", "text": "\"nats\""}, "description": {"_type": "mdDoc", "text": "Name of the NATS server, must be unique if clustered.\n"}, "example": {"_type": "literalExpression", "text": "\"n1-c3\""}, "loc": ["services", "nats", "serverName"], "readOnly": false, "type": "string"}, "services.nats.settings": {"declarations": ["nixos/modules/services/networking/nats.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative NATS configuration. See the\n[\nNATS documentation](https://docs.nats.io/nats-server/configuration) for a list of options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  jetstream = {\n    max_mem = \"1G\";\n    max_file = \"10G\";\n  };\n};\n"}, "loc": ["services", "nats", "settings"], "readOnly": false, "type": "JSON value"}, "services.nats.user": {"declarations": ["nixos/modules/services/networking/nats.nix"], "default": {"_type": "literalExpression", "text": "\"nats\""}, "description": {"_type": "mdDoc", "text": "User account under which NATS runs."}, "loc": ["services", "nats", "user"], "readOnly": false, "type": "string"}, "services.navidrome.enable": {"declarations": ["nixos/modules/services/audio/navidrome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Navidrome music server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "navidrome", "enable"], "readOnly": false, "type": "boolean"}, "services.navidrome.package": {"declarations": ["nixos/modules/services/audio/navidrome.nix"], "default": {"_type": "literalExpression", "text": "pkgs.navidrome"}, "description": {"_type": "mdDoc", "text": "The navidrome package to use."}, "loc": ["services", "navidrome", "package"], "readOnly": false, "type": "package"}, "services.navidrome.settings": {"declarations": ["nixos/modules/services/audio/navidrome.nix"], "default": {"_type": "literalExpression", "text": "{\n  Address = \"127.0.0.1\";\n  Port = 4533;\n}"}, "description": {"_type": "mdDoc", "text": "Configuration for Navidrome, see <https://www.navidrome.org/docs/usage/configuration-options/> for supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  MusicFolder = \"/mnt/music\";\n}"}, "loc": ["services", "navidrome", "settings"], "readOnly": false, "type": "JSON value"}, "services.nbd.server.enable": {"declarations": ["nixos/modules/services/networking/nbd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Network Block Device (nbd) server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nbd", "server", "enable"], "readOnly": false, "type": "boolean"}, "services.nbd.server.exports": {"declarations": ["nixos/modules/services/networking/nbd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Files or block devices to make available over the network."}, "loc": ["services", "nbd", "server", "exports"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.nbd.server.exports.<name>.allowAddresses": {"declarations": ["nixos/modules/services/networking/nbd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IPs and subnets that are authorized to connect for this device. If not specified, the server will allow all connections."}, "example": {"_type": "literalExpression", "text": "[\n  \"10.10.0.0/24\"\n  \"127.0.0.1\"\n]"}, "loc": ["services", "nbd", "server", "exports", "<name>", "allowAddresses"], "readOnly": false, "type": "null or (list of string)"}, "services.nbd.server.exports.<name>.extraOptions": {"declarations": ["nixos/modules/services/networking/nbd.nix"], "default": {"_type": "literalExpression", "text": "{\n  flush = true;\n  fua = true;\n}"}, "description": {"_type": "mdDoc", "text": "Extra options for this export. See\n{manpage}`nbd-server(5)`.\n"}, "loc": ["services", "nbd", "server", "exports", "<name>", "extraOptions"], "readOnly": false, "type": "attribute set of (boolean or signed integer or floating point number or string)"}, "services.nbd.server.exports.<name>.path": {"declarations": ["nixos/modules/services/networking/nbd.nix"], "description": {"_type": "mdDoc", "text": "File or block device to export."}, "example": {"_type": "literalExpression", "text": "\"/dev/sdb1\""}, "loc": ["services", "nbd", "server", "exports", "<name>", "path"], "readOnly": false, "type": "string"}, "services.nbd.server.extraOptions": {"declarations": ["nixos/modules/services/networking/nbd.nix"], "default": {"_type": "literalExpression", "text": "{\n  allowlist = false;\n}"}, "description": {"_type": "mdDoc", "text": "Extra options for the server. See\n{manpage}`nbd-server(5)`.\n"}, "loc": ["services", "nbd", "server", "extraOptions"], "readOnly": false, "type": "attribute set of (boolean or signed integer or floating point number or string)"}, "services.nbd.server.listenAddress": {"declarations": ["nixos/modules/services/networking/nbd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to listen on. If not specified, the server will listen on all interfaces."}, "example": {"_type": "literalExpression", "text": "\"10.10.0.1\""}, "loc": ["services", "nbd", "server", "listenAddress"], "readOnly": false, "type": "null or string"}, "services.nbd.server.listenPort": {"declarations": ["nixos/modules/services/networking/nbd.nix"], "default": {"_type": "literalExpression", "text": "10809"}, "description": {"_type": "mdDoc", "text": "Port to listen on. The port is NOT automatically opened in the firewall."}, "loc": ["services", "nbd", "server", "listenPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.ncdns.address": {"declarations": ["nixos/modules/services/networking/ncdns.nix"], "default": {"_type": "literalExpression", "text": "\"[::1]\""}, "description": {"_type": "mdDoc", "text": "The IP address the ncdns resolver will bind to.  Leave this unchanged\nif you do not wish to directly expose the resolver.\n"}, "loc": ["services", "ncdns", "address"], "readOnly": false, "type": "string"}, "services.ncdns.dnssec.enable": {"declarations": ["nixos/modules/services/networking/ncdns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable DNSSEC support in ncdns. This will generate KSK and ZSK keypairs\n(unless provided via the options\n{option}`services.ncdns.dnssec.publicKey`,\n{option}`services.ncdns.dnssec.privateKey` etc.) and add a trust\nanchor to recursive resolvers\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ncdns", "dnssec", "enable"], "readOnly": false, "type": "boolean"}, "services.ncdns.dnssec.keys.private": {"declarations": ["nixos/modules/services/networking/ncdns.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/ncdns/bit.private\""}, "description": {"_type": "mdDoc", "text": "Path to the file containing the KSK private key.\n"}, "loc": ["services", "ncdns", "dnssec", "keys", "private"], "readOnly": false, "type": "path"}, "services.ncdns.dnssec.keys.public": {"declarations": ["nixos/modules/services/networking/ncdns.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/ncdns/bit.key\""}, "description": {"_type": "mdDoc", "text": "Path to the file containing the KSK public key.\nThe key can be generated using the `dnssec-keygen`\ncommand, provided by the package `bind` as follows:\n```\n$ dnssec-keygen -a RSASHA256 -3 -b 2048 -f KSK bit\n```\n"}, "loc": ["services", "ncdns", "dnssec", "keys", "public"], "readOnly": false, "type": "path"}, "services.ncdns.dnssec.keys.zonePrivate": {"declarations": ["nixos/modules/services/networking/ncdns.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/ncdns/bit-zone.private\""}, "description": {"_type": "mdDoc", "text": "Path to the file containing the ZSK private key.\n"}, "loc": ["services", "ncdns", "dnssec", "keys", "zonePrivate"], "readOnly": false, "type": "path"}, "services.ncdns.dnssec.keys.zonePublic": {"declarations": ["nixos/modules/services/networking/ncdns.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/ncdns/bit-zone.key\""}, "description": {"_type": "mdDoc", "text": "Path to the file containing the ZSK public key.\nThe key can be generated using the `dnssec-keygen`\ncommand, provided by the package `bind` as follows:\n```\n$ dnssec-keygen -a RSASHA256 -3 -b 2048 bit\n```\n"}, "loc": ["services", "ncdns", "dnssec", "keys", "zonePublic"], "readOnly": false, "type": "path"}, "services.ncdns.enable": {"declarations": ["nixos/modules/services/networking/ncdns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ncdns, a Go daemon to bridge Namecoin to DNS.\nTo resolve .bit domains set `services.namecoind.enable = true;`\nand an RPC username/password\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ncdns", "enable"], "readOnly": false, "type": "boolean"}, "services.ncdns.identity.address": {"declarations": ["nixos/modules/services/networking/ncdns.nix"], "default": {"_type": "literalExpression", "text": "\"127.127.127.127\""}, "description": {"_type": "mdDoc", "text": "The IP address the hostname specified in\n{option}`services.ncdns.identity.hostname` should resolve to.\nIf you are only using ncdns locally you can ignore this.\n"}, "loc": ["services", "ncdns", "identity", "address"], "readOnly": false, "type": "string"}, "services.ncdns.identity.hostmaster": {"declarations": ["nixos/modules/services/networking/ncdns.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "An email address for the SOA record at the bit zone.\nIf you are only using ncdns locally you can ignore this.\n"}, "example": {"_type": "literalExpression", "text": "\"root@example.com\""}, "loc": ["services", "ncdns", "identity", "hostmaster"], "readOnly": false, "type": "string"}, "services.ncdns.identity.hostname": {"declarations": ["nixos/modules/services/networking/ncdns.nix"], "default": {"_type": "literalExpression", "text": "config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "The hostname of this ncdns instance, which defaults to the machine\nhostname. If specified, ncdns lists the hostname as an NS record at\nthe zone apex:\n```\nbit. IN NS ns1.example.com.\n```\nIf unset ncdns will generate an internal pseudo-hostname under the\nzone, which will resolve to the value of\n{option}`services.ncdns.identity.address`.\nIf you are only using ncdns locally you can ignore this.\n"}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "ncdns", "identity", "hostname"], "readOnly": false, "type": "string"}, "services.ncdns.port": {"declarations": ["nixos/modules/services/networking/ncdns.nix"], "default": {"_type": "literalExpression", "text": "5333"}, "description": {"_type": "mdDoc", "text": "The port the ncdns resolver will bind to.\n"}, "loc": ["services", "ncdns", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.ncdns.settings": {"declarations": ["nixos/modules/services/networking/ncdns.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "ncdns settings. Use this option to configure ncds\nsettings not exposed in a NixOS option or to bypass one.\nSee the example ncdns.conf file at <https://github.com/namecoin/ncdns/blob/master/_doc/ncdns.conf.example>\nfor the available options.\n"}, "example": {"_type": "literalExpression", "text": "{ # enable webserver\n  ncdns.httplistenaddr = \":8202\";\n\n  # synchronize TLS certs\n  certstore.nss = true;\n  # note: all paths are relative to the config file\n  certstore.nsscertdir =  \"../../var/lib/ncdns\";\n  certstore.nssdbdir = \"../../home/alice/.pki/nssdb\";\n}\n"}, "loc": ["services", "ncdns", "settings"], "readOnly": false, "type": "ncdns.conf configuration type. The format consists of an\nattribute set of settings. Each setting can be either `null`,\na value or an attribute set. The allowed values are integers,\nstrings, booleans or paths.\n"}, "services.ndppd.configFile": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to configuration file."}, "loc": ["services", "ndppd", "configFile"], "readOnly": false, "type": "null or path"}, "services.ndppd.enable": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable daemon that proxies NDP (Neighbor Discovery Protocol) messages between interfaces."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ndppd", "enable"], "readOnly": false, "type": "boolean"}, "services.ndppd.interface": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Interface which is on link-level with router.\n(Legacy option, use services.ndppd.proxies.\\<interface\\>.rules.\\<network\\> instead)\n"}, "example": {"_type": "literalExpression", "text": "\"eth0\""}, "loc": ["services", "ndppd", "interface"], "readOnly": false, "type": "null or string"}, "services.ndppd.network": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Network that we proxy.\n(Legacy option, use services.ndppd.proxies.\\<interface\\>.rules.\\<network\\> instead)\n"}, "example": {"_type": "literalExpression", "text": "\"1111::/64\""}, "loc": ["services", "ndppd", "network"], "readOnly": false, "type": "null or string"}, "services.ndppd.proxies": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This sets up a listener, that will listen for any Neighbor Solicitation\nmessages, and respond to them according to a set of rules.\n"}, "example": {"_type": "literalExpression", "text": "{\n  eth0.rules.\"1111::/64\" = {};\n}\n"}, "loc": ["services", "ndppd", "proxies"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.ndppd.proxies.<name>.interface": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Listen for any Neighbor Solicitation messages on this interface,\nand respond to them according to a set of rules.\nDefaults to the name of the attrset.\n"}, "loc": ["services", "ndppd", "proxies", "<name>", "interface"], "readOnly": false, "type": "null or string"}, "services.ndppd.proxies.<name>.router": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Turns on or off the router flag for Neighbor Advertisement Messages.\n"}, "loc": ["services", "ndppd", "proxies", "<name>", "router"], "readOnly": false, "type": "boolean"}, "services.ndppd.proxies.<name>.rules": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This is a rule that the target address is to match against. If no netmask\nis provided, /128 is assumed. You may have several rule sections, and the\naddresses may or may not overlap.\n"}, "loc": ["services", "ndppd", "proxies", "<name>", "rules"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.ndppd.proxies.<name>.rules.<name>.interface": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Interface to use when method is iface."}, "loc": ["services", "ndppd", "proxies", "<name>", "rules", "<name>", "interface"], "readOnly": false, "type": "null or string"}, "services.ndppd.proxies.<name>.rules.<name>.method": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "\"auto\""}, "description": {"_type": "mdDoc", "text": "static: Immediately answer any Neighbor Solicitation Messages\n  (if they match the IP rule).\niface: Forward the Neighbor Solicitation Message through the specified\n  interface and only respond if a matching Neighbor Advertisement\n  Message is received.\nauto: Same as iface, but instead of manually specifying the outgoing\n  interface, check for a matching route in /proc/net/ipv6_route.\n"}, "loc": ["services", "ndppd", "proxies", "<name>", "rules", "<name>", "method"], "readOnly": false, "type": "one of \"static\", \"iface\", \"auto\""}, "services.ndppd.proxies.<name>.rules.<name>.network": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This is the target address is to match against. If no netmask\nis provided, /128 is assumed. The addresses of several rules\nmay or may not overlap.\nDefaults to the name of the attrset.\n"}, "loc": ["services", "ndppd", "proxies", "<name>", "rules", "<name>", "network"], "readOnly": false, "type": "null or string"}, "services.ndppd.proxies.<name>.timeout": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "500"}, "description": {"_type": "mdDoc", "text": "Controls how long to wait for a Neighbor Advertisement Message before\ninvalidating the entry, in milliseconds.\n"}, "loc": ["services", "ndppd", "proxies", "<name>", "timeout"], "readOnly": false, "type": "signed integer"}, "services.ndppd.proxies.<name>.ttl": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "30000"}, "description": {"_type": "mdDoc", "text": "Controls how long a valid or invalid entry remains in the cache, in\nmilliseconds.\n"}, "loc": ["services", "ndppd", "proxies", "<name>", "ttl"], "readOnly": false, "type": "signed integer"}, "services.ndppd.routeTTL": {"declarations": ["nixos/modules/services/networking/ndppd.nix"], "default": {"_type": "literalExpression", "text": "30000"}, "description": {"_type": "mdDoc", "text": "This tells 'ndppd' how often to reload the route file /proc/net/ipv6_route,\nin milliseconds.\n"}, "loc": ["services", "ndppd", "routeTTL"], "readOnly": false, "type": "signed integer"}, "services.neard.enable": {"declarations": ["nixos/modules/services/desktops/neard.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable neard, NFC daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "neard", "enable"], "readOnly": false, "type": "boolean"}, "services.nebula.networks": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Nebula network definitions."}, "loc": ["services", "nebula", "networks"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.nebula.networks.<name>.ca": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "description": {"_type": "mdDoc", "text": "Path to the certificate authority certificate."}, "example": {"_type": "literalExpression", "text": "\"/etc/nebula/ca.crt\""}, "loc": ["services", "nebula", "networks", "<name>", "ca"], "readOnly": false, "type": "path"}, "services.nebula.networks.<name>.cert": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "description": {"_type": "mdDoc", "text": "Path to the host certificate."}, "example": {"_type": "literalExpression", "text": "\"/etc/nebula/host.crt\""}, "loc": ["services", "nebula", "networks", "<name>", "cert"], "readOnly": false, "type": "path"}, "services.nebula.networks.<name>.enable": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable or disable this network."}, "loc": ["services", "nebula", "networks", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.nebula.networks.<name>.firewall.inbound": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Firewall rules for inbound traffic."}, "example": {"_type": "literalExpression", "text": "[\n  {\n    host = \"any\";\n    port = \"any\";\n    proto = \"any\";\n  }\n]"}, "loc": ["services", "nebula", "networks", "<name>", "firewall", "inbound"], "readOnly": false, "type": "list of (attribute set)"}, "services.nebula.networks.<name>.firewall.outbound": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Firewall rules for outbound traffic."}, "example": {"_type": "literalExpression", "text": "[\n  {\n    host = \"any\";\n    port = \"any\";\n    proto = \"any\";\n  }\n]"}, "loc": ["services", "nebula", "networks", "<name>", "firewall", "outbound"], "readOnly": false, "type": "list of (attribute set)"}, "services.nebula.networks.<name>.isLighthouse": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether this node is a lighthouse."}, "loc": ["services", "nebula", "networks", "<name>", "isLighthouse"], "readOnly": false, "type": "boolean"}, "services.nebula.networks.<name>.isRelay": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether this node is a relay."}, "loc": ["services", "nebula", "networks", "<name>", "isRelay"], "readOnly": false, "type": "boolean"}, "services.nebula.networks.<name>.key": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "description": {"_type": "mdDoc", "text": "Path to the host key."}, "example": {"_type": "literalExpression", "text": "\"/etc/nebula/host.key\""}, "loc": ["services", "nebula", "networks", "<name>", "key"], "readOnly": false, "type": "path"}, "services.nebula.networks.<name>.lighthouses": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of IPs of lighthouse hosts this node should report to and query from. This should be empty on lighthouse\nnodes. The IPs should be the lighthouse's Nebula IPs, not their external IPs.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168.100.1\"\n]"}, "loc": ["services", "nebula", "networks", "<name>", "lighthouses"], "readOnly": false, "type": "list of string"}, "services.nebula.networks.<name>.listen.host": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IP address to listen on."}, "loc": ["services", "nebula", "networks", "<name>", "listen", "host"], "readOnly": false, "type": "string"}, "services.nebula.networks.<name>.listen.port": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "4242"}, "description": {"_type": "mdDoc", "text": "Port number to listen on."}, "loc": ["services", "nebula", "networks", "<name>", "listen", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nebula.networks.<name>.package": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nebula"}, "description": {"_type": "mdDoc", "text": "Nebula derivation to use."}, "loc": ["services", "nebula", "networks", "<name>", "package"], "readOnly": false, "type": "package"}, "services.nebula.networks.<name>.relays": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of IPs of relays that this node should allow traffic from.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168.100.1\"\n]"}, "loc": ["services", "nebula", "networks", "<name>", "relays"], "readOnly": false, "type": "list of string"}, "services.nebula.networks.<name>.settings": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Nebula configuration. Refer to\n<https://github.com/slackhq/nebula/blob/master/examples/config.yml>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  lighthouse.dns = {\n    host = \"0.0.0.0\";\n    port = 53;\n  };\n}\n"}, "loc": ["services", "nebula", "networks", "<name>", "settings"], "readOnly": false, "type": "YAML value"}, "services.nebula.networks.<name>.staticHostMap": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The static host map defines a set of hosts with fixed IP addresses on the internet (or any network).\nA host can have multiple fixed IP addresses defined here, and nebula will try each when establishing a tunnel.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"192.168.100.1\" = [\n    \"100.64.22.11:4242\"\n  ];\n}"}, "loc": ["services", "nebula", "networks", "<name>", "staticHostMap"], "readOnly": false, "type": "attribute set of list of string"}, "services.nebula.networks.<name>.tun.device": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the tun device. Defaults to nebula.${networkName}."}, "loc": ["services", "nebula", "networks", "<name>", "tun", "device"], "readOnly": false, "type": "null or string"}, "services.nebula.networks.<name>.tun.disable": {"declarations": ["nixos/modules/services/networking/nebula.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When tun is disabled, a lighthouse can be started without a local tun interface (and therefore without root).\n"}, "loc": ["services", "nebula", "networks", "<name>", "tun", "disable"], "readOnly": false, "type": "boolean"}, "services.neo4j.allowUpgrade": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow upgrade of Neo4j database files from an older version.\n"}, "loc": ["services", "neo4j", "allowUpgrade"], "readOnly": false, "type": "boolean"}, "services.neo4j.bolt.enable": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable the BOLT connector for Neo4j. Setting this option to\n`false` will stop Neo4j from listening for incoming\nconnections on the BOLT port (7687 by default).\n"}, "loc": ["services", "neo4j", "bolt", "enable"], "readOnly": false, "type": "boolean"}, "services.neo4j.bolt.listenAddress": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\":7687\""}, "description": {"_type": "mdDoc", "text": "Neo4j listen address for BOLT traffic. The listen address is\nexpressed in the format `<ip-address>:<port-number>`.\n"}, "loc": ["services", "neo4j", "bolt", "listenAddress"], "readOnly": false, "type": "string"}, "services.neo4j.bolt.sslPolicy": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"legacy\""}, "description": {"_type": "mdDoc", "text": "Neo4j SSL policy for BOLT traffic.\n\nThe legacy policy is a special policy which is not defined in\nthe policy configuration section, but rather derives from\n{option}`directories.certificates` and\nassociated files (by default: {file}`neo4j.key` and\n{file}`neo4j.cert`). Its use will be deprecated.\n\nNote: This connector must be configured to support/require\nSSL/TLS for the legacy policy to actually be utilized. See\n{option}`bolt.tlsLevel`.\n"}, "loc": ["services", "neo4j", "bolt", "sslPolicy"], "readOnly": false, "type": "string"}, "services.neo4j.bolt.tlsLevel": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"OPTIONAL\""}, "description": {"_type": "mdDoc", "text": "SSL/TSL requirement level for BOLT traffic.\n"}, "loc": ["services", "neo4j", "bolt", "tlsLevel"], "readOnly": false, "type": "one of \"REQUIRED\", \"OPTIONAL\", \"DISABLED\""}, "services.neo4j.constrainLoadCsv": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Sets the root directory for file URLs used with the Cypher\n`LOAD CSV` clause to be that defined by\n{option}`directories.imports`. It restricts\naccess to only those files within that directory and its\nsubdirectories.\n\nSetting this option to `false` introduces\npossible security problems.\n"}, "loc": ["services", "neo4j", "constrainLoadCsv"], "readOnly": false, "type": "boolean"}, "services.neo4j.defaultListenAddress": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Default network interface to listen for incoming connections. To\nlisten for connections on all interfaces, use \"0.0.0.0\".\n\nSpecifies the default IP address and address part of connector\nspecific {option}`listenAddress` options. To bind specific\nconnectors to a specific network interfaces, specify the entire\n{option}`listenAddress` option for that connector.\n"}, "loc": ["services", "neo4j", "defaultListenAddress"], "readOnly": false, "type": "string"}, "services.neo4j.directories.certificates": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.neo4j.directories.home}/certificates\""}, "description": {"_type": "mdDoc", "text": "Directory for storing certificates to be used by Neo4j for\nTLS connections.\n\nWhen setting this directory to something other than its default,\nensure the directory's existence, and that read/write permissions are\ngiven to the Neo4j daemon user `neo4j`.\n\nNote that changing this directory from its default will prevent\nthe directory structure required for each SSL policy from being\nautomatically generated. A policy's directory structure as defined by\nits {option}`baseDirectory`,{option}`revokedDir` and\n{option}`trustedDir` must then be setup manually. The\nexistence of these directories is mandatory, as well as the presence\nof the certificate file and the private key. Ensure the correct\npermissions are set on these directories and files.\n"}, "loc": ["services", "neo4j", "directories", "certificates"], "readOnly": false, "type": "path"}, "services.neo4j.directories.data": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.neo4j.directories.home}/data\""}, "description": {"_type": "mdDoc", "text": "Path of the data directory. You must not configure more than one\nNeo4j installation to use the same data directory.\n\nWhen setting this directory to something other than its default,\nensure the directory's existence, and that read/write permissions are\ngiven to the Neo4j daemon user `neo4j`.\n"}, "loc": ["services", "neo4j", "directories", "data"], "readOnly": false, "type": "path"}, "services.neo4j.directories.home": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/neo4j\""}, "description": {"_type": "mdDoc", "text": "Path of the Neo4j home directory. Other default directories are\nsubdirectories of this path. This directory will be created if\nnon-existent, and its ownership will be {command}`chown` to\nthe Neo4j daemon user `neo4j`.\n"}, "loc": ["services", "neo4j", "directories", "home"], "readOnly": false, "type": "path"}, "services.neo4j.directories.imports": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.neo4j.directories.home}/import\""}, "description": {"_type": "mdDoc", "text": "The root directory for file URLs used with the Cypher\n`LOAD CSV` clause. Only meaningful when\n{option}`constrainLoadCvs` is set to\n`true`.\n\nWhen setting this directory to something other than its default,\nensure the directory's existence, and that read permission is\ngiven to the Neo4j daemon user `neo4j`.\n"}, "loc": ["services", "neo4j", "directories", "imports"], "readOnly": false, "type": "path"}, "services.neo4j.directories.plugins": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.neo4j.directories.home}/plugins\""}, "description": {"_type": "mdDoc", "text": "Path of the database plugin directory. Compiled Java JAR files that\ncontain database procedures will be loaded if they are placed in\nthis directory.\n\nWhen setting this directory to something other than its default,\nensure the directory's existence, and that read permission is\ngiven to the Neo4j daemon user `neo4j`.\n"}, "loc": ["services", "neo4j", "directories", "plugins"], "readOnly": false, "type": "path"}, "services.neo4j.enable": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Neo4j Community Edition.\n"}, "loc": ["services", "neo4j", "enable"], "readOnly": false, "type": "boolean"}, "services.neo4j.extraServerConfig": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration for Neo4j Community server. Refer to the\n[complete reference](https://neo4j.com/docs/operations-manual/current/reference/configuration-settings/)\nof Neo4j configuration settings.\n"}, "loc": ["services", "neo4j", "extraServerConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.neo4j.http.enable": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable the HTTP connector for Neo4j. Setting this option to\n`false` will stop Neo4j from listening for incoming\nconnections on the HTTPS port (7474 by default).\n"}, "loc": ["services", "neo4j", "http", "enable"], "readOnly": false, "type": "boolean"}, "services.neo4j.http.listenAddress": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\":7474\""}, "description": {"_type": "mdDoc", "text": "Neo4j listen address for HTTP traffic. The listen address is\nexpressed in the format `<ip-address>:<port-number>`.\n"}, "loc": ["services", "neo4j", "http", "listenAddress"], "readOnly": false, "type": "string"}, "services.neo4j.https.enable": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable the HTTPS connector for Neo4j. Setting this option to\n`false` will stop Neo4j from listening for incoming\nconnections on the HTTPS port (7473 by default).\n"}, "loc": ["services", "neo4j", "https", "enable"], "readOnly": false, "type": "boolean"}, "services.neo4j.https.listenAddress": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\":7473\""}, "description": {"_type": "mdDoc", "text": "Neo4j listen address for HTTPS traffic. The listen address is\nexpressed in the format `<ip-address>:<port-number>`.\n"}, "loc": ["services", "neo4j", "https", "listenAddress"], "readOnly": false, "type": "string"}, "services.neo4j.https.sslPolicy": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"legacy\""}, "description": {"_type": "mdDoc", "text": "Neo4j SSL policy for HTTPS traffic.\n\nThe legacy policy is a special policy which is not defined in the\npolicy configuration section, but rather derives from\n{option}`directories.certificates` and\nassociated files (by default: {file}`neo4j.key` and\n{file}`neo4j.cert`). Its use will be deprecated.\n"}, "loc": ["services", "neo4j", "https", "sslPolicy"], "readOnly": false, "type": "string"}, "services.neo4j.package": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "pkgs.neo4j"}, "description": {"_type": "mdDoc", "text": "Neo4j package to use.\n"}, "loc": ["services", "neo4j", "package"], "readOnly": false, "type": "package"}, "services.neo4j.readOnly": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Only allow read operations from this Neo4j instance.\n"}, "loc": ["services", "neo4j", "readOnly"], "readOnly": false, "type": "boolean"}, "services.neo4j.shell.enable": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable a remote shell server which Neo4j Shell clients can log in to.\nOnly applicable to {command}`neo4j-shell`.\n"}, "loc": ["services", "neo4j", "shell", "enable"], "readOnly": false, "type": "boolean"}, "services.neo4j.ssl.policies": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Defines the SSL policies for use with Neo4j connectors. Each attribute\nof this set defines a policy, with the attribute name defining the name\nof the policy and its namespace. Refer to the operations manual section\non Neo4j's\n[SSL Framework](https://neo4j.com/docs/operations-manual/current/security/ssl-framework/)\nfor further details.\n"}, "loc": ["services", "neo4j", "ssl", "policies"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.neo4j.ssl.policies.<name>.allowKeyGeneration": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allows the generation of a private key and associated self-signed\ncertificate. Only performed when both objects cannot be found for\nthis policy. It is recommended to turn this off again after keys\nhave been generated.\n\nThe public certificate is required to be duplicated to the\ndirectory holding trusted certificates as defined by the\n{option}`trustedDir` option.\n\nKeys should in general be generated and distributed offline by a\ntrusted certificate authority and not by utilizing this mode.\n"}, "loc": ["services", "neo4j", "ssl", "policies", "<name>", "allowKeyGeneration"], "readOnly": false, "type": "boolean"}, "services.neo4j.ssl.policies.<name>.baseDirectory": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.neo4j.directories.certificates}/${name}\""}, "description": {"_type": "mdDoc", "text": "The mandatory base directory for cryptographic objects of this\npolicy. This path is only automatically generated when this\noption as well as {option}`directories.certificates` are\nleft at their default. Ensure read/write permissions are given\nto the Neo4j daemon user `neo4j`.\n\nIt is also possible to override each individual\nconfiguration with absolute paths. See the\n{option}`privateKey` and {option}`publicCertificate`\npolicy options.\n"}, "loc": ["services", "neo4j", "ssl", "policies", "<name>", "baseDirectory"], "readOnly": false, "type": "path"}, "services.neo4j.ssl.policies.<name>.ciphers": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Restrict the allowed ciphers of this policy to those defined\nhere. The default ciphers are those of the JVM platform.\n"}, "loc": ["services", "neo4j", "ssl", "policies", "<name>", "ciphers"], "readOnly": false, "type": "null or (list of string)"}, "services.neo4j.ssl.policies.<name>.clientAuth": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"REQUIRE\""}, "description": {"_type": "mdDoc", "text": "The client authentication stance for this policy.\n"}, "loc": ["services", "neo4j", "ssl", "policies", "<name>", "clientAuth"], "readOnly": false, "type": "one of \"NONE\", \"OPTIONAL\", \"REQUIRE\""}, "services.neo4j.ssl.policies.<name>.privateKey": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"private.key\""}, "description": {"_type": "mdDoc", "text": "The name of private PKCS #8 key file for this policy to be found\nin the {option}`baseDirectory`, or the absolute path to\nthe key file. It is mandatory that a key can be found or generated.\n"}, "loc": ["services", "neo4j", "ssl", "policies", "<name>", "privateKey"], "readOnly": false, "type": "string"}, "services.neo4j.ssl.policies.<name>.publicCertificate": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"public.crt\""}, "description": {"_type": "mdDoc", "text": "The name of public X.509 certificate (chain) file in PEM format\nfor this policy to be found in the {option}`baseDirectory`,\nor the absolute path to the certificate file. It is mandatory\nthat a certificate can be found or generated.\n\nThe public certificate is required to be duplicated to the\ndirectory holding trusted certificates as defined by the\n{option}`trustedDir` option.\n"}, "loc": ["services", "neo4j", "ssl", "policies", "<name>", "publicCertificate"], "readOnly": false, "type": "string"}, "services.neo4j.ssl.policies.<name>.revokedDir": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.neo4j.ssl.policies.<name>.baseDirectory}/revoked\""}, "description": {"_type": "mdDoc", "text": "Path to directory of CRLs (Certificate Revocation Lists) in\nPEM format. Must be an absolute path. The existence of this\ndirectory is mandatory and will need to be created manually when:\nsetting this option to something other than its default; setting\neither this policy's {option}`baseDirectory` or\n{option}`directories.certificates` to something other than\ntheir default. Ensure read/write permissions are given to the\nNeo4j daemon user `neo4j`.\n"}, "loc": ["services", "neo4j", "ssl", "policies", "<name>", "revokedDir"], "readOnly": false, "type": "path"}, "services.neo4j.ssl.policies.<name>.tlsVersions": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"TLSv1.2\"\n]"}, "description": {"_type": "mdDoc", "text": "Restrict the TLS protocol versions of this policy to those\ndefined here.\n"}, "loc": ["services", "neo4j", "ssl", "policies", "<name>", "tlsVersions"], "readOnly": false, "type": "list of string"}, "services.neo4j.ssl.policies.<name>.trustAll": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Makes this policy trust all remote parties. Enabling this is not\nrecommended and the policy's trusted directory will be ignored.\nUse of this mode is discouraged. It would offer encryption but\nno security.\n"}, "loc": ["services", "neo4j", "ssl", "policies", "<name>", "trustAll"], "readOnly": false, "type": "boolean"}, "services.neo4j.ssl.policies.<name>.trustedDir": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.neo4j.ssl.policies.<name>.baseDirectory}/trusted\""}, "description": {"_type": "mdDoc", "text": "Path to directory of X.509 certificates in PEM format for\ntrusted parties. Must be an absolute path. The existence of this\ndirectory is mandatory and will need to be created manually when:\nsetting this option to something other than its default; setting\neither this policy's {option}`baseDirectory` or\n{option}`directories.certificates` to something other than\ntheir default. Ensure read/write permissions are given to the\nNeo4j daemon user `neo4j`.\n\nThe public certificate as defined by\n{option}`publicCertificate` is required to be duplicated\nto this directory.\n"}, "loc": ["services", "neo4j", "ssl", "policies", "<name>", "trustedDir"], "readOnly": false, "type": "path"}, "services.neo4j.workerCount": {"declarations": ["nixos/modules/services/databases/neo4j.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Number of Neo4j worker threads, where the default of\n`0` indicates a worker count equal to the number of\navailable processors.\n"}, "loc": ["services", "neo4j", "workerCount"], "readOnly": false, "type": "integer between 0 and 44738 (both inclusive)"}, "services.netatalk.enable": {"declarations": ["nixos/modules/services/network-filesystems/netatalk.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Netatalk AFP fileserver."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "netatalk", "enable"], "readOnly": false, "type": "boolean"}, "services.netatalk.extmap": {"declarations": ["nixos/modules/services/network-filesystems/netatalk.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "File name extension mappings.\nSee {manpage}`extmap.conf(5)`. for more information.\n"}, "loc": ["services", "netatalk", "extmap"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.netatalk.port": {"declarations": ["nixos/modules/services/network-filesystems/netatalk.nix"], "default": {"_type": "literalExpression", "text": "548"}, "description": {"_type": "mdDoc", "text": "TCP port to be used for AFP."}, "loc": ["services", "netatalk", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.netatalk.settings": {"declarations": ["nixos/modules/services/network-filesystems/netatalk.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for Netatalk. See\n{manpage}`afp.conf(5)`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Global = {\n    \"uam list\" = \"uams_guest.so\";\n  };\n  Homes = {\n    \"basedir regex\" = \"/home\";\n    path = \"afp-data\";\n  };\n  example-volume = {\n    path = \"/srv/volume\";\n    \"read only\" = true;\n  };\n}"}, "loc": ["services", "netatalk", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.netbird.enable": {"declarations": ["nixos/modules/services/networking/netbird.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Netbird daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "netbird", "enable"], "readOnly": false, "type": "boolean"}, "services.netbird.package": {"declarations": ["nixos/modules/services/networking/netbird.nix"], "default": {"_type": "literalExpression", "text": "pkgs.netbird"}, "description": {"_type": "mdDoc", "text": "The package to use for netbird"}, "loc": ["services", "netbird", "package"], "readOnly": false, "type": "package"}, "services.netbox.dataDir": {"declarations": ["nixos/modules/services/web-apps/netbox.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/netbox\""}, "description": {"_type": "mdDoc", "text": "Storage path of netbox.\n"}, "loc": ["services", "netbox", "dataDir"], "readOnly": false, "type": "string"}, "services.netbox.enable": {"declarations": ["nixos/modules/services/web-apps/netbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Netbox.\n\nThis module requires a reverse proxy that serves `/static` separately.\nSee this [example](https://github.com/netbox-community/netbox/blob/develop/contrib/nginx.conf/) on how to configure this.\n"}, "loc": ["services", "netbox", "enable"], "readOnly": false, "type": "boolean"}, "services.netbox.enableLdap": {"declarations": ["nixos/modules/services/web-apps/netbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable LDAP-Authentication for Netbox.\n\nThis requires a configuration file being pass through `ldapConfigPath`.\n"}, "loc": ["services", "netbox", "enableLdap"], "readOnly": false, "type": "boolean"}, "services.netbox.extraConfig": {"declarations": ["nixos/modules/services/web-apps/netbox.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional lines of configuration appended to the `configuration.py`.\nSee the [documentation](https://docs.netbox.dev/en/stable/configuration/) for more possible options.\n"}, "loc": ["services", "netbox", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.netbox.ldapConfigPath": {"declarations": ["nixos/modules/services/web-apps/netbox.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Path to the Configuration-File for LDAP-Authentication, will be loaded as `ldap_config.py`.\nSee the [documentation](https://netbox.readthedocs.io/en/stable/installation/6-ldap/#configuration) for possible options.\n"}, "example": {"_type": "literalExpression", "text": "''\n  import ldap\n  from django_auth_ldap.config import LDAPSearch, PosixGroupType\n  \n  AUTH_LDAP_SERVER_URI = \"ldaps://ldap.example.com/\"\n  \n  AUTH_LDAP_USER_SEARCH = LDAPSearch(\n      \"ou=accounts,ou=posix,dc=example,dc=com\",\n      ldap.SCOPE_SUBTREE,\n      \"(uid=%(user)s)\",\n  )\n  \n  AUTH_LDAP_GROUP_SEARCH = LDAPSearch(\n      \"ou=groups,ou=posix,dc=example,dc=com\",\n      ldap.SCOPE_SUBTREE,\n      \"(objectClass=posixGroup)\",\n  )\n  AUTH_LDAP_GROUP_TYPE = PosixGroupType()\n  \n  # Mirror LDAP group assignments.\n  AUTH_LDAP_MIRROR_GROUPS = True\n  \n  # For more granular permissions, we can map LDAP groups to Django groups.\n  AUTH_LDAP_FIND_GROUP_PERMS = True\n''"}, "loc": ["services", "netbox", "ldapConfigPath"], "readOnly": false, "type": "path"}, "services.netbox.listenAddress": {"declarations": ["nixos/modules/services/web-apps/netbox.nix"], "default": {"_type": "literalExpression", "text": "\"[::1]\""}, "description": {"_type": "mdDoc", "text": "Address the server will listen on.\n"}, "loc": ["services", "netbox", "listenAddress"], "readOnly": false, "type": "string"}, "services.netbox.package": {"declarations": ["nixos/modules/services/web-apps/netbox.nix"], "default": {"_type": "literalExpression", "text": "if versionAtLeast config.system.stateVersion \"23.05\" then pkgs.netbox else pkgs.netbox_3_3;\n"}, "description": {"_type": "mdDoc", "text": "NetBox package to use.\n"}, "loc": ["services", "netbox", "package"], "readOnly": false, "type": "package"}, "services.netbox.plugins": {"declarations": ["nixos/modules/services/web-apps/netbox.nix"], "default": {"_type": "literalExpression", "text": "python3Packages: with python3Packages; [];\n"}, "description": {"_type": "mdDoc", "text": "List of plugin packages to install.\n"}, "loc": ["services", "netbox", "plugins"], "readOnly": false, "type": "function that evaluates to a(n) list of package"}, "services.netbox.port": {"declarations": ["nixos/modules/services/web-apps/netbox.nix"], "default": {"_type": "literalExpression", "text": "8001"}, "description": {"_type": "mdDoc", "text": "Port the server will listen on.\n"}, "loc": ["services", "netbox", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.netbox.secretKeyFile": {"declarations": ["nixos/modules/services/web-apps/netbox.nix"], "description": {"_type": "mdDoc", "text": "Path to a file containing the secret key.\n"}, "loc": ["services", "netbox", "secretKeyFile"], "readOnly": false, "type": "path"}, "services.netbox.settings": {"declarations": ["nixos/modules/services/web-apps/netbox.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration options to set in `configuration.py`.\nSee the [documentation](https://docs.netbox.dev/en/stable/configuration/) for more possible options.\n"}, "loc": ["services", "netbox", "settings"], "readOnly": false, "type": "attribute set of (Python value)"}, "services.netbox.settings.ALLOWED_HOSTS": {"declarations": ["nixos/modules/services/web-apps/netbox.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*\"\n]"}, "description": {"_type": "mdDoc", "text": "A list of valid fully-qualified domain names (FQDNs) and/or IP\naddresses that can be used to reach the NetBox service.\n"}, "loc": ["services", "netbox", "settings", "ALLOWED_HOSTS"], "readOnly": false, "type": "list of string"}, "services.netdata.config": {"declarations": ["nixos/modules/services/monitoring/netdata.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "netdata.conf configuration as nix attributes. cannot be combined with configText."}, "example": {"_type": "literalExpression", "text": "global = {\n  \"debug log\" = \"syslog\";\n  \"access log\" = \"syslog\";\n  \"error log\" = \"syslog\";\n};\n"}, "loc": ["services", "netdata", "config"], "readOnly": false, "type": "attribute set of (attribute set)"}, "services.netdata.configDir": {"declarations": ["nixos/modules/services/monitoring/netdata.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Complete netdata config directory except netdata.conf.\nThe default configuration is merged with changes\ndefined in this option.\nEach top-level attribute denotes a path in the configuration\ndirectory as in environment.etc.\nIts value is the absolute path and must be readable by netdata.\nCannot be combined with configText.\n"}, "example": {"_type": "literalExpression", "text": "\"health_alarm_notify.conf\" = pkgs.writeText \"health_alarm_notify.conf\" ''\n  sendmail=\"/path/to/sendmail\"\n'';\n\"health.d\" = \"/run/secrets/netdata/health.d\";\n"}, "loc": ["services", "netdata", "configDir"], "readOnly": false, "type": "attribute set of path"}, "services.netdata.configText": {"declarations": ["nixos/modules/services/monitoring/netdata.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Verbatim netdata.conf, cannot be combined with config."}, "example": {"_type": "literalExpression", "text": "''\n  [global]\n  debug log = syslog\n  access log = syslog\n  error log = syslog\n''"}, "loc": ["services", "netdata", "configText"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.netdata.deadlineBeforeStopSec": {"declarations": ["nixos/modules/services/monitoring/netdata.nix"], "default": {"_type": "literalExpression", "text": "120"}, "description": {"_type": "mdDoc", "text": "In order to detect when netdata is misbehaving, we run a concurrent task pinging netdata (wait-for-netdata-up)\nin the systemd unit.\n\nIf after a while, this task does not succeed, we stop the unit and mark it as failed.\n\nYou can control this deadline in seconds with this option, it's useful to bump it\nif you have (1) a lot of data (2) doing upgrades (3) have low IOPS/throughput.\n"}, "loc": ["services", "netdata", "deadlineBeforeStopSec"], "readOnly": false, "type": "signed integer"}, "services.netdata.enable": {"declarations": ["nixos/modules/services/monitoring/netdata.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable netdata."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "netdata", "enable"], "readOnly": false, "type": "boolean"}, "services.netdata.enableAnalyticsReporting": {"declarations": ["nixos/modules/services/monitoring/netdata.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable reporting of anonymous usage statistics to Netdata Inc. via either\nGoogle Analytics (in versions prior to 1.29.4), or Netdata Inc.'s\nself-hosted PostHog (in versions 1.29.4 and later).\nSee: <https://learn.netdata.cloud/docs/agent/anonymous-statistics>\n"}, "loc": ["services", "netdata", "enableAnalyticsReporting"], "readOnly": false, "type": "boolean"}, "services.netdata.extraPluginPaths": {"declarations": ["nixos/modules/services/monitoring/netdata.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra paths to add to the netdata global \"plugins directory\"\noption.  Useful for when you want to include your own\ncollection scripts.\n\nDetails about writing a custom netdata plugin are available at:\n<https://docs.netdata.cloud/collectors/plugins.d/>\n\nCannot be combined with configText.\n"}, "example": {"_type": "literalExpression", "text": "[ \"/path/to/plugins.d\" ]\n"}, "loc": ["services", "netdata", "extraPluginPaths"], "readOnly": false, "type": "list of path"}, "services.netdata.group": {"declarations": ["nixos/modules/services/monitoring/netdata.nix"], "default": {"_type": "literalExpression", "text": "\"netdata\""}, "description": {"_type": "mdDoc", "text": "Group under which netdata runs."}, "loc": ["services", "netdata", "group"], "readOnly": false, "type": "string"}, "services.netdata.package": {"declarations": ["nixos/modules/services/monitoring/netdata.nix"], "default": {"_type": "literalExpression", "text": "pkgs.netdata"}, "description": {"_type": "mdDoc", "text": "Netdata package to use."}, "loc": ["services", "netdata", "package"], "readOnly": false, "type": "package"}, "services.netdata.python.enable": {"declarations": ["nixos/modules/services/monitoring/netdata.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable python-based plugins\n"}, "loc": ["services", "netdata", "python", "enable"], "readOnly": false, "type": "boolean"}, "services.netdata.python.extraPackages": {"declarations": ["nixos/modules/services/monitoring/netdata.nix"], "default": {"_type": "literalExpression", "text": "ps: []"}, "description": {"_type": "mdDoc", "text": "Extra python packages available at runtime\nto enable additional python plugins.\n"}, "example": {"_type": "literalExpression", "text": "ps: [\n  ps.psycopg2\n  ps.docker\n  ps.dnspython\n]\n"}, "loc": ["services", "netdata", "python", "extraPackages"], "readOnly": false, "type": "function that evaluates to a(n) list of package"}, "services.netdata.user": {"declarations": ["nixos/modules/services/monitoring/netdata.nix"], "default": {"_type": "literalExpression", "text": "\"netdata\""}, "description": {"_type": "mdDoc", "text": "User account under which netdata runs."}, "loc": ["services", "netdata", "user"], "readOnly": false, "type": "string"}, "services.networkaudiod.enable": {"declarations": ["nixos/modules/services/audio/networkaudiod.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Networkaudiod (NAA)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "networkaudiod", "enable"], "readOnly": false, "type": "boolean"}, "services.networkd-dispatcher.enable": {"declarations": ["nixos/modules/services/networking/networkd-dispatcher.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Networkd-dispatcher service for systemd-networkd connection status\nchange. See [https://gitlab.com/craftyguy/networkd-dispatcher](upstream instructions)\nfor usage.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "networkd-dispatcher", "enable"], "readOnly": false, "type": "boolean"}, "services.networkd-dispatcher.rules": {"declarations": ["nixos/modules/services/networking/networkd-dispatcher.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative configuration of networkd-dispatcher rules. See\n[https://gitlab.com/craftyguy/networkd-dispatcher](upstream instructions)\nfor an introduction and example scripts.\n"}, "example": {"_type": "literalExpression", "text": "{ \"restart-tor\" = {\n    onState = [\"routable\" \"off\"];\n    script = ''\n      #!${pkgs.runtimeShell}\n      if [[ $IFACE == \"wlan0\" && $AdministrativeState == \"configured\" ]]; then\n        echo \"Restarting Tor ...\"\n        systemctl restart tor\n      fi\n      exit 0\n    '';\n  };\n};\n"}, "loc": ["services", "networkd-dispatcher", "rules"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.networkd-dispatcher.rules.<name>.onState": {"declarations": ["nixos/modules/services/networking/networkd-dispatcher.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of names of the systemd-networkd operational states which\nshould trigger the script. See <https://www.freedesktop.org/software/systemd/man/networkctl.html>\nfor a description of the specific state type.\n"}, "loc": ["services", "networkd-dispatcher", "rules", "<name>", "onState"], "readOnly": false, "type": "list of (one of \"routable\", \"dormant\", \"no-carrier\", \"off\", \"carrier\", \"degraded\", \"configuring\", \"configured\")"}, "services.networkd-dispatcher.rules.<name>.script": {"declarations": ["nixos/modules/services/networking/networkd-dispatcher.nix"], "description": {"_type": "mdDoc", "text": "Shell commands executed on specified operational states.\n"}, "loc": ["services", "networkd-dispatcher", "rules", "<name>", "script"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.networking.websockify.enable": {"declarations": ["nixos/modules/services/networking/websockify.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable websockify to forward websocket connections to TCP connections."}, "loc": ["services", "networking", "websockify", "enable"], "readOnly": false, "type": "boolean"}, "services.networking.websockify.portMap": {"declarations": ["nixos/modules/services/networking/websockify.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Ports to map by default."}, "loc": ["services", "networking", "websockify", "portMap"], "readOnly": false, "type": "attribute set of signed integer"}, "services.networking.websockify.sslCert": {"declarations": ["nixos/modules/services/networking/websockify.nix"], "description": {"_type": "mdDoc", "text": "Path to the SSL certificate."}, "loc": ["services", "networking", "websockify", "sslCert"], "readOnly": false, "type": "path"}, "services.networking.websockify.sslKey": {"declarations": ["nixos/modules/services/networking/websockify.nix"], "default": {"_type": "literalExpression", "text": "config.services.networking.websockify.sslCert"}, "description": {"_type": "mdDoc", "text": "Path to the SSL key."}, "loc": ["services", "networking", "websockify", "sslKey"], "readOnly": false, "type": "path"}, "services.nextcloud.appstoreEnable": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Allow the installation and updating of apps from the Nextcloud appstore.\nEnabled by default unless there are packages in [](#opt-services.nextcloud.extraApps).\nSet this to true to force enable the store even if [](#opt-services.nextcloud.extraApps) is used.\nSet this to false to disable the installation of apps from the global appstore. App management is always enabled regardless of this setting.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nextcloud", "appstoreEnable"], "readOnly": false, "type": "null or boolean"}, "services.nextcloud.autoUpdateApps.enable": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Run a regular auto-update of all apps installed from the Nextcloud app store.\n"}, "loc": ["services", "nextcloud", "autoUpdateApps", "enable"], "readOnly": false, "type": "boolean"}, "services.nextcloud.autoUpdateApps.startAt": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "\"05:00:00\""}, "description": {"_type": "mdDoc", "text": "When to run the update. See `systemd.services.<name>.startAt`.\n"}, "example": {"_type": "literalExpression", "text": "\"Sun 14:00:00\""}, "loc": ["services", "nextcloud", "autoUpdateApps", "startAt"], "readOnly": false, "type": "string or list of string"}, "services.nextcloud.caching.apcu": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to load the APCu module into PHP.\n"}, "loc": ["services", "nextcloud", "caching", "apcu"], "readOnly": false, "type": "boolean"}, "services.nextcloud.caching.memcached": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to load the Memcached module into PHP.\nYou still need to enable Memcached in your config.php.\nSee https://docs.nextcloud.com/server/14/admin_manual/configuration_server/caching_configuration.html\n"}, "loc": ["services", "nextcloud", "caching", "memcached"], "readOnly": false, "type": "boolean"}, "services.nextcloud.caching.redis": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to load the Redis module into PHP.\nYou still need to enable Redis in your config.php.\nSee https://docs.nextcloud.com/server/14/admin_manual/configuration_server/caching_configuration.html\n"}, "loc": ["services", "nextcloud", "caching", "redis"], "readOnly": false, "type": "boolean"}, "services.nextcloud.config.adminpassFile": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "description": {"_type": "mdDoc", "text": "The full path to a file that contains the admin's password. Must be\nreadable by user `nextcloud`. The password is set only in the initial\nsetup of Nextcloud by the systemd service `nextcloud-setup.service`.\n"}, "loc": ["services", "nextcloud", "config", "adminpassFile"], "readOnly": false, "type": "string"}, "services.nextcloud.config.adminuser": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "Username for the admin account. The username is only set during the\ninitial setup of Nextcloud! Since the username also acts as unique\nID internally, it cannot be changed later!\n"}, "loc": ["services", "nextcloud", "config", "adminuser"], "readOnly": false, "type": "string"}, "services.nextcloud.config.dbhost": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host or socket path.\nIf [](#opt-services.nextcloud.database.createLocally) is true and\n[](#opt-services.nextcloud.config.dbtype) is either `pgsql` or `mysql`,\ndefaults to the correct Unix socket instead.\n"}, "loc": ["services", "nextcloud", "config", "dbhost"], "readOnly": false, "type": "null or string"}, "services.nextcloud.config.dbname": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "\"nextcloud\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "nextcloud", "config", "dbname"], "readOnly": false, "type": "null or string"}, "services.nextcloud.config.dbpassFile": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The full path to a file that contains the database password.\n"}, "loc": ["services", "nextcloud", "config", "dbpassFile"], "readOnly": false, "type": "null or string"}, "services.nextcloud.config.dbport": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Database port."}, "loc": ["services", "nextcloud", "config", "dbport"], "readOnly": false, "type": "null or signed integer or string"}, "services.nextcloud.config.dbtableprefix": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Table prefix in Nextcloud's database."}, "loc": ["services", "nextcloud", "config", "dbtableprefix"], "readOnly": false, "type": "null or string"}, "services.nextcloud.config.dbtype": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite\""}, "description": {"_type": "mdDoc", "text": "Database type."}, "loc": ["services", "nextcloud", "config", "dbtype"], "readOnly": false, "type": "one of \"sqlite\", \"pgsql\", \"mysql\""}, "services.nextcloud.config.dbuser": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "\"nextcloud\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "nextcloud", "config", "dbuser"], "readOnly": false, "type": "null or string"}, "services.nextcloud.config.defaultPhoneRegion": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "An [ISO 3166-1](https://www.iso.org/iso-3166-country-codes.html)\ncountry code which replaces automatic phone-number detection\nwithout a country code.\n\nAs an example, with `DE` set as the default phone region,\nthe `+49` prefix can be omitted for phone numbers.\n"}, "example": {"_type": "literalExpression", "text": "\"DE\""}, "loc": ["services", "nextcloud", "config", "defaultPhoneRegion"], "readOnly": false, "type": "null or string"}, "services.nextcloud.config.extraTrustedDomains": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Trusted domains from which the Nextcloud installation will be\naccessible.  You don't need to add\n`services.nextcloud.hostname` here.\n"}, "loc": ["services", "nextcloud", "config", "extraTrustedDomains"], "readOnly": false, "type": "list of string"}, "services.nextcloud.config.objectstore.s3.autocreate": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "description": {"_type": "mdDoc", "text": "Create the objectstore if it does not exist.\n"}, "loc": ["services", "nextcloud", "config", "objectstore", "s3", "autocreate"], "readOnly": false, "type": "boolean"}, "services.nextcloud.config.objectstore.s3.bucket": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "description": {"_type": "mdDoc", "text": "The name of the S3 bucket.\n"}, "example": {"_type": "literalExpression", "text": "\"nextcloud\""}, "loc": ["services", "nextcloud", "config", "objectstore", "s3", "bucket"], "readOnly": false, "type": "string"}, "services.nextcloud.config.objectstore.s3.enable": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable S3 object storage as primary storage.\n\nThis mounts a bucket on an Amazon S3 object storage or compatible\nimplementation into the virtual filesystem.\n\nFurther details about this feature can be found in the\n[upstream documentation](https://docs.nextcloud.com/server/22/admin_manual/configuration_files/primary_storage.html).\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nextcloud", "config", "objectstore", "s3", "enable"], "readOnly": false, "type": "boolean"}, "services.nextcloud.config.objectstore.s3.hostname": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Required for some non-Amazon implementations.\n"}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "nextcloud", "config", "objectstore", "s3", "hostname"], "readOnly": false, "type": "null or string"}, "services.nextcloud.config.objectstore.s3.key": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "description": {"_type": "mdDoc", "text": "The access key for the S3 bucket.\n"}, "example": {"_type": "literalExpression", "text": "\"EJ39ITYZEUH5BGWDRUFY\""}, "loc": ["services", "nextcloud", "config", "objectstore", "s3", "key"], "readOnly": false, "type": "string"}, "services.nextcloud.config.objectstore.s3.port": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Required for some non-Amazon implementations.\n"}, "loc": ["services", "nextcloud", "config", "objectstore", "s3", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nextcloud.config.objectstore.s3.region": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Required for some non-Amazon implementations.\n"}, "example": {"_type": "literalExpression", "text": "\"REGION\""}, "loc": ["services", "nextcloud", "config", "objectstore", "s3", "region"], "readOnly": false, "type": "null or string"}, "services.nextcloud.config.objectstore.s3.secretFile": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "description": {"_type": "mdDoc", "text": "The full path to a file that contains the access secret. Must be\nreadable by user `nextcloud`.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/nextcloud-objectstore-s3-secret\""}, "loc": ["services", "nextcloud", "config", "objectstore", "s3", "secretFile"], "readOnly": false, "type": "string"}, "services.nextcloud.config.objectstore.s3.sseCKeyFile": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If provided this is the full path to a file that contains the key\nto enable [server-side encryption with customer-provided keys][1]\n(SSE-C).\n\nThe file must contain a random 32-byte key encoded as a base64\nstring, e.g. generated with the command\n\n```\nopenssl rand 32 | base64\n```\n\nMust be readable by user `nextcloud`.\n\n[1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerSideEncryptionCustomerKeys.html\n"}, "example": {"_type": "literalExpression", "text": "\"/var/nextcloud-objectstore-s3-sse-c-key\""}, "loc": ["services", "nextcloud", "config", "objectstore", "s3", "sseCKeyFile"], "readOnly": false, "type": "null or path"}, "services.nextcloud.config.objectstore.s3.usePathStyle": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Required for some non-Amazon S3 implementations.\n\nOrdinarily, requests will be made with\n`http://bucket.hostname.domain/`, but with path style\nenabled requests are made with\n`http://hostname.domain/bucket` instead.\n"}, "loc": ["services", "nextcloud", "config", "objectstore", "s3", "usePathStyle"], "readOnly": false, "type": "boolean"}, "services.nextcloud.config.objectstore.s3.useSsl": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Use SSL for objectstore access.\n"}, "loc": ["services", "nextcloud", "config", "objectstore", "s3", "useSsl"], "readOnly": false, "type": "boolean"}, "services.nextcloud.config.overwriteProtocol": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Force Nextcloud to always use HTTP or HTTPS i.e. for link generation.\nNextcloud uses the currently used protocol by default, but when\nbehind a reverse-proxy, it may use `http` for everything although\nNextcloud may be served via HTTPS.\n"}, "example": {"_type": "literalExpression", "text": "\"https\""}, "loc": ["services", "nextcloud", "config", "overwriteProtocol"], "readOnly": false, "type": "null or one of \"http\", \"https\""}, "services.nextcloud.config.trustedProxies": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Trusted proxies to provide if the Nextcloud installation is being\nproxied to secure against, e.g. spoofing.\n"}, "loc": ["services", "nextcloud", "config", "trustedProxies"], "readOnly": false, "type": "list of string"}, "services.nextcloud.configureRedis": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "config.services.nextcloud.notify_push.enable"}, "description": {"_type": "mdDoc", "text": "Whether to configure Nextcloud to use the recommended Redis settings for small instances.\n\n::: {.note}\nThe `notify_push` app requires Redis to be configured. If this option is turned off, this must be configured manually.\n:::\n"}, "loc": ["services", "nextcloud", "configureRedis"], "readOnly": false, "type": "boolean"}, "services.nextcloud.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to create the database and database user locally.\n"}, "loc": ["services", "nextcloud", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.nextcloud.datadir": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "config.services.nextcloud.home"}, "description": {"_type": "mdDoc", "text": "Nextcloud's data storage path.  Will be [](#opt-services.nextcloud.home) by default.\nThis folder will be populated with a config.php file and a data folder which contains the state of the instance (excluding the database).\";\n"}, "example": {"_type": "literalExpression", "text": "\"/mnt/nextcloud-file\""}, "loc": ["services", "nextcloud", "datadir"], "readOnly": false, "type": "string"}, "services.nextcloud.enable": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nextcloud."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nextcloud", "enable"], "readOnly": false, "type": "boolean"}, "services.nextcloud.enableBrokenCiphersForSSE": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "versionOlder system.stateVersion \"22.11\""}, "description": {"_type": "mdDoc", "text": "This option enables using the OpenSSL PHP extension linked against OpenSSL 1.1\nrather than latest OpenSSL (\u2265\u00a03), this is not recommended unless you need\nit for server-side encryption (SSE). SSE uses the legacy RC4 cipher which is\nconsidered broken for several years now. See also [RFC7465](https://datatracker.ietf.org/doc/html/rfc7465).\n\nThis cipher has been disabled in OpenSSL \u2265 3 and requires\na specific legacy profile to re-enable it.\n\nIf you deploy Nextcloud using OpenSSL \u2265\u00a03 for PHP and have\nserver-side encryption configured, you will not be able to access\nyour files anymore. Enabling this option can restore access to your files.\nUpon testing we didn't encounter any data corruption when turning\nthis on and off again, but this cannot be guaranteed for\neach Nextcloud installation.\n\nIt is `true` by default for systems with a [](#opt-system.stateVersion) below\n`22.11` to make sure that existing installations won't break on update. On newer\nNixOS systems you have to explicitly enable it on your own.\n\nPlease note that this only provides additional value when using\nexternal storage such as S3 since it's not an end-to-end encryption.\nIf this is not the case,\nit is advised to [disable server-side encryption](https://docs.nextcloud.com/server/latest/admin_manual/configuration_files/encryption_configuration.html#disabling-encryption) and set this to `false`.\n\nIn the future, Nextcloud may move to AES-256-GCM, by then,\nthis option will be removed.\n"}, "loc": ["services", "nextcloud", "enableBrokenCiphersForSSE"], "readOnly": false, "type": "boolean"}, "services.nextcloud.enableImagemagick": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the ImageMagick module for PHP.\nThis is used by the theming app and for generating previews of certain images (e.g. SVG and HEIF).\nYou may want to disable it for increased security. In that case, previews will still be available\nfor some images (e.g. JPEG and PNG).\nSee <https://github.com/nextcloud/server/issues/13099>.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nextcloud", "enableImagemagick"], "readOnly": false, "type": "boolean"}, "services.nextcloud.extraApps": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra apps to install. Should be an attrSet of appid to packages generated by fetchNextcloudApp.\nThe appid must be identical to the \"id\" value in the apps appinfo/info.xml.\nUsing this will disable the appstore to prevent Nextcloud from updating these apps (see [](#opt-services.nextcloud.appstoreEnable)).\n"}, "example": {"_type": "literalExpression", "text": "{\n  maps = pkgs.fetchNextcloudApp {\n    name = \"maps\";\n    sha256 = \"007y80idqg6b6zk6kjxg4vgw0z8fsxs9lajnv49vv1zjy6jx2i1i\";\n    url = \"https://github.com/nextcloud/maps/releases/download/v0.1.9/maps-0.1.9.tar.gz\";\n    version = \"0.1.9\";\n  };\n  phonetrack = pkgs.fetchNextcloudApp {\n    name = \"phonetrack\";\n    sha256 = \"0qf366vbahyl27p9mshfma1as4nvql6w75zy2zk5xwwbp343vsbc\";\n    url = \"https://gitlab.com/eneiluj/phonetrack-oc/-/wikis/uploads/931aaaf8dca24bf31a7e169a83c17235/phonetrack-0.6.9.tar.gz\";\n    version = \"0.6.9\";\n  };\n}\n"}, "loc": ["services", "nextcloud", "extraApps"], "readOnly": false, "type": "attribute set of package"}, "services.nextcloud.extraAppsEnable": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Automatically enable the apps in [](#opt-services.nextcloud.extraApps) every time Nextcloud starts.\nIf set to false, apps need to be enabled in the Nextcloud web user interface or with `nextcloud-occ app:enable`.\n"}, "loc": ["services", "nextcloud", "extraAppsEnable"], "readOnly": false, "type": "boolean"}, "services.nextcloud.extraOptions": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra options which should be appended to Nextcloud's config.php file.\n"}, "example": {"_type": "literalExpression", "text": "{\n       redis = {\n         host = \"/run/redis/redis.sock\";\n         port = 0;\n         dbindex = 0;\n         password = \"secret\";\n         timeout = 1.5;\n       };\n     } "}, "loc": ["services", "nextcloud", "extraOptions"], "readOnly": false, "type": "JSON value"}, "services.nextcloud.fastcgiTimeout": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "120"}, "description": {"_type": "mdDoc", "text": "FastCGI timeout for database connection in seconds.\n"}, "loc": ["services", "nextcloud", "fastcgiTimeout"], "readOnly": false, "type": "signed integer"}, "services.nextcloud.globalProfiles": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Makes user-profiles globally available under `nextcloud.tld/u/user.name`.\nEven though it's enabled by default in Nextcloud, it must be explicitly enabled\nhere because it has the side-effect that personal information is even accessible to\nunauthenticated users by default.\n\nBy default, the following properties are set to \u201cShow to everyone\u201d\nif this flag is enabled:\n- About\n- Full name\n- Headline\n- Organisation\n- Profile picture\n- Role\n- Twitter\n- Website\n\nOnly has an effect in Nextcloud 23 and later.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nextcloud", "globalProfiles"], "readOnly": false, "type": "boolean"}, "services.nextcloud.home": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/nextcloud\""}, "description": {"_type": "mdDoc", "text": "Storage path of nextcloud."}, "loc": ["services", "nextcloud", "home"], "readOnly": false, "type": "string"}, "services.nextcloud.hostName": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "description": {"_type": "mdDoc", "text": "FQDN for the nextcloud instance."}, "loc": ["services", "nextcloud", "hostName"], "readOnly": false, "type": "string"}, "services.nextcloud.https": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use HTTPS for generated links."}, "loc": ["services", "nextcloud", "https"], "readOnly": false, "type": "boolean"}, "services.nextcloud.logLevel": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Log level value between 0 (DEBUG) and 4 (FATAL).\n\n- 0 (debug): Log all activity.\n\n- 1 (info): Log activity such as user logins and file activities, plus warnings, errors, and fatal errors.\n\n- 2 (warn): Log successful operations, as well as warnings of potential problems, errors and fatal errors.\n\n- 3 (error): Log failed operations and fatal errors.\n\n- 4 (fatal): Log only fatal errors that cause the server to stop.\n"}, "loc": ["services", "nextcloud", "logLevel"], "readOnly": false, "type": "integer between 0 and 4 (both inclusive)"}, "services.nextcloud.logType": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "\"syslog\""}, "description": {"_type": "mdDoc", "text": "Logging backend to use.\nsystemd requires the php-systemd package to be added to services.nextcloud.phpExtraExtensions.\nSee the [nextcloud documentation](https://docs.nextcloud.com/server/latest/admin_manual/configuration_server/logging_configuration.html) for details.\n"}, "loc": ["services", "nextcloud", "logType"], "readOnly": false, "type": "one of \"errorlog\", \"file\", \"syslog\", \"systemd\""}, "services.nextcloud.maxUploadSize": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "\"512M\""}, "description": {"_type": "mdDoc", "text": "The upload limit for files. This changes the relevant options\nin php.ini and nginx if enabled.\n"}, "loc": ["services", "nextcloud", "maxUploadSize"], "readOnly": false, "type": "string"}, "services.nextcloud.nginx.hstsMaxAge": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "15552000"}, "description": {"_type": "mdDoc", "text": "Value for the `max-age` directive of the HTTP\n`Strict-Transport-Security` header.\n\nSee section 6.1.1 of IETF RFC 6797 for detailed information on this\ndirective and header.\n"}, "loc": ["services", "nextcloud", "nginx", "hstsMaxAge"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.nextcloud.nginx.recommendedHttpHeaders": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable additional recommended HTTP response headers"}, "loc": ["services", "nextcloud", "nginx", "recommendedHttpHeaders"], "readOnly": false, "type": "boolean"}, "services.nextcloud.notify_push.bendDomainToLocalhost": {"declarations": ["nixos/modules/services/web-apps/nextcloud-notify_push.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add an entry to `/etc/hosts` for the configured nextcloud domain to point to `localhost` and add `localhost `to nextcloud's `trusted_proxies` config option.\n\nThis is useful when nextcloud's domain is not a static IP address and when the reverse proxy cannot be bypassed because the backend connection is done via unix socket.\n"}, "loc": ["services", "nextcloud", "notify_push", "bendDomainToLocalhost"], "readOnly": false, "type": "boolean"}, "services.nextcloud.notify_push.dbhost": {"declarations": ["nixos/modules/services/web-apps/nextcloud-notify_push.nix"], "default": {"_type": "literalExpression", "text": "\"config.services.nextcloud.config.dbhost\""}, "description": {"_type": "mdDoc", "text": "Database host or socket path.\nIf [](#opt-services.nextcloud.database.createLocally) is true and\n[](#opt-services.nextcloud.config.dbtype) is either `pgsql` or `mysql`,\ndefaults to the correct Unix socket instead.\n"}, "loc": ["services", "nextcloud", "notify_push", "dbhost"], "readOnly": false, "type": "null or string"}, "services.nextcloud.notify_push.dbname": {"declarations": ["nixos/modules/services/web-apps/nextcloud-notify_push.nix"], "default": {"_type": "literalExpression", "text": "\"config.services.nextcloud.config.dbname\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "nextcloud", "notify_push", "dbname"], "readOnly": false, "type": "null or string"}, "services.nextcloud.notify_push.dbpassFile": {"declarations": ["nixos/modules/services/web-apps/nextcloud-notify_push.nix"], "default": {"_type": "literalExpression", "text": "\"config.services.nextcloud.config.dbpassFile\""}, "description": {"_type": "mdDoc", "text": "The full path to a file that contains the database password.\n"}, "loc": ["services", "nextcloud", "notify_push", "dbpassFile"], "readOnly": false, "type": "null or string"}, "services.nextcloud.notify_push.dbport": {"declarations": ["nixos/modules/services/web-apps/nextcloud-notify_push.nix"], "default": {"_type": "literalExpression", "text": "\"config.services.nextcloud.config.dbport\""}, "description": {"_type": "mdDoc", "text": "Database port."}, "loc": ["services", "nextcloud", "notify_push", "dbport"], "readOnly": false, "type": "null or signed integer or string"}, "services.nextcloud.notify_push.dbtableprefix": {"declarations": ["nixos/modules/services/web-apps/nextcloud-notify_push.nix"], "default": {"_type": "literalExpression", "text": "\"config.services.nextcloud.config.dbtableprefix\""}, "description": {"_type": "mdDoc", "text": "Table prefix in Nextcloud's database."}, "loc": ["services", "nextcloud", "notify_push", "dbtableprefix"], "readOnly": false, "type": "null or string"}, "services.nextcloud.notify_push.dbtype": {"declarations": ["nixos/modules/services/web-apps/nextcloud-notify_push.nix"], "default": {"_type": "literalExpression", "text": "\"config.services.nextcloud.config.dbtype\""}, "description": {"_type": "mdDoc", "text": "Database type."}, "loc": ["services", "nextcloud", "notify_push", "dbtype"], "readOnly": false, "type": "one of \"sqlite\", \"pgsql\", \"mysql\""}, "services.nextcloud.notify_push.dbuser": {"declarations": ["nixos/modules/services/web-apps/nextcloud-notify_push.nix"], "default": {"_type": "literalExpression", "text": "\"config.services.nextcloud.config.dbuser\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "nextcloud", "notify_push", "dbuser"], "readOnly": false, "type": "null or string"}, "services.nextcloud.notify_push.enable": {"declarations": ["nixos/modules/services/web-apps/nextcloud-notify_push.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Notify push."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nextcloud", "notify_push", "enable"], "readOnly": false, "type": "boolean"}, "services.nextcloud.notify_push.logLevel": {"declarations": ["nixos/modules/services/web-apps/nextcloud-notify_push.nix"], "default": {"_type": "literalExpression", "text": "\"error\""}, "description": {"_type": "mdDoc", "text": "Log level"}, "loc": ["services", "nextcloud", "notify_push", "logLevel"], "readOnly": false, "type": "one of \"error\", \"warn\", \"info\", \"debug\", \"trace\""}, "services.nextcloud.notify_push.package": {"declarations": ["nixos/modules/services/web-apps/nextcloud-notify_push.nix"], "default": {"_type": "literalMD", "text": "pkgs.nextcloud-notify_push"}, "description": {"_type": "mdDoc", "text": "Which package to use for notify_push"}, "loc": ["services", "nextcloud", "notify_push", "package"], "readOnly": false, "type": "package"}, "services.nextcloud.notify_push.socketPath": {"declarations": ["nixos/modules/services/web-apps/nextcloud-notify_push.nix"], "default": {"_type": "literalExpression", "text": "\"/run/nextcloud-notify_push/sock\""}, "description": {"_type": "mdDoc", "text": "Socket path to use for notify_push"}, "loc": ["services", "nextcloud", "notify_push", "socketPath"], "readOnly": false, "type": "string"}, "services.nextcloud.package": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "description": {"_type": "mdDoc", "text": "Which package to use for the Nextcloud instance."}, "loc": ["services", "nextcloud", "package"], "readOnly": false, "relatedPackages": "- [`pkgs.nextcloud25`](\n    https://search.nixos.org/packages?show=nextcloud25&sort=relevance&query=nextcloud25\n  )\n- [`pkgs.nextcloud26`](\n    https://search.nixos.org/packages?show=nextcloud26&sort=relevance&query=nextcloud26\n  )\n- [`pkgs.nextcloud27`](\n    https://search.nixos.org/packages?show=nextcloud27&sort=relevance&query=nextcloud27\n  )\n", "type": "package"}, "services.nextcloud.phpExtraExtensions": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "all: []"}, "description": {"_type": "mdDoc", "text": "Additional PHP extensions to use for Nextcloud.\nBy default, only extensions necessary for a vanilla Nextcloud installation are enabled,\nbut you may choose from the list of available extensions and add further ones.\nThis is sometimes necessary to be able to install a certain Nextcloud app that has additional requirements.\n"}, "example": {"_type": "literalExpression", "text": "all: [ all.pdlib all.bz2 ]\n"}, "loc": ["services", "nextcloud", "phpExtraExtensions"], "readOnly": false, "type": "function that evaluates to a(n) list of package"}, "services.nextcloud.phpOptions": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "{\n  catch_workers_output = \"yes\";\n  display_errors = \"stderr\";\n  error_reporting = \"E_ALL & ~E_DEPRECATED & ~E_STRICT\";\n  expose_php = \"Off\";\n  \"opcache.enable_cli\" = \"1\";\n  \"opcache.fast_shutdown\" = \"1\";\n  \"opcache.interned_strings_buffer\" = \"8\";\n  \"opcache.max_accelerated_files\" = \"10000\";\n  \"opcache.memory_consumption\" = \"128\";\n  \"opcache.revalidate_freq\" = \"1\";\n  \"openssl.cafile\" = \"/etc/ssl/certs/ca-certificates.crt\";\n  short_open_tag = \"Off\";\n}"}, "description": {"_type": "mdDoc", "text": "Options for PHP's php.ini file for nextcloud.\n"}, "loc": ["services", "nextcloud", "phpOptions"], "readOnly": false, "type": "attribute set of string"}, "services.nextcloud.phpPackage": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "\"pkgs.php\""}, "description": {"_type": "mdDoc", "text": "PHP package to use for Nextcloud.\n"}, "loc": ["services", "nextcloud", "phpPackage"], "readOnly": false, "relatedPackages": "- [`pkgs.php80`](\n    https://search.nixos.org/packages?show=php80&sort=relevance&query=php80\n  )\n- [`pkgs.php81`](\n    https://search.nixos.org/packages?show=php81&sort=relevance&query=php81\n  )\n", "type": "package"}, "services.nextcloud.poolConfig": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Options for Nextcloud's PHP pool. See the documentation on `php-fpm.conf` for details on configuration directives.\n"}, "loc": ["services", "nextcloud", "poolConfig"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.nextcloud.poolSettings": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = \"32\";\n  \"pm.max_requests\" = \"500\";\n  \"pm.max_spare_servers\" = \"4\";\n  \"pm.min_spare_servers\" = \"2\";\n  \"pm.start_servers\" = \"2\";\n}"}, "description": {"_type": "mdDoc", "text": "Options for nextcloud's PHP pool. See the documentation on `php-fpm.conf` for details on configuration directives.\n"}, "loc": ["services", "nextcloud", "poolSettings"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.nextcloud.secretFile": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Secret options which will be appended to Nextcloud's config.php file (written as JSON, in the same\nform as the [](#opt-services.nextcloud.extraOptions) option), for example\n`{\"redis\":{\"password\":\"secret\"}}`.\n"}, "loc": ["services", "nextcloud", "secretFile"], "readOnly": false, "type": "null or string"}, "services.nextcloud.skeletonDirectory": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The directory where the skeleton files are located. These files will be\ncopied to the data directory of new users. Leave empty to not copy any\nskeleton files.\n"}, "loc": ["services", "nextcloud", "skeletonDirectory"], "readOnly": false, "type": "string"}, "services.nextcloud.webfinger": {"declarations": ["nixos/modules/services/web-apps/nextcloud.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable this option if you plan on using the webfinger plugin.\nThe appropriate nginx rewrite rules will be added to your configuration.\n"}, "loc": ["services", "nextcloud", "webfinger"], "readOnly": false, "type": "boolean"}, "services.nextdns.arguments": {"declarations": ["nixos/modules/services/networking/nextdns.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional arguments to be passed to nextdns run."}, "example": {"_type": "literalExpression", "text": "[\n  \"-config\"\n  \"10.0.3.0/24=abcdef\"\n]"}, "loc": ["services", "nextdns", "arguments"], "readOnly": false, "type": "list of string"}, "services.nextdns.enable": {"declarations": ["nixos/modules/services/networking/nextdns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the NextDNS DNS/53 to DoH Proxy service."}, "loc": ["services", "nextdns", "enable"], "readOnly": false, "type": "boolean"}, "services.nexus.enable": {"declarations": ["nixos/modules/services/web-apps/nexus.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Sonatype Nexus3 OSS service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nexus", "enable"], "readOnly": false, "type": "boolean"}, "services.nexus.group": {"declarations": ["nixos/modules/services/web-apps/nexus.nix"], "default": {"_type": "literalExpression", "text": "\"nexus\""}, "description": {"_type": "mdDoc", "text": "Group which runs Nexus3."}, "loc": ["services", "nexus", "group"], "readOnly": false, "type": "string"}, "services.nexus.home": {"declarations": ["nixos/modules/services/web-apps/nexus.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/sonatype-work\""}, "description": {"_type": "mdDoc", "text": "Home directory of the Nexus3 instance."}, "loc": ["services", "nexus", "home"], "readOnly": false, "type": "string"}, "services.nexus.jvmOpts": {"declarations": ["nixos/modules/services/web-apps/nexus.nix"], "default": {"_type": "literalExpression", "text": "''\n  -Xms1200M\n  -Xmx1200M\n  -XX:MaxDirectMemorySize=2G\n  -XX:+UnlockDiagnosticVMOptions\n  -XX:+UnsyncloadClass\n  -XX:+LogVMOutput\n  -XX:LogFile=${home}/nexus3/log/jvm.log\n  -XX:-OmitStackTraceInFastThrow\n  -Djava.net.preferIPv4Stack=true\n  -Dkaraf.home=${package}\n  -Dkaraf.base=${package}\n  -Dkaraf.etc=${package}/etc/karaf\n  -Djava.util.logging.config.file=${package}/etc/karaf/java.util.logging.properties\n  -Dkaraf.data=${home}/nexus3\n  -Djava.io.tmpdir=${home}/nexus3/tmp\n  -Dkaraf.startLocalConsole=false\n  -Djava.endorsed.dirs=${package}/lib/endorsed\n''\n"}, "description": {"_type": "mdDoc", "text": "Options for the JVM written to `nexus.jvmopts`.\nPlease refer to the docs (https://help.sonatype.com/repomanager3/installation/configuring-the-runtime-environment)\nfor further information.\n"}, "loc": ["services", "nexus", "jvmOpts"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nexus.listenAddress": {"declarations": ["nixos/modules/services/web-apps/nexus.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address to listen on."}, "loc": ["services", "nexus", "listenAddress"], "readOnly": false, "type": "string"}, "services.nexus.listenPort": {"declarations": ["nixos/modules/services/web-apps/nexus.nix"], "default": {"_type": "literalExpression", "text": "8081"}, "description": {"_type": "mdDoc", "text": "Port to listen on."}, "loc": ["services", "nexus", "listenPort"], "readOnly": false, "type": "signed integer"}, "services.nexus.package": {"declarations": ["nixos/modules/services/web-apps/nexus.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nexus"}, "description": {"_type": "mdDoc", "text": "Package which runs Nexus3"}, "loc": ["services", "nexus", "package"], "readOnly": false, "type": "package"}, "services.nexus.user": {"declarations": ["nixos/modules/services/web-apps/nexus.nix"], "default": {"_type": "literalExpression", "text": "\"nexus\""}, "description": {"_type": "mdDoc", "text": "User which runs Nexus3."}, "loc": ["services", "nexus", "user"], "readOnly": false, "type": "string"}, "services.nfs.extraConfig": {"declarations": ["nixos/modules/tasks/filesystems/nfs.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra nfs-utils configuration.\n"}, "loc": ["services", "nfs", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nfs.idmapd.settings": {"declarations": ["nixos/modules/tasks/filesystems/nfs.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "libnfsidmap configuration. Refer to\n<https://linux.die.net/man/5/idmapd.conf>\nfor details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Translation = {\n    GSS-Methods = \"static,nsswitch\";\n  };\n  Static = {\n    \"root/hostname.domain.com@REALM.COM\" = \"root\";\n  };\n}\n"}, "loc": ["services", "nfs", "idmapd", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.nfs.server.createMountPoints": {"declarations": ["nixos/modules/services/network-filesystems/nfsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to create the mount points in the exports file at startup time."}, "loc": ["services", "nfs", "server", "createMountPoints"], "readOnly": false, "type": "boolean"}, "services.nfs.server.enable": {"declarations": ["nixos/modules/services/network-filesystems/nfsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the kernel's NFS server.\n"}, "loc": ["services", "nfs", "server", "enable"], "readOnly": false, "type": "boolean"}, "services.nfs.server.exports": {"declarations": ["nixos/modules/services/network-filesystems/nfsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Contents of the /etc/exports file.  See\n{manpage}`exports(5)` for the format.\n"}, "loc": ["services", "nfs", "server", "exports"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nfs.server.extraNfsdConfig": {"declarations": ["nixos/modules/services/network-filesystems/nfsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options for the [nfsd] section of /etc/nfs.conf.\n"}, "loc": ["services", "nfs", "server", "extraNfsdConfig"], "readOnly": false, "type": "string"}, "services.nfs.server.hostName": {"declarations": ["nixos/modules/services/network-filesystems/nfsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hostname or address on which NFS requests will be accepted.\nDefault is all.  See the {option}`-H` option in\n{manpage}`nfsd(8)`.\n"}, "loc": ["services", "nfs", "server", "hostName"], "readOnly": false, "type": "null or string"}, "services.nfs.server.lockdPort": {"declarations": ["nixos/modules/services/network-filesystems/nfsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use a fixed port for the NFS lock manager kernel module\n(`lockd/nlockmgr`).  This is useful if the\nNFS server is behind a firewall.\n"}, "example": {"_type": "literalExpression", "text": "4001"}, "loc": ["services", "nfs", "server", "lockdPort"], "readOnly": false, "type": "null or signed integer"}, "services.nfs.server.mountdPort": {"declarations": ["nixos/modules/services/network-filesystems/nfsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use fixed port for rpc.mountd, useful if server is behind firewall.\n"}, "example": {"_type": "literalExpression", "text": "4002"}, "loc": ["services", "nfs", "server", "mountdPort"], "readOnly": false, "type": "null or signed integer"}, "services.nfs.server.nproc": {"declarations": ["nixos/modules/services/network-filesystems/nfsd.nix"], "default": {"_type": "literalExpression", "text": "8"}, "description": {"_type": "mdDoc", "text": "Number of NFS server threads.  Defaults to the recommended value of 8.\n"}, "loc": ["services", "nfs", "server", "nproc"], "readOnly": false, "type": "signed integer"}, "services.nfs.server.statdPort": {"declarations": ["nixos/modules/services/network-filesystems/nfsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use a fixed port for {command}`rpc.statd`. This is\nuseful if the NFS server is behind a firewall.\n"}, "example": {"_type": "literalExpression", "text": "4000"}, "loc": ["services", "nfs", "server", "statdPort"], "readOnly": false, "type": "null or signed integer"}, "services.nginx.additionalModules": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional [third-party nginx modules](https://www.nginx.com/resources/wiki/modules/)\nto install. Packaged modules are available in `pkgs.nginxModules`.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.nginxModules.echo ]"}, "loc": ["services", "nginx", "additionalModules"], "readOnly": false, "type": "list of attribute set of anything"}, "services.nginx.appendConfig": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration lines appended to the generated Nginx\nconfiguration file. Commonly used by different modules\nproviding http snippets. {option}`appendConfig`\ncan be specified more than once and it's value will be\nconcatenated (contrary to {option}`config` which\ncan be set only once).\n"}, "loc": ["services", "nginx", "appendConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nginx.appendHttpConfig": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration lines to be appended to the generated http block.\nThis is mutually exclusive with using config and httpConfig for\nspecifying the whole http block verbatim.\n"}, "loc": ["services", "nginx", "appendHttpConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nginx.clientMaxBodySize": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"10m\""}, "description": {"_type": "mdDoc", "text": "Set nginx global client_max_body_size."}, "loc": ["services", "nginx", "clientMaxBodySize"], "readOnly": false, "type": "string"}, "services.nginx.commonHttpConfig": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "With nginx you must provide common http context definitions before\nthey are used, e.g. log_format, resolver, etc. inside of server\nor location contexts. Use this attribute to set these definitions\nat the appropriate location.\n"}, "example": {"_type": "literalExpression", "text": "''\n  resolver 127.0.0.1 valid=5s;\n  \n  log_format myformat '$remote_addr - $remote_user [$time_local] '\n                      '\"$request\" $status $body_bytes_sent '\n                      '\"$http_referer\" \"$http_user_agent\"';\n''"}, "loc": ["services", "nginx", "commonHttpConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nginx.config": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim {file}`nginx.conf` configuration.\nThis is mutually exclusive to any other config option for\n{file}`nginx.conf` except for\n- [](#opt-services.nginx.appendConfig)\n- [](#opt-services.nginx.httpConfig)\n- [](#opt-services.nginx.logError)\n\nIf additional verbatim config in addition to other options is needed,\n[](#opt-services.nginx.appendConfig) should be used instead.\n"}, "loc": ["services", "nginx", "config"], "readOnly": false, "type": "string"}, "services.nginx.defaultHTTPListenPort": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "If vhosts do not specify listen.port, use these ports for HTTP by default.\n"}, "example": {"_type": "literalExpression", "text": "8080"}, "loc": ["services", "nginx", "defaultHTTPListenPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nginx.defaultListenAddresses": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "[ \"0.0.0.0\" ] ++ lib.optional config.networking.enableIPv6 \"[::0]\""}, "description": {"_type": "mdDoc", "text": "If vhosts do not specify listenAddresses, use these addresses by default.\n"}, "example": {"_type": "literalExpression", "text": "[ \"10.0.0.12\" \"[2002:a00:1::]\" ]"}, "loc": ["services", "nginx", "defaultListenAddresses"], "readOnly": false, "type": "list of string"}, "services.nginx.defaultMimeTypes": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "$''{pkgs.mailcap}/etc/nginx/mime.types"}, "description": {"_type": "mdDoc", "text": "Default MIME types for NGINX, as MIME types definitions from NGINX are very incomplete,\nwe use by default the ones bundled in the mailcap package, used by most of the other\nLinux distributions.\n"}, "example": {"_type": "literalExpression", "text": "$''{pkgs.nginx}/conf/mime.types"}, "loc": ["services", "nginx", "defaultMimeTypes"], "readOnly": false, "type": "path"}, "services.nginx.defaultSSLListenPort": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "443"}, "description": {"_type": "mdDoc", "text": "If vhosts do not specify listen.port, use these ports for SSL by default.\n"}, "example": {"_type": "literalExpression", "text": "8443"}, "loc": ["services", "nginx", "defaultSSLListenPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nginx.enable": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Nginx Web Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nginx", "enable"], "readOnly": false, "type": "boolean"}, "services.nginx.enableReload": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Reload nginx when configuration file changes (instead of restart).\nThe configuration file is exposed at {file}`/etc/nginx/nginx.conf`.\nSee also `systemd.services.*.restartIfChanged`.\n"}, "loc": ["services", "nginx", "enableReload"], "readOnly": false, "type": "boolean"}, "services.nginx.eventsConfig": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration lines to be set inside the events block.\n"}, "loc": ["services", "nginx", "eventsConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nginx.gitweb.enable": {"declarations": ["nixos/modules/services/web-servers/nginx/gitweb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If true, enable gitweb in nginx.\n"}, "loc": ["services", "nginx", "gitweb", "enable"], "readOnly": false, "type": "boolean"}, "services.nginx.gitweb.group": {"declarations": ["nixos/modules/services/web-servers/nginx/gitweb.nix"], "default": {"_type": "literalExpression", "text": "\"nginx\""}, "description": {"_type": "mdDoc", "text": "Group that the CGI process will belong to. (Set to `config.services.gitolite.group` if you are using gitolite.)\n"}, "loc": ["services", "nginx", "gitweb", "group"], "readOnly": false, "type": "string"}, "services.nginx.gitweb.location": {"declarations": ["nixos/modules/services/web-servers/nginx/gitweb.nix"], "default": {"_type": "literalExpression", "text": "\"/gitweb\""}, "description": {"_type": "mdDoc", "text": "Location to serve gitweb on.\n"}, "loc": ["services", "nginx", "gitweb", "location"], "readOnly": false, "type": "string"}, "services.nginx.gitweb.user": {"declarations": ["nixos/modules/services/web-servers/nginx/gitweb.nix"], "default": {"_type": "literalExpression", "text": "\"nginx\""}, "description": {"_type": "mdDoc", "text": "Existing user that the CGI process will belong to. (Default almost surely will do.)\n"}, "loc": ["services", "nginx", "gitweb", "user"], "readOnly": false, "type": "string"}, "services.nginx.gitweb.virtualHost": {"declarations": ["nixos/modules/services/web-servers/nginx/gitweb.nix"], "default": {"_type": "literalExpression", "text": "\"_\""}, "description": {"_type": "mdDoc", "text": "VirtualHost to serve gitweb on. Default is catch-all.\n"}, "loc": ["services", "nginx", "gitweb", "virtualHost"], "readOnly": false, "type": "string"}, "services.nginx.group": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"nginx\""}, "description": {"_type": "mdDoc", "text": "Group account under which nginx runs."}, "loc": ["services", "nginx", "group"], "readOnly": false, "type": "string"}, "services.nginx.httpConfig": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration lines to be set inside the http block.\nThis is mutually exclusive with the structured configuration\nvia virtualHosts and the recommendedXyzSettings configuration\noptions. See appendHttpConfig for appending to the generated http block.\n"}, "loc": ["services", "nginx", "httpConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nginx.logError": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"stderr\""}, "description": {"_type": "mdDoc", "text": "Configures logging.\nThe first parameter defines a file that will store the log. The\nspecial value stderr selects the standard error file. Logging to\nsyslog can be configured by specifying the \u201csyslog:\u201d prefix.\nThe second parameter determines the level of logging, and can be\none of the following: debug, info, notice, warn, error, crit,\nalert, or emerg. Log levels above are listed in the order of\nincreasing severity. Setting a certain log level will cause all\nmessages of the specified and more severe log levels to be logged.\nIf this parameter is omitted then error is used.\n"}, "loc": ["services", "nginx", "logError"], "readOnly": false, "type": "string"}, "services.nginx.mapHashBucketSize": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the bucket size for the map variables hash tables. Default\nvalue depends on the processor\u2019s cache line size.\n"}, "loc": ["services", "nginx", "mapHashBucketSize"], "readOnly": false, "type": "null or one of 32, 64, 128"}, "services.nginx.mapHashMaxSize": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the maximum size of the map variables hash tables.\n"}, "loc": ["services", "nginx", "mapHashMaxSize"], "readOnly": false, "type": "null or positive integer, meaning >0"}, "services.nginx.package": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nginxStable"}, "description": {"_type": "mdDoc", "text": "Nginx package to use. This defaults to the stable version. Note\nthat the nginx team recommends to use the mainline version which\navailable in nixpkgs as `nginxMainline`.\n"}, "loc": ["services", "nginx", "package"], "readOnly": false, "type": "package"}, "services.nginx.preStart": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed before the service's nginx is started.\n"}, "loc": ["services", "nginx", "preStart"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nginx.proxyCachePath": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configure a proxy cache path entry.\nSee <http://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_cache_path> for documentation.\n"}, "loc": ["services", "nginx", "proxyCachePath"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.nginx.proxyCachePath.<name>.enable": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable this proxy cache path entry."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nginx", "proxyCachePath", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.nginx.proxyCachePath.<name>.inactive": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"10m\""}, "description": {"_type": "mdDoc", "text": "Cached data that has not been accessed for the time specified by\nthe inactive parameter is removed from the cache, regardless of\nits freshness.\n"}, "example": {"_type": "literalExpression", "text": "\"1d\""}, "loc": ["services", "nginx", "proxyCachePath", "<name>", "inactive"], "readOnly": false, "type": "string"}, "services.nginx.proxyCachePath.<name>.keysZoneName": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"cache\""}, "description": {"_type": "mdDoc", "text": "Set name to shared memory zone."}, "example": {"_type": "literalExpression", "text": "\"my_cache\""}, "loc": ["services", "nginx", "proxyCachePath", "<name>", "keysZoneName"], "readOnly": false, "type": "string"}, "services.nginx.proxyCachePath.<name>.keysZoneSize": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"10m\""}, "description": {"_type": "mdDoc", "text": "Set size to shared memory zone."}, "example": {"_type": "literalExpression", "text": "\"32m\""}, "loc": ["services", "nginx", "proxyCachePath", "<name>", "keysZoneSize"], "readOnly": false, "type": "string"}, "services.nginx.proxyCachePath.<name>.levels": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"1:2\""}, "description": {"_type": "mdDoc", "text": "The levels parameter defines structure of subdirectories in cache: from\n1 to 3, each level accepts values 1 or 2. \u0421an be used any combination of\n1 and 2 in these formats: x, x:x and x:x:x.\n"}, "example": {"_type": "literalExpression", "text": "\"1:2:2\""}, "loc": ["services", "nginx", "proxyCachePath", "<name>", "levels"], "readOnly": false, "type": "string"}, "services.nginx.proxyCachePath.<name>.maxSize": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"1g\""}, "description": {"_type": "mdDoc", "text": "Set maximum cache size"}, "example": {"_type": "literalExpression", "text": "\"2048m\""}, "loc": ["services", "nginx", "proxyCachePath", "<name>", "maxSize"], "readOnly": false, "type": "string"}, "services.nginx.proxyCachePath.<name>.useTempPath": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Nginx first writes files that are destined for the cache to a temporary\nstorage area, and the use_temp_path=off directive instructs Nginx to\nwrite them to the same directories where they will be cached. Recommended\nthat you set this parameter to off to avoid unnecessary copying of data\nbetween file systems.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nginx", "proxyCachePath", "<name>", "useTempPath"], "readOnly": false, "type": "boolean"}, "services.nginx.proxyResolveWhileRunning": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Resolves domains of proxyPass targets at runtime\nand not only at start, you have to set\nservices.nginx.resolver, too.\n"}, "loc": ["services", "nginx", "proxyResolveWhileRunning"], "readOnly": false, "type": "boolean"}, "services.nginx.proxyTimeout": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"60s\""}, "description": {"_type": "mdDoc", "text": "Change the proxy related timeouts in recommendedProxySettings.\n"}, "example": {"_type": "literalExpression", "text": "\"20s\""}, "loc": ["services", "nginx", "proxyTimeout"], "readOnly": false, "type": "string"}, "services.nginx.recommendedBrotliSettings": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable recommended brotli settings.\nLearn more about compression in Brotli format [here](https://github.com/google/ngx_brotli/).\n\nThis adds `pkgs.nginxModules.brotli` to `services.nginx.additionalModules`.\n"}, "loc": ["services", "nginx", "recommendedBrotliSettings"], "readOnly": false, "type": "boolean"}, "services.nginx.recommendedGzipSettings": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable recommended gzip settings.\nLearn more about compression in Gzip format [here](https://docs.nginx.com/nginx/admin-guide/web-server/compression/).\n"}, "loc": ["services", "nginx", "recommendedGzipSettings"], "readOnly": false, "type": "boolean"}, "services.nginx.recommendedOptimisation": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable recommended optimisation settings.\n"}, "loc": ["services", "nginx", "recommendedOptimisation"], "readOnly": false, "type": "boolean"}, "services.nginx.recommendedProxySettings": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable recommended proxy settings if a vhost does not specify the option manually.\n"}, "loc": ["services", "nginx", "recommendedProxySettings"], "readOnly": false, "type": "boolean"}, "services.nginx.recommendedTlsSettings": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable recommended TLS settings.\n"}, "loc": ["services", "nginx", "recommendedTlsSettings"], "readOnly": false, "type": "boolean"}, "services.nginx.recommendedZstdSettings": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable recommended zstd settings.\nLearn more about compression in Zstd format [here](https://github.com/tokers/zstd-nginx-module).\n\nThis adds `pkgs.nginxModules.zstd` to `services.nginx.additionalModules`.\n"}, "loc": ["services", "nginx", "recommendedZstdSettings"], "readOnly": false, "type": "boolean"}, "services.nginx.resolver": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configures name servers used to resolve names of upstream servers into addresses\n"}, "loc": ["services", "nginx", "resolver"], "readOnly": false, "type": "submodule"}, "services.nginx.resolver.addresses": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of resolvers to use"}, "example": {"_type": "literalExpression", "text": "[ \"[::1]\" \"127.0.0.1:5353\" ]"}, "loc": ["services", "nginx", "resolver", "addresses"], "readOnly": false, "type": "list of string"}, "services.nginx.resolver.ipv6": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "By default, nginx will look up both IPv4 and IPv6 addresses while resolving.\nIf looking up of IPv6 addresses is not desired, the ipv6=off parameter can be\nspecified.\n"}, "loc": ["services", "nginx", "resolver", "ipv6"], "readOnly": false, "type": "boolean"}, "services.nginx.resolver.valid": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "By default, nginx caches answers using the TTL value of a response.\nAn optional valid parameter allows overriding it\n"}, "example": {"_type": "literalExpression", "text": "\"30s\""}, "loc": ["services", "nginx", "resolver", "valid"], "readOnly": false, "type": "string"}, "services.nginx.serverNamesHashBucketSize": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the bucket size for the server names hash tables. Default\nvalue depends on the processor\u2019s cache line size.\n"}, "loc": ["services", "nginx", "serverNamesHashBucketSize"], "readOnly": false, "type": "null or positive integer, meaning >0"}, "services.nginx.serverNamesHashMaxSize": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the maximum size of the server names hash tables.\n"}, "loc": ["services", "nginx", "serverNamesHashMaxSize"], "readOnly": false, "type": "null or positive integer, meaning >0"}, "services.nginx.serverTokens": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Show nginx version in headers and error pages."}, "loc": ["services", "nginx", "serverTokens"], "readOnly": false, "type": "boolean"}, "services.nginx.sslCiphers": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384\""}, "description": {"_type": "mdDoc", "text": "Ciphers to choose from when negotiating TLS handshakes."}, "loc": ["services", "nginx", "sslCiphers"], "readOnly": false, "type": "null or string"}, "services.nginx.sslDhparam": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to DH parameters file."}, "example": {"_type": "literalExpression", "text": "\"/path/to/dhparams.pem\""}, "loc": ["services", "nginx", "sslDhparam"], "readOnly": false, "type": "null or path"}, "services.nginx.sslProtocols": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"TLSv1.2 TLSv1.3\""}, "description": {"_type": "mdDoc", "text": "Allowed TLS protocol versions."}, "example": {"_type": "literalExpression", "text": "\"TLSv1 TLSv1.1 TLSv1.2 TLSv1.3\""}, "loc": ["services", "nginx", "sslProtocols"], "readOnly": false, "type": "string"}, "services.nginx.sso.configuration": {"declarations": ["nixos/modules/services/security/nginx-sso.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "nginx-sso configuration\n([documentation](https://github.com/Luzifer/nginx-sso/wiki/Main-Configuration))\nas a Nix attribute set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  listen = { addr = \"127.0.0.1\"; port = 8080; };\n\n  providers.token.tokens = {\n    myuser = \"MyToken\";\n  };\n\n  acl = {\n    rule_sets = [\n      {\n        rules = [ { field = \"x-application\"; equals = \"MyApp\"; } ];\n        allow = [ \"myuser\" ];\n      }\n    ];\n  };\n}\n"}, "loc": ["services", "nginx", "sso", "configuration"], "readOnly": false, "type": "attribute set of unspecified value"}, "services.nginx.sso.enable": {"declarations": ["nixos/modules/services/security/nginx-sso.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nginx-sso service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nginx", "sso", "enable"], "readOnly": false, "type": "boolean"}, "services.nginx.sso.package": {"declarations": ["nixos/modules/services/security/nginx-sso.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nginx-sso"}, "description": {"_type": "mdDoc", "text": "The nginx-sso package that should be used.\n"}, "loc": ["services", "nginx", "sso", "package"], "readOnly": false, "type": "package"}, "services.nginx.statusPage": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable status page reachable from localhost on http://127.0.0.1/nginx_status.\n"}, "loc": ["services", "nginx", "statusPage"], "readOnly": false, "type": "boolean"}, "services.nginx.streamConfig": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration lines to be set inside the stream block.\n"}, "example": {"_type": "literalExpression", "text": "''\n  server {\n    listen 127.0.0.1:53 udp reuseport;\n    proxy_timeout 20s;\n    proxy_pass 192.168.0.1:53535;\n  }\n''"}, "loc": ["services", "nginx", "streamConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nginx.upstreams": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Defines a group of servers to use as proxy target.\n"}, "example": {"_type": "literalExpression", "text": "{\n  backend = {\n    extraConfig = ''\n      keepalive 16;\n    '';\n    servers = {\n      \"backend1.example.com:8080\" = {\n        weight = 5;\n      };\n      \"backend2.example.com\" = {\n        fail_timeout = \"30s\";\n        max_fails = 3;\n      };\n      \"backend3.example.com\" = { };\n      \"backup1.example.com\" = {\n        backup = true;\n      };\n      \"backup2.example.com\" = {\n        backup = true;\n      };\n    };\n  };\n  memcached = {\n    servers = {\n      \"unix:/run//memcached/memcached.sock\" = { };\n    };\n  };\n}"}, "loc": ["services", "nginx", "upstreams"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.nginx.upstreams.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the upstream verbatim.\n"}, "loc": ["services", "nginx", "upstreams", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nginx.upstreams.<name>.servers": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Defines the address and other parameters of the upstream servers.\nSee [the documentation](https://nginx.org/en/docs/http/ngx_http_upstream_module.html#server)\nfor the available parameters.\n"}, "example": {"_type": "literalMD", "text": "see [](#opt-services.nginx.upstreams)"}, "loc": ["services", "nginx", "upstreams", "<name>", "servers"], "readOnly": false, "type": "attribute set of (attribute set of (boolean or signed integer or string))"}, "services.nginx.upstreams.<name>.servers.<name>.backup": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Marks the server as a backup server. It will be passed\nrequests when the primary servers are unavailable.\n"}, "loc": ["services", "nginx", "upstreams", "<name>", "servers", "<name>", "backup"], "readOnly": false, "type": "boolean"}, "services.nginx.user": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"nginx\""}, "description": {"_type": "mdDoc", "text": "User account under which nginx runs."}, "loc": ["services", "nginx", "user"], "readOnly": false, "type": "string"}, "services.nginx.virtualHosts": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "{\n  localhost = { };\n}"}, "description": {"_type": "mdDoc", "text": "Declarative vhost config"}, "example": {"_type": "literalExpression", "text": "{\n  \"hydra.example.com\" = {\n    forceSSL = true;\n    enableACME = true;\n    locations.\"/\" = {\n      proxyPass = \"http://localhost:3000\";\n    };\n  };\n};\n"}, "loc": ["services", "nginx", "virtualHosts"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.nginx.virtualHosts.<name>.acmeFallbackHost": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host which to proxy requests to if ACME challenge is not found. Useful\nif you want multiple hosts to be able to verify the same domain name.\n\nWith this option, you could request certificates for the present domain\nwith an ACME client that is running on another host, which you would\nspecify here.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "acmeFallbackHost"], "readOnly": false, "type": "null or string"}, "services.nginx.virtualHosts.<name>.acmeRoot": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the ACME challenge, which is **public**. Don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.nginx.virtualHosts.<name>.addSSL": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "addSSL"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.basicAuth": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.nginx.virtualHosts.<name>.basicAuthFile": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.nginx.virtualHosts.<name>.default": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Makes this vhost the default.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "default"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.enableACME": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "enableACME"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the vhost verbatim.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nginx.virtualHosts.<name>.forceSSL": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.globalRedirect": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given hostname.\n"}, "example": {"_type": "literalExpression", "text": "\"newserver.example.org\""}, "loc": ["services", "nginx", "virtualHosts", "<name>", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.nginx.virtualHosts.<name>.http2": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/2 protocol.\nNote that (as of writing) due to nginx's implementation, to disable\nHTTP/2 you have to disable it on all vhosts that use a given\nIP address / port.\nIf there is one server block configured to enable http2, then it is\nenabled for all server blocks on this IP.\nSee https://stackoverflow.com/a/39466948/263061.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "http2"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.http3": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/3 protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that HTTP/3 support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "http3"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.http3_hq": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that special application protocol support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "http3_hq"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.kTLS": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kTLS support.\nImplementing TLS in the kernel (kTLS) improves performance by significantly\nreducing the need for copying operations between user space and the kernel.\nRequired Nginx version 1.21.4 or later.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "kTLS"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.listen": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\nIPv6 addresses must be enclosed in square brackets.\nNote: this option overrides `addSSL`\nand `onlySSL`.\n\nIf you only want to set the addresses manually and not\nthe ports, take a look at `listenAddresses`\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    addr = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    addr = \"192.154.1.1\";\n    port = 80;\n  }\n]"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.nginx.virtualHosts.<name>.listen.*.addr": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "description": {"_type": "mdDoc", "text": "IP address."}, "loc": ["services", "nginx", "virtualHosts", "<name>", "listen", "*", "addr"], "readOnly": false, "type": "string"}, "services.nginx.virtualHosts.<name>.listen.*.extraParameters": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters of this listen directive."}, "example": {"_type": "literalExpression", "text": "[\n  \"backlog=1024\"\n  \"deferred\"\n]"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "listen", "*", "extraParameters"], "readOnly": false, "type": "list of string"}, "services.nginx.virtualHosts.<name>.listen.*.port": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Port number."}, "loc": ["services", "nginx", "virtualHosts", "<name>", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nginx.virtualHosts.<name>.listen.*.ssl": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SSL."}, "loc": ["services", "nginx", "virtualHosts", "<name>", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.listenAddresses": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n\nNote: This option overrides `enableIPv6`\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"[::1]\"\n]"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "listenAddresses"], "readOnly": false, "type": "list of string"}, "services.nginx.virtualHosts.<name>.locations": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n};\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.nginx.virtualHosts.<name>.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.nginx.virtualHosts.<name>.locations.<name>.basicAuth": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations", "<name>", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.nginx.virtualHosts.<name>.locations.<name>.basicAuthFile": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations", "<name>", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.nginx.virtualHosts.<name>.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nginx.virtualHosts.<name>.locations.<name>.fastcgiParams": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "FastCGI parameters to override.  Unlike in the Nginx\nconfiguration file, overriding only some default parameters\nwon't unset the default values for other parameters.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations", "<name>", "fastcgiParams"], "readOnly": false, "type": "attribute set of (string or path)"}, "services.nginx.virtualHosts.<name>.locations.<name>.index": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds index directive.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.nginx.virtualHosts.<name>.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.nginx.virtualHosts.<name>.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds proxy_pass directive and sets recommended proxy headers if\nrecommendedProxySettings is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.nginx.virtualHosts.<name>.locations.<name>.proxyWebsockets": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to support proxying websocket connections with HTTP/1.1.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations", "<name>", "proxyWebsockets"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.locations.<name>.recommendedProxySettings": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "config.services.nginx.recommendedProxySettings"}, "description": {"_type": "mdDoc", "text": "Enable recommended proxy settings.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations", "<name>", "recommendedProxySettings"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.locations.<name>.return": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds a return directive, for e.g. redirections.\n"}, "example": {"_type": "literalExpression", "text": "\"301 http://example.com$request_uri\""}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations", "<name>", "return"], "readOnly": false, "type": "null or string"}, "services.nginx.virtualHosts.<name>.locations.<name>.root": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Root directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/root/directory\""}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations", "<name>", "root"], "readOnly": false, "type": "null or path"}, "services.nginx.virtualHosts.<name>.locations.<name>.tryFiles": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds try_files directive.\n"}, "example": {"_type": "literalExpression", "text": "\"$uri =404\""}, "loc": ["services", "nginx", "virtualHosts", "<name>", "locations", "<name>", "tryFiles"], "readOnly": false, "type": "null or string"}, "services.nginx.virtualHosts.<name>.onlySSL": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.quic": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the QUIC transport protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.\nNote that QUIC support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "quic"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.rejectSSL": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to listen for and reject all HTTPS connections to this vhost. Useful in\n[default](#opt-services.nginx.virtualHosts._name_.default)\nserver blocks to avoid serving the certificate for another vhost. Uses the\n`ssl_reject_handshake` directive available in nginx versions\n1.19.4 and above.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "rejectSSL"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.reuseport": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create an individual listening socket .\nIt is required to specify only once on one of the hosts.\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "reuseport"], "readOnly": false, "type": "boolean"}, "services.nginx.virtualHosts.<name>.root": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of the web root directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "nginx", "virtualHosts", "<name>", "root"], "readOnly": false, "type": "null or path"}, "services.nginx.virtualHosts.<name>.serverAliases": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"example.org\"\n]"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.nginx.virtualHosts.<name>.serverName": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of this virtual host. Defaults to attribute name in virtualHosts.\n"}, "example": {"_type": "literalExpression", "text": "\"example.org\""}, "loc": ["services", "nginx", "virtualHosts", "<name>", "serverName"], "readOnly": false, "type": "null or string"}, "services.nginx.virtualHosts.<name>.sslCertificate": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "nginx", "virtualHosts", "<name>", "sslCertificate"], "readOnly": false, "type": "path"}, "services.nginx.virtualHosts.<name>.sslCertificateKey": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "nginx", "virtualHosts", "<name>", "sslCertificateKey"], "readOnly": false, "type": "path"}, "services.nginx.virtualHosts.<name>.sslTrustedCertificate": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to root SSL certificate for stapling and client certificates."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\""}, "loc": ["services", "nginx", "virtualHosts", "<name>", "sslTrustedCertificate"], "readOnly": false, "type": "null or path"}, "services.nginx.virtualHosts.<name>.useACMEHost": {"declarations": ["nixos/modules/services/web-servers/nginx/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "nginx", "virtualHosts", "<name>", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.ngircd.config": {"declarations": ["nixos/modules/services/networking/ngircd.nix"], "description": {"_type": "mdDoc", "text": "The ngircd configuration (see ngircd.conf(5))."}, "loc": ["services", "ngircd", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.ngircd.enable": {"declarations": ["nixos/modules/services/networking/ngircd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the ngircd IRC server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ngircd", "enable"], "readOnly": false, "type": "boolean"}, "services.ngircd.package": {"declarations": ["nixos/modules/services/networking/ngircd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ngircd"}, "description": {"_type": "mdDoc", "text": "The ngircd package."}, "loc": ["services", "ngircd", "package"], "readOnly": false, "type": "package"}, "services.nifi.enable": {"declarations": ["nixos/modules/services/web-apps/nifi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Apache NiFi."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nifi", "enable"], "readOnly": false, "type": "boolean"}, "services.nifi.enableHTTPS": {"declarations": ["nixos/modules/services/web-apps/nifi.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable HTTPS protocol. Don`t use in production."}, "loc": ["services", "nifi", "enableHTTPS"], "readOnly": false, "type": "boolean"}, "services.nifi.group": {"declarations": ["nixos/modules/services/web-apps/nifi.nix"], "default": {"_type": "literalExpression", "text": "\"nifi\""}, "description": {"_type": "mdDoc", "text": "Group account where Apache NiFi runs."}, "loc": ["services", "nifi", "group"], "readOnly": false, "type": "string"}, "services.nifi.initJavaHeapSize": {"declarations": ["nixos/modules/services/web-apps/nifi.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the initial heap size for the JVM in MB."}, "example": {"_type": "literalExpression", "text": "1024"}, "loc": ["services", "nifi", "initJavaHeapSize"], "readOnly": false, "type": "null or signed integer"}, "services.nifi.initPasswordFile": {"declarations": ["nixos/modules/services/web-apps/nifi.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "nitial password for Apache NiFi. Password must be at least 12 characters."}, "example": {"_type": "literalExpression", "text": "\"/run/keys/nifi/password-nifi\""}, "loc": ["services", "nifi", "initPasswordFile"], "readOnly": false, "type": "null or path"}, "services.nifi.initUser": {"declarations": ["nixos/modules/services/web-apps/nifi.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Initial user account for Apache NiFi. Username must be at least 4 characters."}, "loc": ["services", "nifi", "initUser"], "readOnly": false, "type": "null or string"}, "services.nifi.listenHost": {"declarations": ["nixos/modules/services/web-apps/nifi.nix"], "default": {"_type": "literalExpression", "text": "if config.services.nifi.enableHTTPS\nthen \"0.0.0.0\"\nelse \"127.0.0.1\"\n"}, "description": {"_type": "mdDoc", "text": "Bind to an ip for Apache NiFi web-ui."}, "loc": ["services", "nifi", "listenHost"], "readOnly": false, "type": "string"}, "services.nifi.listenPort": {"declarations": ["nixos/modules/services/web-apps/nifi.nix"], "default": {"_type": "literalExpression", "text": "if config.services.nifi.enableHTTPS\nthen \"8443\"\nelse \"8000\"\n"}, "description": {"_type": "mdDoc", "text": "Bind to a port for Apache NiFi web-ui."}, "loc": ["services", "nifi", "listenPort"], "readOnly": false, "type": "signed integer"}, "services.nifi.maxJavaHeapSize": {"declarations": ["nixos/modules/services/web-apps/nifi.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the initial heap size for the JVM in MB."}, "example": {"_type": "literalExpression", "text": "2048"}, "loc": ["services", "nifi", "maxJavaHeapSize"], "readOnly": false, "type": "null or signed integer"}, "services.nifi.package": {"declarations": ["nixos/modules/services/web-apps/nifi.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nifi"}, "description": {"_type": "mdDoc", "text": "Apache NiFi package to use."}, "loc": ["services", "nifi", "package"], "readOnly": false, "type": "package"}, "services.nifi.proxyHost": {"declarations": ["nixos/modules/services/web-apps/nifi.nix"], "default": {"_type": "literalExpression", "text": "if config.services.nifi.enableHTTPS\nthen \"0.0.0.0\"\nelse null\n"}, "description": {"_type": "mdDoc", "text": "Allow requests from a specific host."}, "loc": ["services", "nifi", "proxyHost"], "readOnly": false, "type": "null or string"}, "services.nifi.proxyPort": {"declarations": ["nixos/modules/services/web-apps/nifi.nix"], "default": {"_type": "literalExpression", "text": "if config.services.nifi.enableHTTPS\nthen \"8443\"\nelse null\n"}, "description": {"_type": "mdDoc", "text": "Allow requests from a specific port."}, "loc": ["services", "nifi", "proxyPort"], "readOnly": false, "type": "null or signed integer"}, "services.nifi.user": {"declarations": ["nixos/modules/services/web-apps/nifi.nix"], "default": {"_type": "literalExpression", "text": "\"nifi\""}, "description": {"_type": "mdDoc", "text": "User account where Apache NiFi runs."}, "loc": ["services", "nifi", "user"], "readOnly": false, "type": "string"}, "services.nitter.cache.listMinutes": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "240"}, "description": {"_type": "mdDoc", "text": "How long to cache list info (not the tweets, so keep it high)."}, "loc": ["services", "nitter", "cache", "listMinutes"], "readOnly": false, "type": "signed integer"}, "services.nitter.cache.redisConnections": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "20"}, "description": {"_type": "mdDoc", "text": "Redis connection pool size."}, "loc": ["services", "nitter", "cache", "redisConnections"], "readOnly": false, "type": "signed integer"}, "services.nitter.cache.redisHost": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Redis host."}, "loc": ["services", "nitter", "cache", "redisHost"], "readOnly": false, "type": "string"}, "services.nitter.cache.redisMaxConnections": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "Maximum number of connections to Redis.\n\nNew connections are opened when none are available, but if the\npool size goes above this, they are closed when released, do not\nworry about this unless you receive tons of requests per second.\n"}, "loc": ["services", "nitter", "cache", "redisMaxConnections"], "readOnly": false, "type": "signed integer"}, "services.nitter.cache.redisPort": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "6379"}, "description": {"_type": "mdDoc", "text": "Redis port."}, "loc": ["services", "nitter", "cache", "redisPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nitter.cache.rssMinutes": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "How long to cache RSS queries."}, "loc": ["services", "nitter", "cache", "rssMinutes"], "readOnly": false, "type": "signed integer"}, "services.nitter.config.base64Media": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use base64 encoding for proxied media URLs."}, "loc": ["services", "nitter", "config", "base64Media"], "readOnly": false, "type": "boolean"}, "services.nitter.config.enableDebug": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable request logs and debug endpoints."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nitter", "config", "enableDebug"], "readOnly": false, "type": "boolean"}, "services.nitter.config.enableRSS": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable RSS feeds."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nitter", "config", "enableRSS"], "readOnly": false, "type": "boolean"}, "services.nitter.config.proxy": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "URL to a HTTP/HTTPS proxy."}, "loc": ["services", "nitter", "config", "proxy"], "readOnly": false, "type": "string"}, "services.nitter.config.proxyAuth": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Credentials for proxy."}, "loc": ["services", "nitter", "config", "proxyAuth"], "readOnly": false, "type": "string"}, "services.nitter.config.tokenCount": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Minimum amount of usable tokens.\n\nTokens are used to authorize API requests, but they expire after\n~1 hour, and have a limit of 187 requests. The limit gets reset\nevery 15 minutes, and the pool is filled up so there is always at\nleast tokenCount usable tokens. Only increase this if you receive\nmajor bursts all the time.\n"}, "loc": ["services", "nitter", "config", "tokenCount"], "readOnly": false, "type": "signed integer"}, "services.nitter.enable": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Nitter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nitter", "enable"], "readOnly": false, "type": "boolean"}, "services.nitter.openFirewall": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for Nitter web interface."}, "loc": ["services", "nitter", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.nitter.package": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nitter"}, "description": {"_type": "mdDoc", "text": "The nitter derivation to use."}, "loc": ["services", "nitter", "package"], "readOnly": false, "type": "package"}, "services.nitter.preferences.autoplayGifs": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Autoplay GIFs."}, "loc": ["services", "nitter", "preferences", "autoplayGifs"], "readOnly": false, "type": "boolean"}, "services.nitter.preferences.bidiSupport": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Support bidirectional text (makes clicking on tweets harder)."}, "loc": ["services", "nitter", "preferences", "bidiSupport"], "readOnly": false, "type": "boolean"}, "services.nitter.preferences.hideBanner": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Hide profile banner."}, "loc": ["services", "nitter", "preferences", "hideBanner"], "readOnly": false, "type": "boolean"}, "services.nitter.preferences.hidePins": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Hide pinned tweets."}, "loc": ["services", "nitter", "preferences", "hidePins"], "readOnly": false, "type": "boolean"}, "services.nitter.preferences.hideReplies": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Hide tweet replies."}, "loc": ["services", "nitter", "preferences", "hideReplies"], "readOnly": false, "type": "boolean"}, "services.nitter.preferences.hideTweetStats": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Hide tweet stats (replies, retweets, likes)."}, "loc": ["services", "nitter", "preferences", "hideTweetStats"], "readOnly": false, "type": "boolean"}, "services.nitter.preferences.hlsPlayback": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable HLS video streaming (requires JavaScript)."}, "loc": ["services", "nitter", "preferences", "hlsPlayback"], "readOnly": false, "type": "boolean"}, "services.nitter.preferences.infiniteScroll": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Infinite scrolling (requires JavaScript, experimental!)."}, "loc": ["services", "nitter", "preferences", "infiniteScroll"], "readOnly": false, "type": "boolean"}, "services.nitter.preferences.mp4Playback": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable MP4 video playback."}, "loc": ["services", "nitter", "preferences", "mp4Playback"], "readOnly": false, "type": "boolean"}, "services.nitter.preferences.muteVideos": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Mute videos by default."}, "loc": ["services", "nitter", "preferences", "muteVideos"], "readOnly": false, "type": "boolean"}, "services.nitter.preferences.proxyVideos": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Proxy video streaming through the server (might be slow)."}, "loc": ["services", "nitter", "preferences", "proxyVideos"], "readOnly": false, "type": "boolean"}, "services.nitter.preferences.replaceReddit": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Replace Reddit links with links to this instance (blank to disable)."}, "example": {"_type": "literalExpression", "text": "\"teddit.net\""}, "loc": ["services", "nitter", "preferences", "replaceReddit"], "readOnly": false, "type": "string"}, "services.nitter.preferences.replaceTwitter": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Replace Twitter links with links to this instance (blank to disable)."}, "example": {"_type": "literalExpression", "text": "\"nitter.net\""}, "loc": ["services", "nitter", "preferences", "replaceTwitter"], "readOnly": false, "type": "string"}, "services.nitter.preferences.replaceYouTube": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Replace YouTube links with links to this instance (blank to disable)."}, "example": {"_type": "literalExpression", "text": "\"piped.kavin.rocks\""}, "loc": ["services", "nitter", "preferences", "replaceYouTube"], "readOnly": false, "type": "string"}, "services.nitter.preferences.squareAvatars": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Square profile pictures."}, "loc": ["services", "nitter", "preferences", "squareAvatars"], "readOnly": false, "type": "boolean"}, "services.nitter.preferences.stickyProfile": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Make profile sidebar stick to top."}, "loc": ["services", "nitter", "preferences", "stickyProfile"], "readOnly": false, "type": "boolean"}, "services.nitter.preferences.theme": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "\"Nitter\""}, "description": {"_type": "mdDoc", "text": "Instance theme."}, "loc": ["services", "nitter", "preferences", "theme"], "readOnly": false, "type": "string"}, "services.nitter.redisCreateLocally": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Configure local Redis server for Nitter."}, "loc": ["services", "nitter", "redisCreateLocally"], "readOnly": false, "type": "boolean"}, "services.nitter.server.address": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "The address to listen on."}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "nitter", "server", "address"], "readOnly": false, "type": "string"}, "services.nitter.server.hostname": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Hostname of the instance."}, "example": {"_type": "literalExpression", "text": "\"nitter.net\""}, "loc": ["services", "nitter", "server", "hostname"], "readOnly": false, "type": "string"}, "services.nitter.server.httpMaxConnections": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "100"}, "description": {"_type": "mdDoc", "text": "Maximum number of HTTP connections."}, "loc": ["services", "nitter", "server", "httpMaxConnections"], "readOnly": false, "type": "signed integer"}, "services.nitter.server.https": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set secure attribute on cookies. Keep it disabled to enable cookies when not using HTTPS."}, "loc": ["services", "nitter", "server", "https"], "readOnly": false, "type": "boolean"}, "services.nitter.server.port": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "The port to listen on."}, "example": {"_type": "literalExpression", "text": "8000"}, "loc": ["services", "nitter", "server", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nitter.server.staticDir": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.nitter.package}/share/nitter/public\""}, "description": {"_type": "mdDoc", "text": "Path to the static files directory."}, "loc": ["services", "nitter", "server", "staticDir"], "readOnly": false, "type": "path"}, "services.nitter.server.title": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "\"nitter\""}, "description": {"_type": "mdDoc", "text": "Title of the instance."}, "loc": ["services", "nitter", "server", "title"], "readOnly": false, "type": "string"}, "services.nitter.settings": {"declarations": ["nixos/modules/services/misc/nitter.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Add settings here to override NixOS module generated settings.\n\nCheck the official repository for the available settings:\nhttps://github.com/zedeus/nitter/blob/master/nitter.example.conf\n"}, "loc": ["services", "nitter", "settings"], "readOnly": false, "type": "attribute set"}, "services.nix-serve.bindAddress": {"declarations": ["nixos/modules/services/networking/nix-serve.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IP address where nix-serve will bind its listening socket.\n"}, "loc": ["services", "nix-serve", "bindAddress"], "readOnly": false, "type": "string"}, "services.nix-serve.enable": {"declarations": ["nixos/modules/services/networking/nix-serve.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nix-serve, the standalone Nix binary cache server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nix-serve", "enable"], "readOnly": false, "type": "boolean"}, "services.nix-serve.extraParams": {"declarations": ["nixos/modules/services/networking/nix-serve.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra command line parameters for nix-serve.\n"}, "loc": ["services", "nix-serve", "extraParams"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.nix-serve.openFirewall": {"declarations": ["nixos/modules/services/networking/nix-serve.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for nix-serve."}, "loc": ["services", "nix-serve", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.nix-serve.package": {"declarations": ["nixos/modules/services/networking/nix-serve.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nix-serve"}, "description": {"_type": "mdDoc", "text": "nix-serve package to use.\n"}, "loc": ["services", "nix-serve", "package"], "readOnly": false, "type": "package"}, "services.nix-serve.port": {"declarations": ["nixos/modules/services/networking/nix-serve.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Port number where nix-serve will listen on.\n"}, "loc": ["services", "nix-serve", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nix-serve.secretKeyFile": {"declarations": ["nixos/modules/services/networking/nix-serve.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the file used for signing derivation data.\nGenerate with:\n\n```\nnix-store --generate-binary-cache-key key-name secret-key-file public-key-file\n```\n\nFor more details see {manpage}`nix-store(1)`.\n"}, "loc": ["services", "nix-serve", "secretKeyFile"], "readOnly": false, "type": "null or string"}, "services.nix-store-gcs-proxy": {"declarations": ["nixos/modules/services/networking/nix-store-gcs-proxy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "An attribute set describing an HTTP to GCS proxy that allows us to use GCS\nbucket via HTTP protocol.\n"}, "loc": ["services", "nix-store-gcs-proxy"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.nix-store-gcs-proxy.<name>.address": {"declarations": ["nixos/modules/services/networking/nix-store-gcs-proxy.nix"], "description": {"_type": "mdDoc", "text": "The address of the proxy."}, "example": {"_type": "literalExpression", "text": "\"localhost:3000\""}, "loc": ["services", "nix-store-gcs-proxy", "<name>", "address"], "readOnly": false, "type": "string"}, "services.nix-store-gcs-proxy.<name>.bucketName": {"declarations": ["nixos/modules/services/networking/nix-store-gcs-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Name of Google storage bucket"}, "example": {"_type": "literalExpression", "text": "\"my-bucket-name\""}, "loc": ["services", "nix-store-gcs-proxy", "<name>", "bucketName"], "readOnly": false, "type": "string"}, "services.nix-store-gcs-proxy.<name>.enable": {"declarations": ["nixos/modules/services/networking/nix-store-gcs-proxy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable proxy for this bucket"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nix-store-gcs-proxy", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.nixops-dns.dnsmasq": {"declarations": ["nixos/modules/services/networking/nixops-dns.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable dnsmasq forwarding to nixops-dns. This allows to use\nnixops-dns for `services.nixops-dns.domain` resolution\nwhile forwarding the rest of the queries to original resolvers.\n"}, "loc": ["services", "nixops-dns", "dnsmasq"], "readOnly": false, "type": "boolean"}, "services.nixops-dns.domain": {"declarations": ["nixos/modules/services/networking/nixops-dns.nix"], "default": {"_type": "literalExpression", "text": "\"ops\""}, "description": {"_type": "mdDoc", "text": "Fake domain name to resolve to NixOps virtual machines.\n\nFor example \"ops\" will resolve \"vm.ops\".\n"}, "loc": ["services", "nixops-dns", "domain"], "readOnly": false, "type": "string"}, "services.nixops-dns.enable": {"declarations": ["nixos/modules/services/networking/nixops-dns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the nixops-dns resolution\nof NixOps virtual machines via dnsmasq and fake domain name.\n"}, "loc": ["services", "nixops-dns", "enable"], "readOnly": false, "type": "boolean"}, "services.nixops-dns.user": {"declarations": ["nixos/modules/services/networking/nixops-dns.nix"], "description": {"_type": "mdDoc", "text": "The user the nixops-dns daemon should run as.\nThis should be the user, which is also used for nixops and\nhave the .nixops directory in its home.\n"}, "loc": ["services", "nixops-dns", "user"], "readOnly": false, "type": "string"}, "services.nntp-proxy.enable": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable NNTP-Proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nntp-proxy", "enable"], "readOnly": false, "type": "boolean"}, "services.nntp-proxy.listenAddress": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Proxy listen address (IPv6 literal addresses need to be enclosed in \"[\" and \"]\" characters)\n"}, "example": {"_type": "literalExpression", "text": "\"[::]\""}, "loc": ["services", "nntp-proxy", "listenAddress"], "readOnly": false, "type": "string"}, "services.nntp-proxy.port": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "5555"}, "description": {"_type": "mdDoc", "text": "Proxy listen port\n"}, "loc": ["services", "nntp-proxy", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nntp-proxy.prohibitPosting": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to prohibit posting to the upstream server\n"}, "loc": ["services", "nntp-proxy", "prohibitPosting"], "readOnly": false, "type": "boolean"}, "services.nntp-proxy.sslCert": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"cert.pem\""}, "description": {"_type": "mdDoc", "text": "Proxy ssl certificate path\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/your/cert.file\""}, "loc": ["services", "nntp-proxy", "sslCert"], "readOnly": false, "type": "string"}, "services.nntp-proxy.sslKey": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"key.pem\""}, "description": {"_type": "mdDoc", "text": "Proxy ssl key path\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/your/key.file\""}, "loc": ["services", "nntp-proxy", "sslKey"], "readOnly": false, "type": "string"}, "services.nntp-proxy.upstreamMaxConnections": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "20"}, "description": {"_type": "mdDoc", "text": "Upstream server maximum allowed concurrent connections\n"}, "loc": ["services", "nntp-proxy", "upstreamMaxConnections"], "readOnly": false, "type": "signed integer"}, "services.nntp-proxy.upstreamPassword": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Upstream server password\n"}, "loc": ["services", "nntp-proxy", "upstreamPassword"], "readOnly": false, "type": "string"}, "services.nntp-proxy.upstreamPort": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "563"}, "description": {"_type": "mdDoc", "text": "Upstream server port\n"}, "loc": ["services", "nntp-proxy", "upstreamPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nntp-proxy.upstreamServer": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Upstream server address\n"}, "example": {"_type": "literalExpression", "text": "\"ssl-eu.astraweb.com\""}, "loc": ["services", "nntp-proxy", "upstreamServer"], "readOnly": false, "type": "string"}, "services.nntp-proxy.upstreamUser": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Upstream server username\n"}, "loc": ["services", "nntp-proxy", "upstreamUser"], "readOnly": false, "type": "string"}, "services.nntp-proxy.users": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "NNTP-Proxy user configuration\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"user1\" = {\n    passwordHash = \"$6$1l0t5Kn2Dk$appzivc./9l/kjq57eg5UCsBKlcfyCr0zNWYNerKoPsI1d7eAwiT0SVsOVx/CTgaBNT/u4fi2vN.iGlPfv1ek0\";\n    maxConnections = 5;\n  };\n  \"anotheruser\" = {\n    passwordHash = \"$6$6lwEsWB.TmsS$W7m1riUx4QrA8pKJz8hvff0dnF1NwtZXgdjmGqA1Dx2MDPj07tI9GNcb0SWlMglE.2/hBgynDdAd/XqqtRqVQ0\";\n    maxConnections = 7;\n  };\n}\n"}, "loc": ["services", "nntp-proxy", "users"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.nntp-proxy.users.<name>.maxConnections": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Maximum number of concurrent connections to the proxy for this user\n"}, "loc": ["services", "nntp-proxy", "users", "<name>", "maxConnections"], "readOnly": false, "type": "signed integer"}, "services.nntp-proxy.users.<name>.passwordHash": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "description": {"_type": "mdDoc", "text": "SHA-512 password hash (can be generated by\n`mkpasswd -m sha-512 <password>`)\n"}, "example": {"_type": "literalExpression", "text": "\"$6$GtzE7FrpE$wwuVgFYU.TZH4Rz.Snjxk9XGua89IeVwPQ/fEUD8eujr40q5Y021yhn0aNcsQ2Ifw.BLclyzvzgegopgKcneL0\""}, "loc": ["services", "nntp-proxy", "users", "<name>", "passwordHash"], "readOnly": false, "type": "string"}, "services.nntp-proxy.users.<name>.username": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "description": {"_type": "mdDoc", "text": "Username\n"}, "loc": ["services", "nntp-proxy", "users", "<name>", "username"], "readOnly": false, "type": "string"}, "services.nntp-proxy.verbosity": {"declarations": ["nixos/modules/services/networking/nntp-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Verbosity level\n"}, "example": {"_type": "literalExpression", "text": "\"error\""}, "loc": ["services", "nntp-proxy", "verbosity"], "readOnly": false, "type": "one of \"error\", \"warning\", \"notice\", \"info\", \"debug\""}, "services.node-red.configFile": {"declarations": ["nixos/modules/services/web-apps/node-red.nix"], "default": {"_type": "literalExpression", "text": "\"${package}/lib/node_modules/node-red/settings.js\""}, "description": {"_type": "mdDoc", "text": "Path to the JavaScript configuration file.\nSee <https://github.com/node-red/node-red/blob/master/packages/node_modules/node-red/settings.js>\nfor a configuration example.\n"}, "loc": ["services", "node-red", "configFile"], "readOnly": false, "type": "path"}, "services.node-red.define": {"declarations": ["nixos/modules/services/web-apps/node-red.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "List of settings.js overrides to pass via -D to Node-RED."}, "example": {"_type": "literalExpression", "text": "{\n  \"logging.console.level\" = \"trace\";\n}\n"}, "loc": ["services", "node-red", "define"], "readOnly": false, "type": "attribute set"}, "services.node-red.enable": {"declarations": ["nixos/modules/services/web-apps/node-red.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Node-RED service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "node-red", "enable"], "readOnly": false, "type": "boolean"}, "services.node-red.group": {"declarations": ["nixos/modules/services/web-apps/node-red.nix"], "default": {"_type": "literalExpression", "text": "\"node-red\""}, "description": {"_type": "mdDoc", "text": "Group under which Node-RED runs.If left as the default value this group\nwill automatically be created on system activation, otherwise the\nsysadmin is responsible for ensuring the group exists.\n"}, "loc": ["services", "node-red", "group"], "readOnly": false, "type": "string"}, "services.node-red.openFirewall": {"declarations": ["nixos/modules/services/web-apps/node-red.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the server.\n"}, "loc": ["services", "node-red", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.node-red.package": {"declarations": ["nixos/modules/services/web-apps/node-red.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nodePackages.node-red"}, "description": {"_type": "mdDoc", "text": "Node-RED package to use."}, "loc": ["services", "node-red", "package"], "readOnly": false, "type": "package"}, "services.node-red.port": {"declarations": ["nixos/modules/services/web-apps/node-red.nix"], "default": {"_type": "literalExpression", "text": "1880"}, "description": {"_type": "mdDoc", "text": "Listening port."}, "loc": ["services", "node-red", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.node-red.safe": {"declarations": ["nixos/modules/services/web-apps/node-red.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to launch Node-RED in --safe mode."}, "loc": ["services", "node-red", "safe"], "readOnly": false, "type": "boolean"}, "services.node-red.user": {"declarations": ["nixos/modules/services/web-apps/node-red.nix"], "default": {"_type": "literalExpression", "text": "\"node-red\""}, "description": {"_type": "mdDoc", "text": "User under which Node-RED runs.If left as the default value this user\nwill automatically be created on system activation, otherwise the\nsysadmin is responsible for ensuring the user exists.\n"}, "loc": ["services", "node-red", "user"], "readOnly": false, "type": "string"}, "services.node-red.userDir": {"declarations": ["nixos/modules/services/web-apps/node-red.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/node-red\""}, "description": {"_type": "mdDoc", "text": "The directory to store all user data, such as flow and credential files and all library data. If left\nas the default value this directory will automatically be created before the node-red service starts,\notherwise the sysadmin is responsible for ensuring the directory exists with appropriate ownership\nand permissions.\n"}, "loc": ["services", "node-red", "userDir"], "readOnly": false, "type": "path"}, "services.node-red.withNpmAndGcc": {"declarations": ["nixos/modules/services/web-apps/node-red.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Give Node-RED access to NPM and GCC at runtime, so 'Nodes' can be\ndownloaded and managed imperatively via the 'Palette Manager'.\n"}, "loc": ["services", "node-red", "withNpmAndGcc"], "readOnly": false, "type": "boolean"}, "services.nomad.credentials": {"declarations": ["nixos/modules/services/networking/nomad.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Credentials envs used to configure nomad secrets.\n"}, "example": {"_type": "literalExpression", "text": "{\n  logs_remote_write_password = \"/run/keys/nomad_write_password\";\n}"}, "loc": ["services", "nomad", "credentials"], "readOnly": false, "type": "attribute set of string"}, "services.nomad.dropPrivileges": {"declarations": ["nixos/modules/services/networking/nomad.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the nomad agent should be run as a non-root nomad user.\n"}, "loc": ["services", "nomad", "dropPrivileges"], "readOnly": false, "type": "boolean"}, "services.nomad.enable": {"declarations": ["nixos/modules/services/networking/nomad.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Nomad, a distributed, highly available, datacenter-aware scheduler."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nomad", "enable"], "readOnly": false, "type": "boolean"}, "services.nomad.enableDocker": {"declarations": ["nixos/modules/services/networking/nomad.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable Docker support. Needed for Nomad's docker driver.\n\nNote that the docker group membership is effectively equivalent\nto being root, see https://github.com/moby/moby/issues/9976.\n"}, "loc": ["services", "nomad", "enableDocker"], "readOnly": false, "type": "boolean"}, "services.nomad.extraPackages": {"declarations": ["nixos/modules/services/networking/nomad.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra packages to add to {env}`PATH` for the Nomad agent process.\n"}, "example": {"_type": "literalExpression", "text": "with pkgs; [ cni-plugins ]\n"}, "loc": ["services", "nomad", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.nomad.extraSettingsPaths": {"declarations": ["nixos/modules/services/networking/nomad.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional settings paths used to configure nomad. These can be files or directories.\n"}, "example": {"_type": "literalExpression", "text": "[ \"/etc/nomad-mutable.json\" \"/run/keys/nomad-with-secrets.json\" \"/etc/nomad/config.d\" ]\n"}, "loc": ["services", "nomad", "extraSettingsPaths"], "readOnly": false, "type": "list of path"}, "services.nomad.extraSettingsPlugins": {"declarations": ["nixos/modules/services/networking/nomad.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional plugins dir used to configure nomad.\n"}, "example": {"_type": "literalExpression", "text": "[ \"<pluginDir>\" pkgs.nomad-driver-nix pkgs.nomad-driver-podman  ]\n"}, "loc": ["services", "nomad", "extraSettingsPlugins"], "readOnly": false, "type": "list of (package or path)"}, "services.nomad.package": {"declarations": ["nixos/modules/services/networking/nomad.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nomad"}, "description": {"_type": "mdDoc", "text": "The package used for the Nomad agent and CLI.\n"}, "loc": ["services", "nomad", "package"], "readOnly": false, "type": "package"}, "services.nomad.settings": {"declarations": ["nixos/modules/services/networking/nomad.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for Nomad. See the [documentation](https://www.nomadproject.io/docs/configuration)\nfor supported values.\n\nNotes about `data_dir`:\n\nIf `data_dir` is set to a value other than the\ndefault value of `\"/var/lib/nomad\"` it is the Nomad\ncluster manager's responsibility to make sure that this directory\nexists and has the appropriate permissions.\n\nAdditionally, if `dropPrivileges` is\n`true` then `data_dir`\n*cannot* be customized. Setting\n`dropPrivileges` to `true` enables\nthe `DynamicUser` feature of systemd which directly\nmanages and operates on `StateDirectory`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  # A minimal config example:\n  server = {\n    enabled = true;\n    bootstrap_expect = 1; # for demo; no fault tolerance\n  };\n  client = {\n    enabled = true;\n  };\n}\n"}, "loc": ["services", "nomad", "settings"], "readOnly": false, "type": "JSON value"}, "services.novacomd.enable": {"declarations": ["nixos/modules/services/misc/novacomd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Novacom service for connecting to WebOS devices."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "novacomd", "enable"], "readOnly": false, "type": "boolean"}, "services.nscd.config": {"declarations": ["nixos/modules/services/system/nscd.nix"], "default": {"_type": "literalExpression", "text": "''\n  # We basically use nscd as a proxy for forwarding nss requests to appropriate\n  # nss modules, as we run nscd with LD_LIBRARY_PATH set to the directory\n  # containing all such modules\n  # Note that we can not use `enable-cache no` As this will actually cause nscd\n  # to just reject the nss requests it receives, which then causes glibc to\n  # fallback to trying to handle the request by itself. Which won't work as glibc\n  # is not aware of the path in which the nss modules live.  As a workaround, we\n  # have `enable-cache yes` with an explicit ttl of 0\n  server-user             nscd\n  \n  enable-cache            passwd          yes\n  positive-time-to-live   passwd          0\n  negative-time-to-live   passwd          0\n  shared                  passwd          yes\n  \n  enable-cache            group           yes\n  positive-time-to-live   group           0\n  negative-time-to-live   group           0\n  shared                  group           yes\n  \n  enable-cache            netgroup        yes\n  positive-time-to-live   netgroup        0\n  negative-time-to-live   netgroup        0\n  shared                  netgroup        yes\n  \n  enable-cache            hosts           yes\n  positive-time-to-live   hosts           0\n  negative-time-to-live   hosts           0\n  shared                  hosts           yes\n  \n  enable-cache            services        yes\n  positive-time-to-live   services        0\n  negative-time-to-live   services        0\n  shared                  services        yes\n''"}, "description": {"_type": "mdDoc", "text": "Configuration to use for Name Service Cache Daemon.\nOnly used in case glibc-nscd is used.\n"}, "loc": ["services", "nscd", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nscd.enable": {"declarations": ["nixos/modules/services/system/nscd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Name Service Cache Daemon.\nDisabling this is strongly discouraged, as this effectively disables NSS Lookups\nfrom all non-glibc NSS modules, including the ones provided by systemd.\n"}, "loc": ["services", "nscd", "enable"], "readOnly": false, "type": "boolean"}, "services.nscd.enableNsncd": {"declarations": ["nixos/modules/services/system/nscd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to use nsncd instead of nscd from glibc.\nThis is a nscd-compatible daemon, that proxies lookups, without any caching.\nUsing nscd from glibc is discouraged.\n"}, "loc": ["services", "nscd", "enableNsncd"], "readOnly": false, "type": "boolean"}, "services.nscd.group": {"declarations": ["nixos/modules/services/system/nscd.nix"], "default": {"_type": "literalExpression", "text": "\"nscd\""}, "description": {"_type": "mdDoc", "text": "User group under which nscd runs.\n"}, "loc": ["services", "nscd", "group"], "readOnly": false, "type": "string"}, "services.nscd.package": {"declarations": ["nixos/modules/services/system/nscd.nix"], "default": {"_type": "literalExpression", "text": "if pkgs.stdenv.hostPlatform.libc == \"glibc\"\n  then pkgs.stdenv.cc.libc.bin\n  else pkgs.glibc.bin;\n"}, "description": {"_type": "mdDoc", "text": "package containing the nscd binary to be used by the service.\nIgnored when enableNsncd is set to true.\n"}, "loc": ["services", "nscd", "package"], "readOnly": false, "type": "package"}, "services.nscd.user": {"declarations": ["nixos/modules/services/system/nscd.nix"], "default": {"_type": "literalExpression", "text": "\"nscd\""}, "description": {"_type": "mdDoc", "text": "User account under which nscd runs.\n"}, "loc": ["services", "nscd", "user"], "readOnly": false, "type": "string"}, "services.nsd.bind8Stats": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable BIND8 like statistics."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nsd", "bind8Stats"], "readOnly": false, "type": "boolean"}, "services.nsd.dnssecInterval": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "\"1h\""}, "description": {"_type": "mdDoc", "text": "How often to check whether dnssec key rollover is required\n"}, "loc": ["services", "nsd", "dnssecInterval"], "readOnly": false, "type": "string"}, "services.nsd.enable": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable NSD authoritative DNS server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nsd", "enable"], "readOnly": false, "type": "boolean"}, "services.nsd.extraConfig": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra nsd config.\n"}, "loc": ["services", "nsd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nsd.hideVersion": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether NSD should answer VERSION.BIND and VERSION.SERVER CHAOS class queries.\n"}, "loc": ["services", "nsd", "hideVersion"], "readOnly": false, "type": "boolean"}, "services.nsd.identity": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "\"unidentified server\""}, "description": {"_type": "mdDoc", "text": "Identify the server (CH TXT ID.SERVER entry).\n"}, "loc": ["services", "nsd", "identity"], "readOnly": false, "type": "string"}, "services.nsd.interfaces": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.0\"\n  \"::1\"\n]"}, "description": {"_type": "mdDoc", "text": "What addresses the server should listen to.\n"}, "loc": ["services", "nsd", "interfaces"], "readOnly": false, "type": "list of string"}, "services.nsd.ipFreebind": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to bind to nonlocal addresses and interfaces that are down.\nSimilar to ip-transparent.\n"}, "loc": ["services", "nsd", "ipFreebind"], "readOnly": false, "type": "boolean"}, "services.nsd.ipTransparent": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow binding to non local addresses.\n"}, "loc": ["services", "nsd", "ipTransparent"], "readOnly": false, "type": "boolean"}, "services.nsd.ipv4": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to listen on IPv4 connections.\n"}, "loc": ["services", "nsd", "ipv4"], "readOnly": false, "type": "boolean"}, "services.nsd.ipv4EDNSSize": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "4096"}, "description": {"_type": "mdDoc", "text": "Preferred EDNS buffer size for IPv4.\n"}, "loc": ["services", "nsd", "ipv4EDNSSize"], "readOnly": false, "type": "signed integer"}, "services.nsd.ipv6": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to listen on IPv6 connections.\n"}, "loc": ["services", "nsd", "ipv6"], "readOnly": false, "type": "boolean"}, "services.nsd.ipv6EDNSSize": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "4096"}, "description": {"_type": "mdDoc", "text": "Preferred EDNS buffer size for IPv6.\n"}, "loc": ["services", "nsd", "ipv6EDNSSize"], "readOnly": false, "type": "signed integer"}, "services.nsd.keys": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Define your TSIG keys here.\n"}, "example": {"_type": "literalExpression", "text": "{ \"tsig.example.org\" = {\n    algorithm = \"hmac-md5\";\n    keyFile = \"/path/to/my/key\";\n  };\n}\n"}, "loc": ["services", "nsd", "keys"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.nsd.keys.<name>.algorithm": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "\"hmac-sha256\""}, "description": {"_type": "mdDoc", "text": "Authentication algorithm for this key.\n"}, "loc": ["services", "nsd", "keys", "<name>", "algorithm"], "readOnly": false, "type": "string"}, "services.nsd.keys.<name>.keyFile": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "description": {"_type": "mdDoc", "text": "Path to the file which contains the actual base64 encoded\nkey. The key will be copied into \"/var/lib/nsd/private\" before\nNSD starts. The copied file is only accessibly by the NSD\nuser.\n"}, "loc": ["services", "nsd", "keys", "<name>", "keyFile"], "readOnly": false, "type": "path"}, "services.nsd.logTimeAscii": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Log time in ascii, if false then in unix epoch seconds.\n"}, "loc": ["services", "nsd", "logTimeAscii"], "readOnly": false, "type": "boolean"}, "services.nsd.nsid": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "NSID identity (hex string, or \"ascii_somestring\").\n"}, "loc": ["services", "nsd", "nsid"], "readOnly": false, "type": "null or string"}, "services.nsd.port": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "53"}, "description": {"_type": "mdDoc", "text": "Port the service should bind do.\n"}, "loc": ["services", "nsd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nsd.ratelimit.enable": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ratelimit capabilities."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nsd", "ratelimit", "enable"], "readOnly": false, "type": "boolean"}, "services.nsd.ratelimit.ipv4PrefixLength": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IPv4 prefix length. Addresses are grouped by netblock.\n"}, "loc": ["services", "nsd", "ratelimit", "ipv4PrefixLength"], "readOnly": false, "type": "null or signed integer"}, "services.nsd.ratelimit.ipv6PrefixLength": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IPv6 prefix length. Addresses are grouped by netblock.\n"}, "loc": ["services", "nsd", "ratelimit", "ipv6PrefixLength"], "readOnly": false, "type": "null or signed integer"}, "services.nsd.ratelimit.ratelimit": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "200"}, "description": {"_type": "mdDoc", "text": "Max qps allowed from any query source.\n0 means unlimited. With an verbosity of 2 blocked and\nunblocked subnets will be logged.\n"}, "loc": ["services", "nsd", "ratelimit", "ratelimit"], "readOnly": false, "type": "signed integer"}, "services.nsd.ratelimit.size": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "1000000"}, "description": {"_type": "mdDoc", "text": "Size of the hashtable. More buckets use more memory but lower\nthe chance of hash hash collisions.\n"}, "loc": ["services", "nsd", "ratelimit", "size"], "readOnly": false, "type": "signed integer"}, "services.nsd.ratelimit.slip": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of packets that get discarded before replying a SLIP response.\n0 disables SLIP responses. 1 will make every response a SLIP response.\n"}, "loc": ["services", "nsd", "ratelimit", "slip"], "readOnly": false, "type": "null or signed integer"}, "services.nsd.ratelimit.whitelistRatelimit": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "2000"}, "description": {"_type": "mdDoc", "text": "Max qps allowed from whitelisted sources.\n0 means unlimited. Set the rrl-whitelist option for specific\nqueries to apply this limit instead of the default to them.\n"}, "loc": ["services", "nsd", "ratelimit", "whitelistRatelimit"], "readOnly": false, "type": "signed integer"}, "services.nsd.remoteControl.controlCertFile": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/nsd/nsd_control.pem\""}, "description": {"_type": "mdDoc", "text": "Path to the client certificate signed with the server certificate.\nThis file is used by nsd-control and generated by nsd-control-setup.\n"}, "loc": ["services", "nsd", "remoteControl", "controlCertFile"], "readOnly": false, "type": "path"}, "services.nsd.remoteControl.controlKeyFile": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/nsd/nsd_control.key\""}, "description": {"_type": "mdDoc", "text": "Path to the client private key, which is used by nsd-control\nbut not by the server. This file is generated by nsd-control-setup.\n"}, "loc": ["services", "nsd", "remoteControl", "controlKeyFile"], "readOnly": false, "type": "path"}, "services.nsd.remoteControl.enable": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable remote control via nsd-control."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nsd", "remoteControl", "enable"], "readOnly": false, "type": "boolean"}, "services.nsd.remoteControl.interfaces": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"::1\"\n]"}, "description": {"_type": "mdDoc", "text": "Which interfaces NSD should bind to for remote control.\n"}, "loc": ["services", "nsd", "remoteControl", "interfaces"], "readOnly": false, "type": "list of string"}, "services.nsd.remoteControl.port": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "8952"}, "description": {"_type": "mdDoc", "text": "Port number for remote control operations (uses TLS over TCP).\n"}, "loc": ["services", "nsd", "remoteControl", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nsd.remoteControl.serverCertFile": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/nsd/nsd_server.pem\""}, "description": {"_type": "mdDoc", "text": "Path to the server self signed certificate, which is used by the server\nbut and by nsd-control. This file is generated by nsd-control-setup.\n"}, "loc": ["services", "nsd", "remoteControl", "serverCertFile"], "readOnly": false, "type": "path"}, "services.nsd.remoteControl.serverKeyFile": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/nsd/nsd_server.key\""}, "description": {"_type": "mdDoc", "text": "Path to the server private key, which is used by the server\nbut not by nsd-control. This file is generated by nsd-control-setup.\n"}, "loc": ["services", "nsd", "remoteControl", "serverKeyFile"], "readOnly": false, "type": "path"}, "services.nsd.reuseport": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.stdenv.isLinux"}, "description": {"_type": "mdDoc", "text": "Whether to enable SO_REUSEPORT on all used sockets. This lets multiple\nprocesses bind to the same port. This speeds up operation especially\nif the server count is greater than one and makes fast restarts less\nprone to fail\n"}, "loc": ["services", "nsd", "reuseport"], "readOnly": false, "type": "boolean"}, "services.nsd.rootServer": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether this server will be a root server (a DNS root server, you\nusually don't want that).\n"}, "loc": ["services", "nsd", "rootServer"], "readOnly": false, "type": "boolean"}, "services.nsd.roundRobin": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable round robin rotation of records."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nsd", "roundRobin"], "readOnly": false, "type": "boolean"}, "services.nsd.serverCount": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Number of NSD servers to fork. Put the number of CPUs to use here.\n"}, "loc": ["services", "nsd", "serverCount"], "readOnly": false, "type": "signed integer"}, "services.nsd.statistics": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Statistics are produced every number of seconds. Prints to log.\nIf null no statistics are logged.\n"}, "loc": ["services", "nsd", "statistics"], "readOnly": false, "type": "null or signed integer"}, "services.nsd.tcpCount": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "100"}, "description": {"_type": "mdDoc", "text": "Maximum number of concurrent TCP connections per server.\n"}, "loc": ["services", "nsd", "tcpCount"], "readOnly": false, "type": "signed integer"}, "services.nsd.tcpQueryCount": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Maximum number of queries served on a single TCP connection.\n0 means no maximum.\n"}, "loc": ["services", "nsd", "tcpQueryCount"], "readOnly": false, "type": "signed integer"}, "services.nsd.tcpTimeout": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "120"}, "description": {"_type": "mdDoc", "text": "TCP timeout in seconds.\n"}, "loc": ["services", "nsd", "tcpTimeout"], "readOnly": false, "type": "signed integer"}, "services.nsd.verbosity": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Verbosity level.\n"}, "loc": ["services", "nsd", "verbosity"], "readOnly": false, "type": "signed integer"}, "services.nsd.version": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The version string replied for CH TXT version.server and version.bind\nqueries. Will use the compiled package version on null.\nSee hideVersion for enabling/disabling this responses.\n"}, "loc": ["services", "nsd", "version"], "readOnly": false, "type": "null or string"}, "services.nsd.xfrdReloadTimeout": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Number of seconds between reloads triggered by xfrd.\n"}, "loc": ["services", "nsd", "xfrdReloadTimeout"], "readOnly": false, "type": "signed integer"}, "services.nsd.zonefilesCheck": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to check mtime of all zone files on start and sighup.\n"}, "loc": ["services", "nsd", "zonefilesCheck"], "readOnly": false, "type": "boolean"}, "services.nsd.zones": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Define your zones here. Zones can cascade other zones and therefore\ninherit settings from parent zones. Look at the definition of\nchildren to learn about inheritance and child zones.\nThe given example will define 3 zones (example.(com|org|net).). Both\nexample.com. and example.org. inherit their configuration from\nserverGroup1.\n"}, "example": {"_type": "literalExpression", "text": "{ \"serverGroup1\" = {\n    provideXFR = [ \"10.1.2.3 NOKEY\" ];\n    children = {\n      \"example.com.\" = {\n        data = ''\n          $ORIGIN example.com.\n          $TTL    86400\n          @ IN SOA a.ns.example.com. admin.example.com. (\n          ...\n        '';\n      };\n      \"example.org.\" = {\n        data = ''\n          $ORIGIN example.org.\n          $TTL    86400\n          @ IN SOA a.ns.example.com. admin.example.com. (\n          ...\n        '';\n      };\n    };\n  };\n\n  \"example.net.\" = {\n    provideXFR = [ \"10.3.2.1 NOKEY\" ];\n    data = ''\n      ...\n    '';\n  };\n}\n"}, "loc": ["services", "nsd", "zones"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.nsd.zones.<name>.allowAXFRFallback": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If NSD as secondary server should be allowed to AXFR if the primary\nserver does not allow IXFR.\n"}, "loc": ["services", "nsd", "zones", "<name>", "allowAXFRFallback"], "readOnly": false, "type": "boolean"}, "services.nsd.zones.<name>.allowNotify": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listed primary servers are allowed to notify this secondary server.\n\nFormat: `<ip> <key-name | NOKEY | BLOCKED>`\n\n`<ip>` either a plain IPv4/IPv6 address or range.\nValid patters for ranges:\n* `10.0.0.0/24`: via subnet size\n* `10.0.0.0&255.255.255.0`: via subnet mask\n* `10.0.0.1-10.0.0.254`: via range\n\nA optional port number could be added with a '@':\n* `2001:1234::1@1234`\n\n`<key-name | NOKEY | BLOCKED>`\n* `<key-name>` will use the specified TSIG key\n* `NOKEY` no TSIG signature is required\n* `BLOCKED`notifies from non-listed or blocked IPs will be ignored\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"192.0.2.0/24 NOKEY\"\n  \"10.0.0.1-10.0.0.5 my_tsig_key_name\"\n  \"10.0.3.4&255.255.0.0 BLOCKED\"\n]"}, "loc": ["services", "nsd", "zones", "<name>", "allowNotify"], "readOnly": false, "type": "list of string"}, "services.nsd.zones.<name>.children": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Children zones inherit all options of their parents. Attributes\ndefined in a child will overwrite the ones of its parent. Only\nleaf zones will be actually served. This way it's possible to\ndefine maybe zones which share most attributes without\nduplicating everything. This mechanism replaces nsd's patterns\nin a save and functional way.\n"}, "loc": ["services", "nsd", "zones", "<name>", "children"], "readOnly": false, "type": "attribute set of anything"}, "services.nsd.zones.<name>.data": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The actual zone data. This is the content of your zone file.\nUse imports or pkgs.lib.readFile if you don't want this data in your config file.\n"}, "loc": ["services", "nsd", "zones", "<name>", "data"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nsd.zones.<name>.dnssec": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable DNSSEC."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nsd", "zones", "<name>", "dnssec"], "readOnly": false, "type": "boolean"}, "services.nsd.zones.<name>.dnssecPolicy.algorithm": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "\"RSASHA256\""}, "description": {"_type": "mdDoc", "text": "Which algorithm to use for DNSSEC"}, "loc": ["services", "nsd", "zones", "<name>", "dnssecPolicy", "algorithm"], "readOnly": false, "type": "string"}, "services.nsd.zones.<name>.dnssecPolicy.coverage": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "\"1y\""}, "description": {"_type": "mdDoc", "text": "The length of time to ensure that keys will be correct; no action will be taken to create new keys to be activated after this time.\n"}, "loc": ["services", "nsd", "zones", "<name>", "dnssecPolicy", "coverage"], "readOnly": false, "type": "string"}, "services.nsd.zones.<name>.dnssecPolicy.keyttl": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "\"1h\""}, "description": {"_type": "mdDoc", "text": "TTL for dnssec records"}, "loc": ["services", "nsd", "zones", "<name>", "dnssecPolicy", "keyttl"], "readOnly": false, "type": "string"}, "services.nsd.zones.<name>.dnssecPolicy.ksk": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "{\n  keySize = 4096;\n  postPublish = \"1mo\";\n  prePublish = \"1mo\";\n  rollPeriod = \"0\";\n}"}, "description": {"_type": "mdDoc", "text": "Key policy for key signing keys"}, "loc": ["services", "nsd", "zones", "<name>", "dnssecPolicy", "ksk"], "readOnly": false, "type": "submodule"}, "services.nsd.zones.<name>.dnssecPolicy.ksk.keySize": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "description": {"_type": "mdDoc", "text": "Key size in bits"}, "loc": ["services", "nsd", "zones", "<name>", "dnssecPolicy", "ksk", "keySize"], "readOnly": false, "type": "signed integer"}, "services.nsd.zones.<name>.dnssecPolicy.ksk.postPublish": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "description": {"_type": "mdDoc", "text": "How long after deactivation to keep a key in the zone"}, "loc": ["services", "nsd", "zones", "<name>", "dnssecPolicy", "ksk", "postPublish"], "readOnly": false, "type": "string"}, "services.nsd.zones.<name>.dnssecPolicy.ksk.prePublish": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "description": {"_type": "mdDoc", "text": "How long in advance to publish new keys"}, "loc": ["services", "nsd", "zones", "<name>", "dnssecPolicy", "ksk", "prePublish"], "readOnly": false, "type": "string"}, "services.nsd.zones.<name>.dnssecPolicy.ksk.rollPeriod": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "description": {"_type": "mdDoc", "text": "How frequently to change keys"}, "loc": ["services", "nsd", "zones", "<name>", "dnssecPolicy", "ksk", "rollPeriod"], "readOnly": false, "type": "string"}, "services.nsd.zones.<name>.dnssecPolicy.zsk": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "{\n  keySize = 2048;\n  postPublish = \"1w\";\n  prePublish = \"1w\";\n  rollPeriod = \"1mo\";\n}"}, "description": {"_type": "mdDoc", "text": "Key policy for zone signing keys"}, "loc": ["services", "nsd", "zones", "<name>", "dnssecPolicy", "zsk"], "readOnly": false, "type": "submodule"}, "services.nsd.zones.<name>.dnssecPolicy.zsk.keySize": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "description": {"_type": "mdDoc", "text": "Key size in bits"}, "loc": ["services", "nsd", "zones", "<name>", "dnssecPolicy", "zsk", "keySize"], "readOnly": false, "type": "signed integer"}, "services.nsd.zones.<name>.dnssecPolicy.zsk.postPublish": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "description": {"_type": "mdDoc", "text": "How long after deactivation to keep a key in the zone"}, "loc": ["services", "nsd", "zones", "<name>", "dnssecPolicy", "zsk", "postPublish"], "readOnly": false, "type": "string"}, "services.nsd.zones.<name>.dnssecPolicy.zsk.prePublish": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "description": {"_type": "mdDoc", "text": "How long in advance to publish new keys"}, "loc": ["services", "nsd", "zones", "<name>", "dnssecPolicy", "zsk", "prePublish"], "readOnly": false, "type": "string"}, "services.nsd.zones.<name>.dnssecPolicy.zsk.rollPeriod": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "description": {"_type": "mdDoc", "text": "How frequently to change keys"}, "loc": ["services", "nsd", "zones", "<name>", "dnssecPolicy", "zsk", "rollPeriod"], "readOnly": false, "type": "string"}, "services.nsd.zones.<name>.maxRefreshSecs": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Limit refresh time for secondary zones. This is the timer which\nchecks to see if the zone has to be refetched when it expires.\nNormally the value from the SOA record is used, but this  option\nrestricts that value.\n"}, "loc": ["services", "nsd", "zones", "<name>", "maxRefreshSecs"], "readOnly": false, "type": "null or signed integer"}, "services.nsd.zones.<name>.maxRetrySecs": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Limit retry time for secondary zones. This is the timeout after\na failed fetch attempt for the zone. Normally the value from\nthe SOA record is used, but this option restricts that value.\n"}, "loc": ["services", "nsd", "zones", "<name>", "maxRetrySecs"], "readOnly": false, "type": "null or signed integer"}, "services.nsd.zones.<name>.minRefreshSecs": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Limit refresh time for secondary zones.\n"}, "loc": ["services", "nsd", "zones", "<name>", "minRefreshSecs"], "readOnly": false, "type": "null or signed integer"}, "services.nsd.zones.<name>.minRetrySecs": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Limit retry time for secondary zones.\n"}, "loc": ["services", "nsd", "zones", "<name>", "minRetrySecs"], "readOnly": false, "type": "null or signed integer"}, "services.nsd.zones.<name>.notify": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This primary server will notify all given secondary servers about\nzone changes.\n\nFormat: `<ip> <key-name | NOKEY>`\n\n`<ip>` a plain IPv4/IPv6 address with on optional port number (ip@port)\n\n`<key-name | NOKEY>`\n- `<key-name>` sign notifies with the specified key\n- `NOKEY` don't sign notifies\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"10.0.0.1@3721 my_key\"\n  \"::5 NOKEY\"\n]"}, "loc": ["services", "nsd", "zones", "<name>", "notify"], "readOnly": false, "type": "list of string"}, "services.nsd.zones.<name>.notifyRetry": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Specifies the number of retries for failed notifies. Set this along with notify.\n"}, "loc": ["services", "nsd", "zones", "<name>", "notifyRetry"], "readOnly": false, "type": "signed integer"}, "services.nsd.zones.<name>.outgoingInterface": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This address will be used for zone-transfer requests if configured\nas a secondary server or notifications in case of a primary server.\nSupply either a plain IPv4 or IPv6 address with an optional port\nnumber (ip@port).\n"}, "example": {"_type": "literalExpression", "text": "\"2000::1@1234\""}, "loc": ["services", "nsd", "zones", "<name>", "outgoingInterface"], "readOnly": false, "type": "null or string"}, "services.nsd.zones.<name>.provideXFR": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Allow these IPs and TSIG to transfer zones, addr TSIG|NOKEY|BLOCKED\naddress range 192.0.2.0/24, 1.2.3.4&255.255.0.0, 3.0.2.20-3.0.2.40\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"192.0.2.0/24 NOKEY\"\n  \"192.0.2.0/24 my_tsig_key_name\"\n]"}, "loc": ["services", "nsd", "zones", "<name>", "provideXFR"], "readOnly": false, "type": "list of string"}, "services.nsd.zones.<name>.requestXFR": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Format: `[AXFR|UDP] <ip-address> <key-name | NOKEY>`\n"}, "loc": ["services", "nsd", "zones", "<name>", "requestXFR"], "readOnly": false, "type": "list of string"}, "services.nsd.zones.<name>.rrlWhitelist": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Whitelists the given rrl-types.\n"}, "loc": ["services", "nsd", "zones", "<name>", "rrlWhitelist"], "readOnly": false, "type": "list of (one of \"nxdomain\", \"error\", \"referral\", \"any\", \"rrsig\", \"wildcard\", \"nodata\", \"dnskey\", \"positive\", \"all\")"}, "services.nsd.zones.<name>.zoneStats": {"declarations": ["nixos/modules/services/networking/nsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "When set to something distinct to null NSD is able to collect\nstatistics per zone. All statistics of this zone(s) will be added\nto the group specified by this given name. Use \"%s\" to use the zones\nname as the group. The groups are output from nsd-control stats\nand stats_noreset.\n"}, "example": {"_type": "literalExpression", "text": "\"%s\""}, "loc": ["services", "nsd", "zones", "<name>", "zoneStats"], "readOnly": false, "type": "null or string"}, "services.ntfy-sh.enable": {"declarations": ["nixos/modules/services/misc/ntfy-sh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable [ntfy-sh](https://ntfy.sh), a push notification service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ntfy-sh", "enable"], "readOnly": false, "type": "boolean"}, "services.ntfy-sh.group": {"declarations": ["nixos/modules/services/misc/ntfy-sh.nix"], "default": {"_type": "literalExpression", "text": "\"ntfy-sh\""}, "description": {"_type": "mdDoc", "text": "Primary group of ntfy-sh user."}, "loc": ["services", "ntfy-sh", "group"], "readOnly": false, "type": "string"}, "services.ntfy-sh.package": {"declarations": ["nixos/modules/services/misc/ntfy-sh.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ntfy-sh"}, "description": {"_type": "mdDoc", "text": "The ntfy.sh package to use."}, "loc": ["services", "ntfy-sh", "package"], "readOnly": false, "type": "package"}, "services.ntfy-sh.settings": {"declarations": ["nixos/modules/services/misc/ntfy-sh.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for ntfy.sh, supported values are [here](https://ntfy.sh/docs/config/#config-options).\n"}, "example": {"_type": "literalExpression", "text": "{\n  listen-http = \":8080\";\n}\n"}, "loc": ["services", "ntfy-sh", "settings"], "readOnly": false, "type": "YAML value"}, "services.ntfy-sh.user": {"declarations": ["nixos/modules/services/misc/ntfy-sh.nix"], "default": {"_type": "literalExpression", "text": "\"ntfy-sh\""}, "description": {"_type": "mdDoc", "text": "User the ntfy-sh server runs under."}, "loc": ["services", "ntfy-sh", "user"], "readOnly": false, "type": "string"}, "services.ntopng.configText": {"declarations": ["nixos/modules/services/networking/ntopng.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Overridable configuration file contents to use for ntopng. By\ndefault, use the contents automatically generated by NixOS.\n"}, "example": {"_type": "literalExpression", "text": "''\n  --interface=any\n  --http-port=3000\n  --disable-login\n''"}, "loc": ["services", "ntopng", "configText"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.ntopng.enable": {"declarations": ["nixos/modules/services/networking/ntopng.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable ntopng, a high-speed web-based traffic analysis and flow\ncollection tool.\n\nWith the default configuration, ntopng monitors all network\ninterfaces and displays its findings at http://localhost:${toString\nconfig.services.ntopng.http-port}. Default username and password is admin/admin.\n\nSee the ntopng(8) manual page and http://www.ntop.org/products/ntop/\nfor more info.\n\nNote that enabling ntopng will also enable redis (key-value\ndatabase server) for persistent data storage.\n"}, "loc": ["services", "ntopng", "enable"], "readOnly": false, "type": "boolean"}, "services.ntopng.extraConfig": {"declarations": ["nixos/modules/services/networking/ntopng.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration lines that will be appended to the generated ntopng\nconfiguration file. Note that this mechanism does not work when the\nmanual {option}`configText` option is used.\n"}, "loc": ["services", "ntopng", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.ntopng.httpPort": {"declarations": ["nixos/modules/services/networking/ntopng.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Sets the HTTP port of the embedded web server.\n"}, "loc": ["services", "ntopng", "httpPort"], "readOnly": false, "type": "signed integer"}, "services.ntopng.interfaces": {"declarations": ["nixos/modules/services/networking/ntopng.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"any\"\n]"}, "description": {"_type": "mdDoc", "text": "List of interfaces to monitor. Use \"any\" to monitor all interfaces.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"eth0\"\n  \"wlan0\"\n]"}, "loc": ["services", "ntopng", "interfaces"], "readOnly": false, "type": "list of string"}, "services.ntopng.redis.address": {"declarations": ["nixos/modules/services/networking/ntopng.nix"], "description": {"_type": "mdDoc", "text": "Redis address - may be a Unix socket or a network host and port.\n"}, "example": {"_type": "literalExpression", "text": "config.services.redis.ntopng.unixSocket"}, "loc": ["services", "ntopng", "redis", "address"], "readOnly": false, "type": "string"}, "services.ntopng.redis.createInstance": {"declarations": ["nixos/modules/services/networking/ntopng.nix"], "default": {"_type": "literalExpression", "text": "\"ntopng\""}, "description": {"_type": "mdDoc", "text": "Local Redis instance name. Set to `null` to disable\nlocal Redis instance. Defaults to `\"\"` for\n`system.stateVersion` older than 22.05.\n"}, "loc": ["services", "ntopng", "redis", "createInstance"], "readOnly": false, "type": "null or string"}, "services.ntp.enable": {"declarations": ["nixos/modules/services/networking/ntp/ntpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to synchronise your machine's time using ntpd, as a peer in\nthe NTP network.\n\nDisables `systemd.timesyncd` if enabled.\n"}, "loc": ["services", "ntp", "enable"], "readOnly": false, "type": "boolean"}, "services.ntp.extraConfig": {"declarations": ["nixos/modules/services/networking/ntp/ntpd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional text appended to {file}`ntp.conf`.\n"}, "example": {"_type": "literalExpression", "text": "''\n  fudge 127.127.1.0 stratum 10\n''"}, "loc": ["services", "ntp", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.ntp.extraFlags": {"declarations": ["nixos/modules/services/networking/ntp/ntpd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags passed to the ntpd command."}, "example": {"_type": "literalExpression", "text": "[ \"--interface=eth0\" ]"}, "loc": ["services", "ntp", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.ntp.restrictDefault": {"declarations": ["nixos/modules/services/networking/ntp/ntpd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"limited\"\n  \"kod\"\n  \"nomodify\"\n  \"notrap\"\n  \"noquery\"\n  \"nopeer\"\n]"}, "description": {"_type": "mdDoc", "text": "The restriction flags to be set by default.\n\nThe default flags prevent external hosts from using ntpd as a DDoS\nreflector, setting system time, and querying OS/ntpd version. As\nrecommended in section 6.5.1.1.3, answer \"No\" of\nhttp://support.ntp.org/bin/view/Support/AccessRestrictions\n"}, "loc": ["services", "ntp", "restrictDefault"], "readOnly": false, "type": "list of string"}, "services.ntp.restrictSource": {"declarations": ["nixos/modules/services/networking/ntp/ntpd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"limited\"\n  \"kod\"\n  \"nomodify\"\n  \"notrap\"\n  \"noquery\"\n]"}, "description": {"_type": "mdDoc", "text": "The restriction flags to be set on source.\n\nThe default flags allow peers to be added by ntpd from configured\npool(s), but not by other means.\n"}, "loc": ["services", "ntp", "restrictSource"], "readOnly": false, "type": "list of string"}, "services.ntp.servers": {"declarations": ["nixos/modules/services/networking/ntp/ntpd.nix"], "default": {"_type": "literalExpression", "text": "config.networking.timeServers"}, "description": {"_type": "mdDoc", "text": "The set of NTP servers from which to synchronise.\n"}, "loc": ["services", "ntp", "servers"], "readOnly": false, "type": "list of string"}, "services.nullidentdmod.enable": {"declarations": ["nixos/modules/services/networking/nullidentdmod.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the nullidentdmod identd daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nullidentdmod", "enable"], "readOnly": false, "type": "boolean"}, "services.nullidentdmod.userid": {"declarations": ["nixos/modules/services/networking/nullidentdmod.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "User ID to return. Set to null to return a random string each time."}, "example": {"_type": "literalExpression", "text": "\"alice\""}, "loc": ["services", "nullidentdmod", "userid"], "readOnly": false, "type": "null or string"}, "services.nullmailer.config.adminaddr": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all recipients to users at either \"localhost\" (the literal string)\nor the canonical host name (from the me control attribute) are remapped to this address.\nThis is provided to allow local daemons to be able to send email to\n\"somebody@localhost\" and have it go somewhere sensible instead of being  bounced\nby your relay host. To send to multiple addresses,\nput them all on one line separated by a comma.\n"}, "loc": ["services", "nullmailer", "config", "adminaddr"], "readOnly": false, "type": "null or string"}, "services.nullmailer.config.allmailfrom": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, content will override the envelope sender on all messages.\n"}, "loc": ["services", "nullmailer", "config", "allmailfrom"], "readOnly": false, "type": "null or string"}, "services.nullmailer.config.defaultdomain": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The content of this attribute is appended to any host name that\ndoes not contain a period (except localhost), including defaulthost\nand idhost. Defaults to the value of the me attribute, if it exists,\notherwise the literal name defauldomain.\n"}, "loc": ["services", "nullmailer", "config", "defaultdomain"], "readOnly": false, "type": "null or string"}, "services.nullmailer.config.defaulthost": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The content of this attribute is appended to any address that\nis missing a host name. Defaults to the value of the me control\nattribute, if it exists, otherwise the literal name defaulthost.\n"}, "loc": ["services", "nullmailer", "config", "defaulthost"], "readOnly": false, "type": "null or string"}, "services.nullmailer.config.doublebounceto": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If the original sender was empty (the original message was a\ndelivery status or disposition notification), the double bounce\nis sent to the address in this attribute.\n"}, "loc": ["services", "nullmailer", "config", "doublebounceto"], "readOnly": false, "type": "null or string"}, "services.nullmailer.config.helohost": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets  the  environment variable $HELOHOST which is used by the\nSMTP protocol module to set the parameter given to the HELO command.\nDefaults to the value of the me configuration attribute.\n"}, "loc": ["services", "nullmailer", "config", "helohost"], "readOnly": false, "type": "null or string"}, "services.nullmailer.config.idhost": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The content of this attribute is used when building the message-id\nstring for the message. Defaults to the canonicalized value of defaulthost.\n"}, "loc": ["services", "nullmailer", "config", "idhost"], "readOnly": false, "type": "null or string"}, "services.nullmailer.config.maxpause": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The maximum time to pause between successive queue runs, in seconds.\nDefaults to 24 hours (86400).\n"}, "loc": ["services", "nullmailer", "config", "maxpause"], "readOnly": false, "type": "null or string"}, "services.nullmailer.config.me": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The fully-qualifiled host name of the computer running nullmailer.\nDefaults to the literal name me.\n"}, "loc": ["services", "nullmailer", "config", "me"], "readOnly": false, "type": "null or string"}, "services.nullmailer.config.pausetime": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The minimum time to pause between successive queue runs when there\nare messages in the queue, in seconds. Defaults to 1 minute (60).\nEach time this timeout is reached, the timeout is doubled to a\nmaximum of maxpause. After new messages are injected, the timeout\nis reset.  If this is set to 0, nullmailer-send will exit\nimmediately after going through the queue once (one-shot mode).\n"}, "loc": ["services", "nullmailer", "config", "pausetime"], "readOnly": false, "type": "null or string"}, "services.nullmailer.config.remotes": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A list of remote servers to which to send each message. Each line\ncontains a remote host name or address followed by an optional\nprotocol string, separated by white space.\n\nSee `man 8 nullmailer-send` for syntax and available\noptions.\n\nWARNING: This is stored world-readable in the nix store. If you need\nto specify any secret credentials here, consider using the\n`remotesFile` option instead.\n"}, "loc": ["services", "nullmailer", "config", "remotes"], "readOnly": false, "type": "null or string"}, "services.nullmailer.config.sendtimeout": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The  time to wait for a remote module listed above to complete sending\na message before killing it and trying again, in seconds.\nDefaults to 1 hour (3600).  If this is set to 0, nullmailer-send\nwill wait forever for messages to complete sending.\n"}, "loc": ["services", "nullmailer", "config", "sendtimeout"], "readOnly": false, "type": "null or string"}, "services.nullmailer.enable": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nullmailer daemon."}, "loc": ["services", "nullmailer", "enable"], "readOnly": false, "type": "boolean"}, "services.nullmailer.group": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "\"nullmailer\""}, "description": {"_type": "mdDoc", "text": "Group to use to run nullmailer-send.\n"}, "loc": ["services", "nullmailer", "group"], "readOnly": false, "type": "string"}, "services.nullmailer.remotesFile": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the `remotes` control file. This file contains a\nlist of remote servers to which to send each message.\n\nSee `man 8 nullmailer-send` for syntax and available\noptions.\n"}, "loc": ["services", "nullmailer", "remotesFile"], "readOnly": false, "type": "null or string"}, "services.nullmailer.setSendmail": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to set the system sendmail to nullmailer's."}, "loc": ["services", "nullmailer", "setSendmail"], "readOnly": false, "type": "boolean"}, "services.nullmailer.user": {"declarations": ["nixos/modules/services/mail/nullmailer.nix"], "default": {"_type": "literalExpression", "text": "\"nullmailer\""}, "description": {"_type": "mdDoc", "text": "User to use to run nullmailer-send.\n"}, "loc": ["services", "nullmailer", "user"], "readOnly": false, "type": "string"}, "services.nylon.<name>.acceptInterface": {"declarations": ["nixos/modules/services/networking/nylon.nix"], "default": {"_type": "literalExpression", "text": "\"lo\""}, "description": {"_type": "mdDoc", "text": "Tell nylon which interface to listen for client requests on, default is \"lo\".\n"}, "loc": ["services", "nylon", "<name>", "acceptInterface"], "readOnly": false, "type": "string"}, "services.nylon.<name>.allowedIPRanges": {"declarations": ["nixos/modules/services/networking/nylon.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"192.168.0.0/16\"\n  \"127.0.0.1/8\"\n  \"172.16.0.1/12\"\n  \"10.0.0.0/8\"\n]"}, "description": {"_type": "mdDoc", "text": "Allowed client IP ranges are evaluated first, defaults to ARIN IPv4 private ranges:\n  [ \"192.168.0.0/16\" \"127.0.0.0/8\" \"172.16.0.0/12\" \"10.0.0.0/8\" ]\n"}, "loc": ["services", "nylon", "<name>", "allowedIPRanges"], "readOnly": false, "type": "list of string"}, "services.nylon.<name>.bindInterface": {"declarations": ["nixos/modules/services/networking/nylon.nix"], "default": {"_type": "literalExpression", "text": "\"enp3s0f0\""}, "description": {"_type": "mdDoc", "text": "Tell nylon which interface to use as an uplink, default is \"enp3s0f0\".\n"}, "loc": ["services", "nylon", "<name>", "bindInterface"], "readOnly": false, "type": "string"}, "services.nylon.<name>.deniedIPRanges": {"declarations": ["nixos/modules/services/networking/nylon.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0/0\"\n]"}, "description": {"_type": "mdDoc", "text": "Denied client IP ranges, these gets evaluated after the allowed IP ranges, defaults to all IPv4 addresses:\n  [ \"0.0.0.0/0\" ]\nTo block all other access than the allowed.\n"}, "loc": ["services", "nylon", "<name>", "deniedIPRanges"], "readOnly": false, "type": "list of string"}, "services.nylon.<name>.enable": {"declarations": ["nixos/modules/services/networking/nylon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables nylon as a running service upon activation.\n"}, "loc": ["services", "nylon", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.nylon.<name>.logging": {"declarations": ["nixos/modules/services/networking/nylon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable logging, default is no logging.\n"}, "loc": ["services", "nylon", "<name>", "logging"], "readOnly": false, "type": "boolean"}, "services.nylon.<name>.name": {"declarations": ["nixos/modules/services/networking/nylon.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The name of this nylon instance."}, "loc": ["services", "nylon", "<name>", "name"], "readOnly": false, "type": "string"}, "services.nylon.<name>.nrConnections": {"declarations": ["nixos/modules/services/networking/nylon.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "The number of allowed simultaneous connections to the daemon, default 10.\n"}, "loc": ["services", "nylon", "<name>", "nrConnections"], "readOnly": false, "type": "signed integer"}, "services.nylon.<name>.port": {"declarations": ["nixos/modules/services/networking/nylon.nix"], "default": {"_type": "literalExpression", "text": "1080"}, "description": {"_type": "mdDoc", "text": "What port to listen for client requests, default is 1080.\n"}, "loc": ["services", "nylon", "<name>", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.nylon.<name>.verbosity": {"declarations": ["nixos/modules/services/networking/nylon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable verbose output, default is to not be verbose.\n"}, "loc": ["services", "nylon", "<name>", "verbosity"], "readOnly": false, "type": "boolean"}, "services.nzbget.enable": {"declarations": ["nixos/modules/services/misc/nzbget.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable NZBGet."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nzbget", "enable"], "readOnly": false, "type": "boolean"}, "services.nzbget.group": {"declarations": ["nixos/modules/services/misc/nzbget.nix"], "default": {"_type": "literalExpression", "text": "\"nzbget\""}, "description": {"_type": "mdDoc", "text": "Group under which NZBGet runs"}, "loc": ["services", "nzbget", "group"], "readOnly": false, "type": "string"}, "services.nzbget.settings": {"declarations": ["nixos/modules/services/misc/nzbget.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "NZBGet configuration, passed via command line using switch -o. Refer to\n<https://github.com/nzbget/nzbget/blob/master/nzbget.conf>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  MainDir = \"/data\";\n}"}, "loc": ["services", "nzbget", "settings"], "readOnly": false, "type": "attribute set of (boolean or signed integer or string)"}, "services.nzbget.user": {"declarations": ["nixos/modules/services/misc/nzbget.nix"], "default": {"_type": "literalExpression", "text": "\"nzbget\""}, "description": {"_type": "mdDoc", "text": "User account under which NZBGet runs"}, "loc": ["services", "nzbget", "user"], "readOnly": false, "type": "string"}, "services.nzbhydra2.dataDir": {"declarations": ["nixos/modules/services/misc/nzbhydra2.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/nzbhydra2\""}, "description": {"_type": "mdDoc", "text": "The directory where NZBHydra2 stores its data files."}, "loc": ["services", "nzbhydra2", "dataDir"], "readOnly": false, "type": "string"}, "services.nzbhydra2.enable": {"declarations": ["nixos/modules/services/misc/nzbhydra2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable NZBHydra2."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nzbhydra2", "enable"], "readOnly": false, "type": "boolean"}, "services.nzbhydra2.openFirewall": {"declarations": ["nixos/modules/services/misc/nzbhydra2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the NZBHydra2 web interface."}, "loc": ["services", "nzbhydra2", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.nzbhydra2.package": {"declarations": ["nixos/modules/services/misc/nzbhydra2.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nzbhydra2"}, "description": {"_type": "mdDoc", "text": "NZBHydra2 package to use."}, "loc": ["services", "nzbhydra2", "package"], "readOnly": false, "type": "package"}, "services.oauth2_proxy.approvalPrompt": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "\"force\""}, "description": {"_type": "mdDoc", "text": "OAuth approval_prompt.\n"}, "loc": ["services", "oauth2_proxy", "approvalPrompt"], "readOnly": false, "type": "one of \"force\", \"auto\""}, "services.oauth2_proxy.azure.resource": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "description": {"_type": "mdDoc", "text": "The resource that is protected.\n"}, "loc": ["services", "oauth2_proxy", "azure", "resource"], "readOnly": false, "type": "string"}, "services.oauth2_proxy.azure.tenant": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "\"common\""}, "description": {"_type": "mdDoc", "text": "Go to a tenant-specific or common (tenant-independent) endpoint.\n"}, "loc": ["services", "oauth2_proxy", "azure", "tenant"], "readOnly": false, "type": "string"}, "services.oauth2_proxy.basicAuthPassword": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The password to set when passing the HTTP Basic Auth header.\n"}, "loc": ["services", "oauth2_proxy", "basicAuthPassword"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.clientID": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "description": {"_type": "mdDoc", "text": "The OAuth Client ID.\n"}, "example": {"_type": "literalExpression", "text": "\"123456.apps.googleusercontent.com\""}, "loc": ["services", "oauth2_proxy", "clientID"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.clientSecret": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "description": {"_type": "mdDoc", "text": "The OAuth Client Secret.\n"}, "loc": ["services", "oauth2_proxy", "clientSecret"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.cookie.domain": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional cookie domains to force cookies to (ie: `.yourcompany.com`).\nThe longest domain matching the request's host will be used (or the shortest\ncookie domain if there is no match).\n"}, "example": {"_type": "literalExpression", "text": "\".yourcompany.com\""}, "loc": ["services", "oauth2_proxy", "cookie", "domain"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.cookie.expire": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "\"168h0m0s\""}, "description": {"_type": "mdDoc", "text": "Expire timeframe for cookie.\n"}, "loc": ["services", "oauth2_proxy", "cookie", "expire"], "readOnly": false, "type": "string"}, "services.oauth2_proxy.cookie.httpOnly": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Set HttpOnly cookie flag.\n"}, "loc": ["services", "oauth2_proxy", "cookie", "httpOnly"], "readOnly": false, "type": "boolean"}, "services.oauth2_proxy.cookie.name": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "\"_oauth2_proxy\""}, "description": {"_type": "mdDoc", "text": "The name of the cookie that the oauth_proxy creates.\n"}, "loc": ["services", "oauth2_proxy", "cookie", "name"], "readOnly": false, "type": "string"}, "services.oauth2_proxy.cookie.refresh": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refresh the cookie after this duration; 0 to disable.\n"}, "example": {"_type": "literalExpression", "text": "\"168h0m0s\""}, "loc": ["services", "oauth2_proxy", "cookie", "refresh"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.cookie.secret": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "description": {"_type": "mdDoc", "text": "The seed string for secure cookies.\n"}, "loc": ["services", "oauth2_proxy", "cookie", "secret"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.cookie.secure": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Set secure (HTTPS) cookie flag.\n"}, "loc": ["services", "oauth2_proxy", "cookie", "secure"], "readOnly": false, "type": "boolean"}, "services.oauth2_proxy.customTemplatesDir": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to custom HTML templates.\n"}, "loc": ["services", "oauth2_proxy", "customTemplatesDir"], "readOnly": false, "type": "null or path"}, "services.oauth2_proxy.email.addresses": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Line-separated email addresses that are allowed to authenticate.\n"}, "loc": ["services", "oauth2_proxy", "email", "addresses"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.oauth2_proxy.email.domains": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Authenticate emails with the specified domains. Use\n`*` to authenticate any email.\n"}, "loc": ["services", "oauth2_proxy", "email", "domains"], "readOnly": false, "type": "list of string"}, "services.oauth2_proxy.enable": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable oauth2_proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "oauth2_proxy", "enable"], "readOnly": false, "type": "boolean"}, "services.oauth2_proxy.extraConfig": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra config to pass to oauth2-proxy.\n"}, "loc": ["services", "oauth2_proxy", "extraConfig"], "readOnly": false, "type": "attribute set of anything"}, "services.oauth2_proxy.github.org": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Restrict logins to members of this organisation.\n"}, "loc": ["services", "oauth2_proxy", "github", "org"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.github.team": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Restrict logins to members of this team.\n"}, "loc": ["services", "oauth2_proxy", "github", "team"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.google.adminEmail": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "description": {"_type": "mdDoc", "text": "The Google Admin to impersonate for API calls.\n\nOnly users with access to the Admin APIs can access the Admin SDK\nDirectory API, thus the service account needs to impersonate one of\nthose users to access the Admin SDK Directory API.\n\nSee <https://developers.google.com/admin-sdk/directory/v1/guides/delegation#delegate_domain-wide_authority_to_your_service_account>.\n"}, "loc": ["services", "oauth2_proxy", "google", "adminEmail"], "readOnly": false, "type": "string"}, "services.oauth2_proxy.google.groups": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Restrict logins to members of these Google groups.\n"}, "loc": ["services", "oauth2_proxy", "google", "groups"], "readOnly": false, "type": "list of string"}, "services.oauth2_proxy.google.serviceAccountJSON": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "description": {"_type": "mdDoc", "text": "The path to the service account JSON credentials.\n"}, "loc": ["services", "oauth2_proxy", "google", "serviceAccountJSON"], "readOnly": false, "type": "path"}, "services.oauth2_proxy.htpasswd.displayForm": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Display username / password login form if an htpasswd file is provided.\n"}, "loc": ["services", "oauth2_proxy", "htpasswd", "displayForm"], "readOnly": false, "type": "boolean"}, "services.oauth2_proxy.htpasswd.file": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Additionally authenticate against a htpasswd file. Entries must be\ncreated with `htpasswd -s` for SHA encryption.\n"}, "loc": ["services", "oauth2_proxy", "htpasswd", "file"], "readOnly": false, "type": "null or path"}, "services.oauth2_proxy.httpAddress": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "\"http://127.0.0.1:4180\""}, "description": {"_type": "mdDoc", "text": "HTTPS listening address.  This module does not expose the port by\ndefault. If you want this URL to be accessible to other machines, please\nadd the port to `networking.firewall.allowedTCPPorts`.\n"}, "loc": ["services", "oauth2_proxy", "httpAddress"], "readOnly": false, "type": "string"}, "services.oauth2_proxy.keyFile": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "oauth2-proxy allows passing sensitive configuration via environment variables.\nMake a file that contains lines like\nOAUTH2_PROXY_CLIENT_SECRET=asdfasdfasdf.apps.googleuserscontent.com\nand specify the path here.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/oauth2_proxy\""}, "loc": ["services", "oauth2_proxy", "keyFile"], "readOnly": false, "type": "null or path"}, "services.oauth2_proxy.loginURL": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Authentication endpoint.\n\nYou only need to set this if you are using a self-hosted provider (e.g.\nGithub Enterprise). If you're using a publicly hosted provider\n(e.g github.com), then the default works.\n"}, "example": {"_type": "literalExpression", "text": "\"https://provider.example.com/oauth/authorize\""}, "loc": ["services", "oauth2_proxy", "loginURL"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.nginx.proxy": {"declarations": ["nixos/modules/services/security/oauth2_proxy_nginx.nix"], "default": {"_type": "literalExpression", "text": "config.services.oauth2_proxy.httpAddress"}, "description": {"_type": "mdDoc", "text": "The address of the reverse proxy endpoint for oauth2_proxy\n"}, "loc": ["services", "oauth2_proxy", "nginx", "proxy"], "readOnly": false, "type": "string"}, "services.oauth2_proxy.nginx.virtualHosts": {"declarations": ["nixos/modules/services/security/oauth2_proxy_nginx.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of nginx virtual hosts to put behind the oauth2 proxy\n"}, "loc": ["services", "oauth2_proxy", "nginx", "virtualHosts"], "readOnly": false, "type": "list of string"}, "services.oauth2_proxy.package": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "pkgs.oauth2-proxy"}, "description": {"_type": "mdDoc", "text": "The package that provides oauth2-proxy.\n"}, "loc": ["services", "oauth2_proxy", "package"], "readOnly": false, "type": "package"}, "services.oauth2_proxy.passAccessToken": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Pass OAuth access_token to upstream via X-Forwarded-Access-Token header.\n"}, "loc": ["services", "oauth2_proxy", "passAccessToken"], "readOnly": false, "type": "boolean"}, "services.oauth2_proxy.passBasicAuth": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Pass HTTP Basic Auth, X-Forwarded-User and X-Forwarded-Email information to upstream.\n"}, "loc": ["services", "oauth2_proxy", "passBasicAuth"], "readOnly": false, "type": "boolean"}, "services.oauth2_proxy.passHostHeader": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Pass the request Host Header to upstream.\n"}, "loc": ["services", "oauth2_proxy", "passHostHeader"], "readOnly": false, "type": "boolean"}, "services.oauth2_proxy.profileURL": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Profile access endpoint.\n"}, "loc": ["services", "oauth2_proxy", "profileURL"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.provider": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "\"google\""}, "description": {"_type": "mdDoc", "text": "OAuth provider.\n"}, "loc": ["services", "oauth2_proxy", "provider"], "readOnly": false, "type": "one of \"adfs\", \"azure\", \"bitbucket\", \"digitalocean\", \"facebook\", \"github\", \"gitlab\", \"google\", \"keycloak\", \"keycloak-oidc\", \"linkedin\", \"login.gov\", \"nextcloud\", \"oidc\""}, "services.oauth2_proxy.proxyPrefix": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "\"/oauth2\""}, "description": {"_type": "mdDoc", "text": "The url root path that this proxy should be nested under.\n"}, "loc": ["services", "oauth2_proxy", "proxyPrefix"], "readOnly": false, "type": "string"}, "services.oauth2_proxy.redeemURL": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Token redemption endpoint.\n\nYou only need to set this if you are using a self-hosted provider (e.g.\nGithub Enterprise). If you're using a publicly hosted provider\n(e.g github.com), then the default works.\n"}, "example": {"_type": "literalExpression", "text": "\"https://provider.example.com/oauth/token\""}, "loc": ["services", "oauth2_proxy", "redeemURL"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.redirectURL": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The OAuth2 redirect URL.\n"}, "example": {"_type": "literalExpression", "text": "\"https://internalapp.yourcompany.com/oauth2/callback\""}, "loc": ["services", "oauth2_proxy", "redirectURL"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.requestLogging": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Log requests to stdout.\n"}, "loc": ["services", "oauth2_proxy", "requestLogging"], "readOnly": false, "type": "boolean"}, "services.oauth2_proxy.reverseProxy": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "In case when running behind a reverse proxy, controls whether headers\nlike `X-Real-Ip` are accepted. Usage behind a reverse\nproxy will require this flag to be set to avoid logging the reverse\nproxy IP address.\n"}, "loc": ["services", "oauth2_proxy", "reverseProxy"], "readOnly": false, "type": "boolean"}, "services.oauth2_proxy.scope": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth scope specification.\n"}, "loc": ["services", "oauth2_proxy", "scope"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.setXauthrequest": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set X-Auth-Request-User and X-Auth-Request-Email response headers (useful in Nginx auth_request mode). Setting this to 'null' means using the upstream default (false).\n"}, "loc": ["services", "oauth2_proxy", "setXauthrequest"], "readOnly": false, "type": "null or boolean"}, "services.oauth2_proxy.signatureKey": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "GAP-Signature request signature key.\n"}, "example": {"_type": "literalExpression", "text": "\"sha1:secret0\""}, "loc": ["services", "oauth2_proxy", "signatureKey"], "readOnly": false, "type": "null or string"}, "services.oauth2_proxy.skipAuthRegexes": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Skip authentication for requests matching any of these regular\nexpressions.\n"}, "loc": ["services", "oauth2_proxy", "skipAuthRegexes"], "readOnly": false, "type": "list of string"}, "services.oauth2_proxy.tls.certificate": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "description": {"_type": "mdDoc", "text": "Path to certificate file.\n"}, "loc": ["services", "oauth2_proxy", "tls", "certificate"], "readOnly": false, "type": "path"}, "services.oauth2_proxy.tls.enable": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to serve over TLS.\n"}, "loc": ["services", "oauth2_proxy", "tls", "enable"], "readOnly": false, "type": "boolean"}, "services.oauth2_proxy.tls.httpsAddress": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "\":443\""}, "description": {"_type": "mdDoc", "text": "`addr:port` to listen on for HTTPS clients.\n\nRemember to add `port` to\n`allowedTCPPorts` if you want other machines to be\nable to connect to it.\n"}, "loc": ["services", "oauth2_proxy", "tls", "httpsAddress"], "readOnly": false, "type": "string"}, "services.oauth2_proxy.tls.key": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "description": {"_type": "mdDoc", "text": "Path to private key file.\n"}, "loc": ["services", "oauth2_proxy", "tls", "key"], "readOnly": false, "type": "path"}, "services.oauth2_proxy.upstream": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The http url(s) of the upstream endpoint or `file://`\npaths for static files. Routing is based on the path.\n"}, "loc": ["services", "oauth2_proxy", "upstream"], "readOnly": false, "type": "(list of string) or string convertible to it"}, "services.oauth2_proxy.validateURL": {"declarations": ["nixos/modules/services/security/oauth2_proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Access token validation endpoint.\n\nYou only need to set this if you are using a self-hosted provider (e.g.\nGithub Enterprise). If you're using a publicly hosted provider\n(e.g github.com), then the default works.\n"}, "example": {"_type": "literalExpression", "text": "\"https://provider.example.com/user/emails\""}, "loc": ["services", "oauth2_proxy", "validateURL"], "readOnly": false, "type": "null or string"}, "services.ocserv.config": {"declarations": ["nixos/modules/services/networking/ocserv.nix"], "description": {"_type": "mdDoc", "text": "Configuration content to start an OCServ server.\n\nFor a full configuration reference,please refer to the online documentation\n(https://ocserv.gitlab.io/www/manual.html), the openconnect\nrecipes (https://github.com/openconnect/recipes) or `man ocserv`.\n"}, "example": {"_type": "literalExpression", "text": "''\n  # configuration examples from $out/doc without explanatory comments.\n  # for a full reference please look at the installed man pages.\n  auth = \"plain[passwd=./sample.passwd]\"\n  tcp-port = 443\n  udp-port = 443\n  run-as-user = nobody\n  run-as-group = nogroup\n  socket-file = /run/ocserv-socket\n  server-cert = certs/server-cert.pem\n  server-key = certs/server-key.pem\n  keepalive = 32400\n  dpd = 90\n  mobile-dpd = 1800\n  switch-to-tcp-timeout = 25\n  try-mtu-discovery = false\n  cert-user-oid = 0.9.2342.19200300.100.1.1\n  tls-priorities = \"NORMAL:%SERVER_PRECEDENCE:%COMPAT:-VERS-SSL3.0\"\n  auth-timeout = 240\n  min-reauth-time = 300\n  max-ban-score = 80\n  ban-reset-time = 1200\n  cookie-timeout = 300\n  deny-roaming = false\n  rekey-time = 172800\n  rekey-method = ssl\n  use-occtl = true\n  pid-file = /run/ocserv.pid\n  device = vpns\n  predictable-ips = true\n  default-domain = example.com\n  ipv4-network = 192.168.1.0\n  ipv4-netmask = 255.255.255.0\n  dns = 192.168.1.2\n  ping-leases = false\n  route = 10.10.10.0/255.255.255.0\n  route = 192.168.0.0/255.255.0.0\n  no-route = 192.168.5.0/255.255.255.0\n  cisco-client-compat = true\n  dtls-legacy = true\n  \n  [vhost:www.example.com]\n  auth = \"certificate\"\n  ca-cert = certs/ca.pem\n  server-cert = certs/server-cert-secp521r1.pem\n  server-key = cersts/certs/server-key-secp521r1.pem\n  ipv4-network = 192.168.2.0\n  ipv4-netmask = 255.255.255.0\n  cert-user-oid = 0.9.2342.19200300.100.1.1\n''"}, "loc": ["services", "ocserv", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.ocserv.enable": {"declarations": ["nixos/modules/services/networking/ocserv.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ocserv."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ocserv", "enable"], "readOnly": false, "type": "boolean"}, "services.octoprint.enable": {"declarations": ["nixos/modules/services/misc/octoprint.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OctoPrint, web interface for 3D printers."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "octoprint", "enable"], "readOnly": false, "type": "boolean"}, "services.octoprint.extraConfig": {"declarations": ["nixos/modules/services/misc/octoprint.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra options which are added to OctoPrint's YAML configuration file."}, "loc": ["services", "octoprint", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.octoprint.group": {"declarations": ["nixos/modules/services/misc/octoprint.nix"], "default": {"_type": "literalExpression", "text": "\"octoprint\""}, "description": {"_type": "mdDoc", "text": "Group for the daemon."}, "loc": ["services", "octoprint", "group"], "readOnly": false, "type": "string"}, "services.octoprint.host": {"declarations": ["nixos/modules/services/misc/octoprint.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Host to bind OctoPrint to.\n"}, "loc": ["services", "octoprint", "host"], "readOnly": false, "type": "string"}, "services.octoprint.openFirewall": {"declarations": ["nixos/modules/services/misc/octoprint.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for OctoPrint."}, "loc": ["services", "octoprint", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.octoprint.plugins": {"declarations": ["nixos/modules/services/misc/octoprint.nix"], "default": {"_type": "literalExpression", "text": "plugins: []"}, "description": {"_type": "mdDoc", "text": "Additional plugins to be used. Available plugins are passed through the plugins input."}, "example": {"_type": "literalExpression", "text": "plugins: with plugins; [ themeify stlviewer ]"}, "loc": ["services", "octoprint", "plugins"], "readOnly": false, "type": "function that evaluates to a(n) list of package"}, "services.octoprint.port": {"declarations": ["nixos/modules/services/misc/octoprint.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Port to bind OctoPrint to.\n"}, "loc": ["services", "octoprint", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.octoprint.stateDir": {"declarations": ["nixos/modules/services/misc/octoprint.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/octoprint\""}, "description": {"_type": "mdDoc", "text": "State directory of the daemon."}, "loc": ["services", "octoprint", "stateDir"], "readOnly": false, "type": "path"}, "services.octoprint.user": {"declarations": ["nixos/modules/services/misc/octoprint.nix"], "default": {"_type": "literalExpression", "text": "\"octoprint\""}, "description": {"_type": "mdDoc", "text": "User for the daemon."}, "loc": ["services", "octoprint", "user"], "readOnly": false, "type": "string"}, "services.odoo.addons": {"declarations": ["nixos/modules/services/finance/odoo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Odoo addons."}, "example": {"_type": "literalExpression", "text": "[ pkgs.odoo_enterprise ]"}, "loc": ["services", "odoo", "addons"], "readOnly": false, "type": "list of package"}, "services.odoo.domain": {"declarations": ["nixos/modules/services/finance/odoo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Domain to host Odoo with nginx"}, "loc": ["services", "odoo", "domain"], "readOnly": false, "type": "null or string"}, "services.odoo.enable": {"declarations": ["nixos/modules/services/finance/odoo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable odoo."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "odoo", "enable"], "readOnly": false, "type": "boolean"}, "services.odoo.package": {"declarations": ["nixos/modules/services/finance/odoo.nix"], "default": {"_type": "literalExpression", "text": "pkgs.odoo"}, "description": {"_type": "mdDoc", "text": "Odoo package to use."}, "loc": ["services", "odoo", "package"], "readOnly": false, "type": "package"}, "services.odoo.settings": {"declarations": ["nixos/modules/services/finance/odoo.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Odoo configuration settings. For more details see <https://www.odoo.com/documentation/15.0/administration/install/deploy.html>\n"}, "loc": ["services", "odoo", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.offlineimap.enable": {"declarations": ["nixos/modules/services/mail/offlineimap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OfflineIMAP, a software to dispose your mailbox(es) as a local Maildir(s)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "offlineimap", "enable"], "readOnly": false, "type": "boolean"}, "services.offlineimap.install": {"declarations": ["nixos/modules/services/mail/offlineimap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install a user service for Offlineimap. Once\nthe service is started, emails will be fetched automatically.\n\nThe service must be manually started for each user with\n\"systemctl --user start offlineimap\" or globally through\n{var}`services.offlineimap.enable`.\n"}, "loc": ["services", "offlineimap", "install"], "readOnly": false, "type": "boolean"}, "services.offlineimap.onCalendar": {"declarations": ["nixos/modules/services/mail/offlineimap.nix"], "default": {"_type": "literalExpression", "text": "\"*:0/3\""}, "description": {"_type": "mdDoc", "text": "How often is offlineimap started. Default is '*:0/3' meaning every 3 minutes. See systemd.time(7) for more information about the format."}, "loc": ["services", "offlineimap", "onCalendar"], "readOnly": false, "type": "string"}, "services.offlineimap.package": {"declarations": ["nixos/modules/services/mail/offlineimap.nix"], "default": {"_type": "literalExpression", "text": "pkgs.offlineimap"}, "description": {"_type": "mdDoc", "text": "Offlineimap derivation to use."}, "loc": ["services", "offlineimap", "package"], "readOnly": false, "type": "package"}, "services.offlineimap.path": {"declarations": ["nixos/modules/services/mail/offlineimap.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of derivations to put in Offlineimap's path."}, "example": {"_type": "literalExpression", "text": "[ pkgs.pass pkgs.bash pkgs.notmuch ]"}, "loc": ["services", "offlineimap", "path"], "readOnly": false, "type": "list of path"}, "services.offlineimap.timeoutStartSec": {"declarations": ["nixos/modules/services/mail/offlineimap.nix"], "default": {"_type": "literalExpression", "text": "\"120sec\""}, "description": {"_type": "mdDoc", "text": "How long waiting for offlineimap before killing it. Default is '120sec' meaning every 2 minutes. See systemd.time(7) for more information about the format."}, "loc": ["services", "offlineimap", "timeoutStartSec"], "readOnly": false, "type": "string"}, "services.ofono.enable": {"declarations": ["nixos/modules/services/networking/ofono.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ofono."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ofono", "enable"], "readOnly": false, "type": "boolean"}, "services.ofono.plugins": {"declarations": ["nixos/modules/services/networking/ofono.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The list of plugins to install.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.modem-manager-gui ]"}, "loc": ["services", "ofono", "plugins"], "readOnly": false, "type": "list of package"}, "services.oidentd.enable": {"declarations": ["nixos/modules/services/networking/oidentd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable \u2018oidentd\u2019, an implementation of the Ident\nprotocol (RFC 1413).  It allows remote systems to identify the\nname of the user associated with a TCP connection.\n"}, "loc": ["services", "oidentd", "enable"], "readOnly": false, "type": "boolean"}, "services.ombi.dataDir": {"declarations": ["nixos/modules/services/misc/ombi.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/ombi\""}, "description": {"_type": "mdDoc", "text": "The directory where Ombi stores its data files."}, "loc": ["services", "ombi", "dataDir"], "readOnly": false, "type": "string"}, "services.ombi.enable": {"declarations": ["nixos/modules/services/misc/ombi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ombi.\nOptionally see <https://docs.ombi.app/info/reverse-proxy>\non how to set up a reverse proxy\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ombi", "enable"], "readOnly": false, "type": "boolean"}, "services.ombi.group": {"declarations": ["nixos/modules/services/misc/ombi.nix"], "default": {"_type": "literalExpression", "text": "\"ombi\""}, "description": {"_type": "mdDoc", "text": "Group under which Ombi runs."}, "loc": ["services", "ombi", "group"], "readOnly": false, "type": "string"}, "services.ombi.openFirewall": {"declarations": ["nixos/modules/services/misc/ombi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the Ombi web interface."}, "loc": ["services", "ombi", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.ombi.port": {"declarations": ["nixos/modules/services/misc/ombi.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "The port for the Ombi web interface."}, "loc": ["services", "ombi", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.ombi.user": {"declarations": ["nixos/modules/services/misc/ombi.nix"], "default": {"_type": "literalExpression", "text": "\"ombi\""}, "description": {"_type": "mdDoc", "text": "User account under which Ombi runs."}, "loc": ["services", "ombi", "user"], "readOnly": false, "type": "string"}, "services.onedrive.enable": {"declarations": ["nixos/modules/services/networking/onedrive.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OneDrive service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "onedrive", "enable"], "readOnly": false, "type": "boolean"}, "services.onedrive.package": {"declarations": ["nixos/modules/services/networking/onedrive.nix"], "default": {"_type": "literalExpression", "text": "pkgs.onedrive"}, "description": {"_type": "mdDoc", "text": "OneDrive package to use.\n"}, "loc": ["services", "onedrive", "package"], "readOnly": false, "type": "package"}, "services.onlyoffice.enable": {"declarations": ["nixos/modules/services/web-apps/onlyoffice.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OnlyOffice DocumentServer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "onlyoffice", "enable"], "readOnly": false, "type": "boolean"}, "services.onlyoffice.enableExampleServer": {"declarations": ["nixos/modules/services/web-apps/onlyoffice.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OnlyOffice example server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "onlyoffice", "enableExampleServer"], "readOnly": false, "type": "boolean"}, "services.onlyoffice.examplePort": {"declarations": ["nixos/modules/services/web-apps/onlyoffice.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port the OnlyOffice Example server should listens on."}, "loc": ["services", "onlyoffice", "examplePort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.onlyoffice.hostname": {"declarations": ["nixos/modules/services/web-apps/onlyoffice.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "FQDN for the onlyoffice instance."}, "loc": ["services", "onlyoffice", "hostname"], "readOnly": false, "type": "string"}, "services.onlyoffice.jwtSecretFile": {"declarations": ["nixos/modules/services/web-apps/onlyoffice.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a file that contains the secret to sign web requests using JSON Web Tokens.\nIf left at the default value null signing is disabled.\n"}, "loc": ["services", "onlyoffice", "jwtSecretFile"], "readOnly": false, "type": "null or string"}, "services.onlyoffice.package": {"declarations": ["nixos/modules/services/web-apps/onlyoffice.nix"], "default": {"_type": "literalExpression", "text": "pkgs.onlyoffice-documentserver"}, "description": {"_type": "mdDoc", "text": "Which package to use for the OnlyOffice instance."}, "loc": ["services", "onlyoffice", "package"], "readOnly": false, "type": "package"}, "services.onlyoffice.port": {"declarations": ["nixos/modules/services/web-apps/onlyoffice.nix"], "default": {"_type": "literalExpression", "text": "8000"}, "description": {"_type": "mdDoc", "text": "Port the OnlyOffice DocumentServer should listens on."}, "loc": ["services", "onlyoffice", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.onlyoffice.postgresHost": {"declarations": ["nixos/modules/services/web-apps/onlyoffice.nix"], "default": {"_type": "literalExpression", "text": "\"/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "The Postgresql hostname or socket path OnlyOffice should connect to."}, "loc": ["services", "onlyoffice", "postgresHost"], "readOnly": false, "type": "string"}, "services.onlyoffice.postgresName": {"declarations": ["nixos/modules/services/web-apps/onlyoffice.nix"], "default": {"_type": "literalExpression", "text": "\"onlyoffice\""}, "description": {"_type": "mdDoc", "text": "The name of database OnlyOffice should user."}, "loc": ["services", "onlyoffice", "postgresName"], "readOnly": false, "type": "string"}, "services.onlyoffice.postgresPasswordFile": {"declarations": ["nixos/modules/services/web-apps/onlyoffice.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a file that contains the password OnlyOffice should use to connect to Postgresql.\nUnused when using socket authentication.\n"}, "loc": ["services", "onlyoffice", "postgresPasswordFile"], "readOnly": false, "type": "null or string"}, "services.onlyoffice.postgresUser": {"declarations": ["nixos/modules/services/web-apps/onlyoffice.nix"], "default": {"_type": "literalExpression", "text": "\"onlyoffice\""}, "description": {"_type": "mdDoc", "text": "The username OnlyOffice should use to connect to Postgresql.\nUnused when using socket authentication.\n"}, "loc": ["services", "onlyoffice", "postgresUser"], "readOnly": false, "type": "string"}, "services.onlyoffice.rabbitmqUrl": {"declarations": ["nixos/modules/services/web-apps/onlyoffice.nix"], "default": {"_type": "literalExpression", "text": "\"amqp://guest:guest@localhost:5672\""}, "description": {"_type": "mdDoc", "text": "The Rabbitmq in amqp URI style OnlyOffice should connect to."}, "loc": ["services", "onlyoffice", "rabbitmqUrl"], "readOnly": false, "type": "string"}, "services.openafsClient.afsdb": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Resolve cells via AFSDB DNS records."}, "loc": ["services", "openafsClient", "afsdb"], "readOnly": false, "type": "boolean"}, "services.openafsClient.cache.blocks": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "100000"}, "description": {"_type": "mdDoc", "text": "Cache size in 1KB blocks."}, "loc": ["services", "openafsClient", "cache", "blocks"], "readOnly": false, "type": "signed integer"}, "services.openafsClient.cache.chunksize": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Size of each cache chunk given in powers of\n2. `0` resets the chunk size to its default\nvalues (13 (8 KB) for memcache, 18-20 (256 KB to 1 MB) for\ndiskcache). Maximum value is 30. Important performance\nparameter. Set to higher values when dealing with large files.\n"}, "loc": ["services", "openafsClient", "cache", "chunksize"], "readOnly": false, "type": "integer between 0 and 30 (both inclusive)"}, "services.openafsClient.cache.directory": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "\"/var/cache/openafs\""}, "description": {"_type": "mdDoc", "text": "Cache directory."}, "loc": ["services", "openafsClient", "cache", "directory"], "readOnly": false, "type": "string"}, "services.openafsClient.cache.diskless": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use in-memory cache for diskless machines. Has no real\nperformance benefit anymore.\n"}, "loc": ["services", "openafsClient", "cache", "diskless"], "readOnly": false, "type": "boolean"}, "services.openafsClient.cellName": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Cell name."}, "example": {"_type": "literalExpression", "text": "\"grand.central.org\""}, "loc": ["services", "openafsClient", "cellName"], "readOnly": false, "type": "string"}, "services.openafsClient.cellServDB": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This cell's database server records, added to the global\nCellServDB. See CellServDB(5) man page for syntax. Ignored when\n`afsdb` is set to `true`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    dnsname = \"first.afsdb.server.dns.fqdn.org\";\n    ip = \"1.2.3.4\";\n  }\n  {\n    dnsname = \"second.afsdb.server.dns.fqdn.org\";\n    ip = \"2.3.4.5\";\n  }\n]"}, "loc": ["services", "openafsClient", "cellServDB"], "readOnly": false, "type": "list of (submodule)"}, "services.openafsClient.cellServDB.*.dnsname": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "DNS full-qualified domain name of a database server"}, "example": {"_type": "literalExpression", "text": "\"afs.example.org\""}, "loc": ["services", "openafsClient", "cellServDB", "*", "dnsname"], "readOnly": false, "type": "string"}, "services.openafsClient.cellServDB.*.ip": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "IP Address of a database server"}, "example": {"_type": "literalExpression", "text": "\"1.2.3.4\""}, "loc": ["services", "openafsClient", "cellServDB", "*", "ip"], "readOnly": false, "type": "string"}, "services.openafsClient.crypt": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable (weak) protocol encryption."}, "loc": ["services", "openafsClient", "crypt"], "readOnly": false, "type": "boolean"}, "services.openafsClient.daemons": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Number of daemons to serve user requests. Numbers higher than 6\nusually do no increase performance. Default is sufficient for up\nto five concurrent users.\n"}, "loc": ["services", "openafsClient", "daemons"], "readOnly": false, "type": "signed integer"}, "services.openafsClient.enable": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the OpenAFS client."}, "loc": ["services", "openafsClient", "enable"], "readOnly": false, "type": "boolean"}, "services.openafsClient.fakestat": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Return fake data on stat() calls. If `true`,\nalways do so. If `false`, only do so for\ncross-cell mounts (as these are potentially expensive).\n"}, "loc": ["services", "openafsClient", "fakestat"], "readOnly": false, "type": "boolean"}, "services.openafsClient.inumcalc": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "\"compat\""}, "description": {"_type": "mdDoc", "text": "Inode calculation method. `compat` is\ncomputationally less expensive, but `md5` greatly\nreduces the likelihood of inode collisions in larger scenarios\ninvolving multiple cells mounted into one AFS space.\n"}, "loc": ["services", "openafsClient", "inumcalc"], "readOnly": false, "type": "string matching the pattern compat|md5"}, "services.openafsClient.mountPoint": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "\"/afs\""}, "description": {"_type": "mdDoc", "text": "Mountpoint of the AFS file tree, conventionally\n`/afs`. When set to a different value, only\ncross-cells that use the same value can be accessed.\n"}, "loc": ["services", "openafsClient", "mountPoint"], "readOnly": false, "type": "string"}, "services.openafsClient.packages.module": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "config.boot.kernelPackages.openafs"}, "description": {"_type": "mdDoc", "text": "OpenAFS kernel module package. MUST match the userland package!"}, "loc": ["services", "openafsClient", "packages", "module"], "readOnly": false, "type": "package"}, "services.openafsClient.packages.programs": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "getBin pkgs.openafs"}, "description": {"_type": "mdDoc", "text": "OpenAFS programs package. MUST match the kernel module package!"}, "loc": ["services", "openafsClient", "packages", "programs"], "readOnly": false, "type": "package"}, "services.openafsClient.sparse": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Minimal cell list in /afs."}, "loc": ["services", "openafsClient", "sparse"], "readOnly": false, "type": "boolean"}, "services.openafsClient.startDisconnected": {"declarations": ["nixos/modules/services/network-filesystems/openafs/client.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Start up in disconnected mode.  You need to execute\n`fs disco online` (as root) to switch to\nconnected mode. Useful for roaming devices.\n"}, "loc": ["services", "openafsClient", "startDisconnected"], "readOnly": false, "type": "boolean"}, "services.openafsServer.advertisedAddresses": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of IP addresses this server is advertised under. See NetInfo(5)"}, "loc": ["services", "openafsServer", "advertisedAddresses"], "readOnly": false, "type": "list of string"}, "services.openafsServer.cellName": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Cell name, this server will serve."}, "example": {"_type": "literalExpression", "text": "\"grand.central.org\""}, "loc": ["services", "openafsServer", "cellName"], "readOnly": false, "type": "string"}, "services.openafsServer.cellServDB": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Definition of all cell-local database server machines."}, "loc": ["services", "openafsServer", "cellServDB"], "readOnly": false, "type": "list of (submodule)"}, "services.openafsServer.cellServDB.*.dnsname": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "DNS full-qualified domain name of a database server"}, "example": {"_type": "literalExpression", "text": "\"afs.example.org\""}, "loc": ["services", "openafsServer", "cellServDB", "*", "dnsname"], "readOnly": false, "type": "string"}, "services.openafsServer.cellServDB.*.ip": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "IP Address of a database server"}, "example": {"_type": "literalExpression", "text": "\"1.2.3.4\""}, "loc": ["services", "openafsServer", "cellServDB", "*", "ip"], "readOnly": false, "type": "string"}, "services.openafsServer.dottedPrincipals": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, allow principal names containing (.) dots. Enabling\nthis has security implications!\n"}, "loc": ["services", "openafsServer", "dottedPrincipals"], "readOnly": false, "type": "boolean"}, "services.openafsServer.enable": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the OpenAFS server. An OpenAFS server needs a\ncomplex setup. So, be aware that enabling this service and setting\nsome options does not give you a turn-key-ready solution. You need\nat least a running Kerberos 5 setup, as OpenAFS relies on it for\nauthentication. See the Guide \"QuickStartUnix\" coming with\n`pkgs.openafs.doc` for complete setup\ninstructions.\n"}, "loc": ["services", "openafsServer", "enable"], "readOnly": false, "type": "boolean"}, "services.openafsServer.package": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.openafs"}, "description": {"_type": "mdDoc", "text": "OpenAFS package for the server binaries"}, "loc": ["services", "openafsServer", "package"], "readOnly": false, "type": "package"}, "services.openafsServer.roles.backup.buserverArgs": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Arguments to the buserver process. See its man page."}, "example": {"_type": "literalExpression", "text": "\"-p 8\""}, "loc": ["services", "openafsServer", "roles", "backup", "buserverArgs"], "readOnly": false, "type": "string"}, "services.openafsServer.roles.backup.cellServDB": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Definition of all cell-local backup database server machines.\nUse this when your cell uses less backup database servers than\nother database server machines.\n"}, "loc": ["services", "openafsServer", "roles", "backup", "cellServDB"], "readOnly": false, "type": "list of (submodule)"}, "services.openafsServer.roles.backup.cellServDB.*.dnsname": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "DNS full-qualified domain name of a database server"}, "example": {"_type": "literalExpression", "text": "\"afs.example.org\""}, "loc": ["services", "openafsServer", "roles", "backup", "cellServDB", "*", "dnsname"], "readOnly": false, "type": "string"}, "services.openafsServer.roles.backup.cellServDB.*.ip": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "IP Address of a database server"}, "example": {"_type": "literalExpression", "text": "\"1.2.3.4\""}, "loc": ["services", "openafsServer", "roles", "backup", "cellServDB", "*", "ip"], "readOnly": false, "type": "string"}, "services.openafsServer.roles.backup.enable": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Backup server role. When using OpenAFS built-in buserver, use in conjunction with the\n`database` role to maintain the Backup\nDatabase. Normally only used in conjunction with tape storage\nor IBM's Tivoli Storage Manager.\n\nFor a modern backup server, enable this role and see\n{option}`enableFabs`.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "openafsServer", "roles", "backup", "enable"], "readOnly": false, "type": "boolean"}, "services.openafsServer.roles.backup.enableFabs": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable FABS, the flexible AFS backup system. It stores volumes as dump files, relying on other\npre-existing backup solutions for handling them.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "openafsServer", "roles", "backup", "enableFabs"], "readOnly": false, "type": "boolean"}, "services.openafsServer.roles.backup.fabsArgs": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Arguments to the fabsys process. See\n{manpage}`fabsys_server(1)` and\n{manpage}`fabsys_config(1)`.\n"}, "loc": ["services", "openafsServer", "roles", "backup", "fabsArgs"], "readOnly": false, "type": "string"}, "services.openafsServer.roles.backup.fabsExtraConfig": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional configuration parameters for the FABS backup server.\n"}, "example": {"_type": "literalExpression", "text": "{\n  afs.localauth = true;\n  afs.keytab = config.sops.secrets.fabsKeytab.path;\n}\n"}, "loc": ["services", "openafsServer", "roles", "backup", "fabsExtraConfig"], "readOnly": false, "type": "attribute set"}, "services.openafsServer.roles.database.enable": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Database server role, maintains the Volume Location Database,\nProtection Database (and Backup Database, see\n`backup` role). There can be multiple\nservers in the database role for replication, which then need\nreliable network connection to each other.\n\nServers in this role appear in AFSDB DNS records or the\nCellServDB.\n"}, "loc": ["services", "openafsServer", "roles", "database", "enable"], "readOnly": false, "type": "boolean"}, "services.openafsServer.roles.database.ptserverArgs": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Arguments to the ptserver process. See its man page."}, "example": {"_type": "literalExpression", "text": "\"-restricted -default_access S---- S-M---\""}, "loc": ["services", "openafsServer", "roles", "database", "ptserverArgs"], "readOnly": false, "type": "string"}, "services.openafsServer.roles.database.vlserverArgs": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Arguments to the vlserver process. See its man page."}, "example": {"_type": "literalExpression", "text": "\"-rxbind\""}, "loc": ["services", "openafsServer", "roles", "database", "vlserverArgs"], "readOnly": false, "type": "string"}, "services.openafsServer.roles.fileserver.enable": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Fileserver role, serves files and volumes from its local storage."}, "loc": ["services", "openafsServer", "roles", "fileserver", "enable"], "readOnly": false, "type": "boolean"}, "services.openafsServer.roles.fileserver.fileserverArgs": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "\"-vattachpar 128 -vhashsize 11 -L -rxpck 400 -cb 1000000\""}, "description": {"_type": "mdDoc", "text": "Arguments to the dafileserver process. See its man page."}, "loc": ["services", "openafsServer", "roles", "fileserver", "fileserverArgs"], "readOnly": false, "type": "string"}, "services.openafsServer.roles.fileserver.salvagerArgs": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Arguments to the dasalvager process. See its man page."}, "example": {"_type": "literalExpression", "text": "\"-showlog -showmounts\""}, "loc": ["services", "openafsServer", "roles", "fileserver", "salvagerArgs"], "readOnly": false, "type": "string"}, "services.openafsServer.roles.fileserver.salvageserverArgs": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Arguments to the salvageserver process. See its man page."}, "example": {"_type": "literalExpression", "text": "\"-showlog\""}, "loc": ["services", "openafsServer", "roles", "fileserver", "salvageserverArgs"], "readOnly": false, "type": "string"}, "services.openafsServer.roles.fileserver.volserverArgs": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Arguments to the davolserver process. See its man page."}, "example": {"_type": "literalExpression", "text": "\"-sync never\""}, "loc": ["services", "openafsServer", "roles", "fileserver", "volserverArgs"], "readOnly": false, "type": "string"}, "services.openafsServer.udpPacketSize": {"declarations": ["nixos/modules/services/network-filesystems/openafs/server.nix"], "default": {"_type": "literalExpression", "text": "1310720"}, "description": {"_type": "mdDoc", "text": "UDP packet size to use in Bytes. Higher values can speed up\ncommunications. The default of 1 MB is a sufficient in most\ncases. Make sure to increase the kernel's UDP buffer size\naccordingly via `net.core(w|r|opt)mem_max`\nsysctl.\n"}, "loc": ["services", "openafsServer", "udpPacketSize"], "readOnly": false, "type": "signed integer"}, "services.openarena.enable": {"declarations": ["nixos/modules/services/games/openarena.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OpenArena."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "openarena", "enable"], "readOnly": false, "type": "boolean"}, "services.openarena.extraFlags": {"declarations": ["nixos/modules/services/games/openarena.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags to pass to {command}`oa_ded`"}, "example": {"_type": "literalExpression", "text": "[\n  \"+set dedicated 2\"\n  \"+set sv_hostname 'My NixOS OpenArena Server'\"\n  \"+map oa_dm1\"\n]"}, "loc": ["services", "openarena", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.openarena.openPorts": {"declarations": ["nixos/modules/services/games/openarena.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open firewall ports for OpenArena"}, "loc": ["services", "openarena", "openPorts"], "readOnly": false, "type": "boolean"}, "services.opendkim.configFile": {"declarations": ["nixos/modules/services/mail/opendkim.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Additional opendkim configuration."}, "loc": ["services", "opendkim", "configFile"], "readOnly": false, "type": "null or path"}, "services.opendkim.domains": {"declarations": ["nixos/modules/services/mail/opendkim.nix"], "default": {"_type": "literalExpression", "text": "\"csl:${config.networking.hostName}\""}, "description": {"_type": "mdDoc", "text": "Local domains set (see `opendkim(8)` for more information on datasets).\nMessages from them are signed, not verified.\n"}, "example": {"_type": "literalExpression", "text": "\"csl:example.com,mydomain.net\""}, "loc": ["services", "opendkim", "domains"], "readOnly": false, "type": "string"}, "services.opendkim.enable": {"declarations": ["nixos/modules/services/mail/opendkim.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the OpenDKIM sender authentication system."}, "loc": ["services", "opendkim", "enable"], "readOnly": false, "type": "boolean"}, "services.opendkim.group": {"declarations": ["nixos/modules/services/mail/opendkim.nix"], "default": {"_type": "literalExpression", "text": "\"opendkim\""}, "description": {"_type": "mdDoc", "text": "Group for the daemon."}, "loc": ["services", "opendkim", "group"], "readOnly": false, "type": "string"}, "services.opendkim.keyPath": {"declarations": ["nixos/modules/services/mail/opendkim.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/opendkim/keys\""}, "description": {"_type": "mdDoc", "text": "The path that opendkim should put its generated private keys into.\nThe DNS settings will be found in this directory with the name selector.txt.\n"}, "loc": ["services", "opendkim", "keyPath"], "readOnly": false, "type": "path"}, "services.opendkim.selector": {"declarations": ["nixos/modules/services/mail/opendkim.nix"], "description": {"_type": "mdDoc", "text": "Selector to use when signing."}, "loc": ["services", "opendkim", "selector"], "readOnly": false, "type": "string"}, "services.opendkim.socket": {"declarations": ["nixos/modules/services/mail/opendkim.nix"], "default": {"_type": "literalExpression", "text": "\"local:/run/opendkim/opendkim.sock\""}, "description": {"_type": "mdDoc", "text": "Socket which is used for communication with OpenDKIM."}, "loc": ["services", "opendkim", "socket"], "readOnly": false, "type": "string"}, "services.opendkim.user": {"declarations": ["nixos/modules/services/mail/opendkim.nix"], "default": {"_type": "literalExpression", "text": "\"opendkim\""}, "description": {"_type": "mdDoc", "text": "User for the daemon."}, "loc": ["services", "opendkim", "user"], "readOnly": false, "type": "string"}, "services.openiscsi.discoverPortal": {"declarations": ["nixos/modules/services/networking/iscsi/initiator.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Portal to discover targets on"}, "loc": ["services", "openiscsi", "discoverPortal"], "readOnly": false, "type": "null or string"}, "services.openiscsi.enable": {"declarations": ["nixos/modules/services/networking/iscsi/initiator.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the openiscsi iscsi daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "openiscsi", "enable"], "readOnly": false, "type": "boolean"}, "services.openiscsi.enableAutoLoginOut": {"declarations": ["nixos/modules/services/networking/iscsi/initiator.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic login and logout of all automatic targets.\nYou probably do not want this.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "openiscsi", "enableAutoLoginOut"], "readOnly": false, "type": "boolean"}, "services.openiscsi.extraConfig": {"declarations": ["nixos/modules/services/networking/iscsi/initiator.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Lines to append to default iscsid.conf"}, "loc": ["services", "openiscsi", "extraConfig"], "readOnly": false, "type": "string"}, "services.openiscsi.extraConfigFile": {"declarations": ["nixos/modules/services/networking/iscsi/initiator.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Append an additional file's contents to /etc/iscsid.conf. Use a non-store path\nand store passwords in this file.\n"}, "loc": ["services", "openiscsi", "extraConfigFile"], "readOnly": false, "type": "null or string"}, "services.openiscsi.name": {"declarations": ["nixos/modules/services/networking/iscsi/initiator.nix"], "description": {"_type": "mdDoc", "text": "Name of this iscsi initiator"}, "example": {"_type": "literalExpression", "text": "\"iqn.2020-08.org.linux-iscsi.initiatorhost:example\""}, "loc": ["services", "openiscsi", "name"], "readOnly": false, "type": "string"}, "services.openiscsi.package": {"declarations": ["nixos/modules/services/networking/iscsi/initiator.nix"], "default": {"_type": "literalExpression", "text": "pkgs.openiscsi"}, "description": {"_type": "mdDoc", "text": "openiscsi package to use"}, "loc": ["services", "openiscsi", "package"], "readOnly": false, "type": "package"}, "services.openldap.configDir": {"declarations": ["nixos/modules/services/databases/openldap.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use this config directory instead of generating one from the\n`settings` option. Overrides all NixOS settings.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/openldap/slapd.d\""}, "loc": ["services", "openldap", "configDir"], "readOnly": false, "type": "null or path"}, "services.openldap.declarativeContents": {"declarations": ["nixos/modules/services/databases/openldap.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative contents for the LDAP database, in LDIF format by suffix.\n\nAll data will be erased when starting the LDAP server. Modifications\nto the database are not prevented, they are just dropped on the next\nreboot of the server. Performance-wise the database and indexes are\nrebuilt on each server startup, so this will slow down server startup,\nespecially with large databases.\n\nNote that the root of the DB must be defined in\n`services.openldap.settings` and the\n`olcDbDirectory` must begin with\n`\"/var/lib/openldap\"`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"dc=example,dc=org\" = ''\n    dn= dn: dc=example,dc=org\n    objectClass: domain\n    dc: example\n\n    dn: ou=users,dc=example,dc=org\n    objectClass = organizationalUnit\n    ou: users\n\n    # ...\n  '';\n}\n"}, "loc": ["services", "openldap", "declarativeContents"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.openldap.enable": {"declarations": ["nixos/modules/services/databases/openldap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the ldap server."}, "loc": ["services", "openldap", "enable"], "readOnly": false, "type": "boolean"}, "services.openldap.group": {"declarations": ["nixos/modules/services/databases/openldap.nix"], "default": {"_type": "literalExpression", "text": "\"openldap\""}, "description": {"_type": "mdDoc", "text": "Group account under which slapd runs."}, "loc": ["services", "openldap", "group"], "readOnly": false, "type": "string"}, "services.openldap.mutableConfig": {"declarations": ["nixos/modules/services/databases/openldap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow writable on-line configuration. If\n`true`, the NixOS settings will only be used to\ninitialize the OpenLDAP configuration if it does not exist, and are\nsubsequently ignored.\n"}, "loc": ["services", "openldap", "mutableConfig"], "readOnly": false, "type": "boolean"}, "services.openldap.package": {"declarations": ["nixos/modules/services/databases/openldap.nix"], "default": {"_type": "literalExpression", "text": "pkgs.openldap"}, "description": {"_type": "mdDoc", "text": "OpenLDAP package to use.\n\nThis can be used to, for example, set an OpenLDAP package\nwith custom overrides to enable modules or other\nfunctionality.\n"}, "loc": ["services", "openldap", "package"], "readOnly": false, "type": "package"}, "services.openldap.settings": {"declarations": ["nixos/modules/services/databases/openldap.nix"], "description": {"_type": "mdDoc", "text": "Configuration for OpenLDAP, in OLC format"}, "example": {"_type": "literalExpression", "text": "{\n  attrs.olcLogLevel = [ \"stats\" ];\n  children = {\n    \"cn=schema\".includes = [\n       \"${pkgs.openldap}/etc/schema/core.ldif\"\n       \"${pkgs.openldap}/etc/schema/cosine.ldif\"\n       \"${pkgs.openldap}/etc/schema/inetorgperson.ldif\"\n    ];\n    \"olcDatabase={-1}frontend\" = {\n      attrs = {\n        objectClass = \"olcDatabaseConfig\";\n        olcDatabase = \"{-1}frontend\";\n        olcAccess = [ \"{0}to * by dn.exact=uidNumber=0+gidNumber=0,cn=peercred,cn=external,cn=auth manage stop by * none stop\" ];\n      };\n    };\n    \"olcDatabase={0}config\" = {\n      attrs = {\n        objectClass = \"olcDatabaseConfig\";\n        olcDatabase = \"{0}config\";\n        olcAccess = [ \"{0}to * by * none break\" ];\n      };\n    };\n    \"olcDatabase={1}mdb\" = {\n      attrs = {\n        objectClass = [ \"olcDatabaseConfig\" \"olcMdbConfig\" ];\n        olcDatabase = \"{1}mdb\";\n        olcDbDirectory = \"/var/lib/openldap/ldap\";\n        olcDbIndex = [\n          \"objectClass eq\"\n          \"cn pres,eq\"\n          \"uid pres,eq\"\n          \"sn pres,eq,subany\"\n        ];\n        olcSuffix = \"dc=example,dc=com\";\n        olcAccess = [ \"{0}to * by * read break\" ];\n      };\n    };\n  };\n};\n"}, "loc": ["services", "openldap", "settings"], "readOnly": false, "type": "submodule"}, "services.openldap.settings.attrs": {"declarations": ["nixos/modules/services/databases/openldap.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attributes of the parent entry."}, "loc": ["services", "openldap", "settings", "attrs"], "readOnly": false, "type": "attribute set of ((LDAP value - either a string, or an attrset containing\n`path` or `base64` for included\nvalues or base-64 encoded values respectively.\n) or list of (LDAP value - either a string, or an attrset containing\n`path` or `base64` for included\nvalues or base-64 encoded values respectively.\n))"}, "services.openldap.settings.children": {"declarations": ["nixos/modules/services/databases/openldap.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Child entries of the current entry, with recursively the same structure."}, "example": {"_type": "literalExpression", "text": "{\n    \"cn=schema\" = {\n    # The attribute used in the DN must be defined\n    attrs = { cn = \"schema\"; };\n    children = {\n        # This entry's DN is expanded to \"cn=foo,cn=schema\"\n        \"cn=foo\" = { ... };\n    };\n    # These includes are inserted after \"cn=schema\", but before \"cn=foo,cn=schema\"\n    includes = [ ... ];\n    };\n}\n"}, "loc": ["services", "openldap", "settings", "children"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.openldap.settings.includes": {"declarations": ["nixos/modules/services/databases/openldap.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "LDIF files to include after the parent's attributes but before its children.\n"}, "loc": ["services", "openldap", "settings", "includes"], "readOnly": false, "type": "list of path"}, "services.openldap.urlList": {"declarations": ["nixos/modules/services/databases/openldap.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"ldap:///\"\n]"}, "description": {"_type": "mdDoc", "text": "URL list slapd should listen on."}, "example": {"_type": "literalExpression", "text": "[\n  \"ldaps:///\"\n]"}, "loc": ["services", "openldap", "urlList"], "readOnly": false, "type": "list of string"}, "services.openldap.user": {"declarations": ["nixos/modules/services/databases/openldap.nix"], "default": {"_type": "literalExpression", "text": "\"openldap\""}, "description": {"_type": "mdDoc", "text": "User account under which slapd runs."}, "loc": ["services", "openldap", "user"], "readOnly": false, "type": "string"}, "services.openntpd.enable": {"declarations": ["nixos/modules/services/networking/ntp/openntpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OpenNTP time synchronization server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "openntpd", "enable"], "readOnly": false, "type": "boolean"}, "services.openntpd.extraConfig": {"declarations": ["nixos/modules/services/networking/ntp/openntpd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional text appended to {file}`openntpd.conf`.\n"}, "example": {"_type": "literalExpression", "text": "''\n  listen on 127.0.0.1\n  listen on ::1\n''"}, "loc": ["services", "openntpd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.openntpd.extraOptions": {"declarations": ["nixos/modules/services/networking/ntp/openntpd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra options used when launching openntpd.\n"}, "example": {"_type": "literalExpression", "text": "\"-s\""}, "loc": ["services", "openntpd", "extraOptions"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.openntpd.servers": {"declarations": ["nixos/modules/services/networking/ntp/openntpd.nix"], "default": {"_type": "literalExpression", "text": "config.services.ntp.servers"}, "description": {"_type": "mdDoc", "text": "The set of NTP servers from which to synchronise.\n"}, "loc": ["services", "openntpd", "servers"], "readOnly": false, "type": "list of string"}, "services.opensearch.dataDir": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/opensearch\""}, "description": {"_type": "mdDoc", "text": "Data directory for OpenSearch. If you change this, you need to\nmanually create the directory. You also need to create the\n`opensearch` user and group, or change\n[](#opt-services.opensearch.user) and\n[](#opt-services.opensearch.group) to existing ones with\naccess to the directory.\n"}, "loc": ["services", "opensearch", "dataDir"], "readOnly": false, "type": "path"}, "services.opensearch.enable": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OpenSearch."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "opensearch", "enable"], "readOnly": false, "type": "boolean"}, "services.opensearch.extraCmdLineOptions": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line options for the OpenSearch launcher."}, "loc": ["services", "opensearch", "extraCmdLineOptions"], "readOnly": false, "type": "list of string"}, "services.opensearch.extraJavaOptions": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line options for Java."}, "example": {"_type": "literalExpression", "text": "[\n  \"-Djava.net.preferIPv4Stack=true\"\n]"}, "loc": ["services", "opensearch", "extraJavaOptions"], "readOnly": false, "type": "list of string"}, "services.opensearch.group": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "\"opensearch\""}, "description": {"_type": "mdDoc", "text": "The group OpenSearch runs as. Should be left at default unless\nyou have very specific needs.\n"}, "loc": ["services", "opensearch", "group"], "readOnly": false, "type": "string"}, "services.opensearch.logging": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "''\n  logger.action.name = org.opensearch.action\n  logger.action.level = info\n  \n  appender.console.type = Console\n  appender.console.name = console\n  appender.console.layout.type = PatternLayout\n  appender.console.layout.pattern = [%d{ISO8601}][%-5p][%-25c{1.}] %marker%m%n\n  \n  rootLogger.level = info\n  rootLogger.appenderRef.console.ref = console\n''"}, "description": {"_type": "mdDoc", "text": "opensearch logging configuration."}, "loc": ["services", "opensearch", "logging"], "readOnly": false, "type": "string"}, "services.opensearch.package": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "pkgs.opensearch"}, "description": {"_type": "mdDoc", "text": "The OpenSearch package to use."}, "loc": ["services", "opensearch", "package"], "readOnly": false, "type": "package"}, "services.opensearch.restartIfChanged": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Automatically restart the service on config change.\nThis can be set to false to defer restarts on a server or cluster.\nPlease consider the security implications of inadvertently running an older version,\nand the possibility of unexpected behavior caused by inconsistent versions across a cluster when disabling this option.\n"}, "loc": ["services", "opensearch", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.opensearch.settings": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "OpenSearch configuration.\n"}, "loc": ["services", "opensearch", "settings"], "readOnly": false, "type": "YAML value"}, "services.opensearch.settings.\"cluster.name\"": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "\"opensearch\""}, "description": {"_type": "mdDoc", "text": "The name of the cluster.\n"}, "loc": ["services", "opensearch", "settings", "cluster.name"], "readOnly": false, "type": "string"}, "services.opensearch.settings.\"discovery.type\"": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "\"single-node\""}, "description": {"_type": "mdDoc", "text": "The type of discovery to use.\n"}, "loc": ["services", "opensearch", "settings", "discovery.type"], "readOnly": false, "type": "string"}, "services.opensearch.settings.\"http.port\"": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "9200"}, "description": {"_type": "mdDoc", "text": "The port to listen on for HTTP traffic.\n"}, "loc": ["services", "opensearch", "settings", "http.port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.opensearch.settings.\"network.host\"": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Which port this service should listen on.\n"}, "loc": ["services", "opensearch", "settings", "network.host"], "readOnly": false, "type": "string"}, "services.opensearch.settings.\"transport.port\"": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "9300"}, "description": {"_type": "mdDoc", "text": "The port to listen on for transport traffic.\n"}, "loc": ["services", "opensearch", "settings", "transport.port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.opensearch.user": {"declarations": ["nixos/modules/services/search/opensearch.nix"], "default": {"_type": "literalExpression", "text": "\"opensearch\""}, "description": {"_type": "mdDoc", "text": "The user OpenSearch runs as. Should be left at default unless\nyou have very specific needs.\n"}, "loc": ["services", "opensearch", "user"], "readOnly": false, "type": "string"}, "services.opensmtpd.enable": {"declarations": ["nixos/modules/services/mail/opensmtpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the OpenSMTPD server."}, "loc": ["services", "opensmtpd", "enable"], "readOnly": false, "type": "boolean"}, "services.opensmtpd.extraServerArgs": {"declarations": ["nixos/modules/services/mail/opensmtpd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line arguments provided when the smtpd process\nis started.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-v\"\n  \"-P mta\"\n]"}, "loc": ["services", "opensmtpd", "extraServerArgs"], "readOnly": false, "type": "list of string"}, "services.opensmtpd.package": {"declarations": ["nixos/modules/services/mail/opensmtpd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.opensmtpd"}, "description": {"_type": "mdDoc", "text": "The OpenSMTPD package to use."}, "loc": ["services", "opensmtpd", "package"], "readOnly": false, "type": "package"}, "services.opensmtpd.procPackages": {"declarations": ["nixos/modules/services/mail/opensmtpd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages to search for filters, tables, queues, and schedulers.\n\nAdd OpenSMTPD-extras here if you want to use the filters, etc. from\nthat package.\n"}, "loc": ["services", "opensmtpd", "procPackages"], "readOnly": false, "type": "list of package"}, "services.opensmtpd.serverConfiguration": {"declarations": ["nixos/modules/services/mail/opensmtpd.nix"], "description": {"_type": "mdDoc", "text": "The contents of the smtpd.conf configuration file. See the\nOpenSMTPD documentation for syntax information.\n"}, "example": {"_type": "literalExpression", "text": "''\n  listen on lo\n  accept for any deliver to lmtp localhost:24\n''"}, "loc": ["services", "opensmtpd", "serverConfiguration"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.opensmtpd.setSendmail": {"declarations": ["nixos/modules/services/mail/opensmtpd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to set the system sendmail to OpenSMTPD's."}, "loc": ["services", "opensmtpd", "setSendmail"], "readOnly": false, "type": "boolean"}, "services.opensnitch.enable": {"declarations": ["nixos/modules/services/security/opensnitch.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Opensnitch application firewall."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "opensnitch", "enable"], "readOnly": false, "type": "boolean"}, "services.opensnitch.rules": {"declarations": ["nixos/modules/services/security/opensnitch.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative configuration of firewall rules.\nAll rules will be stored in `/var/lib/opensnitch/rules`.\nSee [upstream documentation](https://github.com/evilsocket/opensnitch/wiki/Rules)\nfor available options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"tor\" = {\n    \"name\" = \"tor\";\n    \"enabled\" = true;\n    \"action\" = \"allow\";\n    \"duration\" = \"always\";\n    \"operator\" = {\n      \"type\" =\"simple\";\n      \"sensitive\" = false;\n      \"operand\" = \"process.path\";\n      \"data\" = \"${lib.getBin pkgs.tor}/bin/tor\";\n    };\n  };\n};\n"}, "loc": ["services", "opensnitch", "rules"], "readOnly": false, "type": "JSON value"}, "services.opensnitch.settings": {"declarations": ["nixos/modules/services/security/opensnitch.nix"], "description": {"_type": "mdDoc", "text": "opensnitchd configuration. Refer to [upstream documentation](https://github.com/evilsocket/opensnitch/wiki/Configurations)\nfor details on supported values.\n"}, "loc": ["services", "opensnitch", "settings"], "readOnly": false, "type": "JSON value"}, "services.opensnitch.settings.DefaultAction": {"declarations": ["nixos/modules/services/security/opensnitch.nix"], "description": {"_type": "mdDoc", "text": "Default action whether to block or allow application internet\naccess.\n"}, "loc": ["services", "opensnitch", "settings", "DefaultAction"], "readOnly": false, "type": "one of \"allow\", \"deny\""}, "services.opensnitch.settings.DefaultDuration": {"declarations": ["nixos/modules/services/security/opensnitch.nix"], "description": {"_type": "mdDoc", "text": "Default duration of firewall rule.\n"}, "loc": ["services", "opensnitch", "settings", "DefaultDuration"], "readOnly": false, "type": "one of \"once\", \"always\", \"until restart\", \"30s\", \"5m\", \"15m\", \"30m\", \"1h\""}, "services.opensnitch.settings.Firewall": {"declarations": ["nixos/modules/services/security/opensnitch.nix"], "description": {"_type": "mdDoc", "text": "Which firewall backend to use.\n"}, "loc": ["services", "opensnitch", "settings", "Firewall"], "readOnly": false, "type": "one of \"iptables\", \"nftables\""}, "services.opensnitch.settings.InterceptUnknown": {"declarations": ["nixos/modules/services/security/opensnitch.nix"], "description": {"_type": "mdDoc", "text": "Whether to intercept spare connections.\n"}, "loc": ["services", "opensnitch", "settings", "InterceptUnknown"], "readOnly": false, "type": "boolean"}, "services.opensnitch.settings.LogLevel": {"declarations": ["nixos/modules/services/security/opensnitch.nix"], "description": {"_type": "mdDoc", "text": "Default log level from 0 to 4 (debug, info, important, warning,\nerror).\n"}, "loc": ["services", "opensnitch", "settings", "LogLevel"], "readOnly": false, "type": "one of 0, 1, 2, 3, 4"}, "services.opensnitch.settings.ProcMonitorMethod": {"declarations": ["nixos/modules/services/security/opensnitch.nix"], "description": {"_type": "mdDoc", "text": "Which process monitoring method to use.\n"}, "loc": ["services", "opensnitch", "settings", "ProcMonitorMethod"], "readOnly": false, "type": "one of \"ebpf\", \"proc\", \"ftrace\", \"audit\""}, "services.opensnitch.settings.Server.Address": {"declarations": ["nixos/modules/services/security/opensnitch.nix"], "description": {"_type": "mdDoc", "text": "Unix socket path (unix:///tmp/osui.sock, the \"unix:///\" part is\nmandatory) or TCP socket (192.168.1.100:50051).\n"}, "loc": ["services", "opensnitch", "settings", "Server", "Address"], "readOnly": false, "type": "string"}, "services.opensnitch.settings.Server.LogFile": {"declarations": ["nixos/modules/services/security/opensnitch.nix"], "description": {"_type": "mdDoc", "text": "File to write logs to (use /dev/stdout to write logs to standard\noutput).\n"}, "loc": ["services", "opensnitch", "settings", "Server", "LogFile"], "readOnly": false, "type": "path"}, "services.opensnitch.settings.Stats.MaxEvents": {"declarations": ["nixos/modules/services/security/opensnitch.nix"], "description": {"_type": "mdDoc", "text": "Max events to send to the GUI.\n"}, "loc": ["services", "opensnitch", "settings", "Stats", "MaxEvents"], "readOnly": false, "type": "signed integer"}, "services.opensnitch.settings.Stats.MaxStats": {"declarations": ["nixos/modules/services/security/opensnitch.nix"], "description": {"_type": "mdDoc", "text": "Max stats per item to keep in backlog.\n"}, "loc": ["services", "opensnitch", "settings", "Stats", "MaxStats"], "readOnly": false, "type": "signed integer"}, "services.openssh.allowSFTP": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the SFTP subsystem in the SSH daemon.  This\nenables the use of commands such as {command}`sftp` and\n{command}`sshfs`.\n"}, "loc": ["services", "openssh", "allowSFTP"], "readOnly": false, "type": "boolean"}, "services.openssh.authorizedKeysCommand": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "\"none\""}, "description": {"_type": "mdDoc", "text": "Specifies a program to be used to look up the user's public\nkeys. The program must be owned by root, not writable by group\nor others and specified by an absolute path.\n"}, "loc": ["services", "openssh", "authorizedKeysCommand"], "readOnly": false, "type": "string"}, "services.openssh.authorizedKeysCommandUser": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "\"nobody\""}, "description": {"_type": "mdDoc", "text": "Specifies the user under whose account the AuthorizedKeysCommand\nis run. It is recommended to use a dedicated user that has no\nother role on the host than running authorized keys commands.\n"}, "loc": ["services", "openssh", "authorizedKeysCommandUser"], "readOnly": false, "type": "string"}, "services.openssh.authorizedKeysFiles": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Specify the rules for which files to read on the host.\n\nThis is an advanced option. If you're looking to configure user\nkeys, you can generally use [](#opt-users.users._name_.openssh.authorizedKeys.keys)\nor [](#opt-users.users._name_.openssh.authorizedKeys.keyFiles).\n\nThese are paths relative to the host root file system or home\ndirectories and they are subject to certain token expansion rules.\nSee AuthorizedKeysFile in man sshd_config for details.\n"}, "loc": ["services", "openssh", "authorizedKeysFiles"], "readOnly": false, "type": "list of string"}, "services.openssh.banner": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Message to display to the remote user before authentication is allowed.\n"}, "loc": ["services", "openssh", "banner"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.openssh.enable": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the OpenSSH secure shell daemon, which\nallows secure remote logins.\n"}, "loc": ["services", "openssh", "enable"], "readOnly": false, "type": "boolean"}, "services.openssh.extraConfig": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim contents of {file}`sshd_config`."}, "loc": ["services", "openssh", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.openssh.hostKeys": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "[\n  {\n    bits = 4096;\n    path = \"/etc/ssh/ssh_host_rsa_key\";\n    type = \"rsa\";\n  }\n  {\n    path = \"/etc/ssh/ssh_host_ed25519_key\";\n    type = \"ed25519\";\n  }\n]"}, "description": {"_type": "mdDoc", "text": "NixOS can automatically generate SSH host keys.  This option\nspecifies the path, type and size of each key.  See\n{manpage}`ssh-keygen(1)` for supported types\nand sizes.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    bits = 4096;\n    openSSHFormat = true;\n    path = \"/etc/ssh/ssh_host_rsa_key\";\n    rounds = 100;\n    type = \"rsa\";\n  }\n  {\n    comment = \"key comment\";\n    path = \"/etc/ssh/ssh_host_ed25519_key\";\n    rounds = 100;\n    type = \"ed25519\";\n  }\n]"}, "loc": ["services", "openssh", "hostKeys"], "readOnly": false, "type": "list of (attribute set)"}, "services.openssh.knownHosts": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "description": {"_type": "mdDoc", "text": "Alias of {option}`programs.ssh.knownHosts`."}, "loc": ["services", "openssh", "knownHosts"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.openssh.knownHosts.<name>.certAuthority": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This public key is an SSH certificate authority, rather than an\nindividual host's key.\n"}, "loc": ["services", "openssh", "knownHosts", "<name>", "certAuthority"], "readOnly": false, "type": "boolean"}, "services.openssh.knownHosts.<name>.extraHostNames": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of additional host names and/or IP numbers used for\naccessing the host's ssh service. This list is ignored if\n`hostNames` is set explicitly.\n"}, "loc": ["services", "openssh", "knownHosts", "<name>", "extraHostNames"], "readOnly": false, "type": "list of string"}, "services.openssh.knownHosts.<name>.hostNames": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "[ \u2039name\u203a ] ++ config.services.openssh.knownHosts.<name>.extraHostNames"}, "description": {"_type": "mdDoc", "text": "A list of host names and/or IP numbers used for accessing\nthe host's ssh service. This list includes the name of the\ncontaining `knownHosts` attribute by default\nfor convenience. If you wish to configure multiple host keys\nfor the same host use multiple `knownHosts`\nentries with different attribute names and the same\n`hostNames` list.\n"}, "loc": ["services", "openssh", "knownHosts", "<name>", "hostNames"], "readOnly": false, "type": "list of string"}, "services.openssh.knownHosts.<name>.publicKey": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The public key data for the host. You can fetch a public key\nfrom a running SSH server with the {command}`ssh-keyscan`\ncommand. The public key should not include any host names, only\nthe key type and the key itself.\n"}, "example": {"_type": "literalExpression", "text": "\"ecdsa-sha2-nistp521 AAAAE2VjZHN...UEPg==\""}, "loc": ["services", "openssh", "knownHosts", "<name>", "publicKey"], "readOnly": false, "type": "null or string"}, "services.openssh.knownHosts.<name>.publicKeyFile": {"declarations": ["nixos/modules/programs/ssh.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the public key file for the host. The public\nkey file is read at build time and saved in the Nix store.\nYou can fetch a public key file from a running SSH server\nwith the {command}`ssh-keyscan` command. The content\nof the file should follow the same format as described for\nthe `publicKey` option. Only a single key\nis supported. If a host has multiple keys, use\n{option}`programs.ssh.knownHostsFiles` instead.\n"}, "loc": ["services", "openssh", "knownHosts", "<name>", "publicKeyFile"], "readOnly": false, "type": "null or path"}, "services.openssh.listenAddresses": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of addresses and ports to listen on (ListenAddress directive\nin config). If port is not specified for address sshd will listen\non all ports specified by `ports` option.\nNOTE: this will override default listening on all local addresses and port 22.\nNOTE: setting this option won't automatically enable given ports\nin firewall configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    addr = \"192.168.3.1\";\n    port = 22;\n  }\n  {\n    addr = \"0.0.0.0\";\n    port = 64022;\n  }\n]"}, "loc": ["services", "openssh", "listenAddresses"], "readOnly": false, "type": "list of (submodule)"}, "services.openssh.listenAddresses.*.addr": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host, IPv4 or IPv6 address to listen to.\n"}, "loc": ["services", "openssh", "listenAddresses", "*", "addr"], "readOnly": false, "type": "null or string"}, "services.openssh.listenAddresses.*.port": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to listen to.\n"}, "loc": ["services", "openssh", "listenAddresses", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.openssh.moduliFile": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "description": {"_type": "mdDoc", "text": "Path to `moduli` file to install in\n`/etc/ssh/moduli`. If this option is unset, then\nthe `moduli` file shipped with OpenSSH will be used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/my-local-ssh-moduli;\""}, "loc": ["services", "openssh", "moduliFile"], "readOnly": false, "type": "path"}, "services.openssh.openFirewall": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to automatically open the specified ports in the firewall.\n"}, "loc": ["services", "openssh", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.openssh.ports": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "[\n  22\n]"}, "description": {"_type": "mdDoc", "text": "Specifies on which ports the SSH daemon listens.\n"}, "loc": ["services", "openssh", "ports"], "readOnly": false, "type": "list of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.openssh.settings": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for `sshd_config(5)`."}, "example": {"_type": "literalExpression", "text": "{\n          UseDns = true;\n          PasswordAuthentication = false;\n        }"}, "loc": ["services", "openssh", "settings"], "readOnly": false, "type": "attribute set of (atom (null, bool, int, float or string))"}, "services.openssh.settings.Ciphers": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"chacha20-poly1305@openssh.com\"\n  \"aes256-gcm@openssh.com\"\n  \"aes128-gcm@openssh.com\"\n  \"aes256-ctr\"\n  \"aes192-ctr\"\n  \"aes128-ctr\"\n]"}, "description": {"_type": "mdDoc", "text": "Allowed ciphers\n\nDefaults to recommended settings from both\n<https://stribika.github.io/2015/01/04/secure-secure-shell.html>\nand\n<https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67>\n"}, "loc": ["services", "openssh", "settings", "Ciphers"], "readOnly": false, "type": "list of string"}, "services.openssh.settings.GatewayPorts": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "\"no\""}, "description": {"_type": "mdDoc", "text": "Specifies whether remote hosts are allowed to connect to\nports forwarded for the client.  See\n{manpage}`sshd_config(5)`.\n"}, "loc": ["services", "openssh", "settings", "GatewayPorts"], "readOnly": false, "type": "string"}, "services.openssh.settings.KbdInteractiveAuthentication": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Specifies whether keyboard-interactive authentication is allowed.\n"}, "loc": ["services", "openssh", "settings", "KbdInteractiveAuthentication"], "readOnly": false, "type": "boolean"}, "services.openssh.settings.KexAlgorithms": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"sntrup761x25519-sha512@openssh.com\"\n  \"curve25519-sha256\"\n  \"curve25519-sha256@libssh.org\"\n  \"diffie-hellman-group-exchange-sha256\"\n]"}, "description": {"_type": "mdDoc", "text": "Allowed key exchange algorithms\n\nUses the lower bound recommended in both\n<https://stribika.github.io/2015/01/04/secure-secure-shell.html>\nand\n<https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67>\n"}, "loc": ["services", "openssh", "settings", "KexAlgorithms"], "readOnly": false, "type": "list of string"}, "services.openssh.settings.LogLevel": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "\"INFO\""}, "description": {"_type": "mdDoc", "text": "Gives the verbosity level that is used when logging messages from sshd(8). Logging with a DEBUG level\nviolates the privacy of users and is not recommended.\n"}, "loc": ["services", "openssh", "settings", "LogLevel"], "readOnly": false, "type": "one of \"QUIET\", \"FATAL\", \"ERROR\", \"INFO\", \"VERBOSE\", \"DEBUG\", \"DEBUG1\", \"DEBUG2\", \"DEBUG3\""}, "services.openssh.settings.Macs": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"hmac-sha2-512-etm@openssh.com\"\n  \"hmac-sha2-256-etm@openssh.com\"\n  \"umac-128-etm@openssh.com\"\n]"}, "description": {"_type": "mdDoc", "text": "Allowed MACs\n\nDefaults to recommended settings from both\n<https://stribika.github.io/2015/01/04/secure-secure-shell.html>\nand\n<https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67>\n"}, "loc": ["services", "openssh", "settings", "Macs"], "readOnly": false, "type": "list of string"}, "services.openssh.settings.PasswordAuthentication": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Specifies whether password authentication is allowed.\n"}, "loc": ["services", "openssh", "settings", "PasswordAuthentication"], "readOnly": false, "type": "boolean"}, "services.openssh.settings.PermitRootLogin": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "\"prohibit-password\""}, "description": {"_type": "mdDoc", "text": "Whether the root user can login using ssh.\n"}, "loc": ["services", "openssh", "settings", "PermitRootLogin"], "readOnly": false, "type": "one of \"yes\", \"without-password\", \"prohibit-password\", \"forced-commands-only\", \"no\""}, "services.openssh.settings.UseDns": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Specifies whether sshd(8) should look up the remote host name, and to check that the resolved host name for\nthe remote IP address maps back to the very same IP address.\nIf this option is set to no (the default) then only addresses and not host names may be used in\n~/.ssh/authorized_keys from and sshd_config Match Host directives.\n"}, "loc": ["services", "openssh", "settings", "UseDns"], "readOnly": false, "type": "boolean"}, "services.openssh.settings.X11Forwarding": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow X11 connections to be forwarded.\n"}, "loc": ["services", "openssh", "settings", "X11Forwarding"], "readOnly": false, "type": "boolean"}, "services.openssh.sftpFlags": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Commandline flags to add to sftp-server.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-f AUTHPRIV\"\n  \"-l INFO\"\n]"}, "loc": ["services", "openssh", "sftpFlags"], "readOnly": false, "type": "list of string"}, "services.openssh.sftpServerExecutable": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "description": {"_type": "mdDoc", "text": "The sftp server executable.  Can be a path or \"internal-sftp\" to use\nthe sftp server built into the sshd binary.\n"}, "example": {"_type": "literalExpression", "text": "\"internal-sftp\""}, "loc": ["services", "openssh", "sftpServerExecutable"], "readOnly": false, "type": "string"}, "services.openssh.startWhenNeeded": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, {command}`sshd` is socket-activated; that\nis, instead of having it permanently running as a daemon,\nsystemd will start an instance for each incoming connection.\n"}, "loc": ["services", "openssh", "startWhenNeeded"], "readOnly": false, "type": "boolean"}, "services.opentelemetry-collector.configFile": {"declarations": ["nixos/modules/services/monitoring/opentelemetry-collector.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a path to a configuration file that Opentelemetry Collector should use.\n"}, "loc": ["services", "opentelemetry-collector", "configFile"], "readOnly": false, "type": "null or path"}, "services.opentelemetry-collector.enable": {"declarations": ["nixos/modules/services/monitoring/opentelemetry-collector.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Opentelemetry Collector."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "opentelemetry-collector", "enable"], "readOnly": false, "type": "boolean"}, "services.opentelemetry-collector.package": {"declarations": ["nixos/modules/services/monitoring/opentelemetry-collector.nix"], "default": {"_type": "literalExpression", "text": "pkgs.opentelemetry-collector"}, "description": {"_type": "mdDoc", "text": "The opentelemetry-collector package to use."}, "loc": ["services", "opentelemetry-collector", "package"], "readOnly": false, "type": "package"}, "services.opentelemetry-collector.settings": {"declarations": ["nixos/modules/services/monitoring/opentelemetry-collector.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specify the configuration for Opentelemetry Collector in Nix.\n\nSee https://opentelemetry.io/docs/collector/configuration/ for available options.\n"}, "loc": ["services", "opentelemetry-collector", "settings"], "readOnly": false, "type": "YAML value"}, "services.opentracker.enable": {"declarations": ["nixos/modules/services/torrent/opentracker.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable opentracker."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "opentracker", "enable"], "readOnly": false, "type": "boolean"}, "services.opentracker.extraOptions": {"declarations": ["nixos/modules/services/torrent/opentracker.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration Arguments for opentracker\nSee https://erdgeist.org/arts/software/opentracker/ for all params\n"}, "loc": ["services", "opentracker", "extraOptions"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.opentracker.package": {"declarations": ["nixos/modules/services/torrent/opentracker.nix"], "default": {"_type": "literalExpression", "text": "pkgs.opentracker"}, "description": {"_type": "mdDoc", "text": "opentracker package to use\n"}, "loc": ["services", "opentracker", "package"], "readOnly": false, "type": "package"}, "services.opentsdb.config": {"declarations": ["nixos/modules/services/databases/opentsdb.nix"], "default": {"_type": "literalExpression", "text": "''\n  tsd.core.auto_create_metrics = true\n  tsd.http.request.enable_chunked  = true\n''"}, "description": {"_type": "mdDoc", "text": "The contents of OpenTSDB's configuration file\n"}, "loc": ["services", "opentsdb", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.opentsdb.enable": {"declarations": ["nixos/modules/services/databases/opentsdb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OpenTSDB."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "opentsdb", "enable"], "readOnly": false, "type": "boolean"}, "services.opentsdb.group": {"declarations": ["nixos/modules/services/databases/opentsdb.nix"], "default": {"_type": "literalExpression", "text": "\"opentsdb\""}, "description": {"_type": "mdDoc", "text": "Group account under which OpenTSDB runs.\n"}, "loc": ["services", "opentsdb", "group"], "readOnly": false, "type": "string"}, "services.opentsdb.package": {"declarations": ["nixos/modules/services/databases/opentsdb.nix"], "default": {"_type": "literalExpression", "text": "pkgs.opentsdb"}, "description": {"_type": "mdDoc", "text": "OpenTSDB package to use.\n"}, "loc": ["services", "opentsdb", "package"], "readOnly": false, "type": "package"}, "services.opentsdb.port": {"declarations": ["nixos/modules/services/databases/opentsdb.nix"], "default": {"_type": "literalExpression", "text": "4242"}, "description": {"_type": "mdDoc", "text": "Which port OpenTSDB listens on.\n"}, "loc": ["services", "opentsdb", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.opentsdb.user": {"declarations": ["nixos/modules/services/databases/opentsdb.nix"], "default": {"_type": "literalExpression", "text": "\"opentsdb\""}, "description": {"_type": "mdDoc", "text": "User account under which OpenTSDB runs.\n"}, "loc": ["services", "opentsdb", "user"], "readOnly": false, "type": "string"}, "services.openvpn.restartAfterSleep": {"declarations": ["nixos/modules/services/networking/openvpn.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether OpenVPN client should be restarted after sleep."}, "loc": ["services", "openvpn", "restartAfterSleep"], "readOnly": false, "type": "boolean"}, "services.openvpn.servers": {"declarations": ["nixos/modules/services/networking/openvpn.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute of this option defines a systemd service that\nruns an OpenVPN instance.  These can be OpenVPN servers or\nclients.  The name of each systemd service is\n`openvpn-\u00abname\u00bb.service`,\nwhere \u00abname\u00bb is the corresponding\nattribute name.\n"}, "example": {"_type": "literalExpression", "text": "{\n  server = {\n    config = ''\n      # Simplest server configuration: https://community.openvpn.net/openvpn/wiki/StaticKeyMiniHowto\n      # server :\n      dev tun\n      ifconfig 10.8.0.1 10.8.0.2\n      secret /root/static.key\n    '';\n    up = \"ip route add ...\";\n    down = \"ip route del ...\";\n  };\n\n  client = {\n    config = ''\n      client\n      remote vpn.example.org\n      dev tun\n      proto tcp-client\n      port 8080\n      ca /root/.vpn/ca.crt\n      cert /root/.vpn/alice.crt\n      key /root/.vpn/alice.key\n    '';\n    up = \"echo nameserver $nameserver | ${pkgs.openresolv}/sbin/resolvconf -m 0 -a $dev\";\n    down = \"${pkgs.openresolv}/sbin/resolvconf -d $dev\";\n  };\n}\n"}, "loc": ["services", "openvpn", "servers"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.openvpn.servers.<name>.authUserPass": {"declarations": ["nixos/modules/services/networking/openvpn.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This option can be used to store the username / password credentials\nwith the \"auth-user-pass\" authentication method.\n\nWARNING: Using this option will put the credentials WORLD-READABLE in the Nix store!\n"}, "loc": ["services", "openvpn", "servers", "<name>", "authUserPass"], "readOnly": false, "type": "null or (submodule)"}, "services.openvpn.servers.<name>.authUserPass.password": {"declarations": ["nixos/modules/services/networking/openvpn.nix"], "description": {"_type": "mdDoc", "text": "The password to store inside the credentials file."}, "loc": ["services", "openvpn", "servers", "<name>", "authUserPass", "password"], "readOnly": false, "type": "string"}, "services.openvpn.servers.<name>.authUserPass.username": {"declarations": ["nixos/modules/services/networking/openvpn.nix"], "description": {"_type": "mdDoc", "text": "The username to store inside the credentials file."}, "loc": ["services", "openvpn", "servers", "<name>", "authUserPass", "username"], "readOnly": false, "type": "string"}, "services.openvpn.servers.<name>.autoStart": {"declarations": ["nixos/modules/services/networking/openvpn.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether this OpenVPN instance should be started automatically."}, "loc": ["services", "openvpn", "servers", "<name>", "autoStart"], "readOnly": false, "type": "boolean"}, "services.openvpn.servers.<name>.config": {"declarations": ["nixos/modules/services/networking/openvpn.nix"], "description": {"_type": "mdDoc", "text": "Configuration of this OpenVPN instance.  See\n{manpage}`openvpn(8)`\nfor details.\n\nTo import an external config file, use the following definition:\n`config = \"config /path/to/config.ovpn\"`\n"}, "loc": ["services", "openvpn", "servers", "<name>", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.openvpn.servers.<name>.down": {"declarations": ["nixos/modules/services/networking/openvpn.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed when the instance is shutting down.\n"}, "loc": ["services", "openvpn", "servers", "<name>", "down"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.openvpn.servers.<name>.up": {"declarations": ["nixos/modules/services/networking/openvpn.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed when the instance is starting.\n"}, "loc": ["services", "openvpn", "servers", "<name>", "up"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.openvpn.servers.<name>.updateResolvConf": {"declarations": ["nixos/modules/services/networking/openvpn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use the script from the update-resolv-conf package to automatically\nupdate resolv.conf with the DNS information provided by openvpn. The\nscript will be run after the \"up\" commands and before the \"down\" commands.\n"}, "loc": ["services", "openvpn", "servers", "<name>", "updateResolvConf"], "readOnly": false, "type": "boolean"}, "services.openvscode-server.connectionToken": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A secret that must be included with all requests.\n"}, "example": {"_type": "literalExpression", "text": "\"secret-token\""}, "loc": ["services", "openvscode-server", "connectionToken"], "readOnly": false, "type": "null or string"}, "services.openvscode-server.connectionTokenFile": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a file that contains the connection token.\n"}, "loc": ["services", "openvscode-server", "connectionTokenFile"], "readOnly": false, "type": "null or string"}, "services.openvscode-server.enable": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable openvscode-server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "openvscode-server", "enable"], "readOnly": false, "type": "boolean"}, "services.openvscode-server.extensionsDir": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the root path for extensions.\n"}, "loc": ["services", "openvscode-server", "extensionsDir"], "readOnly": false, "type": "null or string"}, "services.openvscode-server.extraArguments": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional arguments to pass to openvscode-server.\n"}, "example": {"_type": "literalExpression", "text": "[ \"--log=info\" ]"}, "loc": ["services", "openvscode-server", "extraArguments"], "readOnly": false, "type": "list of string"}, "services.openvscode-server.extraEnvironment": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional environment variables to pass to openvscode-server.\n"}, "example": {"_type": "literalExpression", "text": "{\n  PKG_CONFIG_PATH = \"/run/current-system/sw/lib/pkgconfig\";\n}"}, "loc": ["services", "openvscode-server", "extraEnvironment"], "readOnly": false, "type": "attribute set of string"}, "services.openvscode-server.extraGroups": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An array of additional groups for the `openvscode-server` user.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"docker\"\n]"}, "loc": ["services", "openvscode-server", "extraGroups"], "readOnly": false, "type": "list of string"}, "services.openvscode-server.extraPackages": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional packages to add to the openvscode-server {env}`PATH`.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.go ]"}, "loc": ["services", "openvscode-server", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.openvscode-server.group": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "\"openvscode-server\""}, "description": {"_type": "mdDoc", "text": "The group to run openvscode-server under.\nBy default, a group named `openvscode-server` will be created.\n"}, "example": {"_type": "literalExpression", "text": "\"yourGroup\""}, "loc": ["services", "openvscode-server", "group"], "readOnly": false, "type": "string"}, "services.openvscode-server.host": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The host name or IP address the server should listen to.\n"}, "loc": ["services", "openvscode-server", "host"], "readOnly": false, "type": "string"}, "services.openvscode-server.package": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.openvscode-server"}, "description": {"_type": "mdDoc", "text": "The openvscode-server package to use."}, "loc": ["services", "openvscode-server", "package"], "readOnly": false, "type": "package"}, "services.openvscode-server.port": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "The port the server should listen to. If 0 is passed a random free port is picked. If a range in the format num-num is passed, a free port from the range (end inclusive) is selected.\n"}, "loc": ["services", "openvscode-server", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.openvscode-server.serverDataDir": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the directory that server data is kept in.\n"}, "loc": ["services", "openvscode-server", "serverDataDir"], "readOnly": false, "type": "null or string"}, "services.openvscode-server.socketPath": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to a socket file for the server to listen to.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/openvscode/socket\""}, "loc": ["services", "openvscode-server", "socketPath"], "readOnly": false, "type": "null or string"}, "services.openvscode-server.telemetryLevel": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "\"off\""}, "description": {"_type": "mdDoc", "text": "Sets the initial telemetry level. Valid levels are: 'off', 'crash', 'error' and 'all'.\n"}, "example": {"_type": "literalExpression", "text": "\"crash\""}, "loc": ["services", "openvscode-server", "telemetryLevel"], "readOnly": false, "type": "string"}, "services.openvscode-server.user": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "\"openvscode-server\""}, "description": {"_type": "mdDoc", "text": "The user to run openvscode-server as.\nBy default, a user named `openvscode-server` will be created.\n"}, "example": {"_type": "literalExpression", "text": "\"yourUser\""}, "loc": ["services", "openvscode-server", "user"], "readOnly": false, "type": "string"}, "services.openvscode-server.userDataDir": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the directory that user data is kept in. Can be used to open multiple distinct instances of Code.\n"}, "loc": ["services", "openvscode-server", "userDataDir"], "readOnly": false, "type": "null or string"}, "services.openvscode-server.withoutConnectionToken": {"declarations": ["nixos/modules/services/web-apps/openvscode-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Run without a connection token. Only use this if the connection is secured by other means.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "openvscode-server", "withoutConnectionToken"], "readOnly": false, "type": "boolean"}, "services.openwebrx.enable": {"declarations": ["nixos/modules/services/web-apps/openwebrx.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OpenWebRX Web interface for Software-Defined Radios on http://localhost:8073."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "openwebrx", "enable"], "readOnly": false, "type": "boolean"}, "services.openwebrx.package": {"declarations": ["nixos/modules/services/web-apps/openwebrx.nix"], "default": {"_type": "literalExpression", "text": "pkgs.openwebrx"}, "description": {"_type": "mdDoc", "text": "OpenWebRX package to use for the service"}, "loc": ["services", "openwebrx", "package"], "readOnly": false, "type": "package"}, "services.orangefs.client.enable": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/client.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OrangeFS client daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "orangefs", "client", "enable"], "readOnly": false, "type": "boolean"}, "services.orangefs.client.extraOptions": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/client.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line options for pvfs2-client."}, "loc": ["services", "orangefs", "client", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.orangefs.client.fileSystems": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/client.nix"], "description": {"_type": "mdDoc", "text": "The orangefs file systems to be mounted.\nThis option is preferred over using {option}`fileSystems` directly since\nthe pvfs client service needs to be running for it to be mounted.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    mountPoint = \"/orangefs\";\n    target = \"tcp://server:3334/orangefs\";\n  }\n]"}, "loc": ["services", "orangefs", "client", "fileSystems"], "readOnly": false, "type": "list of (submodule)"}, "services.orangefs.client.fileSystems.*.mountPoint": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/client.nix"], "default": {"_type": "literalExpression", "text": "\"/orangefs\""}, "description": {"_type": "mdDoc", "text": "Mount point."}, "loc": ["services", "orangefs", "client", "fileSystems", "*", "mountPoint"], "readOnly": false, "type": "string"}, "services.orangefs.client.fileSystems.*.options": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/client.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Mount options"}, "loc": ["services", "orangefs", "client", "fileSystems", "*", "options"], "readOnly": false, "type": "list of string"}, "services.orangefs.client.fileSystems.*.target": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/client.nix"], "description": {"_type": "mdDoc", "text": "Target URL"}, "example": {"_type": "literalExpression", "text": "\"tcp://server:3334/orangefs\""}, "loc": ["services", "orangefs", "client", "fileSystems", "*", "target"], "readOnly": false, "type": "string"}, "services.orangefs.server.BMIModules": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"bmi_tcp\"\n]"}, "description": {"_type": "mdDoc", "text": "List of BMI modules to load."}, "example": {"_type": "literalExpression", "text": "[\n  \"bmi_tcp\"\n  \"bmi_ib\"\n]"}, "loc": ["services", "orangefs", "server", "BMIModules"], "readOnly": false, "type": "list of string"}, "services.orangefs.server.dataStorageSpace": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Directory for data storage."}, "example": {"_type": "literalExpression", "text": "\"/data/storage\""}, "loc": ["services", "orangefs", "server", "dataStorageSpace"], "readOnly": false, "type": "null or string"}, "services.orangefs.server.enable": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OrangeFS server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "orangefs", "server", "enable"], "readOnly": false, "type": "boolean"}, "services.orangefs.server.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config for the global section."}, "loc": ["services", "orangefs", "server", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.orangefs.server.extraDefaults": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config for `<Defaults>` section."}, "loc": ["services", "orangefs", "server", "extraDefaults"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.orangefs.server.fileSystems": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "{\n  orangefs = { };\n}"}, "description": {"_type": "mdDoc", "text": "These options will create the `<FileSystem>` sections of config file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  fs1 = {\n    id = 101;\n  };\n\n  fs2 = {\n    id = 102;\n  };\n}\n"}, "loc": ["services", "orangefs", "server", "fileSystems"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.orangefs.server.fileSystems.<name>.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config for `<FileSystem>` section."}, "loc": ["services", "orangefs", "server", "fileSystems", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.orangefs.server.fileSystems.<name>.extraStorageHints": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config for `<StorageHints>` section."}, "loc": ["services", "orangefs", "server", "fileSystems", "<name>", "extraStorageHints"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.orangefs.server.fileSystems.<name>.id": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "File system ID (must be unique within configuration)."}, "loc": ["services", "orangefs", "server", "fileSystems", "<name>", "id"], "readOnly": false, "type": "signed integer"}, "services.orangefs.server.fileSystems.<name>.rootHandle": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "File system root ID."}, "loc": ["services", "orangefs", "server", "fileSystems", "<name>", "rootHandle"], "readOnly": false, "type": "signed integer"}, "services.orangefs.server.fileSystems.<name>.troveSyncData": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Sync data."}, "loc": ["services", "orangefs", "server", "fileSystems", "<name>", "troveSyncData"], "readOnly": false, "type": "boolean"}, "services.orangefs.server.fileSystems.<name>.troveSyncMeta": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Sync meta data."}, "loc": ["services", "orangefs", "server", "fileSystems", "<name>", "troveSyncMeta"], "readOnly": false, "type": "boolean"}, "services.orangefs.server.logType": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "\"syslog\""}, "description": {"_type": "mdDoc", "text": "Destination for log messages."}, "loc": ["services", "orangefs", "server", "logType"], "readOnly": false, "type": "one of \"file\", \"syslog\""}, "services.orangefs.server.metadataStorageSpace": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Directory for meta data storage."}, "example": {"_type": "literalExpression", "text": "\"/data/meta\""}, "loc": ["services", "orangefs", "server", "metadataStorageSpace"], "readOnly": false, "type": "null or string"}, "services.orangefs.server.servers": {"declarations": ["nixos/modules/services/network-filesystems/orangefs/server.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "URLs for storage server including port. The attribute names define the server alias."}, "example": {"_type": "literalExpression", "text": "{\n  node1 = \"tcp://node1:3334\";\n  node2 = \"tcp://node2:3334\";\n}"}, "loc": ["services", "orangefs", "server", "servers"], "readOnly": false, "type": "attribute set of string"}, "services.osrm.address": {"declarations": ["nixos/modules/services/misc/osrm.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IP address on which the web server will listen."}, "loc": ["services", "osrm", "address"], "readOnly": false, "type": "string"}, "services.osrm.algorithm": {"declarations": ["nixos/modules/services/misc/osrm.nix"], "default": {"_type": "literalExpression", "text": "\"MLD\""}, "description": {"_type": "mdDoc", "text": "Algorithm to use for the data. Must be one of CH, CoreCH, MLD"}, "loc": ["services", "osrm", "algorithm"], "readOnly": false, "type": "one of \"CH\", \"CoreCH\", \"MLD\""}, "services.osrm.dataFile": {"declarations": ["nixos/modules/services/misc/osrm.nix"], "description": {"_type": "mdDoc", "text": "Data file location"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/osrm/berlin-latest.osrm\""}, "loc": ["services", "osrm", "dataFile"], "readOnly": false, "type": "path"}, "services.osrm.enable": {"declarations": ["nixos/modules/services/misc/osrm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the OSRM service."}, "loc": ["services", "osrm", "enable"], "readOnly": false, "type": "boolean"}, "services.osrm.extraFlags": {"declarations": ["nixos/modules/services/misc/osrm.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line arguments passed to osrm-routed"}, "example": {"_type": "literalExpression", "text": "[\n  \"--max-table-size 1000\"\n  \"--max-matching-size 1000\"\n]"}, "loc": ["services", "osrm", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.osrm.port": {"declarations": ["nixos/modules/services/misc/osrm.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Port on which the web server will run."}, "loc": ["services", "osrm", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.osrm.threads": {"declarations": ["nixos/modules/services/misc/osrm.nix"], "default": {"_type": "literalExpression", "text": "4"}, "description": {"_type": "mdDoc", "text": "Number of threads to use."}, "loc": ["services", "osrm", "threads"], "readOnly": false, "type": "signed integer"}, "services.ostinato.enable": {"declarations": ["nixos/modules/services/networking/ostinato.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Ostinato agent-controller (Drone)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ostinato", "enable"], "readOnly": false, "type": "boolean"}, "services.ostinato.port": {"declarations": ["nixos/modules/services/networking/ostinato.nix"], "default": {"_type": "literalExpression", "text": "7878"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "ostinato", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.ostinato.portList.exclude": {"declarations": ["nixos/modules/services/networking/ostinato.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of ports does not appear on the port list managed by drone.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"usbmon*\"\n  \"eth0\"\n]"}, "loc": ["services", "ostinato", "portList", "exclude"], "readOnly": false, "type": "list of string"}, "services.ostinato.portList.include": {"declarations": ["nixos/modules/services/networking/ostinato.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "For a port to pass the filter and appear on the port list managed\nby drone, it be allowed by this include list.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"eth*\"\n  \"lo*\"\n]"}, "loc": ["services", "ostinato", "portList", "include"], "readOnly": false, "type": "list of string"}, "services.ostinato.rateAccuracy": {"declarations": ["nixos/modules/services/networking/ostinato.nix"], "default": {"_type": "literalExpression", "text": "\"High\""}, "description": {"_type": "mdDoc", "text": "To ensure that the actual transmit rate is as close as possible to\nthe configured transmit rate, Drone runs a busy-wait loop.\nWhile this provides the maximum accuracy possible, the CPU\nutilization is 100% while the transmit is on. You can however,\nsacrifice the accuracy to reduce the CPU load.\n"}, "loc": ["services", "ostinato", "rateAccuracy"], "readOnly": false, "type": "one of \"High\", \"Low\""}, "services.ostinato.rpcServer.address": {"declarations": ["nixos/modules/services/networking/ostinato.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "By default, the Drone RPC server will listen on all interfaces and\nlocal IPv4 addresses for incoming connections from clients.  Specify\na single IPv4 or IPv6 address if you want to restrict that.\nTo listen on any IPv6 address, use ::\n"}, "loc": ["services", "ostinato", "rpcServer", "address"], "readOnly": false, "type": "string"}, "services.outline.azureAuthentication": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "To configure Microsoft/Azure auth, you'll need to create an OAuth\nClient. See\n[the guide](https://wiki.generaloutline.com/share/dfa77e56-d4d2-4b51-8ff8-84ea6608faa4)\nfor details on setting up your Azure App.\n"}, "loc": ["services", "outline", "azureAuthentication"], "readOnly": false, "type": "null or (submodule)"}, "services.outline.azureAuthentication.clientId": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "Authentication client identifier."}, "loc": ["services", "outline", "azureAuthentication", "clientId"], "readOnly": false, "type": "string"}, "services.outline.azureAuthentication.clientSecretFile": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "File path containing the authentication secret."}, "loc": ["services", "outline", "azureAuthentication", "clientSecretFile"], "readOnly": false, "type": "string"}, "services.outline.azureAuthentication.resourceAppId": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "Authentication application resource ID."}, "loc": ["services", "outline", "azureAuthentication", "resourceAppId"], "readOnly": false, "type": "string"}, "services.outline.cdnUrl": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "If using a Cloudfront/Cloudflare distribution or similar it can be set\nusing this option. This will cause paths to JavaScript files,\nstylesheets and images to be updated to the hostname defined here. In\nyour CDN configuration the origin server should be set to public URL.\n"}, "loc": ["services", "outline", "cdnUrl"], "readOnly": false, "type": "string"}, "services.outline.concurrency": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "How many processes should be spawned. For a rough estimate, divide your\nserver's available memory by 512.\n"}, "loc": ["services", "outline", "concurrency"], "readOnly": false, "type": "signed integer"}, "services.outline.databaseUrl": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"local\""}, "description": {"_type": "mdDoc", "text": "URI to use for the main PostgreSQL database. If this needs to include\ncredentials that shouldn't be world-readable in the Nix store, set an\nenvironment file on the systemd service and override the\n`DATABASE_URL` entry. Pass the string\n`local` to setup a database on the local server.\n"}, "loc": ["services", "outline", "databaseUrl"], "readOnly": false, "type": "string"}, "services.outline.debugOutput": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set this to `http` log HTTP requests."}, "loc": ["services", "outline", "debugOutput"], "readOnly": false, "type": "null or value \"http\" (singular enum)"}, "services.outline.defaultLanguage": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"en_US\""}, "description": {"_type": "mdDoc", "text": "The default interface language. See\n[translate.getoutline.com](https://translate.getoutline.com/)\nfor a list of available language codes and their rough percentage\ntranslated.\n"}, "loc": ["services", "outline", "defaultLanguage"], "readOnly": false, "type": "one of \"da_DK\", \"de_DE\", \"en_US\", \"es_ES\", \"fa_IR\", \"fr_FR\", \"it_IT\", \"ja_JP\", \"ko_KR\", \"nl_NL\", \"pl_PL\", \"pt_BR\", \"pt_PT\", \"ru_RU\", \"sv_SE\", \"th_TH\", \"vi_VN\", \"zh_CN\", \"zh_TW\""}, "services.outline.enable": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable outline."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "outline", "enable"], "readOnly": false, "type": "boolean"}, "services.outline.enableUpdateCheck": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Have the installation check for updates by sending anonymized statistics\nto the maintainers.\n"}, "loc": ["services", "outline", "enableUpdateCheck"], "readOnly": false, "type": "boolean"}, "services.outline.forceHttps": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Auto-redirect to HTTPS in production. The default is\n`true` but you may set this to `false`\nif you can be sure that SSL is terminated at an external loadbalancer.\n"}, "loc": ["services", "outline", "forceHttps"], "readOnly": false, "type": "boolean"}, "services.outline.googleAnalyticsId": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optionally enable Google Analytics to track page views in the knowledge\nbase.\n"}, "loc": ["services", "outline", "googleAnalyticsId"], "readOnly": false, "type": "null or string"}, "services.outline.googleAuthentication": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "To configure Google auth, you'll need to create an OAuth Client ID at\nhttps://console.cloud.google.com/apis/credentials\n\nWhen configuring the Client ID, add an Authorized redirect URI to\n`https://[publicUrl]/auth/google.callback`.\n"}, "loc": ["services", "outline", "googleAuthentication"], "readOnly": false, "type": "null or (submodule)"}, "services.outline.googleAuthentication.clientId": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "Authentication client identifier."}, "loc": ["services", "outline", "googleAuthentication", "clientId"], "readOnly": false, "type": "string"}, "services.outline.googleAuthentication.clientSecretFile": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "File path containing the authentication secret."}, "loc": ["services", "outline", "googleAuthentication", "clientSecretFile"], "readOnly": false, "type": "string"}, "services.outline.group": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"outline\""}, "description": {"_type": "mdDoc", "text": "Group under which the service should run. If this is the default value,\nthe group will be created.\n"}, "loc": ["services", "outline", "group"], "readOnly": false, "type": "string"}, "services.outline.logo": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Custom logo displayed on the authentication screen. This will be scaled\nto a height of 60px.\n"}, "loc": ["services", "outline", "logo"], "readOnly": false, "type": "null or string"}, "services.outline.maximumImportSize": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "5120000"}, "description": {"_type": "mdDoc", "text": "The maximum size of document imports. Overriding this could be required\nif you have especially large Word documents with embedded imagery.\n"}, "loc": ["services", "outline", "maximumImportSize"], "readOnly": false, "type": "signed integer"}, "services.outline.oidcAuthentication": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "To configure generic OIDC auth, you'll need some kind of identity\nprovider. See the documentation for whichever IdP you use to fill out\nall the fields. The redirect URL is\n`https://[publicUrl]/auth/oidc.callback`.\n"}, "loc": ["services", "outline", "oidcAuthentication"], "readOnly": false, "type": "null or (submodule)"}, "services.outline.oidcAuthentication.authUrl": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "OIDC authentication URL endpoint."}, "loc": ["services", "outline", "oidcAuthentication", "authUrl"], "readOnly": false, "type": "string"}, "services.outline.oidcAuthentication.clientId": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "Authentication client identifier."}, "loc": ["services", "outline", "oidcAuthentication", "clientId"], "readOnly": false, "type": "string"}, "services.outline.oidcAuthentication.clientSecretFile": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "File path containing the authentication secret."}, "loc": ["services", "outline", "oidcAuthentication", "clientSecretFile"], "readOnly": false, "type": "string"}, "services.outline.oidcAuthentication.displayName": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"OpenID\""}, "description": {"_type": "mdDoc", "text": "Display name for OIDC authentication."}, "loc": ["services", "outline", "oidcAuthentication", "displayName"], "readOnly": false, "type": "string"}, "services.outline.oidcAuthentication.scopes": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"openid\"\n  \"profile\"\n  \"email\"\n]"}, "description": {"_type": "mdDoc", "text": "OpenID authentication scopes."}, "loc": ["services", "outline", "oidcAuthentication", "scopes"], "readOnly": false, "type": "list of string"}, "services.outline.oidcAuthentication.tokenUrl": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "OIDC token URL endpoint."}, "loc": ["services", "outline", "oidcAuthentication", "tokenUrl"], "readOnly": false, "type": "string"}, "services.outline.oidcAuthentication.userinfoUrl": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "OIDC userinfo URL endpoint."}, "loc": ["services", "outline", "oidcAuthentication", "userinfoUrl"], "readOnly": false, "type": "string"}, "services.outline.oidcAuthentication.usernameClaim": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"preferred_username\""}, "description": {"_type": "mdDoc", "text": "Specify which claims to derive user information from. Supports any\nvalid JSON path with the JWT payload\n"}, "loc": ["services", "outline", "oidcAuthentication", "usernameClaim"], "readOnly": false, "type": "string"}, "services.outline.package": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "pkgs.outline"}, "description": {"_type": "mdDoc", "text": "Outline package to use."}, "example": {"_type": "literalExpression", "text": "pkgs.outline.overrideAttrs (super: {\n  # Ignore the domain part in emails that come from OIDC. This is might\n  # be helpful if you want multiple users with different email providers\n  # to still land in the same team. Note that this effectively makes\n  # Outline a single-team instance.\n  patchPhase = ''\n    sed -i 's/const domain = parts\\.length && parts\\[1\\];/const domain = \"example.com\";/g' server/routes/auth/providers/oidc.ts\n  '';\n})\n"}, "loc": ["services", "outline", "package"], "readOnly": false, "type": "package"}, "services.outline.port": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Listening port."}, "loc": ["services", "outline", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.outline.publicUrl": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:3000\""}, "description": {"_type": "mdDoc", "text": "The fully qualified, publicly accessible URL"}, "loc": ["services", "outline", "publicUrl"], "readOnly": false, "type": "string"}, "services.outline.rateLimiter.durationWindow": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "60"}, "description": {"_type": "mdDoc", "text": "Length of a throttling window."}, "loc": ["services", "outline", "rateLimiter", "durationWindow"], "readOnly": false, "type": "signed integer"}, "services.outline.rateLimiter.enable": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable rate limiter for the application web server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "outline", "rateLimiter", "enable"], "readOnly": false, "type": "boolean"}, "services.outline.rateLimiter.requests": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Maximum number of requests in a throttling window."}, "loc": ["services", "outline", "rateLimiter", "requests"], "readOnly": false, "type": "signed integer"}, "services.outline.redisUrl": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"local\""}, "description": {"_type": "mdDoc", "text": "Connection to a redis server. If this needs to include credentials\nthat shouldn't be world-readable in the Nix store, set an environment\nfile on the systemd service and override the\n`REDIS_URL` entry. Pass the string\n`local` to setup a local Redis database.\n"}, "loc": ["services", "outline", "redisUrl"], "readOnly": false, "type": "string"}, "services.outline.secretKeyFile": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/outline/secret_key\""}, "description": {"_type": "mdDoc", "text": "File path that contains the application secret key. It must be 32\nbytes long and hex-encoded. If the file does not exist, a new key will\nbe generated and saved here.\n"}, "loc": ["services", "outline", "secretKeyFile"], "readOnly": false, "type": "string"}, "services.outline.sentryDsn": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optionally enable [Sentry](https://sentry.io/) to\ntrack errors and performance.\n"}, "loc": ["services", "outline", "sentryDsn"], "readOnly": false, "type": "null or string"}, "services.outline.sentryTunnel": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optionally add a\n[Sentry proxy tunnel](https://docs.sentry.io/platforms/javascript/troubleshooting/#using-the-tunnel-option)\nfor bypassing ad blockers in the UI.\n"}, "loc": ["services", "outline", "sentryTunnel"], "readOnly": false, "type": "null or string"}, "services.outline.sequelizeArguments": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Optional arguments to pass to `sequelize` calls.\n"}, "example": {"_type": "literalExpression", "text": "\"--env=production-ssl-disabled\""}, "loc": ["services", "outline", "sequelizeArguments"], "readOnly": false, "type": "string"}, "services.outline.slackAuthentication": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "To configure Slack auth, you'll need to create an Application at\nhttps://api.slack.com/apps\n\nWhen configuring the Client ID, add a redirect URL under \"OAuth & Permissions\"\nto `https://[publicUrl]/auth/slack.callback`.\n"}, "loc": ["services", "outline", "slackAuthentication"], "readOnly": false, "type": "null or (submodule)"}, "services.outline.slackAuthentication.clientId": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "Authentication key."}, "loc": ["services", "outline", "slackAuthentication", "clientId"], "readOnly": false, "type": "string"}, "services.outline.slackAuthentication.secretFile": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "File path containing the authentication secret."}, "loc": ["services", "outline", "slackAuthentication", "secretFile"], "readOnly": false, "type": "string"}, "services.outline.slackIntegration": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "For a complete Slack integration with search and posting to channels\nthis configuration is also needed. See here for details:\nhttps://wiki.generaloutline.com/share/be25efd1-b3ef-4450-b8e5-c4a4fc11e02a\n"}, "loc": ["services", "outline", "slackIntegration"], "readOnly": false, "type": "null or (submodule)"}, "services.outline.slackIntegration.appId": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "Application ID."}, "loc": ["services", "outline", "slackIntegration", "appId"], "readOnly": false, "type": "string"}, "services.outline.slackIntegration.messageActions": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable message actions."}, "loc": ["services", "outline", "slackIntegration", "messageActions"], "readOnly": false, "type": "boolean"}, "services.outline.slackIntegration.verificationTokenFile": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "File path containing the verification token."}, "loc": ["services", "outline", "slackIntegration", "verificationTokenFile"], "readOnly": false, "type": "string"}, "services.outline.smtp": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "To support sending outgoing transactional emails such as\n\"document updated\" or \"you've been invited\" you'll need to provide\nauthentication for an SMTP server.\n"}, "loc": ["services", "outline", "smtp"], "readOnly": false, "type": "null or (submodule)"}, "services.outline.smtp.fromEmail": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "Sender email in outgoing mail."}, "loc": ["services", "outline", "smtp", "fromEmail"], "readOnly": false, "type": "string"}, "services.outline.smtp.host": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "Host name or IP address of the SMTP server."}, "loc": ["services", "outline", "smtp", "host"], "readOnly": false, "type": "string"}, "services.outline.smtp.passwordFile": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "File path containing the password to authenticate with.\n"}, "loc": ["services", "outline", "smtp", "passwordFile"], "readOnly": false, "type": "string"}, "services.outline.smtp.port": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "TCP port of the SMTP server."}, "loc": ["services", "outline", "smtp", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.outline.smtp.replyEmail": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "Reply address in outgoing mail."}, "loc": ["services", "outline", "smtp", "replyEmail"], "readOnly": false, "type": "string"}, "services.outline.smtp.secure": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Use a secure SMTP connection."}, "loc": ["services", "outline", "smtp", "secure"], "readOnly": false, "type": "boolean"}, "services.outline.smtp.tlsCiphers": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Override SMTP cipher configuration."}, "loc": ["services", "outline", "smtp", "tlsCiphers"], "readOnly": false, "type": "string"}, "services.outline.smtp.username": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "Username to authenticate with."}, "loc": ["services", "outline", "smtp", "username"], "readOnly": false, "type": "string"}, "services.outline.sslCertFile": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File path that contains the Base64-encoded certificate for HTTPS\ntermination. This is only required if you do not use an external reverse\nproxy. See\n[the documentation](https://wiki.generaloutline.com/share/dfa77e56-d4d2-4b51-8ff8-84ea6608faa4).\n"}, "loc": ["services", "outline", "sslCertFile"], "readOnly": false, "type": "null or string"}, "services.outline.sslKeyFile": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File path that contains the Base64-encoded private key for HTTPS\ntermination. This is only required if you do not use an external reverse\nproxy. See\n[the documentation](https://wiki.generaloutline.com/share/dfa77e56-d4d2-4b51-8ff8-84ea6608faa4).\n"}, "loc": ["services", "outline", "sslKeyFile"], "readOnly": false, "type": "null or string"}, "services.outline.storage": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "To support uploading of images for avatars and document attachments an\ns3-compatible storage must be provided. AWS S3 is recommended for\nredundancy however if you want to keep all file storage local an\nalternative such as [minio](https://github.com/minio/minio)\ncan be used.\n\nA more detailed guide on setting up S3 is available\n[here](https://wiki.generaloutline.com/share/125de1cc-9ff6-424b-8415-0d58c809a40f).\n"}, "example": {"_type": "literalExpression", "text": "{\n  accessKey = \"...\";\n  secretKeyFile = \"/somewhere\";\n  uploadBucketUrl = \"https://minio.example.com\";\n  uploadBucketName = \"outline\";\n  region = \"us-east-1\";\n}\n"}, "loc": ["services", "outline", "storage"], "readOnly": false, "type": "submodule"}, "services.outline.storage.accessKey": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "S3 access key."}, "loc": ["services", "outline", "storage", "accessKey"], "readOnly": false, "type": "string"}, "services.outline.storage.acl": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"private\""}, "description": {"_type": "mdDoc", "text": "ACL setting."}, "loc": ["services", "outline", "storage", "acl"], "readOnly": false, "type": "string"}, "services.outline.storage.forcePathStyle": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Force S3 path style."}, "loc": ["services", "outline", "storage", "forcePathStyle"], "readOnly": false, "type": "boolean"}, "services.outline.storage.region": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"xx-xxxx-x\""}, "description": {"_type": "mdDoc", "text": "AWS S3 region name."}, "loc": ["services", "outline", "storage", "region"], "readOnly": false, "type": "string"}, "services.outline.storage.secretKeyFile": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "File path that contains the S3 secret key."}, "loc": ["services", "outline", "storage", "secretKeyFile"], "readOnly": false, "type": "path"}, "services.outline.storage.uploadBucketName": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "Name of the bucket where uploads should be stored."}, "loc": ["services", "outline", "storage", "uploadBucketName"], "readOnly": false, "type": "string"}, "services.outline.storage.uploadBucketUrl": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "description": {"_type": "mdDoc", "text": "URL endpoint of an S3-compatible API where uploads should be\nstored.\n"}, "loc": ["services", "outline", "storage", "uploadBucketUrl"], "readOnly": false, "type": "string"}, "services.outline.storage.uploadMaxSize": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "26214400"}, "description": {"_type": "mdDoc", "text": "Maxmium file size for uploads."}, "loc": ["services", "outline", "storage", "uploadMaxSize"], "readOnly": false, "type": "signed integer"}, "services.outline.user": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"outline\""}, "description": {"_type": "mdDoc", "text": "User under which the service should run. If this is the default value,\nthe user will be created, with the specified group as the primary\ngroup.\n"}, "loc": ["services", "outline", "user"], "readOnly": false, "type": "string"}, "services.outline.utilsSecretFile": {"declarations": ["nixos/modules/services/web-apps/outline.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/outline/utils_secret\""}, "description": {"_type": "mdDoc", "text": "File path that contains the utility secret key. If the file does not\nexist, a new key will be generated and saved here.\n"}, "loc": ["services", "outline", "utilsSecretFile"], "readOnly": false, "type": "string"}, "services.owamp.enable": {"declarations": ["nixos/modules/services/networking/owamp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable OWAMP server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "owamp", "enable"], "readOnly": false, "type": "boolean"}, "services.owncast.dataDir": {"declarations": ["nixos/modules/services/misc/owncast.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/owncast\""}, "description": {"_type": "mdDoc", "text": "The directory where owncast stores its data files. If left as the default value this directory will automatically be created before the owncast server starts, otherwise the sysadmin is responsible for ensuring the directory exists with appropriate ownership and permissions.\n"}, "loc": ["services", "owncast", "dataDir"], "readOnly": false, "type": "string"}, "services.owncast.enable": {"declarations": ["nixos/modules/services/misc/owncast.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable owncast."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "owncast", "enable"], "readOnly": false, "type": "boolean"}, "services.owncast.group": {"declarations": ["nixos/modules/services/misc/owncast.nix"], "default": {"_type": "literalExpression", "text": "\"owncast\""}, "description": {"_type": "mdDoc", "text": "Group under which owncast runs."}, "loc": ["services", "owncast", "group"], "readOnly": false, "type": "string"}, "services.owncast.listen": {"declarations": ["nixos/modules/services/misc/owncast.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The IP address to bind the owncast web server to."}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "owncast", "listen"], "readOnly": false, "type": "string"}, "services.owncast.openFirewall": {"declarations": ["nixos/modules/services/misc/owncast.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open the appropriate ports in the firewall for owncast.\n"}, "loc": ["services", "owncast", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.owncast.port": {"declarations": ["nixos/modules/services/misc/owncast.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "TCP port where owncast web-gui listens.\n"}, "loc": ["services", "owncast", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.owncast.rtmp-port": {"declarations": ["nixos/modules/services/misc/owncast.nix"], "default": {"_type": "literalExpression", "text": "1935"}, "description": {"_type": "mdDoc", "text": "TCP port where owncast rtmp service listens.\n"}, "loc": ["services", "owncast", "rtmp-port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.owncast.user": {"declarations": ["nixos/modules/services/misc/owncast.nix"], "default": {"_type": "literalExpression", "text": "\"owncast\""}, "description": {"_type": "mdDoc", "text": "User account under which owncast runs."}, "loc": ["services", "owncast", "user"], "readOnly": false, "type": "string"}, "services.oxidized.configFile": {"declarations": ["nixos/modules/services/admin/oxidized.nix"], "description": {"_type": "mdDoc", "text": "Path to the oxidized configuration file.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.writeText \"oxidized-config.yml\" ''\n  ---\n  debug: true\n  use_syslog: true\n  input:\n    default: ssh\n    ssh:\n      secure: true\n  interval: 3600\n  model_map:\n    dell: powerconnect\n    hp: procurve\n  source:\n    default: csv\n    csv:\n      delimiter: !ruby/regexp /:/\n      file: \"/var/lib/oxidized/.config/oxidized/router.db\"\n      map:\n        name: 0\n        model: 1\n        username: 2\n        password: 3\n  pid: \"/var/lib/oxidized/.config/oxidized/pid\"\n  rest: 127.0.0.1:8888\n  retries: 3\n  # ... additional config\n'';\n"}, "loc": ["services", "oxidized", "configFile"], "readOnly": false, "type": "path"}, "services.oxidized.dataDir": {"declarations": ["nixos/modules/services/admin/oxidized.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/oxidized\""}, "description": {"_type": "mdDoc", "text": "State directory for the oxidized service."}, "loc": ["services", "oxidized", "dataDir"], "readOnly": false, "type": "path"}, "services.oxidized.enable": {"declarations": ["nixos/modules/services/admin/oxidized.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the oxidized configuration backup service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "oxidized", "enable"], "readOnly": false, "type": "boolean"}, "services.oxidized.group": {"declarations": ["nixos/modules/services/admin/oxidized.nix"], "default": {"_type": "literalExpression", "text": "\"oxidized\""}, "description": {"_type": "mdDoc", "text": "Group under which the oxidized service runs.\n"}, "loc": ["services", "oxidized", "group"], "readOnly": false, "type": "string"}, "services.oxidized.routerDB": {"declarations": ["nixos/modules/services/admin/oxidized.nix"], "description": {"_type": "mdDoc", "text": "Path to the file/database which contains the targets for oxidized.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.writeText \"oxidized-router.db\" ''\n  hostname-sw1:powerconnect:username1:password2\n  hostname-sw2:procurve:username2:password2\n  # ... additional hosts\n''\n"}, "loc": ["services", "oxidized", "routerDB"], "readOnly": false, "type": "path"}, "services.oxidized.user": {"declarations": ["nixos/modules/services/admin/oxidized.nix"], "default": {"_type": "literalExpression", "text": "\"oxidized\""}, "description": {"_type": "mdDoc", "text": "User under which the oxidized service runs.\n"}, "loc": ["services", "oxidized", "user"], "readOnly": false, "type": "string"}, "services.pacemaker.enable": {"declarations": ["nixos/modules/services/cluster/pacemaker/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable pacemaker."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pacemaker", "enable"], "readOnly": false, "type": "boolean"}, "services.pacemaker.package": {"declarations": ["nixos/modules/services/cluster/pacemaker/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.pacemaker"}, "description": {"_type": "mdDoc", "text": "Package that should be used for pacemaker."}, "loc": ["services", "pacemaker", "package"], "readOnly": false, "type": "package"}, "services.packagekit.enable": {"declarations": ["nixos/modules/services/misc/packagekit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PackageKit provides a cross-platform D-Bus abstraction layer for\ninstalling software. Software utilizing PackageKit can install\nsoftware regardless of the package manager.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "packagekit", "enable"], "readOnly": false, "type": "boolean"}, "services.packagekit.settings": {"declarations": ["nixos/modules/services/misc/packagekit.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional settings passed straight through to PackageKit.conf"}, "loc": ["services", "packagekit", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.packagekit.vendorSettings": {"declarations": ["nixos/modules/services/misc/packagekit.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional settings passed straight through to Vendor.conf"}, "loc": ["services", "packagekit", "vendorSettings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.pantalaimon-headless.instances": {"declarations": ["nixos/modules/services/matrix/pantalaimon.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative instance config.\n\nNote: to use pantalaimon interactively, e.g. for a Matrix client which does not\nsupport End-to-end encryption (like `fractal`), refer to the home-manager module.\n"}, "loc": ["services", "pantalaimon-headless", "instances"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.pantalaimon-headless.instances.<name>.dataPath": {"declarations": ["nixos/modules/services/matrix/pantalaimon.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/pantalaimon-\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The directory where `pantalaimon` should store its state such as the database file.\n"}, "loc": ["services", "pantalaimon-headless", "instances", "<name>", "dataPath"], "readOnly": false, "type": "path"}, "services.pantalaimon-headless.instances.<name>.extraSettings": {"declarations": ["nixos/modules/services/matrix/pantalaimon.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration options. See\n[pantalaimon(5)](https://github.com/matrix-org/pantalaimon/blob/master/docs/man/pantalaimon.5.md)\nfor available options.\n"}, "loc": ["services", "pantalaimon-headless", "instances", "<name>", "extraSettings"], "readOnly": false, "type": "attribute set"}, "services.pantalaimon-headless.instances.<name>.homeserver": {"declarations": ["nixos/modules/services/matrix/pantalaimon.nix"], "description": {"_type": "mdDoc", "text": "The URI of the homeserver that the `pantalaimon` proxy should\nforward requests to, without the matrix API path but including\nthe http(s) schema.\n"}, "example": {"_type": "literalExpression", "text": "\"https://matrix.org\""}, "loc": ["services", "pantalaimon-headless", "instances", "<name>", "homeserver"], "readOnly": false, "type": "string"}, "services.pantalaimon-headless.instances.<name>.listenAddress": {"declarations": ["nixos/modules/services/matrix/pantalaimon.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The address where the daemon will listen to client connections\nfor this homeserver.\n"}, "loc": ["services", "pantalaimon-headless", "instances", "<name>", "listenAddress"], "readOnly": false, "type": "string"}, "services.pantalaimon-headless.instances.<name>.listenPort": {"declarations": ["nixos/modules/services/matrix/pantalaimon.nix"], "default": {"_type": "literalExpression", "text": "8009"}, "description": {"_type": "mdDoc", "text": "The port where the daemon will listen to client connections for\nthis homeserver. Note that the listen address/port combination\nneeds to be unique between different homeservers.\n"}, "loc": ["services", "pantalaimon-headless", "instances", "<name>", "listenPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.pantalaimon-headless.instances.<name>.logLevel": {"declarations": ["nixos/modules/services/matrix/pantalaimon.nix"], "default": {"_type": "literalExpression", "text": "\"warning\""}, "description": {"_type": "mdDoc", "text": "Set the log level of the daemon.\n"}, "loc": ["services", "pantalaimon-headless", "instances", "<name>", "logLevel"], "readOnly": false, "type": "one of \"info\", \"warning\", \"error\", \"debug\""}, "services.pantalaimon-headless.instances.<name>.ssl": {"declarations": ["nixos/modules/services/matrix/pantalaimon.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether or not SSL verification should be enabled for outgoing\nconnections to the homeserver.\n"}, "loc": ["services", "pantalaimon-headless", "instances", "<name>", "ssl"], "readOnly": false, "type": "boolean"}, "services.pantheon.apps.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/pantheon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Pantheon default applications."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pantheon", "apps", "enable"], "readOnly": false, "type": "boolean"}, "services.pantheon.contractor.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/pantheon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable contractor, a desktop-wide extension service used by Pantheon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pantheon", "contractor", "enable"], "readOnly": false, "type": "boolean"}, "services.paperless.address": {"declarations": ["nixos/modules/services/misc/paperless.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Web interface address."}, "loc": ["services", "paperless", "address"], "readOnly": false, "type": "string"}, "services.paperless.consumptionDir": {"declarations": ["nixos/modules/services/misc/paperless.nix"], "default": {"_type": "literalExpression", "text": "\"${dataDir}/consume\""}, "description": {"_type": "mdDoc", "text": "Directory from which new documents are imported."}, "loc": ["services", "paperless", "consumptionDir"], "readOnly": false, "type": "string"}, "services.paperless.consumptionDirIsPublic": {"declarations": ["nixos/modules/services/misc/paperless.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether all users can write to the consumption dir."}, "loc": ["services", "paperless", "consumptionDirIsPublic"], "readOnly": false, "type": "boolean"}, "services.paperless.dataDir": {"declarations": ["nixos/modules/services/misc/paperless.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/paperless\""}, "description": {"_type": "mdDoc", "text": "Directory to store the Paperless data."}, "loc": ["services", "paperless", "dataDir"], "readOnly": false, "type": "string"}, "services.paperless.enable": {"declarations": ["nixos/modules/services/misc/paperless.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Paperless.\n\nWhen started, the Paperless database is automatically created if it doesn't\nexist and updated if the Paperless package has changed.\nBoth tasks are achieved by running a Django migration.\n\nA script to manage the Paperless instance (by wrapping Django's manage.py) is linked to\n`${dataDir}/paperless-manage`.\n"}, "loc": ["services", "paperless", "enable"], "readOnly": false, "type": "boolean"}, "services.paperless.extraConfig": {"declarations": ["nixos/modules/services/misc/paperless.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra paperless config options.\n\nSee [the documentation](https://paperless-ngx.readthedocs.io/en/latest/configuration.html)\nfor available options.\n\nNote that some options such as `PAPERLESS_CONSUMER_IGNORE_PATTERN` expect JSON values. Use `builtins.toJSON` to ensure proper quoting.\n"}, "example": {"_type": "literalExpression", "text": "{\n  PAPERLESS_OCR_LANGUAGE = \"deu+eng\";\n\n  PAPERLESS_DBHOST = \"/run/postgresql\";\n\n  PAPERLESS_CONSUMER_IGNORE_PATTERN = builtins.toJSON [ \".DS_STORE/*\" \"desktop.ini\" ];\n\n  PAPERLESS_OCR_USER_ARGS = builtins.toJSON {\n    optimize = 1;\n    pdfa_image_compression = \"lossless\";\n  };\n};\n"}, "loc": ["services", "paperless", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.paperless.mediaDir": {"declarations": ["nixos/modules/services/misc/paperless.nix"], "default": {"_type": "literalExpression", "text": "\"${dataDir}/media\""}, "description": {"_type": "mdDoc", "text": "Directory to store the Paperless documents."}, "loc": ["services", "paperless", "mediaDir"], "readOnly": false, "type": "string"}, "services.paperless.package": {"declarations": ["nixos/modules/services/misc/paperless.nix"], "default": {"_type": "literalExpression", "text": "pkgs.paperless-ngx"}, "description": {"_type": "mdDoc", "text": "The Paperless package to use."}, "loc": ["services", "paperless", "package"], "readOnly": false, "type": "package"}, "services.paperless.passwordFile": {"declarations": ["nixos/modules/services/misc/paperless.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the superuser password.\n\nA superuser is required to access the web interface.\nIf unset, you can create a superuser manually by running\n`${dataDir}/paperless-manage createsuperuser`.\n\nThe default superuser name is `admin`. To change it, set\noption {option}`extraConfig.PAPERLESS_ADMIN_USER`.\nWARNING: When changing the superuser name after the initial setup, the old superuser\nwill continue to exist.\n\nTo disable login for the web interface, set the following:\n`extraConfig.PAPERLESS_AUTO_LOGIN_USERNAME = \"admin\";`.\nWARNING: Only use this on a trusted system without internet access to Paperless.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/paperless-password\""}, "loc": ["services", "paperless", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.paperless.port": {"declarations": ["nixos/modules/services/misc/paperless.nix"], "default": {"_type": "literalExpression", "text": "28981"}, "description": {"_type": "mdDoc", "text": "Web interface port."}, "loc": ["services", "paperless", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.paperless.user": {"declarations": ["nixos/modules/services/misc/paperless.nix"], "default": {"_type": "literalExpression", "text": "\"paperless\""}, "description": {"_type": "mdDoc", "text": "User under which Paperless runs."}, "loc": ["services", "paperless", "user"], "readOnly": false, "type": "string"}, "services.parsedmarc.enable": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable parsedmarc, a DMARC report monitoring service\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "parsedmarc", "enable"], "readOnly": false, "type": "boolean"}, "services.parsedmarc.provision.elasticsearch": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to set up and use a local instance of Elasticsearch.\n"}, "loc": ["services", "parsedmarc", "provision", "elasticsearch"], "readOnly": false, "type": "boolean"}, "services.parsedmarc.provision.geoIp": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable and configure the [geoipupdate](#opt-services.geoipupdate.enable)\nservice to automatically fetch GeoIP databases. Not crucial,\nbut recommended for full functionality.\n\nTo finish the setup, you need to manually set the [](#opt-services.geoipupdate.settings.AccountID) and\n[](#opt-services.geoipupdate.settings.LicenseKey)\noptions.\n"}, "loc": ["services", "parsedmarc", "provision", "geoIp"], "readOnly": false, "type": "boolean"}, "services.parsedmarc.provision.grafana.dashboard": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "config.services.grafana.enable"}, "description": {"_type": "mdDoc", "text": "Whether the official parsedmarc grafana dashboard should\nbe provisioned to the local grafana instance.\n"}, "loc": ["services", "parsedmarc", "provision", "grafana", "dashboard"], "readOnly": false, "type": "boolean"}, "services.parsedmarc.provision.grafana.datasource": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "config.services.parsedmarc.provision.elasticsearch && config.services.grafana.enable\n"}, "description": {"_type": "mdDoc", "text": "Whether the automatically provisioned Elasticsearch\ninstance should be added as a grafana datasource. Has no\neffect unless\n[](#opt-services.parsedmarc.provision.elasticsearch)\nis also enabled.\n"}, "loc": ["services", "parsedmarc", "provision", "grafana", "datasource"], "readOnly": false, "type": "boolean"}, "services.parsedmarc.provision.localMail.enable": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether Postfix and Dovecot should be set up to receive\nmail locally. parsedmarc will be configured to watch the\nlocal inbox as the automatically created user specified in\n[](#opt-services.parsedmarc.provision.localMail.recipientName)\n"}, "loc": ["services", "parsedmarc", "provision", "localMail", "enable"], "readOnly": false, "type": "boolean"}, "services.parsedmarc.provision.localMail.hostname": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "config.networking.fqdn"}, "description": {"_type": "mdDoc", "text": "The hostname to use when configuring Postfix.\n\nShould correspond to the host's fully qualified domain\nname and the domain part of the email address which\nreceives DMARC reports. You also have to set up an MX record\npointing to this domain name.\n"}, "example": {"_type": "literalExpression", "text": "\"monitoring.example.com\""}, "loc": ["services", "parsedmarc", "provision", "localMail", "hostname"], "readOnly": false, "type": "string"}, "services.parsedmarc.provision.localMail.recipientName": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "\"dmarc\""}, "description": {"_type": "mdDoc", "text": "The DMARC mail recipient name, i.e. the name part of the\nemail address which receives DMARC reports.\n\nA local user with this name will be set up and assigned a\nrandomized password on service start.\n"}, "loc": ["services", "parsedmarc", "provision", "localMail", "recipientName"], "readOnly": false, "type": "string"}, "services.parsedmarc.settings": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "description": {"_type": "mdDoc", "text": "Configuration parameters to set in\n{file}`parsedmarc.ini`. For a full list of\navailable parameters, see\n<https://domainaware.github.io/parsedmarc/#configuration-file>.\n\nSettings containing secret data should be set to an attribute\nset containing the attribute `_secret` - a\nstring pointing to a file containing the value the option\nshould be set to. See the example to get a better picture of\nthis: in the resulting {file}`parsedmarc.ini`\nfile, the `splunk_hec.token` key will be set\nto the contents of the\n{file}`/run/keys/splunk_token` file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  imap = {\n    host = \"imap.example.com\";\n    user = \"alice@example.com\";\n    password = { _secret = \"/run/keys/imap_password\" };\n  };\n  mailbox = {\n    watch = true;\n    batch_size = 30;\n  };\n  splunk_hec = {\n    url = \"https://splunkhec.example.com\";\n    token = { _secret = \"/run/keys/splunk_token\" };\n    index = \"email\";\n  };\n}\n"}, "loc": ["services", "parsedmarc", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.parsedmarc.settings.elasticsearch.cert_path": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/ssl/certs/ca-certificates.crt\""}, "description": {"_type": "mdDoc", "text": "The path to a TLS certificate bundle used to verify\nthe server's certificate.\n"}, "loc": ["services", "parsedmarc", "settings", "elasticsearch", "cert_path"], "readOnly": false, "type": "path"}, "services.parsedmarc.settings.elasticsearch.hosts": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of Elasticsearch hosts to push parsed reports\nto.\n"}, "loc": ["services", "parsedmarc", "settings", "elasticsearch", "hosts"], "readOnly": false, "type": "list of string"}, "services.parsedmarc.settings.elasticsearch.password": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The password to use when connecting to Elasticsearch,\nif required.\n\nAlways handled as a secret whether the value is\nwrapped in a `{ _secret = ...; }`\nattrset or not (refer to [](#opt-services.parsedmarc.settings) for\ndetails).\n"}, "loc": ["services", "parsedmarc", "settings", "elasticsearch", "password"], "readOnly": false, "type": "null or path or attribute set of path"}, "services.parsedmarc.settings.elasticsearch.ssl": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use an encrypted SSL/TLS connection.\n"}, "loc": ["services", "parsedmarc", "settings", "elasticsearch", "ssl"], "readOnly": false, "type": "boolean"}, "services.parsedmarc.settings.elasticsearch.user": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Username to use when connecting to Elasticsearch, if\nrequired.\n"}, "loc": ["services", "parsedmarc", "settings", "elasticsearch", "user"], "readOnly": false, "type": "null or string"}, "services.parsedmarc.settings.general.save_aggregate": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Save aggregate report data to Elasticsearch and/or Splunk.\n"}, "loc": ["services", "parsedmarc", "settings", "general", "save_aggregate"], "readOnly": false, "type": "boolean"}, "services.parsedmarc.settings.general.save_forensic": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Save forensic report data to Elasticsearch and/or Splunk.\n"}, "loc": ["services", "parsedmarc", "settings", "general", "save_forensic"], "readOnly": false, "type": "boolean"}, "services.parsedmarc.settings.imap.host": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The IMAP server hostname or IP address.\n"}, "loc": ["services", "parsedmarc", "settings", "imap", "host"], "readOnly": false, "type": "string"}, "services.parsedmarc.settings.imap.password": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The IMAP server password.\n\nAlways handled as a secret whether the value is\nwrapped in a `{ _secret = ...; }`\nattrset or not (refer to [](#opt-services.parsedmarc.settings) for\ndetails).\n"}, "loc": ["services", "parsedmarc", "settings", "imap", "password"], "readOnly": false, "type": "null or path or attribute set of path"}, "services.parsedmarc.settings.imap.port": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "993"}, "description": {"_type": "mdDoc", "text": "The IMAP server port.\n"}, "loc": ["services", "parsedmarc", "settings", "imap", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.parsedmarc.settings.imap.ssl": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Use an encrypted SSL/TLS connection.\n"}, "loc": ["services", "parsedmarc", "settings", "imap", "ssl"], "readOnly": false, "type": "boolean"}, "services.parsedmarc.settings.imap.user": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The IMAP server username.\n"}, "loc": ["services", "parsedmarc", "settings", "imap", "user"], "readOnly": false, "type": "null or string"}, "services.parsedmarc.settings.mailbox.delete": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Delete messages after processing them, instead of archiving them.\n"}, "loc": ["services", "parsedmarc", "settings", "mailbox", "delete"], "readOnly": false, "type": "boolean"}, "services.parsedmarc.settings.mailbox.watch": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Use the IMAP IDLE command to process messages as they arrive.\n"}, "loc": ["services", "parsedmarc", "settings", "mailbox", "watch"], "readOnly": false, "type": "boolean"}, "services.parsedmarc.settings.smtp.from": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The `From` address to use for the\noutgoing mail.\n"}, "loc": ["services", "parsedmarc", "settings", "smtp", "from"], "readOnly": false, "type": "null or string"}, "services.parsedmarc.settings.smtp.host": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The SMTP server hostname or IP address.\n"}, "loc": ["services", "parsedmarc", "settings", "smtp", "host"], "readOnly": false, "type": "null or string"}, "services.parsedmarc.settings.smtp.password": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The SMTP server password.\n\nAlways handled as a secret whether the value is\nwrapped in a `{ _secret = ...; }`\nattrset or not (refer to [](#opt-services.parsedmarc.settings) for\ndetails).\n"}, "loc": ["services", "parsedmarc", "settings", "smtp", "password"], "readOnly": false, "type": "null or path or attribute set of path"}, "services.parsedmarc.settings.smtp.port": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The SMTP server port.\n"}, "loc": ["services", "parsedmarc", "settings", "smtp", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.parsedmarc.settings.smtp.ssl": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use an encrypted SSL/TLS connection.\n"}, "loc": ["services", "parsedmarc", "settings", "smtp", "ssl"], "readOnly": false, "type": "null or boolean"}, "services.parsedmarc.settings.smtp.to": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The addresses to send outgoing mail to.\n"}, "loc": ["services", "parsedmarc", "settings", "smtp", "to"], "readOnly": false, "type": "null or (list of string)"}, "services.parsedmarc.settings.smtp.user": {"declarations": ["nixos/modules/services/monitoring/parsedmarc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The SMTP server username.\n"}, "loc": ["services", "parsedmarc", "settings", "smtp", "user"], "readOnly": false, "type": "null or string"}, "services.parsoid.enable": {"declarations": ["nixos/modules/services/misc/parsoid.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Parsoid -- bidirectional\nwikitext parser.\n"}, "loc": ["services", "parsoid", "enable"], "readOnly": false, "type": "boolean"}, "services.parsoid.extraConfig": {"declarations": ["nixos/modules/services/misc/parsoid.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration to add to parsoid configuration.\n"}, "loc": ["services", "parsoid", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.parsoid.interface": {"declarations": ["nixos/modules/services/misc/parsoid.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Interface to listen on.\n"}, "loc": ["services", "parsoid", "interface"], "readOnly": false, "type": "string"}, "services.parsoid.port": {"declarations": ["nixos/modules/services/misc/parsoid.nix"], "default": {"_type": "literalExpression", "text": "8000"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "parsoid", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.parsoid.wikis": {"declarations": ["nixos/modules/services/misc/parsoid.nix"], "description": {"_type": "mdDoc", "text": "Used MediaWiki API endpoints.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"http://localhost/api.php\"\n]"}, "loc": ["services", "parsoid", "wikis"], "readOnly": false, "type": "list of (string or (attribute set))"}, "services.parsoid.workers": {"declarations": ["nixos/modules/services/misc/parsoid.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Number of Parsoid workers.\n"}, "loc": ["services", "parsoid", "workers"], "readOnly": false, "type": "signed integer"}, "services.passSecretService.enable": {"declarations": ["nixos/modules/services/security/pass-secret-service.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable pass secret service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "passSecretService", "enable"], "readOnly": false, "type": "boolean"}, "services.passSecretService.package": {"declarations": ["nixos/modules/services/security/pass-secret-service.nix"], "default": {"_type": "literalExpression", "text": "pkgs.pass-secret-service"}, "description": {"_type": "mdDoc", "text": "Which pass-secret-service package to use."}, "example": {"_type": "literalExpression", "text": "pkgs.pass-secret-service.override { python3 = pkgs.python310 }"}, "loc": ["services", "passSecretService", "package"], "readOnly": false, "type": "package"}, "services.patroni.dataDir": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/patroni\""}, "description": {"_type": "mdDoc", "text": "Folder where Patroni data will be written, used by Raft as well if enabled.\n"}, "loc": ["services", "patroni", "dataDir"], "readOnly": false, "type": "path"}, "services.patroni.enable": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Patroni."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "patroni", "enable"], "readOnly": false, "type": "boolean"}, "services.patroni.environmentFiles": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables made available to Patroni as files content, useful for providing secrets from files."}, "example": {"_type": "literalExpression", "text": "{\n  PATRONI_REPLICATION_PASSWORD = \"/secret/file\";\n  PATRONI_SUPERUSER_PASSWORD = \"/secret/file\";\n}"}, "loc": ["services", "patroni", "environmentFiles"], "readOnly": false, "type": "attribute set of (null or string or path or package)"}, "services.patroni.group": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "default": {"_type": "literalExpression", "text": "\"patroni\""}, "description": {"_type": "mdDoc", "text": "The group for the service. If left as the default value this group will automatically be created,\notherwise the sysadmin is responsible for ensuring the group exists.\n"}, "example": {"_type": "literalExpression", "text": "\"postgres\""}, "loc": ["services", "patroni", "group"], "readOnly": false, "type": "string"}, "services.patroni.name": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "description": {"_type": "mdDoc", "text": "The name of the host. Must be unique for the cluster.\n"}, "example": {"_type": "literalExpression", "text": "\"node1\""}, "loc": ["services", "patroni", "name"], "readOnly": false, "type": "string"}, "services.patroni.namespace": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "default": {"_type": "literalExpression", "text": "\"/service\""}, "description": {"_type": "mdDoc", "text": "Path within the configuration store where Patroni will keep information about the cluster.\n"}, "loc": ["services", "patroni", "namespace"], "readOnly": false, "type": "string"}, "services.patroni.nodeIp": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "description": {"_type": "mdDoc", "text": "IP address of this node.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.1.1\""}, "loc": ["services", "patroni", "nodeIp"], "readOnly": false, "type": "string"}, "services.patroni.otherNodesIps": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "description": {"_type": "mdDoc", "text": "IP addresses of the other nodes.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168.1.2\"\n  \"192.168.1.3\"\n]"}, "loc": ["services", "patroni", "otherNodesIps"], "readOnly": false, "type": "list of Concatenated string"}, "services.patroni.postgresqlDataDir": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/postgresql/${config.services.patroni.postgresqlPackage.psqlSchema}\""}, "description": {"_type": "mdDoc", "text": "The data directory for PostgreSQL. If left as the default value\nthis directory will automatically be created before the PostgreSQL server starts, otherwise\nthe sysadmin is responsible for ensuring the directory exists with appropriate ownership\nand permissions.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/postgresql/14\""}, "loc": ["services", "patroni", "postgresqlDataDir"], "readOnly": false, "type": "path"}, "services.patroni.postgresqlPackage": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "description": {"_type": "mdDoc", "text": "PostgreSQL package to use.\nPlugins can be enabled like this `pkgs.postgresql_14.withPackages (p: [ p.pg_safeupdate p.postgis ])`.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.postgresql_14"}, "loc": ["services", "patroni", "postgresqlPackage"], "readOnly": false, "type": "package"}, "services.patroni.postgresqlPort": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "default": {"_type": "literalExpression", "text": "5432"}, "description": {"_type": "mdDoc", "text": "The port on which PostgreSQL listens.\n"}, "loc": ["services", "patroni", "postgresqlPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.patroni.raft": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This will configure Patroni to use its own RAFT implementation instead of using a dedicated DCS.\n"}, "loc": ["services", "patroni", "raft"], "readOnly": false, "type": "boolean"}, "services.patroni.raftPort": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "default": {"_type": "literalExpression", "text": "5010"}, "description": {"_type": "mdDoc", "text": "The port on which RAFT listens.\n"}, "loc": ["services", "patroni", "raftPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.patroni.restApiPort": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "default": {"_type": "literalExpression", "text": "8008"}, "description": {"_type": "mdDoc", "text": "The port on Patroni's REST api listens.\n"}, "loc": ["services", "patroni", "restApiPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.patroni.scope": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "description": {"_type": "mdDoc", "text": "Cluster name.\n"}, "example": {"_type": "literalExpression", "text": "\"cluster1\""}, "loc": ["services", "patroni", "scope"], "readOnly": false, "type": "string"}, "services.patroni.settings": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The primary patroni configuration. See the [documentation](https://patroni.readthedocs.io/en/latest/SETTINGS.html)\nfor possible values.\nSecrets should be passed in by using the `environmentFiles` option.\n"}, "loc": ["services", "patroni", "settings"], "readOnly": false, "type": "YAML value"}, "services.patroni.softwareWatchdog": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This will configure Patroni to use the software watchdog built into the Linux kernel\nas described in the [documentation](https://patroni.readthedocs.io/en/latest/watchdog.html#setting-up-software-watchdog-on-linux).\n"}, "loc": ["services", "patroni", "softwareWatchdog"], "readOnly": false, "type": "boolean"}, "services.patroni.user": {"declarations": ["nixos/modules/services/cluster/patroni/default.nix"], "default": {"_type": "literalExpression", "text": "\"patroni\""}, "description": {"_type": "mdDoc", "text": "The user for the service. If left as the default value this user will automatically be created,\notherwise the sysadmin is responsible for ensuring the user exists.\n"}, "example": {"_type": "literalExpression", "text": "\"postgres\""}, "loc": ["services", "patroni", "user"], "readOnly": false, "type": "string"}, "services.pcscd.enable": {"declarations": ["nixos/modules/services/hardware/pcscd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PCSC-Lite daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pcscd", "enable"], "readOnly": false, "type": "boolean"}, "services.pcscd.plugins": {"declarations": ["nixos/modules/services/hardware/pcscd.nix"], "default": {"_type": "literalExpression", "text": "[ pkgs.ccid ]"}, "description": {"_type": "mdDoc", "text": "Plugin packages to be used for PCSC-Lite."}, "example": {"_type": "literalExpression", "text": "[ pkgs.pcsc-cyberjack ]"}, "loc": ["services", "pcscd", "plugins"], "readOnly": false, "type": "list of package"}, "services.pcscd.readerConfig": {"declarations": ["nixos/modules/services/hardware/pcscd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration for devices that aren't hotpluggable.\n\nSee {manpage}`reader.conf(5)` for valid options.\n"}, "example": {"_type": "literalExpression", "text": "''\n  FRIENDLYNAME      \"Some serial reader\"\n  DEVICENAME        /dev/ttyS0\n  LIBPATH           /path/to/serial_reader.so\n  CHANNELID         1\n''"}, "loc": ["services", "pcscd", "readerConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.pdns-recursor.api.address": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IP address Recursor REST API server will bind to.\n"}, "loc": ["services", "pdns-recursor", "api", "address"], "readOnly": false, "type": "string"}, "services.pdns-recursor.api.allowFrom": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"::1\"\n]"}, "description": {"_type": "mdDoc", "text": "IP address ranges of clients allowed to make API requests.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0/0\"\n  \"::/0\"\n]"}, "loc": ["services", "pdns-recursor", "api", "allowFrom"], "readOnly": false, "type": "list of string"}, "services.pdns-recursor.api.port": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "8082"}, "description": {"_type": "mdDoc", "text": "Port number Recursor REST API server will bind to.\n"}, "loc": ["services", "pdns-recursor", "api", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.pdns-recursor.dns.address": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"::\"\n  \"0.0.0.0\"\n]"}, "description": {"_type": "mdDoc", "text": "IP addresses Recursor DNS server will bind to.\n"}, "loc": ["services", "pdns-recursor", "dns", "address"], "readOnly": false, "type": "string or list of string"}, "services.pdns-recursor.dns.allowFrom": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.0/8\"\n  \"10.0.0.0/8\"\n  \"100.64.0.0/10\"\n  \"169.254.0.0/16\"\n  \"192.168.0.0/16\"\n  \"172.16.0.0/12\"\n  \"::1/128\"\n  \"fc00::/7\"\n  \"fe80::/10\"\n]"}, "description": {"_type": "mdDoc", "text": "IP address ranges of clients allowed to make DNS queries.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0/0\"\n  \"::/0\"\n]"}, "loc": ["services", "pdns-recursor", "dns", "allowFrom"], "readOnly": false, "type": "list of string"}, "services.pdns-recursor.dns.port": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "53"}, "description": {"_type": "mdDoc", "text": "Port number Recursor DNS server will bind to.\n"}, "loc": ["services", "pdns-recursor", "dns", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.pdns-recursor.dnssecValidation": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "\"validate\""}, "description": {"_type": "mdDoc", "text": "Controls the level of DNSSEC processing done by the PowerDNS Recursor.\nSee https://doc.powerdns.com/md/recursor/dnssec/ for a detailed explanation.\n"}, "loc": ["services", "pdns-recursor", "dnssecValidation"], "readOnly": false, "type": "one of \"off\", \"process-no-validate\", \"process\", \"log-fail\", \"validate\""}, "services.pdns-recursor.enable": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PowerDNS Recursor, a recursive DNS server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pdns-recursor", "enable"], "readOnly": false, "type": "boolean"}, "services.pdns-recursor.exportHosts": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to export names and IP addresses defined in /etc/hosts.\n"}, "loc": ["services", "pdns-recursor", "exportHosts"], "readOnly": false, "type": "boolean"}, "services.pdns-recursor.forwardZones": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "DNS zones to be forwarded to other authoritative servers.\n"}, "loc": ["services", "pdns-recursor", "forwardZones"], "readOnly": false, "type": "attribute set"}, "services.pdns-recursor.forwardZonesRecurse": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "DNS zones to be forwarded to other recursive servers.\n"}, "example": {"_type": "literalExpression", "text": "{\n  eth = \"[::1]:5353\";\n}"}, "loc": ["services", "pdns-recursor", "forwardZonesRecurse"], "readOnly": false, "type": "attribute set"}, "services.pdns-recursor.luaConfig": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The content Lua configuration file for PowerDNS Recursor. See\n<https://doc.powerdns.com/recursor/lua-config/index.html>.\n"}, "loc": ["services", "pdns-recursor", "luaConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.pdns-recursor.resolveNamecoin": {"declarations": ["nixos/modules/services/networking/ncdns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Resolve `.bit` top-level domains using ncdns and namecoin.\n"}, "loc": ["services", "pdns-recursor", "resolveNamecoin"], "readOnly": false, "type": "boolean"}, "services.pdns-recursor.serveRFC1918": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to directly resolve the RFC1918 reverse-mapping domains:\n`10.in-addr.arpa`,\n`168.192.in-addr.arpa`,\n`16-31.172.in-addr.arpa`\nThis saves load on the AS112 servers.\n"}, "loc": ["services", "pdns-recursor", "serveRFC1918"], "readOnly": false, "type": "boolean"}, "services.pdns-recursor.settings": {"declarations": ["nixos/modules/services/networking/pdns-recursor.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "PowerDNS Recursor settings. Use this option to configure Recursor\nsettings not exposed in a NixOS option or to bypass one.\nSee the full documentation at\n<https://doc.powerdns.com/recursor/settings.html>\nfor the available options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  loglevel = 8;\n  log-common-errors = true;\n}\n"}, "loc": ["services", "pdns-recursor", "settings"], "readOnly": false, "type": "attribute set of (null or signed integer or string or boolean or path or list of (signed integer or string or boolean or path))"}, "services.pdnsd.cacheDir": {"declarations": ["nixos/modules/services/networking/pdnsd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/cache/pdnsd\""}, "description": {"_type": "mdDoc", "text": "Directory holding the pdnsd cache"}, "loc": ["services", "pdnsd", "cacheDir"], "readOnly": false, "type": "string"}, "services.pdnsd.enable": {"declarations": ["nixos/modules/services/networking/pdnsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable pdnsd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pdnsd", "enable"], "readOnly": false, "type": "boolean"}, "services.pdnsd.extraConfig": {"declarations": ["nixos/modules/services/networking/pdnsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration directives that should be added to\n`pdnsd.conf`.\n"}, "loc": ["services", "pdnsd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.pdnsd.globalConfig": {"declarations": ["nixos/modules/services/networking/pdnsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Global configuration that should be added to the global directory\nof `pdnsd.conf`.\n"}, "loc": ["services", "pdnsd", "globalConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.pdnsd.serverConfig": {"declarations": ["nixos/modules/services/networking/pdnsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Server configuration that should be added to the server directory\nof `pdnsd.conf`.\n"}, "loc": ["services", "pdnsd", "serverConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.peerflix.downloadDir": {"declarations": ["nixos/modules/services/torrent/peerflix.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.peerflix.stateDir}/torrents\""}, "description": {"_type": "mdDoc", "text": "Peerflix temporary download directory."}, "loc": ["services", "peerflix", "downloadDir"], "readOnly": false, "type": "path"}, "services.peerflix.enable": {"declarations": ["nixos/modules/services/torrent/peerflix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable peerflix service."}, "loc": ["services", "peerflix", "enable"], "readOnly": false, "type": "boolean"}, "services.peerflix.stateDir": {"declarations": ["nixos/modules/services/torrent/peerflix.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/peerflix\""}, "description": {"_type": "mdDoc", "text": "Peerflix state directory."}, "loc": ["services", "peerflix", "stateDir"], "readOnly": false, "type": "path"}, "services.peering-manager.enable": {"declarations": ["nixos/modules/services/web-apps/peering-manager.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Peering Manager.\n\nThis module requires a reverse proxy that serves `/static` separately.\nSee this [example](https://github.com/peering-manager-community/peering-manager/blob/develop/contrib/nginx.conf/) on how to configure this.\n"}, "loc": ["services", "peering-manager", "enable"], "readOnly": false, "type": "boolean"}, "services.peering-manager.enableLdap": {"declarations": ["nixos/modules/services/web-apps/peering-manager.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable LDAP-Authentication for Peering Manager.\n\nThis requires a configuration file being pass through `ldapConfigPath`.\n"}, "loc": ["services", "peering-manager", "enableLdap"], "readOnly": false, "type": "boolean"}, "services.peering-manager.extraConfig": {"declarations": ["nixos/modules/services/web-apps/peering-manager.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional lines of configuration appended to the `configuration.py`.\nSee the [documentation](https://peering-manager.readthedocs.io/en/stable/configuration/optional-settings/) for more possible options.\n"}, "loc": ["services", "peering-manager", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.peering-manager.ldapConfigPath": {"declarations": ["nixos/modules/services/web-apps/peering-manager.nix"], "description": {"_type": "mdDoc", "text": "Path to the Configuration-File for LDAP-Authentication, will be loaded as `ldap_config.py`.\nSee the [documentation](https://peering-manager.readthedocs.io/en/stable/setup/6-ldap/#configuration) for possible options.\n"}, "loc": ["services", "peering-manager", "ldapConfigPath"], "readOnly": false, "type": "path"}, "services.peering-manager.listenAddress": {"declarations": ["nixos/modules/services/web-apps/peering-manager.nix"], "default": {"_type": "literalExpression", "text": "\"[::1]\""}, "description": {"_type": "mdDoc", "text": "Address the server will listen on.\n"}, "loc": ["services", "peering-manager", "listenAddress"], "readOnly": false, "type": "string"}, "services.peering-manager.peeringdbApiKeyFile": {"declarations": ["nixos/modules/services/web-apps/peering-manager.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a file containing the PeeringDB API key.\n"}, "loc": ["services", "peering-manager", "peeringdbApiKeyFile"], "readOnly": false, "type": "null or path"}, "services.peering-manager.plugins": {"declarations": ["nixos/modules/services/web-apps/peering-manager.nix"], "default": {"_type": "literalExpression", "text": "python3Packages: with python3Packages; [];\n"}, "description": {"_type": "mdDoc", "text": "List of plugin packages to install.\n"}, "loc": ["services", "peering-manager", "plugins"], "readOnly": false, "type": "function that evaluates to a(n) list of package"}, "services.peering-manager.port": {"declarations": ["nixos/modules/services/web-apps/peering-manager.nix"], "default": {"_type": "literalExpression", "text": "8001"}, "description": {"_type": "mdDoc", "text": "Port the server will listen on.\n"}, "loc": ["services", "peering-manager", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.peering-manager.secretKeyFile": {"declarations": ["nixos/modules/services/web-apps/peering-manager.nix"], "description": {"_type": "mdDoc", "text": "Path to a file containing the secret key.\n"}, "loc": ["services", "peering-manager", "secretKeyFile"], "readOnly": false, "type": "path"}, "services.peertube.configureNginx": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Configure nginx as a reverse proxy for peertube."}, "loc": ["services", "peertube", "configureNginx"], "readOnly": false, "type": "boolean"}, "services.peertube.dataDirs": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Allow access to custom data locations."}, "example": {"_type": "literalExpression", "text": "[\n  \"/opt/peertube/storage\"\n  \"/var/cache/peertube\"\n]"}, "loc": ["services", "peertube", "dataDirs"], "readOnly": false, "type": "list of path"}, "services.peertube.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Configure local PostgreSQL database server for PeerTube."}, "loc": ["services", "peertube", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.peertube.database.host": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "if config.services.peertube.database.createLocally\nthen \"/run/postgresql\"\nelse null\n"}, "description": {"_type": "mdDoc", "text": "Database host address or unix socket."}, "example": {"_type": "literalExpression", "text": "\"192.168.15.47\""}, "loc": ["services", "peertube", "database", "host"], "readOnly": false, "type": "string"}, "services.peertube.database.name": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "\"peertube\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "peertube", "database", "name"], "readOnly": false, "type": "string"}, "services.peertube.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password for PostgreSQL database."}, "example": {"_type": "literalExpression", "text": "\"/run/keys/peertube/password-postgresql\""}, "loc": ["services", "peertube", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.peertube.database.port": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "5432"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "peertube", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.peertube.database.user": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "\"peertube\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "peertube", "database", "user"], "readOnly": false, "type": "string"}, "services.peertube.enable": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Peertube."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "peertube", "enable"], "readOnly": false, "type": "boolean"}, "services.peertube.enableWebHttps": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable or disable HTTPS protocol."}, "loc": ["services", "peertube", "enableWebHttps"], "readOnly": false, "type": "boolean"}, "services.peertube.group": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "\"peertube\""}, "description": {"_type": "mdDoc", "text": "Group under which Peertube runs."}, "loc": ["services", "peertube", "group"], "readOnly": false, "type": "string"}, "services.peertube.listenHttp": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "9000"}, "description": {"_type": "mdDoc", "text": "listen port for HTTP server."}, "loc": ["services", "peertube", "listenHttp"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.peertube.listenWeb": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "9000"}, "description": {"_type": "mdDoc", "text": "listen port for WEB server."}, "loc": ["services", "peertube", "listenWeb"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.peertube.localDomain": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "description": {"_type": "mdDoc", "text": "The domain serving your PeerTube instance."}, "example": {"_type": "literalExpression", "text": "\"peertube.example.com\""}, "loc": ["services", "peertube", "localDomain"], "readOnly": false, "type": "string"}, "services.peertube.package": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "pkgs.peertube"}, "description": {"_type": "mdDoc", "text": "Peertube package to use."}, "loc": ["services", "peertube", "package"], "readOnly": false, "type": "package"}, "services.peertube.redis.createLocally": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Configure local Redis server for PeerTube."}, "loc": ["services", "peertube", "redis", "createLocally"], "readOnly": false, "type": "boolean"}, "services.peertube.redis.enableUnixSocket": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "config.services.peertube.redis.createLocally"}, "description": {"_type": "mdDoc", "text": "Use Unix socket."}, "loc": ["services", "peertube", "redis", "enableUnixSocket"], "readOnly": false, "type": "boolean"}, "services.peertube.redis.host": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "if config.services.peertube.redis.createLocally && !config.services.peertube.redis.enableUnixSocket\nthen \"127.0.0.1\"\nelse null\n"}, "description": {"_type": "mdDoc", "text": "Redis host."}, "loc": ["services", "peertube", "redis", "host"], "readOnly": false, "type": "null or string"}, "services.peertube.redis.passwordFile": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password for redis database."}, "example": {"_type": "literalExpression", "text": "\"/run/keys/peertube/password-redis-db\""}, "loc": ["services", "peertube", "redis", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.peertube.redis.port": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "if config.services.peertube.redis.createLocally && config.services.peertube.redis.enableUnixSocket\nthen null\nelse 6379\n"}, "description": {"_type": "mdDoc", "text": "Redis port."}, "loc": ["services", "peertube", "redis", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.peertube.secrets.secretsFile": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Secrets to run PeerTube.\nGenerate one using `openssl rand -hex 32`\n"}, "example": {"_type": "literalExpression", "text": "\"/run/secrets/peertube\""}, "loc": ["services", "peertube", "secrets", "secretsFile"], "readOnly": false, "type": "null or path"}, "services.peertube.serviceEnvironmentFile": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set environment variables for the service. Mainly useful for setting the initial root password.\nFor example write to file:\nPT_INITIAL_ROOT_PASSWORD=changeme\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/peertube/password-init-root\""}, "loc": ["services", "peertube", "serviceEnvironmentFile"], "readOnly": false, "type": "null or path"}, "services.peertube.settings": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "description": {"_type": "mdDoc", "text": "Configuration for peertube."}, "example": {"_type": "literalExpression", "text": "{\n  listen = {\n    hostname = \"0.0.0.0\";\n  };\n  log = {\n    level = \"debug\";\n  };\n  storage = {\n    tmp = \"/opt/data/peertube/storage/tmp/\";\n    logs = \"/opt/data/peertube/storage/logs/\";\n    cache = \"/opt/data/peertube/storage/cache/\";\n  };\n}\n"}, "loc": ["services", "peertube", "settings"], "readOnly": false, "type": "JSON value"}, "services.peertube.smtp.createLocally": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Configure local Postfix SMTP server for PeerTube."}, "loc": ["services", "peertube", "smtp", "createLocally"], "readOnly": false, "type": "boolean"}, "services.peertube.smtp.passwordFile": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password for smtp server."}, "example": {"_type": "literalExpression", "text": "\"/run/keys/peertube/password-smtp\""}, "loc": ["services", "peertube", "smtp", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.peertube.user": {"declarations": ["nixos/modules/services/web-apps/peertube.nix"], "default": {"_type": "literalExpression", "text": "\"peertube\""}, "description": {"_type": "mdDoc", "text": "User account under which Peertube runs."}, "loc": ["services", "peertube", "user"], "readOnly": false, "type": "string"}, "services.peroxide.enable": {"declarations": ["nixos/modules/services/networking/peroxide.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable peroxide."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "peroxide", "enable"], "readOnly": false, "type": "boolean"}, "services.peroxide.logLevel": {"declarations": ["nixos/modules/services/networking/peroxide.nix"], "default": {"_type": "literalExpression", "text": "\"Warning\""}, "description": {"_type": "mdDoc", "text": "Only log messages of this priority or higher."}, "example": {"_type": "literalExpression", "text": "\"Info\""}, "loc": ["services", "peroxide", "logLevel"], "readOnly": false, "type": "one of \"Panic\", \"Fatal\", \"Error\", \"Warning\", \"Info\", \"Debug\", \"Trace\""}, "services.peroxide.package": {"declarations": ["nixos/modules/services/networking/peroxide.nix"], "default": {"_type": "literalExpression", "text": "pkgs.peroxide"}, "description": {"_type": "mdDoc", "text": "The peroxide package to use."}, "loc": ["services", "peroxide", "package"], "readOnly": false, "type": "package"}, "services.peroxide.settings": {"declarations": ["nixos/modules/services/networking/peroxide.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for peroxide.  See\n[config.example.yaml](https://github.com/ljanyst/peroxide/blob/master/config.example.yaml)\nfor an example configuration.\n"}, "loc": ["services", "peroxide", "settings"], "readOnly": false, "type": "YAML value"}, "services.peroxide.settings.ServerAddress": {"declarations": ["nixos/modules/services/networking/peroxide.nix"], "default": {"_type": "literalExpression", "text": "\"[::0]\""}, "description": {"_type": "mdDoc", "text": "The address on which to listen for connections."}, "example": {"_type": "literalExpression", "text": "\"localhost\""}, "loc": ["services", "peroxide", "settings", "ServerAddress"], "readOnly": false, "type": "string"}, "services.peroxide.settings.UserPortImap": {"declarations": ["nixos/modules/services/networking/peroxide.nix"], "default": {"_type": "literalExpression", "text": "1143"}, "description": {"_type": "mdDoc", "text": "The port on which to listen for IMAP connections."}, "loc": ["services", "peroxide", "settings", "UserPortImap"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.peroxide.settings.UserPortSmtp": {"declarations": ["nixos/modules/services/networking/peroxide.nix"], "default": {"_type": "literalExpression", "text": "1025"}, "description": {"_type": "mdDoc", "text": "The port on which to listen for SMTP connections."}, "loc": ["services", "peroxide", "settings", "UserPortSmtp"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.persistent-evdev.devices": {"declarations": ["nixos/modules/services/misc/persistent-evdev.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of virtual proxy device labels with backing physical device ids.\n\nPhysical devices should already exist in {file}`/dev/input/by-id/`.\nProxy devices will be automatically given a `uinput-` prefix.\n\nSee the [project page](https://github.com/aiberia/persistent-evdev#example-usage-with-libvirt)\nfor example configuration of virtual devices with libvirt\nand remember to add `uinput-*` devices to the qemu\n`cgroup_device_acl` list (see [](#opt-virtualisation.libvirtd.qemu.verbatimConfig)).\n"}, "example": {"_type": "literalExpression", "text": "{\n  persist-mouse0 = \"usb-Logitech_G403_Prodigy_Gaming_Mouse_078738533531-event-if01\";\n  persist-mouse1 = \"usb-Logitech_G403_Prodigy_Gaming_Mouse_078738533531-event-mouse\";\n  persist-mouse2 = \"usb-Logitech_G403_Prodigy_Gaming_Mouse_078738533531-if01-event-kbd\";\n  persist-keyboard0 = \"usb-Microsoft_Natural\u00ae_Ergonomic_Keyboard_4000-event-kbd\";\n  persist-keyboard1 = \"usb-Microsoft_Natural\u00ae_Ergonomic_Keyboard_4000-if01-event-kbd\";\n}\n"}, "loc": ["services", "persistent-evdev", "devices"], "readOnly": false, "type": "attribute set of string"}, "services.persistent-evdev.enable": {"declarations": ["nixos/modules/services/misc/persistent-evdev.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable virtual input devices that persist even if the backing device is hotplugged."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "persistent-evdev", "enable"], "readOnly": false, "type": "boolean"}, "services.pfix-srsd.domain": {"declarations": ["nixos/modules/services/mail/pfix-srsd.nix"], "description": {"_type": "mdDoc", "text": "The domain for which to enable srs"}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "pfix-srsd", "domain"], "readOnly": false, "type": "string"}, "services.pfix-srsd.enable": {"declarations": ["nixos/modules/services/mail/pfix-srsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the postfix sender rewriting scheme daemon."}, "loc": ["services", "pfix-srsd", "enable"], "readOnly": false, "type": "boolean"}, "services.pfix-srsd.secretsFile": {"declarations": ["nixos/modules/services/mail/pfix-srsd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/pfix-srsd/secrets\""}, "description": {"_type": "mdDoc", "text": "The secret data used to encode the SRS address.\nto generate, use a command like:\n`for n in $(seq 5); do dd if=/dev/urandom count=1 bs=1024 status=none | sha256sum | sed 's/  -$//' | sed 's/^/          /'; done`\n"}, "loc": ["services", "pfix-srsd", "secretsFile"], "readOnly": false, "type": "path"}, "services.pgadmin.emailServer.address": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "SMTP server for email delivery"}, "loc": ["services", "pgadmin", "emailServer", "address"], "readOnly": false, "type": "string"}, "services.pgadmin.emailServer.enable": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SMTP email server. This is necessary, if you want to use password recovery or change your own password\n"}, "loc": ["services", "pgadmin", "emailServer", "enable"], "readOnly": false, "type": "boolean"}, "services.pgadmin.emailServer.passwordFile": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "description": {"_type": "mdDoc", "text": "Password for SMTP email account.\nNOTE: Should be string not a store path, to prevent the password from being world readable\n"}, "loc": ["services", "pgadmin", "emailServer", "passwordFile"], "readOnly": false, "type": "path"}, "services.pgadmin.emailServer.port": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "default": {"_type": "literalExpression", "text": "25"}, "description": {"_type": "mdDoc", "text": "SMTP server port for email delivery"}, "loc": ["services", "pgadmin", "emailServer", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.pgadmin.emailServer.sender": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "description": {"_type": "mdDoc", "text": "SMTP server sender email for email delivery. Some servers require this to be a valid email address from that server\n"}, "example": {"_type": "literalExpression", "text": "\"noreply@example.com\""}, "loc": ["services", "pgadmin", "emailServer", "sender"], "readOnly": false, "type": "string"}, "services.pgadmin.emailServer.useSSL": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "SMTP server should use SSL"}, "loc": ["services", "pgadmin", "emailServer", "useSSL"], "readOnly": false, "type": "boolean"}, "services.pgadmin.emailServer.useTLS": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "SMTP server should use TLS"}, "loc": ["services", "pgadmin", "emailServer", "useTLS"], "readOnly": false, "type": "boolean"}, "services.pgadmin.emailServer.username": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SMTP server username for email delivery"}, "loc": ["services", "pgadmin", "emailServer", "username"], "readOnly": false, "type": "null or string"}, "services.pgadmin.enable": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PostgreSQL Admin 4."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pgadmin", "enable"], "readOnly": false, "type": "boolean"}, "services.pgadmin.initialEmail": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "description": {"_type": "mdDoc", "text": "Initial email for the pgAdmin account"}, "loc": ["services", "pgadmin", "initialEmail"], "readOnly": false, "type": "string"}, "services.pgadmin.initialPasswordFile": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "description": {"_type": "mdDoc", "text": "Initial password file for the pgAdmin account.\nNOTE: Should be string not a store path, to prevent the password from being world readable\n"}, "loc": ["services", "pgadmin", "initialPasswordFile"], "readOnly": false, "type": "path"}, "services.pgadmin.openFirewall": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable firewall passthrough for pgadmin4."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pgadmin", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.pgadmin.port": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "default": {"_type": "literalExpression", "text": "5050"}, "description": {"_type": "mdDoc", "text": "Port for pgadmin4 to run on"}, "loc": ["services", "pgadmin", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.pgadmin.settings": {"declarations": ["nixos/modules/services/admin/pgadmin.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings for pgadmin4.\n[Documentation](https://www.pgadmin.org/docs/pgadmin4/development/config_py.html)\n"}, "loc": ["services", "pgadmin", "settings"], "readOnly": false, "type": "attribute set of ((attribute set of ((list of (signed integer or boolean or string)) or attribute set of (signed integer or boolean or string) or signed integer or boolean or string)) or list of ((list of (signed integer or boolean or string)) or attribute set of (signed integer or boolean or string) or signed integer or boolean or string) or (list of (signed integer or boolean or string)) or attribute set of (signed integer or boolean or string) or signed integer or boolean or string)"}, "services.pgmanage.allowCustomConnections": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This tells pgmanage whether or not to allow anyone to use a custom\nconnection from the login screen.\n"}, "loc": ["services", "pgmanage", "allowCustomConnections"], "readOnly": false, "type": "boolean"}, "services.pgmanage.connections": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "pgmanage requires at least one PostgreSQL server be defined.\n\nDetailed information about PostgreSQL connection strings is available at:\n<http://www.postgresql.org/docs/current/static/libpq-connect.html>\n\nNote that you should not specify your user name or password. That\ninformation will be entered on the login screen. If you specify a\nusername or password, it will be removed by pgmanage before attempting to\nconnect to a database.\n"}, "example": {"_type": "literalExpression", "text": "{\n  mini-server = \"hostaddr=127.0.0.1 port=5432 dbname=postgres sslmode=require\";\n  nuc-server = \"hostaddr=192.168.0.100 port=5432 dbname=postgres\";\n}"}, "loc": ["services", "pgmanage", "connections"], "readOnly": false, "type": "attribute set of string"}, "services.pgmanage.enable": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PostgreSQL Administration for the web."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pgmanage", "enable"], "readOnly": false, "type": "boolean"}, "services.pgmanage.localOnly": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "This tells pgmanage whether or not to set the listening socket to local\naddresses only.\n"}, "loc": ["services", "pgmanage", "localOnly"], "readOnly": false, "type": "boolean"}, "services.pgmanage.logLevel": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "default": {"_type": "literalExpression", "text": "\"error\""}, "description": {"_type": "mdDoc", "text": "Verbosity of logs\n"}, "loc": ["services", "pgmanage", "logLevel"], "readOnly": false, "type": "one of \"error\", \"warn\", \"notice\", \"info\""}, "services.pgmanage.loginGroup": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This tells pgmanage to only allow users in a certain PostgreSQL group to\nlogin to pgmanage. Note that a connection will be made to PostgreSQL in\norder to test if the user is a member of the login group.\n"}, "loc": ["services", "pgmanage", "loginGroup"], "readOnly": false, "type": "null or string"}, "services.pgmanage.loginTimeout": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "default": {"_type": "literalExpression", "text": "3600"}, "description": {"_type": "mdDoc", "text": "Number of seconds of inactivity before user is automatically logged\nout.\n"}, "loc": ["services", "pgmanage", "loginTimeout"], "readOnly": false, "type": "signed integer"}, "services.pgmanage.package": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "default": {"_type": "literalExpression", "text": "pkgs.pgmanage"}, "description": {"_type": "mdDoc", "text": "The pgmanage package to use.\n"}, "loc": ["services", "pgmanage", "package"], "readOnly": false, "type": "package"}, "services.pgmanage.port": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "This tells pgmanage what port to listen on for browser requests.\n"}, "loc": ["services", "pgmanage", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.pgmanage.sqlRoot": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/pgmanage\""}, "description": {"_type": "mdDoc", "text": "This tells pgmanage where to put the SQL file history. All tabs are saved\nto this location so that if you get disconnected from pgmanage you\ndon't lose your work.\n"}, "loc": ["services", "pgmanage", "sqlRoot"], "readOnly": false, "type": "string"}, "services.pgmanage.superOnly": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "This tells pgmanage whether or not to only allow super users to\nlogin. The recommended value is true and will restrict users who are not\nsuper users from logging in to any PostgreSQL instance through\npgmanage. Note that a connection will be made to PostgreSQL in order to\ntest if the user is a superuser.\n"}, "loc": ["services", "pgmanage", "superOnly"], "readOnly": false, "type": "boolean"}, "services.pgmanage.tls": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "These options tell pgmanage where the TLS Certificate and Key files\nreside. If you use these options then you'll only be able to access\npgmanage through a secure TLS connection. These options are only\nnecessary if you wish to connect directly to pgmanage using a secure TLS\nconnection. As an alternative, you can set up pgmanage in a reverse proxy\nconfiguration. This allows your web server to terminate the secure\nconnection and pass on the request to pgmanage. You can find help to set\nup this configuration in:\n<https://github.com/pgManage/pgManage/blob/master/INSTALL_NGINX.md>\n"}, "loc": ["services", "pgmanage", "tls"], "readOnly": false, "type": "null or (submodule)"}, "services.pgmanage.tls.cert": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "description": {"_type": "mdDoc", "text": "TLS certificate"}, "loc": ["services", "pgmanage", "tls", "cert"], "readOnly": false, "type": "string"}, "services.pgmanage.tls.key": {"declarations": ["nixos/modules/services/databases/pgmanage.nix"], "description": {"_type": "mdDoc", "text": "TLS key"}, "loc": ["services", "pgmanage", "tls", "key"], "readOnly": false, "type": "string"}, "services.pgpkeyserver-lite.enable": {"declarations": ["nixos/modules/services/web-apps/pgpkeyserver-lite.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable pgpkeyserver-lite on a nginx vHost proxying to a gpg keyserver."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pgpkeyserver-lite", "enable"], "readOnly": false, "type": "boolean"}, "services.pgpkeyserver-lite.hkpAddress": {"declarations": ["nixos/modules/services/web-apps/pgpkeyserver-lite.nix"], "default": {"_type": "literalExpression", "text": "head config.services.sks.hkpAddress"}, "description": {"_type": "mdDoc", "text": "Which IP address the sks-keyserver is listening on.\n"}, "loc": ["services", "pgpkeyserver-lite", "hkpAddress"], "readOnly": false, "type": "string"}, "services.pgpkeyserver-lite.hkpPort": {"declarations": ["nixos/modules/services/web-apps/pgpkeyserver-lite.nix"], "default": {"_type": "literalExpression", "text": "config.services.sks.hkpPort"}, "description": {"_type": "mdDoc", "text": "Which port the sks-keyserver is listening on.\n"}, "loc": ["services", "pgpkeyserver-lite", "hkpPort"], "readOnly": false, "type": "signed integer"}, "services.pgpkeyserver-lite.hostname": {"declarations": ["nixos/modules/services/web-apps/pgpkeyserver-lite.nix"], "description": {"_type": "mdDoc", "text": "Which hostname to set the vHost to that is proxying to sks.\n"}, "loc": ["services", "pgpkeyserver-lite", "hostname"], "readOnly": false, "type": "string"}, "services.pgpkeyserver-lite.package": {"declarations": ["nixos/modules/services/web-apps/pgpkeyserver-lite.nix"], "default": {"_type": "literalExpression", "text": "pkgs.pgpkeyserver-lite"}, "description": {"_type": "mdDoc", "text": "Which webgui derivation to use.\n"}, "loc": ["services", "pgpkeyserver-lite", "package"], "readOnly": false, "type": "package"}, "services.photoprism.address": {"declarations": ["nixos/modules/services/web-apps/photoprism.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Web interface address.\n"}, "loc": ["services", "photoprism", "address"], "readOnly": false, "type": "string"}, "services.photoprism.enable": {"declarations": ["nixos/modules/services/web-apps/photoprism.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Photoprism web server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "photoprism", "enable"], "readOnly": false, "type": "boolean"}, "services.photoprism.importPath": {"declarations": ["nixos/modules/services/web-apps/photoprism.nix"], "default": {"_type": "literalExpression", "text": "\"import\""}, "description": {"_type": "mdDoc", "text": "Relative or absolute to the `originalsPath` from where the files should be imported.\n"}, "loc": ["services", "photoprism", "importPath"], "readOnly": false, "type": "string"}, "services.photoprism.originalsPath": {"declarations": ["nixos/modules/services/web-apps/photoprism.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Storage path of your original media files (photos and videos).\n"}, "example": {"_type": "literalExpression", "text": "\"/data/photos\""}, "loc": ["services", "photoprism", "originalsPath"], "readOnly": false, "type": "path"}, "services.photoprism.package": {"declarations": ["nixos/modules/services/web-apps/photoprism.nix"], "default": {"_type": "literalExpression", "text": "pkgs.photoprism"}, "description": {"_type": "mdDoc", "text": "The photoprism package to use."}, "loc": ["services", "photoprism", "package"], "readOnly": false, "type": "package"}, "services.photoprism.passwordFile": {"declarations": ["nixos/modules/services/web-apps/photoprism.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Admin password file.\n"}, "loc": ["services", "photoprism", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.photoprism.port": {"declarations": ["nixos/modules/services/web-apps/photoprism.nix"], "default": {"_type": "literalExpression", "text": "2342"}, "description": {"_type": "mdDoc", "text": "Web interface port.\n"}, "loc": ["services", "photoprism", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.photoprism.settings": {"declarations": ["nixos/modules/services/web-apps/photoprism.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "See [the getting-started guide](https://docs.photoprism.app/getting-started/config-options/) for available options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  PHOTOPRISM_ADMIN_USER = \"root\";\n  PHOTOPRISM_DEFAULT_LOCALE = \"de\";\n}"}, "loc": ["services", "photoprism", "settings"], "readOnly": false, "type": "attribute set of string"}, "services.photoprism.storagePath": {"declarations": ["nixos/modules/services/web-apps/photoprism.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/photoprism\""}, "description": {"_type": "mdDoc", "text": "Location for sidecar, cache, and database files.\n"}, "loc": ["services", "photoprism", "storagePath"], "readOnly": false, "type": "path"}, "services.phpfpm.extraConfig": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Extra configuration that should be put in the global section of\nthe PHP-FPM configuration file. Do not specify the options\n`error_log` or\n`daemonize` here, since they are generated by\nNixOS.\n"}, "loc": ["services", "phpfpm", "extraConfig"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.phpfpm.phpOptions": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Options appended to the PHP configuration file {file}`php.ini`.\n"}, "example": {"_type": "literalExpression", "text": "''\n  date.timezone = \"CET\"\n''"}, "loc": ["services", "phpfpm", "phpOptions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.phpfpm.phpPackage": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.php"}, "description": {"_type": "mdDoc", "text": "The PHP package to use for running the PHP-FPM service.\n"}, "loc": ["services", "phpfpm", "phpPackage"], "readOnly": false, "type": "package"}, "services.phpfpm.pools": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "PHP-FPM pools. If no pools are defined, the PHP-FPM\nservice is disabled.\n"}, "example": {"_type": "literalExpression", "text": "{\n  mypool = {\n    user = \"php\";\n    group = \"php\";\n    phpPackage = pkgs.php;\n    settings = {\n      \"pm\" = \"dynamic\";\n      \"pm.max_children\" = 75;\n      \"pm.start_servers\" = 10;\n      \"pm.min_spare_servers\" = 5;\n      \"pm.max_spare_servers\" = 20;\n      \"pm.max_requests\" = 500;\n    };\n  }\n}"}, "loc": ["services", "phpfpm", "pools"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.phpfpm.pools.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Extra lines that go into the pool configuration.\nSee the documentation on `php-fpm.conf` for\ndetails on configuration directives.\n"}, "loc": ["services", "phpfpm", "pools", "<name>", "extraConfig"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.phpfpm.pools.<name>.group": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "description": {"_type": "mdDoc", "text": "Group account under which this pool runs."}, "loc": ["services", "phpfpm", "pools", "<name>", "group"], "readOnly": false, "type": "string"}, "services.phpfpm.pools.<name>.listen": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The address on which to accept FastCGI requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/unix/socket\""}, "loc": ["services", "phpfpm", "pools", "<name>", "listen"], "readOnly": false, "type": "string"}, "services.phpfpm.pools.<name>.phpEnv": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables used for this PHP-FPM pool.\n"}, "example": {"_type": "literalExpression", "text": "{\n  HOSTNAME = \"$HOSTNAME\";\n  TMP = \"/tmp\";\n  TMPDIR = \"/tmp\";\n  TEMP = \"/tmp\";\n}\n"}, "loc": ["services", "phpfpm", "pools", "<name>", "phpEnv"], "readOnly": false, "type": "attribute set of string"}, "services.phpfpm.pools.<name>.phpOptions": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "description": {"_type": "mdDoc", "text": "\"Options appended to the PHP configuration file {file}`php.ini` used for this PHP-FPM pool.\"\n"}, "loc": ["services", "phpfpm", "pools", "<name>", "phpOptions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.phpfpm.pools.<name>.phpPackage": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "default": {"_type": "literalExpression", "text": "config.services.phpfpm.phpPackage"}, "description": {"_type": "mdDoc", "text": "The PHP package to use for running this PHP-FPM pool.\n"}, "loc": ["services", "phpfpm", "pools", "<name>", "phpPackage"], "readOnly": false, "type": "package"}, "services.phpfpm.pools.<name>.settings": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "PHP-FPM pool directives. Refer to the \"List of pool directives\" section of\n<https://www.php.net/manual/en/install.fpm.configuration.php>\nfor details. Note that settings names must be enclosed in quotes (e.g.\n`\"pm.max_children\"` instead of `pm.max_children`).\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"pm\" = \"dynamic\";\n  \"pm.max_children\" = 75;\n  \"pm.start_servers\" = 10;\n  \"pm.min_spare_servers\" = 5;\n  \"pm.max_spare_servers\" = 20;\n  \"pm.max_requests\" = 500;\n}\n"}, "loc": ["services", "phpfpm", "pools", "<name>", "settings"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.phpfpm.pools.<name>.socket": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "description": {"_type": "mdDoc", "text": "Path to the unix socket file on which to accept FastCGI requests.\n\n::: {.note}\nThis option is read-only and managed by NixOS.\n:::\n"}, "example": {"_type": "literalExpression", "text": "\"/run/phpfpm/<name>.sock\""}, "loc": ["services", "phpfpm", "pools", "<name>", "socket"], "readOnly": true, "type": "string"}, "services.phpfpm.pools.<name>.user": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "description": {"_type": "mdDoc", "text": "User account under which this pool runs."}, "loc": ["services", "phpfpm", "pools", "<name>", "user"], "readOnly": false, "type": "string"}, "services.phpfpm.settings": {"declarations": ["nixos/modules/services/web-servers/phpfpm/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "PHP-FPM global directives. Refer to the \"List of global php-fpm.conf directives\" section of\n<https://www.php.net/manual/en/install.fpm.configuration.php>\nfor details. Note that settings names must be enclosed in quotes (e.g.\n`\"pm.max_children\"` instead of `pm.max_children`).\nYou need not specify the options `error_log` or\n`daemonize` here, since they are generated by NixOS.\n"}, "loc": ["services", "phpfpm", "settings"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.phylactery.enable": {"declarations": ["nixos/modules/services/web-apps/phylactery.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Whether to enable Phylactery server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "phylactery", "enable"], "readOnly": false, "type": "boolean"}, "services.phylactery.host": {"declarations": ["nixos/modules/services/web-apps/phylactery.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Listen host for Phylactery"}, "loc": ["services", "phylactery", "host"], "readOnly": false, "type": "string"}, "services.phylactery.library": {"declarations": ["nixos/modules/services/web-apps/phylactery.nix"], "description": {"_type": "mdDoc", "text": "Path to CBZ library"}, "loc": ["services", "phylactery", "library"], "readOnly": false, "type": "path"}, "services.phylactery.package": {"declarations": ["nixos/modules/services/web-apps/phylactery.nix"], "default": {"_type": "literalExpression", "text": "pkgs.phylactery"}, "description": {"_type": "mdDoc", "text": "The Phylactery package to use"}, "loc": ["services", "phylactery", "package"], "readOnly": false, "type": "package"}, "services.phylactery.port": {"declarations": ["nixos/modules/services/web-apps/phylactery.nix"], "description": {"_type": "mdDoc", "text": "Listen port for Phylactery"}, "loc": ["services", "phylactery", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.physlock.allowAnyUser": {"declarations": ["nixos/modules/services/security/physlock.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow any user to lock the screen. This will install a\nsetuid wrapper to allow any user to start physlock as root, which\nis a minor security risk. Call the physlock binary to use this instead\nof using the systemd service.\n"}, "loc": ["services", "physlock", "allowAnyUser"], "readOnly": false, "type": "boolean"}, "services.physlock.disableSysRq": {"declarations": ["nixos/modules/services/security/physlock.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to disable SysRq when locked with physlock.\n"}, "loc": ["services", "physlock", "disableSysRq"], "readOnly": false, "type": "boolean"}, "services.physlock.enable": {"declarations": ["nixos/modules/services/security/physlock.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the {command}`physlock` screen locking mechanism.\n\nEnable this and then run {command}`systemctl start physlock`\nto securely lock the screen.\n\nThis will switch to a new virtual terminal, turn off console\nswitching and disable SysRq mechanism (when\n{option}`services.physlock.disableSysRq` is set)\nuntil the root or user password is given.\n"}, "loc": ["services", "physlock", "enable"], "readOnly": false, "type": "boolean"}, "services.physlock.lockMessage": {"declarations": ["nixos/modules/services/security/physlock.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Message to show on physlock login terminal.\n"}, "loc": ["services", "physlock", "lockMessage"], "readOnly": false, "type": "string"}, "services.physlock.lockOn.extraTargets": {"declarations": ["nixos/modules/services/security/physlock.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Other targets to lock the screen just before.\n\nUseful if you want to e.g. both autologin to X11 so that\nyour {file}`~/.xsession` gets executed and\nstill to have the screen locked so that the system can be\nbooted relatively unattended.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"display-manager.service\"\n]"}, "loc": ["services", "physlock", "lockOn", "extraTargets"], "readOnly": false, "type": "list of string"}, "services.physlock.lockOn.hibernate": {"declarations": ["nixos/modules/services/security/physlock.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to lock screen with physlock just before hibernate.\n"}, "loc": ["services", "physlock", "lockOn", "hibernate"], "readOnly": false, "type": "boolean"}, "services.physlock.lockOn.suspend": {"declarations": ["nixos/modules/services/security/physlock.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to lock screen with physlock just before suspend.\n"}, "loc": ["services", "physlock", "lockOn", "suspend"], "readOnly": false, "type": "boolean"}, "services.physlock.muteKernelMessages": {"declarations": ["nixos/modules/services/security/physlock.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable kernel messages on console while physlock is running.\n"}, "loc": ["services", "physlock", "muteKernelMessages"], "readOnly": false, "type": "boolean"}, "services.picom.activeOpacity": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "1.0"}, "description": {"_type": "mdDoc", "text": "Opacity of active windows.\n"}, "example": {"_type": "literalExpression", "text": "0.8"}, "loc": ["services", "picom", "activeOpacity"], "readOnly": false, "type": "integer or floating point number between 0 and 1 (both inclusive)"}, "services.picom.backend": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "\"xrender\""}, "description": {"_type": "mdDoc", "text": "Backend to use: `egl`, `glx`, `xrender` or `xr_glx_hybrid`.\n"}, "loc": ["services", "picom", "backend"], "readOnly": false, "type": "one of \"egl\", \"glx\", \"xrender\", \"xr_glx_hybrid\""}, "services.picom.enable": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to enable Picom as the X.org composite manager.\n"}, "loc": ["services", "picom", "enable"], "readOnly": false, "type": "boolean"}, "services.picom.fade": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Fade windows in and out.\n"}, "loc": ["services", "picom", "fade"], "readOnly": false, "type": "boolean"}, "services.picom.fadeDelta": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Time between fade animation step (in ms).\n"}, "example": {"_type": "literalExpression", "text": "5"}, "loc": ["services", "picom", "fadeDelta"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.picom.fadeExclude": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of conditions of windows that should not be faded.\nSee `picom(1)` man page for more examples.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"window_type *= 'menu'\"\n  \"name ~= 'Firefox$'\"\n  \"focused = 1\"\n]"}, "loc": ["services", "picom", "fadeExclude"], "readOnly": false, "type": "list of string"}, "services.picom.fadeSteps": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "[\n  0.028\n  0.03\n]"}, "description": {"_type": "mdDoc", "text": "Opacity change between fade steps (in and out).\n"}, "example": {"_type": "literalExpression", "text": "[\n  0.04\n  0.04\n]"}, "loc": ["services", "picom", "fadeSteps"], "readOnly": false, "type": "pair of integer or floating point number between 0.01 and 1 (both inclusive)"}, "services.picom.inactiveOpacity": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "1.0"}, "description": {"_type": "mdDoc", "text": "Opacity of inactive windows.\n"}, "example": {"_type": "literalExpression", "text": "0.8"}, "loc": ["services", "picom", "inactiveOpacity"], "readOnly": false, "type": "integer or floating point number between 0.1 and 1 (both inclusive)"}, "services.picom.menuOpacity": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "1.0"}, "description": {"_type": "mdDoc", "text": "Opacity of dropdown and popup menu.\n"}, "example": {"_type": "literalExpression", "text": "0.8"}, "loc": ["services", "picom", "menuOpacity"], "readOnly": false, "type": "integer or floating point number between 0 and 1 (both inclusive)"}, "services.picom.opacityRules": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Rules that control the opacity of windows, in format PERCENT:PATTERN.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"95:class_g = 'URxvt' && !_NET_WM_STATE@:32a\"\n  \"0:_NET_WM_STATE@:32a *= '_NET_WM_STATE_HIDDEN'\"\n]"}, "loc": ["services", "picom", "opacityRules"], "readOnly": false, "type": "list of string"}, "services.picom.settings": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Picom settings. Use this option to configure Picom settings not exposed\nin a NixOS option or to bypass one.  For the available options see the\nCONFIGURATION FILES section at `picom(1)`.\n"}, "example": {"_type": "literalExpression", "text": "blur =\n  { method = \"gaussian\";\n    size = 10;\n    deviation = 5.0;\n  };\n"}, "loc": ["services", "picom", "settings"], "readOnly": false, "type": "libconfig configuration. The format consists of an attributes\nset (called a group) of settings. Each setting can be a scalar type\n(boolean, integer, floating point number or string), a list of\nscalars or a group itself\n"}, "services.picom.shadow": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Draw window shadows.\n"}, "loc": ["services", "picom", "shadow"], "readOnly": false, "type": "boolean"}, "services.picom.shadowExclude": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of conditions of windows that should have no shadow.\nSee `picom(1)` man page for more examples.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"window_type *= 'menu'\"\n  \"name ~= 'Firefox$'\"\n  \"focused = 1\"\n]"}, "loc": ["services", "picom", "shadowExclude"], "readOnly": false, "type": "list of string"}, "services.picom.shadowOffsets": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "[\n  -15\n  -15\n]"}, "description": {"_type": "mdDoc", "text": "Left and right offset for shadows (in pixels).\n"}, "example": {"_type": "literalExpression", "text": "[\n  -10\n  -15\n]"}, "loc": ["services", "picom", "shadowOffsets"], "readOnly": false, "type": "pair of signed integer"}, "services.picom.shadowOpacity": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "0.75"}, "description": {"_type": "mdDoc", "text": "Window shadows opacity.\n"}, "example": {"_type": "literalExpression", "text": "0.8"}, "loc": ["services", "picom", "shadowOpacity"], "readOnly": false, "type": "integer or floating point number between 0 and 1 (both inclusive)"}, "services.picom.vSync": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable vertical synchronization. Chooses the best method\n(drm, opengl, opengl-oml, opengl-swc, opengl-mswc) automatically.\nThe bool value should be used, the others are just for backwards compatibility.\n"}, "loc": ["services", "picom", "vSync"], "readOnly": false, "type": "boolean or one of \"none\", \"drm\", \"opengl\", \"opengl-oml\", \"opengl-swc\", \"opengl-mswc\""}, "services.picom.wintypes": {"declarations": ["nixos/modules/services/x11/picom.nix"], "default": {"_type": "literalExpression", "text": "{\n  popup_menu = { opacity = config.services.picom.menuOpacity; };\n  dropdown_menu = { opacity = config.services.picom.menuOpacity; };\n}\n"}, "description": {"_type": "mdDoc", "text": "Rules for specific window types.\n"}, "example": {"_type": "literalExpression", "text": "{ }"}, "loc": ["services", "picom", "wintypes"], "readOnly": false, "type": "attribute set"}, "services.picosnitch.enable": {"declarations": ["nixos/modules/services/networking/picosnitch.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable picosnitch daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "picosnitch", "enable"], "readOnly": false, "type": "boolean"}, "services.pict-rs.address": {"declarations": ["nixos/modules/services/web-apps/pict-rs.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The IPv4 address to deploy the service to.\n"}, "loc": ["services", "pict-rs", "address"], "readOnly": false, "type": "string"}, "services.pict-rs.dataDir": {"declarations": ["nixos/modules/services/web-apps/pict-rs.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/pict-rs\""}, "description": {"_type": "mdDoc", "text": "The directory where to store the uploaded images.\n"}, "loc": ["services", "pict-rs", "dataDir"], "readOnly": false, "type": "path"}, "services.pict-rs.enable": {"declarations": ["nixos/modules/services/web-apps/pict-rs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable pict-rs server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pict-rs", "enable"], "readOnly": false, "type": "boolean"}, "services.pict-rs.port": {"declarations": ["nixos/modules/services/web-apps/pict-rs.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "The port which to bind the service to.\n"}, "loc": ["services", "pict-rs", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.pipewire.alsa.enable": {"declarations": ["nixos/modules/services/desktops/pipewire/pipewire.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ALSA support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pipewire", "alsa", "enable"], "readOnly": false, "type": "boolean"}, "services.pipewire.alsa.support32Bit": {"declarations": ["nixos/modules/services/desktops/pipewire/pipewire.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable 32-bit ALSA support on 64-bit systems."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pipewire", "alsa", "support32Bit"], "readOnly": false, "type": "boolean"}, "services.pipewire.audio.enable": {"declarations": ["nixos/modules/services/desktops/pipewire/pipewire.nix"], "default": {"_type": "literalExpression", "text": "config.services.pipewire.alsa.enable || config.services.pipewire.jack.enable || config.services.pipewire.pulse.enable"}, "description": {"_type": "mdDoc", "text": "Whether to use PipeWire as the primary sound server"}, "loc": ["services", "pipewire", "audio", "enable"], "readOnly": false, "type": "boolean"}, "services.pipewire.enable": {"declarations": ["nixos/modules/services/desktops/pipewire/pipewire.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable pipewire service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pipewire", "enable"], "readOnly": false, "type": "boolean"}, "services.pipewire.jack.enable": {"declarations": ["nixos/modules/services/desktops/pipewire/pipewire.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable JACK audio emulation."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pipewire", "jack", "enable"], "readOnly": false, "type": "boolean"}, "services.pipewire.package": {"declarations": ["nixos/modules/services/desktops/pipewire/pipewire.nix"], "default": {"_type": "literalExpression", "text": "pkgs.pipewire"}, "description": {"_type": "mdDoc", "text": "The pipewire derivation to use.\n"}, "loc": ["services", "pipewire", "package"], "readOnly": false, "type": "package"}, "services.pipewire.pulse.enable": {"declarations": ["nixos/modules/services/desktops/pipewire/pipewire.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PulseAudio server emulation."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pipewire", "pulse", "enable"], "readOnly": false, "type": "boolean"}, "services.pipewire.socketActivation": {"declarations": ["nixos/modules/services/desktops/pipewire/pipewire.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Automatically run pipewire when connections are made to the pipewire socket.\n"}, "loc": ["services", "pipewire", "socketActivation"], "readOnly": false, "type": "boolean"}, "services.pipewire.systemWide": {"declarations": ["nixos/modules/services/desktops/pipewire/pipewire.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If true, a system-wide PipeWire service and socket is enabled\nallowing all users in the \"pipewire\" group to use it simultaneously.\nIf false, then user units are used instead, restricting access to\nonly one user.\n\nEnabling system-wide PipeWire is however not recommended and disabled\nby default according to\nhttps://github.com/PipeWire/pipewire/blob/master/NEWS\n"}, "loc": ["services", "pipewire", "systemWide"], "readOnly": false, "type": "boolean"}, "services.pipewire.wireplumber.enable": {"declarations": ["nixos/modules/services/desktops/pipewire/wireplumber.nix"], "default": {"_type": "literalExpression", "text": "config.services.pipewire.enable"}, "description": {"_type": "mdDoc", "text": "Whether to enable Wireplumber, a modular session / policy manager for PipeWire"}, "loc": ["services", "pipewire", "wireplumber", "enable"], "readOnly": false, "type": "boolean"}, "services.pipewire.wireplumber.package": {"declarations": ["nixos/modules/services/desktops/pipewire/wireplumber.nix"], "default": {"_type": "literalExpression", "text": "pkgs.wireplumber"}, "description": {"_type": "mdDoc", "text": "The wireplumber derivation to use."}, "loc": ["services", "pipewire", "wireplumber", "package"], "readOnly": false, "type": "package"}, "services.pixelfed.dataDir": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/pixelfed\""}, "description": {"_type": "mdDoc", "text": "State directory of the `pixelfed` user which holds\nthe application's state and data.\n"}, "loc": ["services", "pixelfed", "dataDir"], "readOnly": false, "type": "string"}, "services.pixelfed.database.automaticMigrations": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic migrations for database schema and data."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pixelfed", "database", "automaticMigrations"], "readOnly": false, "type": "boolean"}, "services.pixelfed.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable a local database using UNIX socket authentication."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pixelfed", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.pixelfed.database.name": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "\"pixelfed\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "pixelfed", "database", "name"], "readOnly": false, "type": "string"}, "services.pixelfed.database.type": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "\"mysql\""}, "description": {"_type": "mdDoc", "text": "Database engine to use.\nNote that PGSQL is not well supported: https://github.com/pixelfed/pixelfed/issues/2727\n"}, "example": {"_type": "literalExpression", "text": "\"pgsql\""}, "loc": ["services", "pixelfed", "database", "type"], "readOnly": false, "type": "one of \"mysql\", \"pgsql\""}, "services.pixelfed.domain": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "description": {"_type": "mdDoc", "text": "FQDN for the Pixelfed instance.\n"}, "loc": ["services", "pixelfed", "domain"], "readOnly": false, "type": "string"}, "services.pixelfed.enable": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable a Pixelfed instance."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pixelfed", "enable"], "readOnly": false, "type": "boolean"}, "services.pixelfed.group": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "\"pixelfed\""}, "description": {"_type": "mdDoc", "text": "Group account under which pixelfed runs.\n\n::: {.note}\nIf left as the default value this group will automatically be created\non system activation, otherwise you are responsible for\nensuring the group exists before the pixelfed application starts.\n:::\n"}, "loc": ["services", "pixelfed", "group"], "readOnly": false, "type": "string"}, "services.pixelfed.maxUploadSize": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "\"8M\""}, "description": {"_type": "mdDoc", "text": "Max upload size with units.\n"}, "loc": ["services", "pixelfed", "maxUploadSize"], "readOnly": false, "type": "string"}, "services.pixelfed.nginx": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "With this option, you can customize an nginx virtual host which already has sensible defaults for Dolibarr.\nSet to {} if you do not need any customization to the virtual host.\nIf enabled, then by default, the {option}`serverName` is\n`${domain}`,\nIf this is set to null (the default), no nginx virtualHost will be configured.\n"}, "example": {"_type": "literalExpression", "text": "{\n  serverAliases = [\n    \"pics.${config.networking.domain}\"\n  ];\n  enableACME = true;\n  forceHttps = true;\n}\n"}, "loc": ["services", "pixelfed", "nginx"], "readOnly": false, "type": "null or (submodule)"}, "services.pixelfed.nginx.acmeFallbackHost": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host which to proxy requests to if ACME challenge is not found. Useful\nif you want multiple hosts to be able to verify the same domain name.\n\nWith this option, you could request certificates for the present domain\nwith an ACME client that is running on another host, which you would\nspecify here.\n"}, "loc": ["services", "pixelfed", "nginx", "acmeFallbackHost"], "readOnly": false, "type": "null or string"}, "services.pixelfed.nginx.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the ACME challenge, which is **public**. Don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "pixelfed", "nginx", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.pixelfed.nginx.addSSL": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "pixelfed", "nginx", "addSSL"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.basicAuth": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "pixelfed", "nginx", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.pixelfed.nginx.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "pixelfed", "nginx", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.pixelfed.nginx.default": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Makes this vhost the default.\n"}, "loc": ["services", "pixelfed", "nginx", "default"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.enableACME": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "pixelfed", "nginx", "enableACME"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.extraConfig": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the vhost verbatim.\n"}, "loc": ["services", "pixelfed", "nginx", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.pixelfed.nginx.forceSSL": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "pixelfed", "nginx", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given hostname.\n"}, "example": {"_type": "literalExpression", "text": "\"newserver.example.org\""}, "loc": ["services", "pixelfed", "nginx", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.pixelfed.nginx.http2": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/2 protocol.\nNote that (as of writing) due to nginx's implementation, to disable\nHTTP/2 you have to disable it on all vhosts that use a given\nIP address / port.\nIf there is one server block configured to enable http2, then it is\nenabled for all server blocks on this IP.\nSee https://stackoverflow.com/a/39466948/263061.\n"}, "loc": ["services", "pixelfed", "nginx", "http2"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.http3": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/3 protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that HTTP/3 support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "pixelfed", "nginx", "http3"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.http3_hq": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that special application protocol support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "pixelfed", "nginx", "http3_hq"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.kTLS": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kTLS support.\nImplementing TLS in the kernel (kTLS) improves performance by significantly\nreducing the need for copying operations between user space and the kernel.\nRequired Nginx version 1.21.4 or later.\n"}, "loc": ["services", "pixelfed", "nginx", "kTLS"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.listen": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\nIPv6 addresses must be enclosed in square brackets.\nNote: this option overrides `addSSL`\nand `onlySSL`.\n\nIf you only want to set the addresses manually and not\nthe ports, take a look at `listenAddresses`\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    addr = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    addr = \"192.154.1.1\";\n    port = 80;\n  }\n]"}, "loc": ["services", "pixelfed", "nginx", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.pixelfed.nginx.listen.*.addr": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "description": {"_type": "mdDoc", "text": "IP address."}, "loc": ["services", "pixelfed", "nginx", "listen", "*", "addr"], "readOnly": false, "type": "string"}, "services.pixelfed.nginx.listen.*.extraParameters": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters of this listen directive."}, "example": {"_type": "literalExpression", "text": "[\n  \"backlog=1024\"\n  \"deferred\"\n]"}, "loc": ["services", "pixelfed", "nginx", "listen", "*", "extraParameters"], "readOnly": false, "type": "list of string"}, "services.pixelfed.nginx.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Port number."}, "loc": ["services", "pixelfed", "nginx", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.pixelfed.nginx.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SSL."}, "loc": ["services", "pixelfed", "nginx", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n\nNote: This option overrides `enableIPv6`\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"[::1]\"\n]"}, "loc": ["services", "pixelfed", "nginx", "listenAddresses"], "readOnly": false, "type": "list of string"}, "services.pixelfed.nginx.locations": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n};\n"}, "loc": ["services", "pixelfed", "nginx", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.pixelfed.nginx.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "pixelfed", "nginx", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.pixelfed.nginx.locations.<name>.basicAuth": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "pixelfed", "nginx", "locations", "<name>", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.pixelfed.nginx.locations.<name>.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "pixelfed", "nginx", "locations", "<name>", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.pixelfed.nginx.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "pixelfed", "nginx", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.pixelfed.nginx.locations.<name>.fastcgiParams": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "FastCGI parameters to override.  Unlike in the Nginx\nconfiguration file, overriding only some default parameters\nwon't unset the default values for other parameters.\n"}, "loc": ["services", "pixelfed", "nginx", "locations", "<name>", "fastcgiParams"], "readOnly": false, "type": "attribute set of (string or path)"}, "services.pixelfed.nginx.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds index directive.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "pixelfed", "nginx", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.pixelfed.nginx.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "pixelfed", "nginx", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.pixelfed.nginx.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds proxy_pass directive and sets recommended proxy headers if\nrecommendedProxySettings is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "pixelfed", "nginx", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.pixelfed.nginx.locations.<name>.proxyWebsockets": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to support proxying websocket connections with HTTP/1.1.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pixelfed", "nginx", "locations", "<name>", "proxyWebsockets"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.locations.<name>.recommendedProxySettings": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "config.services.nginx.recommendedProxySettings"}, "description": {"_type": "mdDoc", "text": "Enable recommended proxy settings.\n"}, "loc": ["services", "pixelfed", "nginx", "locations", "<name>", "recommendedProxySettings"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.locations.<name>.return": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds a return directive, for e.g. redirections.\n"}, "example": {"_type": "literalExpression", "text": "\"301 http://example.com$request_uri\""}, "loc": ["services", "pixelfed", "nginx", "locations", "<name>", "return"], "readOnly": false, "type": "null or string"}, "services.pixelfed.nginx.locations.<name>.root": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Root directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/root/directory\""}, "loc": ["services", "pixelfed", "nginx", "locations", "<name>", "root"], "readOnly": false, "type": "null or path"}, "services.pixelfed.nginx.locations.<name>.tryFiles": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds try_files directive.\n"}, "example": {"_type": "literalExpression", "text": "\"$uri =404\""}, "loc": ["services", "pixelfed", "nginx", "locations", "<name>", "tryFiles"], "readOnly": false, "type": "null or string"}, "services.pixelfed.nginx.onlySSL": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "pixelfed", "nginx", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.quic": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the QUIC transport protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.\nNote that QUIC support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "pixelfed", "nginx", "quic"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.rejectSSL": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to listen for and reject all HTTPS connections to this vhost. Useful in\n[default](#opt-services.nginx.virtualHosts._name_.default)\nserver blocks to avoid serving the certificate for another vhost. Uses the\n`ssl_reject_handshake` directive available in nginx versions\n1.19.4 and above.\n"}, "loc": ["services", "pixelfed", "nginx", "rejectSSL"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.reuseport": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create an individual listening socket .\nIt is required to specify only once on one of the hosts.\n"}, "loc": ["services", "pixelfed", "nginx", "reuseport"], "readOnly": false, "type": "boolean"}, "services.pixelfed.nginx.root": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of the web root directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "pixelfed", "nginx", "root"], "readOnly": false, "type": "null or path"}, "services.pixelfed.nginx.serverAliases": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"example.org\"\n]"}, "loc": ["services", "pixelfed", "nginx", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.pixelfed.nginx.serverName": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of this virtual host. Defaults to attribute name in virtualHosts.\n"}, "example": {"_type": "literalExpression", "text": "\"example.org\""}, "loc": ["services", "pixelfed", "nginx", "serverName"], "readOnly": false, "type": "null or string"}, "services.pixelfed.nginx.sslCertificate": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "pixelfed", "nginx", "sslCertificate"], "readOnly": false, "type": "path"}, "services.pixelfed.nginx.sslCertificateKey": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "pixelfed", "nginx", "sslCertificateKey"], "readOnly": false, "type": "path"}, "services.pixelfed.nginx.sslTrustedCertificate": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to root SSL certificate for stapling and client certificates."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\""}, "loc": ["services", "pixelfed", "nginx", "sslTrustedCertificate"], "readOnly": false, "type": "null or path"}, "services.pixelfed.nginx.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "pixelfed", "nginx", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.pixelfed.package": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "pkgs.pixelfed"}, "description": {"_type": "mdDoc", "text": "The pixelfed package to use."}, "loc": ["services", "pixelfed", "package"], "readOnly": false, "type": "package"}, "services.pixelfed.phpPackage": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "pkgs.php81"}, "description": {"_type": "mdDoc", "text": "The php81 package to use."}, "loc": ["services", "pixelfed", "phpPackage"], "readOnly": false, "type": "package"}, "services.pixelfed.poolConfig": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Options for Pixelfed's PHP-FPM pool.\n"}, "loc": ["services", "pixelfed", "poolConfig"], "readOnly": false, "type": "attribute set of (signed integer or string or boolean)"}, "services.pixelfed.redis.createLocally": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable a local Redis database using UNIX socket authentication."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pixelfed", "redis", "createLocally"], "readOnly": false, "type": "boolean"}, "services.pixelfed.runtimeDir": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "\"/run/pixelfed\""}, "description": {"_type": "mdDoc", "text": "Ruutime directory of the `pixelfed` user which holds\nthe application's caches and temporary files.\n"}, "loc": ["services", "pixelfed", "runtimeDir"], "readOnly": false, "type": "string"}, "services.pixelfed.schedulerInterval": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "\"1d\""}, "description": {"_type": "mdDoc", "text": "How often the Pixelfed cron task should run"}, "loc": ["services", "pixelfed", "schedulerInterval"], "readOnly": false, "type": "string"}, "services.pixelfed.secretFile": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "description": {"_type": "mdDoc", "text": "A secret file to be sourced for the .env settings.\nPlace `APP_KEY` and other settings that should not end up in the Nix store here.\n"}, "loc": ["services", "pixelfed", "secretFile"], "readOnly": false, "type": "path"}, "services.pixelfed.settings": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "description": {"_type": "mdDoc", "text": ".env settings for Pixelfed.\nSecrets should use `secretFile` option instead.\n"}, "loc": ["services", "pixelfed", "settings"], "readOnly": false, "type": "attribute set of (boolean or signed integer or string)"}, "services.pixelfed.user": {"declarations": ["nixos/modules/services/web-apps/pixelfed.nix"], "default": {"_type": "literalExpression", "text": "\"pixelfed\""}, "description": {"_type": "mdDoc", "text": "User account under which pixelfed runs.\n\n::: {.note}\nIf left as the default value this user will automatically be created\non system activation, otherwise you are responsible for\nensuring the user exists before the pixelfed application starts.\n:::\n"}, "loc": ["services", "pixelfed", "user"], "readOnly": false, "type": "string"}, "services.pixiecore.apiServer": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "description": {"_type": "mdDoc", "text": "host:port to connect to the API. Ignored unless mode is set to 'api'"}, "example": {"_type": "literalExpression", "text": "\"localhost:8080\""}, "loc": ["services", "pixiecore", "apiServer"], "readOnly": false, "type": "string"}, "services.pixiecore.cmdLine": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Kernel commandline arguments. Ignored unless mode is set to 'boot'"}, "loc": ["services", "pixiecore", "cmdLine"], "readOnly": false, "type": "string"}, "services.pixiecore.debug": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Log more things that aren't directly related to booting a recognized client"}, "loc": ["services", "pixiecore", "debug"], "readOnly": false, "type": "boolean"}, "services.pixiecore.dhcpNoBind": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Handle DHCP traffic without binding to the DHCP server port"}, "loc": ["services", "pixiecore", "dhcpNoBind"], "readOnly": false, "type": "boolean"}, "services.pixiecore.enable": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Pixiecore."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pixiecore", "enable"], "readOnly": false, "type": "boolean"}, "services.pixiecore.extraArguments": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command line arguments to pass to Pixiecore"}, "loc": ["services", "pixiecore", "extraArguments"], "readOnly": false, "type": "list of string"}, "services.pixiecore.initrd": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Initrd path. Ignored unless mode is set to 'boot'"}, "loc": ["services", "pixiecore", "initrd"], "readOnly": false, "type": "string"}, "services.pixiecore.kernel": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Kernel path. Ignored unless mode is set to 'boot'"}, "loc": ["services", "pixiecore", "kernel"], "readOnly": false, "type": "string"}, "services.pixiecore.listen": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IPv4 address to listen on"}, "loc": ["services", "pixiecore", "listen"], "readOnly": false, "type": "string"}, "services.pixiecore.mode": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "default": {"_type": "literalExpression", "text": "\"boot\""}, "description": {"_type": "mdDoc", "text": "Which mode to use"}, "loc": ["services", "pixiecore", "mode"], "readOnly": false, "type": "one of \"api\", \"boot\", \"quick\""}, "services.pixiecore.openFirewall": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports (67, 69 UDP and 4011, 'port', 'statusPort' TCP) in the firewall for Pixiecore.\n"}, "loc": ["services", "pixiecore", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.pixiecore.port": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Port to listen on for HTTP"}, "loc": ["services", "pixiecore", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.pixiecore.quick": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "default": {"_type": "literalExpression", "text": "\"xyz\""}, "description": {"_type": "mdDoc", "text": "Which quick option to use"}, "loc": ["services", "pixiecore", "quick"], "readOnly": false, "type": "one of \"arch\", \"centos\", \"coreos\", \"debian\", \"fedora\", \"ubuntu\", \"xyz\""}, "services.pixiecore.statusPort": {"declarations": ["nixos/modules/services/networking/pixiecore.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "HTTP port for status information (can be the same as --port)"}, "loc": ["services", "pixiecore", "statusPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.plantuml-server.allowPlantumlInclude": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables !include processing which can read files from the server into diagrams. Files are read relative to the current working directory."}, "loc": ["services", "plantuml-server", "allowPlantumlInclude"], "readOnly": false, "type": "boolean"}, "services.plantuml-server.enable": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PlantUML server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "plantuml-server", "enable"], "readOnly": false, "type": "boolean"}, "services.plantuml-server.graphvizPackage": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.graphviz"}, "description": {"_type": "mdDoc", "text": "Package containing the dot executable."}, "loc": ["services", "plantuml-server", "graphvizPackage"], "readOnly": false, "type": "package"}, "services.plantuml-server.group": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "\"plantuml\""}, "description": {"_type": "mdDoc", "text": "Group which runs PlantUML server."}, "loc": ["services", "plantuml-server", "group"], "readOnly": false, "type": "string"}, "services.plantuml-server.home": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/plantuml\""}, "description": {"_type": "mdDoc", "text": "Home directory of the PlantUML server instance."}, "loc": ["services", "plantuml-server", "home"], "readOnly": false, "type": "string"}, "services.plantuml-server.httpAuthorization": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "When calling the proxy endpoint, the value of HTTP_AUTHORIZATION will be used to set the HTTP Authorization header."}, "loc": ["services", "plantuml-server", "httpAuthorization"], "readOnly": false, "type": "null or string"}, "services.plantuml-server.listenHost": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Host to listen on."}, "loc": ["services", "plantuml-server", "listenHost"], "readOnly": false, "type": "string"}, "services.plantuml-server.listenPort": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Port to listen on."}, "loc": ["services", "plantuml-server", "listenPort"], "readOnly": false, "type": "signed integer"}, "services.plantuml-server.package": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.plantuml-server"}, "description": {"_type": "mdDoc", "text": "PlantUML server package to use"}, "loc": ["services", "plantuml-server", "package"], "readOnly": false, "type": "package"}, "services.plantuml-server.packages.jdk": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.jdk"}, "description": {"_type": "mdDoc", "text": "JDK package to use for the server"}, "loc": ["services", "plantuml-server", "packages", "jdk"], "readOnly": false, "type": "package"}, "services.plantuml-server.packages.jetty": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.jetty"}, "description": {"_type": "mdDoc", "text": "Jetty package to use for the server"}, "loc": ["services", "plantuml-server", "packages", "jetty"], "readOnly": false, "type": "package"}, "services.plantuml-server.plantumlLimitSize": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "4096"}, "description": {"_type": "mdDoc", "text": "Limits image width and height."}, "loc": ["services", "plantuml-server", "plantumlLimitSize"], "readOnly": false, "type": "signed integer"}, "services.plantuml-server.plantumlStats": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set it to on to enable statistics report (https://plantuml.com/statistics-report)."}, "loc": ["services", "plantuml-server", "plantumlStats"], "readOnly": false, "type": "boolean"}, "services.plantuml-server.user": {"declarations": ["nixos/modules/services/web-apps/plantuml-server.nix"], "default": {"_type": "literalExpression", "text": "\"plantuml\""}, "description": {"_type": "mdDoc", "text": "User which runs PlantUML server."}, "loc": ["services", "plantuml-server", "user"], "readOnly": false, "type": "string"}, "services.plausible.adminUser.activate": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable activating the freshly created admin-user."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "plausible", "adminUser", "activate"], "readOnly": false, "type": "boolean"}, "services.plausible.adminUser.email": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "description": {"_type": "mdDoc", "text": "Email-address of the admin-user.\n"}, "example": {"_type": "literalExpression", "text": "\"admin@localhost\""}, "loc": ["services", "plausible", "adminUser", "email"], "readOnly": false, "type": "string"}, "services.plausible.adminUser.name": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "\"admin\""}, "description": {"_type": "mdDoc", "text": "Name of the admin user that plausible will created on initial startup.\n"}, "loc": ["services", "plausible", "adminUser", "name"], "readOnly": false, "type": "string"}, "services.plausible.adminUser.passwordFile": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "description": {"_type": "mdDoc", "text": "Path to the file which contains the password of the admin user.\n"}, "loc": ["services", "plausible", "adminUser", "passwordFile"], "readOnly": false, "type": "string or path"}, "services.plausible.database.clickhouse.setup": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable creating a clickhouse instance."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "plausible", "database", "clickhouse", "setup"], "readOnly": false, "type": "boolean"}, "services.plausible.database.clickhouse.url": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:8123/default\""}, "description": {"_type": "mdDoc", "text": "The URL to be used to connect to `clickhouse`.\n"}, "loc": ["services", "plausible", "database", "clickhouse", "url"], "readOnly": false, "type": "string"}, "services.plausible.database.postgres.dbname": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "\"plausible\""}, "description": {"_type": "mdDoc", "text": "Name of the database to use.\n"}, "loc": ["services", "plausible", "database", "postgres", "dbname"], "readOnly": false, "type": "string"}, "services.plausible.database.postgres.setup": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable creating a postgresql instance."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "plausible", "database", "postgres", "setup"], "readOnly": false, "type": "boolean"}, "services.plausible.database.postgres.socket": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "\"/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "Path to the UNIX domain-socket to communicate with `postgres`.\n"}, "loc": ["services", "plausible", "database", "postgres", "socket"], "readOnly": false, "type": "string"}, "services.plausible.enable": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable plausible."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "plausible", "enable"], "readOnly": false, "type": "boolean"}, "services.plausible.mail.email": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "\"hello@plausible.local\""}, "description": {"_type": "mdDoc", "text": "The email id to use for as *from* address of all communications\nfrom Plausible.\n"}, "loc": ["services", "plausible", "mail", "email"], "readOnly": false, "type": "string"}, "services.plausible.mail.smtp.enableSSL": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SSL when connecting to the SMTP server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "plausible", "mail", "smtp", "enableSSL"], "readOnly": false, "type": "boolean"}, "services.plausible.mail.smtp.hostAddr": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The host address of your smtp server.\n"}, "loc": ["services", "plausible", "mail", "smtp", "hostAddr"], "readOnly": false, "type": "string"}, "services.plausible.mail.smtp.hostPort": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "25"}, "description": {"_type": "mdDoc", "text": "The port of your smtp server.\n"}, "loc": ["services", "plausible", "mail", "smtp", "hostPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.plausible.mail.smtp.passwordFile": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the file with the password in case SMTP auth is enabled.\n"}, "loc": ["services", "plausible", "mail", "smtp", "passwordFile"], "readOnly": false, "type": "null or string or path"}, "services.plausible.mail.smtp.retries": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Number of retries to make until mailer gives up.\n"}, "loc": ["services", "plausible", "mail", "smtp", "retries"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.plausible.mail.smtp.user": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The username/email in case SMTP auth is enabled.\n"}, "loc": ["services", "plausible", "mail", "smtp", "user"], "readOnly": false, "type": "null or string"}, "services.plausible.package": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "pkgs.plausible"}, "description": {"_type": "mdDoc", "text": "The plausible package to use."}, "loc": ["services", "plausible", "package"], "readOnly": false, "type": "package"}, "services.plausible.releaseCookiePath": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "description": {"_type": "mdDoc", "text": "The path to the file with release cookie. (used for remote connection to the running node).\n"}, "loc": ["services", "plausible", "releaseCookiePath"], "readOnly": false, "type": "string or path"}, "services.plausible.server.baseUrl": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "description": {"_type": "mdDoc", "text": "Public URL where plausible is available.\n\nNote that `/path` components are currently ignored:\n[\n  https://github.com/plausible/analytics/issues/1182\n](https://github.com/plausible/analytics/issues/1182).\n"}, "loc": ["services", "plausible", "server", "baseUrl"], "readOnly": false, "type": "string"}, "services.plausible.server.disableRegistration": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to prohibit creating an account in plausible's UI.\n"}, "loc": ["services", "plausible", "server", "disableRegistration"], "readOnly": false, "type": "boolean"}, "services.plausible.server.port": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "default": {"_type": "literalExpression", "text": "8000"}, "description": {"_type": "mdDoc", "text": "Port where the service should be available.\n"}, "loc": ["services", "plausible", "server", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.plausible.server.secretKeybaseFile": {"declarations": ["nixos/modules/services/web-apps/plausible.nix"], "description": {"_type": "mdDoc", "text": "Path to the secret used by the `phoenix`-framework. Instructions\nhow to generate one are documented in the\n[\nframework docs](https://hexdocs.pm/phoenix/Mix.Tasks.Phx.Gen.Secret.html#content).\n"}, "loc": ["services", "plausible", "server", "secretKeybaseFile"], "readOnly": false, "type": "path or string"}, "services.pleroma.configs": {"declarations": ["nixos/modules/services/networking/pleroma.nix"], "description": {"_type": "mdDoc", "text": "Pleroma public configuration.\n\nThis list gets appended from left to\nright into /etc/pleroma/config.exs. Elixir evaluates its\nconfiguration imperatively, meaning you can override a\nsetting by appending a new str to this NixOS option list.\n\n*DO NOT STORE ANY PLEROMA SECRET\nHERE*, use\n[services.pleroma.secretConfigFile](#opt-services.pleroma.secretConfigFile)\ninstead.\n\nThis setting is going to be stored in a file part of\nthe Nix store. The Nix store being world-readable, it's not\nthe right place to store any secret\n\nHave a look to Pleroma section in the NixOS manual for more\ninformation.\n"}, "loc": ["services", "pleroma", "configs"], "readOnly": false, "type": "list of string"}, "services.pleroma.enable": {"declarations": ["nixos/modules/services/networking/pleroma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable pleroma."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pleroma", "enable"], "readOnly": false, "type": "boolean"}, "services.pleroma.group": {"declarations": ["nixos/modules/services/networking/pleroma.nix"], "default": {"_type": "literalExpression", "text": "\"pleroma\""}, "description": {"_type": "mdDoc", "text": "Group account under which pleroma runs."}, "loc": ["services", "pleroma", "group"], "readOnly": false, "type": "string"}, "services.pleroma.package": {"declarations": ["nixos/modules/services/networking/pleroma.nix"], "default": {"_type": "literalExpression", "text": "pkgs.pleroma"}, "description": {"_type": "mdDoc", "text": "Pleroma package to use."}, "loc": ["services", "pleroma", "package"], "readOnly": false, "type": "package"}, "services.pleroma.secretConfigFile": {"declarations": ["nixos/modules/services/networking/pleroma.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/pleroma/secrets.exs\""}, "description": {"_type": "mdDoc", "text": "Path to the file containing your secret pleroma configuration.\n\n*DO NOT POINT THIS OPTION TO THE NIX\nSTORE*, the store being world-readable, it'll\ncompromise all your secrets.\n"}, "loc": ["services", "pleroma", "secretConfigFile"], "readOnly": false, "type": "string"}, "services.pleroma.stateDir": {"declarations": ["nixos/modules/services/networking/pleroma.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/pleroma\""}, "description": {"_type": "mdDoc", "text": "Directory where the pleroma service will save the uploads and static files."}, "loc": ["services", "pleroma", "stateDir"], "readOnly": true, "type": "string"}, "services.pleroma.user": {"declarations": ["nixos/modules/services/networking/pleroma.nix"], "default": {"_type": "literalExpression", "text": "\"pleroma\""}, "description": {"_type": "mdDoc", "text": "User account under which pleroma runs."}, "loc": ["services", "pleroma", "user"], "readOnly": false, "type": "string"}, "services.plex.dataDir": {"declarations": ["nixos/modules/services/misc/plex.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/plex\""}, "description": {"_type": "mdDoc", "text": "The directory where Plex stores its data files.\n"}, "loc": ["services", "plex", "dataDir"], "readOnly": false, "type": "string"}, "services.plex.enable": {"declarations": ["nixos/modules/services/misc/plex.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Plex Media Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "plex", "enable"], "readOnly": false, "type": "boolean"}, "services.plex.extraPlugins": {"declarations": ["nixos/modules/services/misc/plex.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of paths to extra plugin bundles to install in Plex's plugin\ndirectory. Every time the systemd unit for Plex starts up, all of the\nsymlinks in Plex's plugin directory will be cleared and this module\nwill symlink all of the paths specified here to that directory.\n"}, "example": {"_type": "literalExpression", "text": "[\n  (builtins.path {\n    name = \"Audnexus.bundle\";\n    path = pkgs.fetchFromGitHub {\n      owner = \"djdembeck\";\n      repo = \"Audnexus.bundle\";\n      rev = \"v0.2.8\";\n      sha256 = \"sha256-IWOSz3vYL7zhdHan468xNc6C/eQ2C2BukQlaJNLXh7E=\";\n    };\n  })\n]\n"}, "loc": ["services", "plex", "extraPlugins"], "readOnly": false, "type": "list of path"}, "services.plex.extraScanners": {"declarations": ["nixos/modules/services/misc/plex.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of paths to extra scanners to install in Plex's scanners\ndirectory.\n\nEvery time the systemd unit for Plex starts up, all of the symlinks\nin Plex's scanners directory will be cleared and this module will\nsymlink all of the paths specified here to that directory.\n"}, "example": {"_type": "literalExpression", "text": "[\n  (fetchFromGitHub {\n    owner = \"ZeroQI\";\n    repo = \"Absolute-Series-Scanner\";\n    rev = \"773a39f502a1204b0b0255903cee4ed02c46fde0\";\n    sha256 = \"4l+vpiDdC8L/EeJowUgYyB3JPNTZ1sauN8liFAcK+PY=\";\n  })\n]\n"}, "loc": ["services", "plex", "extraScanners"], "readOnly": false, "type": "list of path"}, "services.plex.group": {"declarations": ["nixos/modules/services/misc/plex.nix"], "default": {"_type": "literalExpression", "text": "\"plex\""}, "description": {"_type": "mdDoc", "text": "Group under which Plex runs.\n"}, "loc": ["services", "plex", "group"], "readOnly": false, "type": "string"}, "services.plex.openFirewall": {"declarations": ["nixos/modules/services/misc/plex.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the media server.\n"}, "loc": ["services", "plex", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.plex.package": {"declarations": ["nixos/modules/services/misc/plex.nix"], "default": {"_type": "literalExpression", "text": "pkgs.plex"}, "description": {"_type": "mdDoc", "text": "The Plex package to use. Plex subscribers may wish to use their own\npackage here, pointing to subscriber-only server versions.\n"}, "loc": ["services", "plex", "package"], "readOnly": false, "type": "package"}, "services.plex.user": {"declarations": ["nixos/modules/services/misc/plex.nix"], "default": {"_type": "literalExpression", "text": "\"plex\""}, "description": {"_type": "mdDoc", "text": "User account under which Plex runs.\n"}, "loc": ["services", "plex", "user"], "readOnly": false, "type": "string"}, "services.plikd.enable": {"declarations": ["nixos/modules/services/misc/plikd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the plikd server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "plikd", "enable"], "readOnly": false, "type": "boolean"}, "services.plikd.openFirewall": {"declarations": ["nixos/modules/services/misc/plikd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the plikd."}, "loc": ["services", "plikd", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.plikd.settings": {"declarations": ["nixos/modules/services/misc/plikd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for plikd, see <https://github.com/root-gg/plik/blob/master/server/plikd.cfg>\nfor supported values.\n"}, "loc": ["services", "plikd", "settings"], "readOnly": false, "type": "TOML value"}, "services.podgrab.enable": {"declarations": ["nixos/modules/services/misc/podgrab.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Podgrab, a self-hosted podcast manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "podgrab", "enable"], "readOnly": false, "type": "boolean"}, "services.podgrab.passwordFile": {"declarations": ["nixos/modules/services/misc/podgrab.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to a file containing the PASSWORD environment variable\ndefinition for Podgrab's authentication.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/secrets/password.env\""}, "loc": ["services", "podgrab", "passwordFile"], "readOnly": false, "type": "null or string"}, "services.podgrab.port": {"declarations": ["nixos/modules/services/misc/podgrab.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "The port on which Podgrab will listen for incoming HTTP traffic."}, "example": {"_type": "literalExpression", "text": "4242"}, "loc": ["services", "podgrab", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.polaris.enable": {"declarations": ["nixos/modules/services/misc/polaris.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Polaris Music Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "polaris", "enable"], "readOnly": false, "type": "boolean"}, "services.polaris.extraGroups": {"declarations": ["nixos/modules/services/misc/polaris.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Polaris' auxiliary groups."}, "example": {"_type": "literalExpression", "text": "[\"media\" \"music\"]"}, "loc": ["services", "polaris", "extraGroups"], "readOnly": false, "type": "list of string"}, "services.polaris.group": {"declarations": ["nixos/modules/services/misc/polaris.nix"], "default": {"_type": "literalExpression", "text": "\"polaris\""}, "description": {"_type": "mdDoc", "text": "Group under which Polaris is run."}, "loc": ["services", "polaris", "group"], "readOnly": false, "type": "string"}, "services.polaris.openFirewall": {"declarations": ["nixos/modules/services/misc/polaris.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open the configured port in the firewall.\n"}, "loc": ["services", "polaris", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.polaris.package": {"declarations": ["nixos/modules/services/misc/polaris.nix"], "default": {"_type": "literalExpression", "text": "pkgs.polaris"}, "description": {"_type": "mdDoc", "text": "The polaris package to use."}, "loc": ["services", "polaris", "package"], "readOnly": false, "type": "package"}, "services.polaris.port": {"declarations": ["nixos/modules/services/misc/polaris.nix"], "default": {"_type": "literalExpression", "text": "5050"}, "description": {"_type": "mdDoc", "text": "The port which the Polaris REST api and web UI should listen to.\nNote: polaris is hardcoded to listen to the hostname \"0.0.0.0\".\n"}, "loc": ["services", "polaris", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.polaris.settings": {"declarations": ["nixos/modules/services/misc/polaris.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Contents for the TOML Polaris config, applied each start.\nAlthough poorly documented, an example may be found here:\n[test-config.toml](https://github.com/agersant/polaris/blob/374d0ca56fc0a466d797a4b252e2078607476797/test-data/config.toml)\n"}, "example": {"_type": "literalExpression", "text": "{\n  settings.reindex_every_n_seconds = 7*24*60*60; # weekly, default is 1800\n  settings.album_art_pattern =\n    \"(cover|front|folder)\\.(jpeg|jpg|png|bmp|gif)\";\n  mount_dirs = [\n    {\n      name = \"NAS\";\n      source = \"/mnt/nas/music\";\n    }\n    {\n      name = \"Local\";\n      source = \"/home/my_user/Music\";\n    }\n  ];\n}\n"}, "loc": ["services", "polaris", "settings"], "readOnly": false, "type": "TOML value"}, "services.polaris.user": {"declarations": ["nixos/modules/services/misc/polaris.nix"], "default": {"_type": "literalExpression", "text": "\"polaris\""}, "description": {"_type": "mdDoc", "text": "User account under which Polaris runs."}, "loc": ["services", "polaris", "user"], "readOnly": false, "type": "string"}, "services.polipo.allowedClients": {"declarations": ["nixos/modules/services/networking/polipo.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"::1\"\n]"}, "description": {"_type": "mdDoc", "text": "List of IP addresses or network addresses that may connect to Polipo.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"::1\"\n  \"134.157.168.0/24\"\n  \"2001:660:116::/48\"\n]"}, "loc": ["services", "polipo", "allowedClients"], "readOnly": false, "type": "list of string"}, "services.polipo.enable": {"declarations": ["nixos/modules/services/networking/polipo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable polipo caching web proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "polipo", "enable"], "readOnly": false, "type": "boolean"}, "services.polipo.extraConfig": {"declarations": ["nixos/modules/services/networking/polipo.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Polio configuration. Contents will be added\nverbatim to the configuration file.\n"}, "loc": ["services", "polipo", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.polipo.parentProxy": {"declarations": ["nixos/modules/services/networking/polipo.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Hostname and port number of an HTTP parent proxy;\nit should have the form \u2018host:port\u2019.\n"}, "example": {"_type": "literalExpression", "text": "\"localhost:8124\""}, "loc": ["services", "polipo", "parentProxy"], "readOnly": false, "type": "string"}, "services.polipo.proxyAddress": {"declarations": ["nixos/modules/services/networking/polipo.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "IP address on which Polipo will listen."}, "loc": ["services", "polipo", "proxyAddress"], "readOnly": false, "type": "string"}, "services.polipo.proxyPort": {"declarations": ["nixos/modules/services/networking/polipo.nix"], "default": {"_type": "literalExpression", "text": "8123"}, "description": {"_type": "mdDoc", "text": "TCP port on which Polipo will listen."}, "loc": ["services", "polipo", "proxyPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.polipo.socksParentProxy": {"declarations": ["nixos/modules/services/networking/polipo.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Hostname and port number of an SOCKS parent proxy;\nit should have the form \u2018host:port\u2019.\n"}, "example": {"_type": "literalExpression", "text": "\"localhost:9050\""}, "loc": ["services", "polipo", "socksParentProxy"], "readOnly": false, "type": "string"}, "services.pomerium.configFile": {"declarations": ["nixos/modules/services/web-servers/pomerium.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to Pomerium config YAML. If set, overrides services.pomerium.settings."}, "loc": ["services", "pomerium", "configFile"], "readOnly": false, "type": "null or path"}, "services.pomerium.enable": {"declarations": ["nixos/modules/services/web-servers/pomerium.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Pomerium authenticating reverse proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pomerium", "enable"], "readOnly": false, "type": "boolean"}, "services.pomerium.secretsFile": {"declarations": ["nixos/modules/services/web-servers/pomerium.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to file containing secrets for Pomerium, in systemd\nEnvironmentFile format. See the systemd.exec(5) man page.\n"}, "loc": ["services", "pomerium", "secretsFile"], "readOnly": false, "type": "null or path"}, "services.pomerium.settings": {"declarations": ["nixos/modules/services/web-servers/pomerium.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The contents of Pomerium's config.yaml, in Nix expressions.\n\nSpecifying configFile will override this in its entirety.\n\nSee [the Pomerium\nconfiguration reference](https://pomerium.io/reference/) for more information about what to put\nhere.\n"}, "loc": ["services", "pomerium", "settings"], "readOnly": false, "type": "YAML value"}, "services.pomerium.useACMEHost": {"declarations": ["nixos/modules/services/web-servers/pomerium.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, use a NixOS-generated ACME certificate with the specified name.\n\nNote that this will require you to use a non-HTTP-based challenge, or\ndisable Pomerium's in-built HTTP redirect server by setting\nhttp_redirect_addr to null and use a different HTTP server for serving\nthe challenge response.\n\nIf you're using an HTTP-based challenge, you should use the\nPomerium-native autocert option instead.\n"}, "loc": ["services", "pomerium", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.portunus.dex.enable": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Dex ldap connector.\n\nTo activate dex, first a search user must be created in the Portunus web ui\nand then the password must to be set as the `DEX_SEARCH_USER_PASSWORD` environment variable\nin the [](#opt-services.dex.environmentFile) setting.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "portunus", "dex", "enable"], "readOnly": false, "type": "boolean"}, "services.portunus.dex.oidcClients": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of OIDC clients.\n\nThe OIDC secret must be set as the `DEX_CLIENT_${id}` environment variable\nin the [](#opt-services.dex.environmentFile) setting.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    callbackURL = \"https://example.com/client/oidc/callback\";\n    id = \"service\";\n  }\n]"}, "loc": ["services", "portunus", "dex", "oidcClients"], "readOnly": false, "type": "list of (submodule)"}, "services.portunus.dex.oidcClients.*.callbackURL": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "description": {"_type": "mdDoc", "text": "URL where the OIDC client should redirect"}, "loc": ["services", "portunus", "dex", "oidcClients", "*", "callbackURL"], "readOnly": false, "type": "string"}, "services.portunus.dex.oidcClients.*.id": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "description": {"_type": "mdDoc", "text": "ID of the OIDC client"}, "loc": ["services", "portunus", "dex", "oidcClients", "*", "id"], "readOnly": false, "type": "string"}, "services.portunus.dex.port": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "5556"}, "description": {"_type": "mdDoc", "text": "Port where dex should listen on."}, "loc": ["services", "portunus", "dex", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.portunus.domain": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "description": {"_type": "mdDoc", "text": "Subdomain which gets reverse proxied to Portunus webserver."}, "example": {"_type": "literalExpression", "text": "\"sso.example.com\""}, "loc": ["services", "portunus", "domain"], "readOnly": false, "type": "string"}, "services.portunus.enable": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Portunus, a self-contained user/group management and authentication service for LDAP."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "portunus", "enable"], "readOnly": false, "type": "boolean"}, "services.portunus.group": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "\"portunus\""}, "description": {"_type": "mdDoc", "text": "Group account under which Portunus runs its webserver."}, "loc": ["services", "portunus", "group"], "readOnly": false, "type": "string"}, "services.portunus.ldap.group": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "\"openldap\""}, "description": {"_type": "mdDoc", "text": "Group account under which Portunus runs its LDAP server."}, "loc": ["services", "portunus", "ldap", "group"], "readOnly": false, "type": "string"}, "services.portunus.ldap.package": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "pkgs.openldap.override { libxcrypt = pkgs.libxcrypt-legacy; }"}, "description": {"_type": "mdDoc", "text": "The OpenLDAP package to use."}, "loc": ["services", "portunus", "ldap", "package"], "readOnly": false, "type": "package"}, "services.portunus.ldap.searchUserName": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The login name of the search user.\nThis user account must be configured in Portunus either manually or via seeding.\n"}, "example": {"_type": "literalExpression", "text": "\"admin\""}, "loc": ["services", "portunus", "ldap", "searchUserName"], "readOnly": false, "type": "string"}, "services.portunus.ldap.suffix": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "description": {"_type": "mdDoc", "text": "The DN of the topmost entry in your LDAP directory.\nPlease refer to the Portunus documentation for more information on how this impacts the structure of the LDAP directory.\n"}, "example": {"_type": "literalExpression", "text": "\"dc=example,dc=org\""}, "loc": ["services", "portunus", "ldap", "suffix"], "readOnly": false, "type": "string"}, "services.portunus.ldap.tls": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable LDAPS protocol.\nThis also adds two entries to the `/etc/hosts` file to point [](#opt-services.portunus.domain) to localhost,\nso that CLIs and programs can use ldaps protocol and verify the certificate without opening the firewall port for the protocol.\n\nThis requires a TLS certificate for [](#opt-services.portunus.domain) to be configured via [](#opt-security.acme.certs).\n"}, "loc": ["services", "portunus", "ldap", "tls"], "readOnly": false, "type": "boolean"}, "services.portunus.ldap.user": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "\"openldap\""}, "description": {"_type": "mdDoc", "text": "User account under which Portunus runs its LDAP server."}, "loc": ["services", "portunus", "ldap", "user"], "readOnly": false, "type": "string"}, "services.portunus.package": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "pkgs.portunus"}, "description": {"_type": "mdDoc", "text": "The Portunus package to use."}, "loc": ["services", "portunus", "package"], "readOnly": false, "type": "package"}, "services.portunus.port": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Port where the Portunus webserver should listen on.\n\nThis must be put behind a TLS-capable reverse proxy because Portunus only listens on localhost.\n"}, "loc": ["services", "portunus", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.portunus.seedPath": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a portunus seed file in json format.\nSee <https://github.com/majewsky/portunus#seeding-users-and-groups-from-static-configuration> for available options.\n"}, "loc": ["services", "portunus", "seedPath"], "readOnly": false, "type": "null or path"}, "services.portunus.stateDir": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/portunus\""}, "description": {"_type": "mdDoc", "text": "Path where Portunus stores its state."}, "loc": ["services", "portunus", "stateDir"], "readOnly": false, "type": "path"}, "services.portunus.user": {"declarations": ["nixos/modules/services/misc/portunus.nix"], "default": {"_type": "literalExpression", "text": "\"portunus\""}, "description": {"_type": "mdDoc", "text": "User account under which Portunus runs its webserver."}, "loc": ["services", "portunus", "user"], "readOnly": false, "type": "string"}, "services.postfix.aliasFiles": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Aliases' tables to be compiled and placed into /var/lib/postfix/conf."}, "loc": ["services", "postfix", "aliasFiles"], "readOnly": false, "type": "attribute set of path"}, "services.postfix.aliasMapType": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"hash\""}, "description": {"_type": "mdDoc", "text": "The format the alias map should have. Use regexp if you want to use regular expressions."}, "example": {"_type": "literalExpression", "text": "\"regexp\""}, "loc": ["services", "postfix", "aliasMapType"], "readOnly": false, "type": "one of \"hash\", \"regexp\", \"pcre\""}, "services.postfix.canonical": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Entries for the {manpage}`canonical(5)` table.\n"}, "loc": ["services", "postfix", "canonical"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.postfix.config": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "description": {"_type": "mdDoc", "text": "The main.cf configuration file as key value set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  mail_owner = \"postfix\";\n  smtp_tls_security_level = \"may\";\n}"}, "loc": ["services", "postfix", "config"], "readOnly": false, "type": "attribute set of (boolean or string or list of string)"}, "services.postfix.destination": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Full (!) list of domains we deliver locally. Leave blank for\nacceptable Postfix default.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"localhost\"\n]"}, "loc": ["services", "postfix", "destination"], "readOnly": false, "type": "null or (list of string)"}, "services.postfix.dnsBlacklistOverrides": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "contents of check_client_access for overriding dnsBlacklists"}, "loc": ["services", "postfix", "dnsBlacklistOverrides"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.postfix.dnsBlacklists": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "dns blacklist servers to use with smtpd_client_restrictions"}, "loc": ["services", "postfix", "dnsBlacklists"], "readOnly": false, "type": "list of string"}, "services.postfix.domain": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Domain to use. Leave blank to use hostname minus first component.\n"}, "loc": ["services", "postfix", "domain"], "readOnly": false, "type": "string"}, "services.postfix.enable": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the Postfix mail server."}, "loc": ["services", "postfix", "enable"], "readOnly": false, "type": "boolean"}, "services.postfix.enableHeaderChecks": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable postfix header checks"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "postfix", "enableHeaderChecks"], "readOnly": false, "type": "boolean"}, "services.postfix.enableSmtp": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable smtp in master.cf."}, "loc": ["services", "postfix", "enableSmtp"], "readOnly": false, "type": "boolean"}, "services.postfix.enableSubmission": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable smtp submission."}, "loc": ["services", "postfix", "enableSubmission"], "readOnly": false, "type": "boolean"}, "services.postfix.enableSubmissions": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable smtp submission via smtps.\n\nAccording to RFC 8314 this should be preferred\nover STARTTLS for submission of messages by end user clients.\n"}, "loc": ["services", "postfix", "enableSubmissions"], "readOnly": false, "type": "boolean"}, "services.postfix.extraAliases": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional entries to put verbatim into aliases file, cf. man-page aliases(8).\n"}, "loc": ["services", "postfix", "extraAliases"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.postfix.extraConfig": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to the main.cf configuration file.\n"}, "loc": ["services", "postfix", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.postfix.extraHeaderChecks": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to /etc/postfix/header_checks file."}, "example": {"_type": "literalExpression", "text": "\"/^X-Spam-Flag:/ REDIRECT spam@example.com\""}, "loc": ["services", "postfix", "extraHeaderChecks"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.postfix.extraMasterConf": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to append to the generated master.cf file."}, "example": {"_type": "literalExpression", "text": "\"submission inet n - n - - smtpd\""}, "loc": ["services", "postfix", "extraMasterConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.postfix.group": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"postfix\""}, "description": {"_type": "mdDoc", "text": "What to call the Postfix group (must be used only for postfix)."}, "loc": ["services", "postfix", "group"], "readOnly": false, "type": "string"}, "services.postfix.headerChecks": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Postfix header checks."}, "example": {"_type": "literalExpression", "text": "[\n  {\n    action = \"REDIRECT spam@example.com\";\n    pattern = \"/^X-Spam-Flag:/\";\n  }\n]"}, "loc": ["services", "postfix", "headerChecks"], "readOnly": false, "type": "list of (submodule)"}, "services.postfix.headerChecks.*.action": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"DUNNO\""}, "description": {"_type": "mdDoc", "text": "The action to be executed when the pattern is matched"}, "example": {"_type": "literalExpression", "text": "\"BCC mail@example.com\""}, "loc": ["services", "postfix", "headerChecks", "*", "action"], "readOnly": false, "type": "string"}, "services.postfix.headerChecks.*.pattern": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"/^.*/\""}, "description": {"_type": "mdDoc", "text": "A regexp pattern matching the header"}, "example": {"_type": "literalExpression", "text": "\"/^X-Mailer:/\""}, "loc": ["services", "postfix", "headerChecks", "*", "pattern"], "readOnly": false, "type": "string"}, "services.postfix.hostname": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Hostname to use. Leave blank to use just the hostname of machine.\nIt should be FQDN.\n"}, "loc": ["services", "postfix", "hostname"], "readOnly": false, "type": "string"}, "services.postfix.localRecipients": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of accepted local users. Specify a bare username, an\n`\"@domain.tld\"` wild-card, or a complete\n`\"user@domain.tld\"` address. If set, these names end\nup in the local recipient map -- see the local(8) man-page -- and\neffectively replace the system user database lookup that's otherwise\nused by default.\n"}, "loc": ["services", "postfix", "localRecipients"], "readOnly": false, "type": "null or (list of string)"}, "services.postfix.lookupMX": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether relay specified is just domain whose MX must be used.\n"}, "loc": ["services", "postfix", "lookupMX"], "readOnly": false, "type": "boolean"}, "services.postfix.mapFiles": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Maps to be compiled and placed into /var/lib/postfix/conf."}, "loc": ["services", "postfix", "mapFiles"], "readOnly": false, "type": "attribute set of path"}, "services.postfix.masterConfig": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "An attribute set of service options, which correspond to the service\ndefinitions usually done within the Postfix\n{file}`master.cf` file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  submission = {\n    args = [\n      \"-o\"\n      \"smtpd_tls_security_level=encrypt\"\n    ];\n    type = \"inet\";\n  };\n}"}, "loc": ["services", "postfix", "masterConfig"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.postfix.masterConfig.<name>.args": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Arguments to pass to the {option}`command`. There is no shell\nprocessing involved and shell syntax is passed verbatim to the\nprocess.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-o\"\n  \"smtp_helo_timeout=5\"\n]"}, "loc": ["services", "postfix", "masterConfig", "<name>", "args"], "readOnly": false, "type": "list of string"}, "services.postfix.masterConfig.<name>.chroot": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "description": {"_type": "mdDoc", "text": "Whether the service is chrooted to have only access to the\n{option}`services.postfix.queueDir` and the closure of\nstore paths specified by the {option}`program` option.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "postfix", "masterConfig", "<name>", "chroot"], "readOnly": false, "type": "boolean"}, "services.postfix.masterConfig.<name>.command": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "A program name specifying a Postfix service/daemon process.\nBy default it's the attribute {option}`name`.\n"}, "example": {"_type": "literalExpression", "text": "\"smtpd\""}, "loc": ["services", "postfix", "masterConfig", "<name>", "command"], "readOnly": false, "type": "string"}, "services.postfix.masterConfig.<name>.maxproc": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "description": {"_type": "mdDoc", "text": "The maximum number of processes to spawn for this service. If the\nvalue is `0` it doesn't have any limit. If\n`null` is given it uses the postfix default of\n`100`.\n"}, "example": {"_type": "literalExpression", "text": "1"}, "loc": ["services", "postfix", "masterConfig", "<name>", "maxproc"], "readOnly": false, "type": "signed integer"}, "services.postfix.masterConfig.<name>.name": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The name of the service to run. Defaults to the attribute set key.\n"}, "example": {"_type": "literalExpression", "text": "\"smtp\""}, "loc": ["services", "postfix", "masterConfig", "<name>", "name"], "readOnly": false, "type": "string"}, "services.postfix.masterConfig.<name>.private": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "description": {"_type": "mdDoc", "text": "Whether the service's sockets and storage directory is restricted to\nbe only available via the mail system. If `null` is\ngiven it uses the postfix default `true`.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "postfix", "masterConfig", "<name>", "private"], "readOnly": false, "type": "boolean"}, "services.postfix.masterConfig.<name>.privileged": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "description": {"_type": "mdDoc", "text": ""}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "postfix", "masterConfig", "<name>", "privileged"], "readOnly": false, "type": "boolean"}, "services.postfix.masterConfig.<name>.type": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"unix\""}, "description": {"_type": "mdDoc", "text": "The type of the service"}, "example": {"_type": "literalExpression", "text": "\"inet\""}, "loc": ["services", "postfix", "masterConfig", "<name>", "type"], "readOnly": false, "type": "one of \"inet\", \"unix\", \"unix-dgram\", \"fifo\", \"pass\""}, "services.postfix.masterConfig.<name>.wakeup": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "description": {"_type": "mdDoc", "text": "Automatically wake up the service after the specified number of\nseconds. If `0` is given, never wake the service\nup.\n"}, "example": {"_type": "literalExpression", "text": "60"}, "loc": ["services", "postfix", "masterConfig", "<name>", "wakeup"], "readOnly": false, "type": "signed integer"}, "services.postfix.masterConfig.<name>.wakeupUnusedComponent": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "description": {"_type": "mdDoc", "text": "If set to `false` the component will only be woken\nup if it is used. This is equivalent to postfix' notion of adding a\nquestion mark behind the wakeup time in\n{file}`master.cf`\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "postfix", "masterConfig", "<name>", "wakeupUnusedComponent"], "readOnly": false, "type": "boolean"}, "services.postfix.networks": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Net masks for trusted - allowed to relay mail to third parties -\nhosts. Leave empty to use mynetworks_style configuration or use\ndefault (localhost-only).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168.0.1/24\"\n]"}, "loc": ["services", "postfix", "networks"], "readOnly": false, "type": "null or (list of string)"}, "services.postfix.networksStyle": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Name of standard way of trusted network specification to use,\nleave blank if you specify it explicitly or if you want to use\ndefault (localhost-only).\n"}, "loc": ["services", "postfix", "networksStyle"], "readOnly": false, "type": "string"}, "services.postfix.origin": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Origin to use in outgoing e-mail. Leave blank to use hostname.\n"}, "loc": ["services", "postfix", "origin"], "readOnly": false, "type": "string"}, "services.postfix.postmasterAlias": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "Who should receive postmaster e-mail. Multiple values can be added by\nseparating values with comma.\n"}, "loc": ["services", "postfix", "postmasterAlias"], "readOnly": false, "type": "string"}, "services.postfix.recipientDelimiter": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Delimiter for address extension: so mail to user+test can be handled by ~user/.forward+test\n"}, "example": {"_type": "literalExpression", "text": "\"+\""}, "loc": ["services", "postfix", "recipientDelimiter"], "readOnly": false, "type": "string"}, "services.postfix.relayDomains": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of domains we agree to relay to. Default is empty.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"localdomain\"\n]"}, "loc": ["services", "postfix", "relayDomains"], "readOnly": false, "type": "null or (list of string)"}, "services.postfix.relayHost": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Mail relay for outbound mail.\n"}, "loc": ["services", "postfix", "relayHost"], "readOnly": false, "type": "string"}, "services.postfix.relayPort": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "25"}, "description": {"_type": "mdDoc", "text": "SMTP port for relay mail relay.\n"}, "loc": ["services", "postfix", "relayPort"], "readOnly": false, "type": "signed integer"}, "services.postfix.rootAlias": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Who should receive root e-mail. Blank for no redirection.\nMultiple values can be added by separating values with comma.\n"}, "loc": ["services", "postfix", "rootAlias"], "readOnly": false, "type": "string"}, "services.postfix.setSendmail": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to set the system sendmail to postfix's."}, "loc": ["services", "postfix", "setSendmail"], "readOnly": false, "type": "boolean"}, "services.postfix.setgidGroup": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"postdrop\""}, "description": {"_type": "mdDoc", "text": "How to call postfix setgid group (for postdrop). Should\nbe uniquely used group.\n"}, "loc": ["services", "postfix", "setgidGroup"], "readOnly": false, "type": "string"}, "services.postfix.sslCert": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "SSL certificate to use."}, "loc": ["services", "postfix", "sslCert"], "readOnly": false, "type": "string"}, "services.postfix.sslKey": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "SSL key to use."}, "loc": ["services", "postfix", "sslKey"], "readOnly": false, "type": "string"}, "services.postfix.submissionOptions": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "{\n  milter_macro_daemon_name = \"ORIGINATING\";\n  smtpd_client_restrictions = \"permit_sasl_authenticated,reject\";\n  smtpd_sasl_auth_enable = \"yes\";\n  smtpd_tls_security_level = \"encrypt\";\n}"}, "description": {"_type": "mdDoc", "text": "Options for the submission config in master.cf"}, "example": {"_type": "literalExpression", "text": "{\n  milter_macro_daemon_name = \"ORIGINATING\";\n  smtpd_client_restrictions = \"permit_sasl_authenticated,reject\";\n  smtpd_sasl_auth_enable = \"yes\";\n  smtpd_sasl_type = \"dovecot\";\n  smtpd_tls_security_level = \"encrypt\";\n}"}, "loc": ["services", "postfix", "submissionOptions"], "readOnly": false, "type": "attribute set of string"}, "services.postfix.submissionsOptions": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "{\n  milter_macro_daemon_name = \"ORIGINATING\";\n  smtpd_client_restrictions = \"permit_sasl_authenticated,reject\";\n  smtpd_sasl_auth_enable = \"yes\";\n}"}, "description": {"_type": "mdDoc", "text": "Options for the submission config via smtps in master.cf.\n\nsmtpd_tls_security_level will be set to encrypt, if it is missing\nor has one of the values \"may\" or \"none\".\n\nsmtpd_tls_wrappermode with value \"yes\" will be added automatically.\n"}, "example": {"_type": "literalExpression", "text": "{\n  milter_macro_daemon_name = \"ORIGINATING\";\n  smtpd_client_restrictions = \"permit_sasl_authenticated,reject\";\n  smtpd_sasl_auth_enable = \"yes\";\n  smtpd_sasl_type = \"dovecot\";\n}"}, "loc": ["services", "postfix", "submissionsOptions"], "readOnly": false, "type": "attribute set of string"}, "services.postfix.tlsTrustedAuthorities": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\""}, "description": {"_type": "mdDoc", "text": "File containing trusted certification authorities (CA) to verify certificates of mailservers contacted for mail delivery. This basically sets smtp_tls_CAfile and enables opportunistic tls. Defaults to NixOS trusted certification authorities.\n"}, "loc": ["services", "postfix", "tlsTrustedAuthorities"], "readOnly": false, "type": "string"}, "services.postfix.transport": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Entries for the transport map, cf. man-page transport(8).\n"}, "loc": ["services", "postfix", "transport"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.postfix.useSrs": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sender rewriting scheme"}, "loc": ["services", "postfix", "useSrs"], "readOnly": false, "type": "boolean"}, "services.postfix.user": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"postfix\""}, "description": {"_type": "mdDoc", "text": "What to call the Postfix user (must be used only for postfix)."}, "loc": ["services", "postfix", "user"], "readOnly": false, "type": "string"}, "services.postfix.virtual": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Entries for the virtual alias map, cf. man-page virtual(5).\n"}, "loc": ["services", "postfix", "virtual"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.postfix.virtualMapType": {"declarations": ["nixos/modules/services/mail/postfix.nix"], "default": {"_type": "literalExpression", "text": "\"hash\""}, "description": {"_type": "mdDoc", "text": "What type of virtual alias map file to use. Use `\"regexp\"` for regular expressions.\n"}, "loc": ["services", "postfix", "virtualMapType"], "readOnly": false, "type": "one of \"hash\", \"regexp\", \"pcre\""}, "services.postfixadmin.adminEmail": {"declarations": ["nixos/modules/services/mail/postfixadmin.nix"], "description": {"_type": "mdDoc", "text": "Defines the Site Admin's email address.\nThis will be used to send emails from to create mailboxes and\nfrom Send Email / Broadcast message pages.\n"}, "example": {"_type": "literalExpression", "text": "\"postmaster@example.com\""}, "loc": ["services", "postfixadmin", "adminEmail"], "readOnly": false, "type": "string"}, "services.postfixadmin.database.dbname": {"declarations": ["nixos/modules/services/mail/postfixadmin.nix"], "default": {"_type": "literalExpression", "text": "\"postfixadmin\""}, "description": {"_type": "mdDoc", "text": "Name of the postgresql database"}, "loc": ["services", "postfixadmin", "database", "dbname"], "readOnly": false, "type": "string"}, "services.postfixadmin.database.host": {"declarations": ["nixos/modules/services/mail/postfixadmin.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Host of the postgresql server. If this is not set to\n`localhost`, you have to create the\npostgresql user and database yourself, with appropriate\npermissions.\n"}, "loc": ["services", "postfixadmin", "database", "host"], "readOnly": false, "type": "string"}, "services.postfixadmin.database.passwordFile": {"declarations": ["nixos/modules/services/mail/postfixadmin.nix"], "description": {"_type": "mdDoc", "text": "Password file for the postgresql connection. Must be readable by user `nginx`."}, "loc": ["services", "postfixadmin", "database", "passwordFile"], "readOnly": false, "type": "path"}, "services.postfixadmin.database.username": {"declarations": ["nixos/modules/services/mail/postfixadmin.nix"], "default": {"_type": "literalExpression", "text": "\"postfixadmin\""}, "description": {"_type": "mdDoc", "text": "Username for the postgresql connection.\nIf `database.host` is set to `localhost`, a unix user and group of the same name will be created as well.\n"}, "loc": ["services", "postfixadmin", "database", "username"], "readOnly": false, "type": "string"}, "services.postfixadmin.enable": {"declarations": ["nixos/modules/services/mail/postfixadmin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable postfixadmin.\n\nAlso enables nginx virtual host management.\nFurther nginx configuration can be done by adapting `services.nginx.virtualHosts.<name>`.\nSee [](#opt-services.nginx.virtualHosts) for further information.\n"}, "loc": ["services", "postfixadmin", "enable"], "readOnly": false, "type": "boolean"}, "services.postfixadmin.extraConfig": {"declarations": ["nixos/modules/services/mail/postfixadmin.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration for the postfixadmin instance, see postfixadmin's config.inc.php for available options."}, "loc": ["services", "postfixadmin", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.postfixadmin.hostName": {"declarations": ["nixos/modules/services/mail/postfixadmin.nix"], "description": {"_type": "mdDoc", "text": "Hostname to use for the nginx vhost"}, "example": {"_type": "literalExpression", "text": "\"postfixadmin.example.com\""}, "loc": ["services", "postfixadmin", "hostName"], "readOnly": false, "type": "string"}, "services.postfixadmin.setupPasswordFile": {"declarations": ["nixos/modules/services/mail/postfixadmin.nix"], "description": {"_type": "mdDoc", "text": "Password file for the admin.\nGenerate with `php -r \"echo password_hash('some password here', PASSWORD_DEFAULT);\"`\n"}, "loc": ["services", "postfixadmin", "setupPasswordFile"], "readOnly": false, "type": "path"}, "services.postgresql.authentication": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Defines how users authenticate themselves to the server. See the\n[PostgreSQL documentation for pg_hba.conf](https://www.postgresql.org/docs/current/auth-pg-hba-conf.html)\nfor details on the expected format of this option. By default,\npeer based authentication will be used for users connecting\nvia the Unix socket, and md5 password authentication will be\nused for users connecting via TCP. Any added rules will be\ninserted above the default rules. If you'd like to replace the\ndefault rules entirely, you can use `lib.mkForce` in your\nmodule.\n"}, "loc": ["services", "postgresql", "authentication"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.postgresql.checkConfig": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Check the syntax of the configuration file at compile time"}, "loc": ["services", "postgresql", "checkConfig"], "readOnly": false, "type": "boolean"}, "services.postgresql.dataDir": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/postgresql/${config.services.postgresql.package.psqlSchema}\""}, "description": {"_type": "mdDoc", "text": "The data directory for PostgreSQL. If left as the default value\nthis directory will automatically be created before the PostgreSQL server starts, otherwise\nthe sysadmin is responsible for ensuring the directory exists with appropriate ownership\nand permissions.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/postgresql/11\""}, "loc": ["services", "postgresql", "dataDir"], "readOnly": false, "type": "path"}, "services.postgresql.enable": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PostgreSQL Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "postgresql", "enable"], "readOnly": false, "type": "boolean"}, "services.postgresql.enableJIT": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable JIT support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "postgresql", "enableJIT"], "readOnly": false, "type": "boolean"}, "services.postgresql.enableTCPIP": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether PostgreSQL should listen on all network interfaces.\nIf disabled, the database can only be accessed via its Unix\ndomain socket or via TCP connections to localhost.\n"}, "loc": ["services", "postgresql", "enableTCPIP"], "readOnly": false, "type": "boolean"}, "services.postgresql.ensureDatabases": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Ensures that the specified databases exist.\nThis option will never delete existing databases, especially not when the value of this\noption is changed. This means that databases created once through this option or\notherwise have to be removed manually.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"gitea\"\n  \"nextcloud\"\n]"}, "loc": ["services", "postgresql", "ensureDatabases"], "readOnly": false, "type": "list of string"}, "services.postgresql.ensureUsers": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Ensures that the specified users exist and have at least the ensured permissions.\nThe PostgreSQL users will be identified using peer authentication. This authenticates the Unix user with the\nsame name only, and that without the need for a password.\nThis option will never delete existing users or remove permissions, especially not when the value of this\noption is changed. This means that users created and permissions assigned once through this option or\notherwise have to be removed manually.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    name = \"nextcloud\";\n    ensurePermissions = {\n      \"DATABASE nextcloud\" = \"ALL PRIVILEGES\";\n    };\n  }\n  {\n    name = \"superuser\";\n    ensurePermissions = {\n      \"ALL TABLES IN SCHEMA public\" = \"ALL PRIVILEGES\";\n    };\n  }\n]\n"}, "loc": ["services", "postgresql", "ensureUsers"], "readOnly": false, "type": "list of (submodule)"}, "services.postgresql.ensureUsers.*.ensureClauses": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalMD", "text": "The default, `null`, means that the user created will have the default permissions assigned by PostgreSQL. Subsequent server starts will not set or unset the clause, so imperative changes are preserved.\n"}, "description": {"_type": "mdDoc", "text": "An attrset of clauses to grant to the user. Under the hood this uses the\n[ALTER USER syntax](https://www.postgresql.org/docs/current/sql-alteruser.html) for each attrName where\nthe attrValue is true in the attrSet:\n`ALTER USER user.name WITH attrName`\n"}, "example": {"_type": "literalExpression", "text": "{\n  superuser = true;\n  createrole = true;\n  createdb = true;\n}\n"}, "loc": ["services", "postgresql", "ensureUsers", "*", "ensureClauses"], "readOnly": false, "type": "submodule"}, "services.postgresql.ensureUsers.*.ensureClauses.bypassrls": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalMD", "text": "`null`: do not set. For newly created roles, use PostgreSQL's default. For existing roles, do not touch this clause.\n"}, "description": {"_type": "mdDoc", "text": "Grants the user, created by the ensureUser attr, replication permissions. From the postgres docs:\n\nA role must be explicitly given permission to bypass\nevery row-level security (RLS) policy (except for\nsuperusers, since those bypass all permission checks). To\ncreate such a role, use CREATE ROLE name BYPASSRLS as a\nsuperuser.\n\nMore information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)\n"}, "loc": ["services", "postgresql", "ensureUsers", "*", "ensureClauses", "bypassrls"], "readOnly": false, "type": "null or boolean"}, "services.postgresql.ensureUsers.*.ensureClauses.createdb": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalMD", "text": "`null`: do not set. For newly created roles, use PostgreSQL's default. For existing roles, do not touch this clause.\n"}, "description": {"_type": "mdDoc", "text": "Grants the user, created by the ensureUser attr, createdb permissions. From the postgres docs:\n\nA role must be explicitly given permission to create\ndatabases (except for superusers, since those bypass all\npermission checks). To create such a role, use CREATE\nROLE name CREATEDB.\n\nMore information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)\n"}, "loc": ["services", "postgresql", "ensureUsers", "*", "ensureClauses", "createdb"], "readOnly": false, "type": "null or boolean"}, "services.postgresql.ensureUsers.*.ensureClauses.createrole": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalMD", "text": "`null`: do not set. For newly created roles, use PostgreSQL's default. For existing roles, do not touch this clause.\n"}, "description": {"_type": "mdDoc", "text": "Grants the user, created by the ensureUser attr, createrole permissions. From the postgres docs:\n\nA role must be explicitly given permission to create more\nroles (except for superusers, since those bypass all\npermission checks). To create such a role, use CREATE\nROLE name CREATEROLE. A role with CREATEROLE privilege\ncan alter and drop other roles, too, as well as grant or\nrevoke membership in them. However, to create, alter,\ndrop, or change membership of a superuser role, superuser\nstatus is required; CREATEROLE is insufficient for that.\n\nMore information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)\n"}, "loc": ["services", "postgresql", "ensureUsers", "*", "ensureClauses", "createrole"], "readOnly": false, "type": "null or boolean"}, "services.postgresql.ensureUsers.*.ensureClauses.inherit": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalMD", "text": "`null`: do not set. For newly created roles, use PostgreSQL's default. For existing roles, do not touch this clause.\n"}, "description": {"_type": "mdDoc", "text": "Grants the user created inherit permissions. From the postgres docs:\n\nA role is given permission to inherit the privileges of\nroles it is a member of, by default. However, to create a\nrole without the permission, use CREATE ROLE name\nNOINHERIT.\n\nMore information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)\n"}, "loc": ["services", "postgresql", "ensureUsers", "*", "ensureClauses", "inherit"], "readOnly": false, "type": "null or boolean"}, "services.postgresql.ensureUsers.*.ensureClauses.login": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalMD", "text": "`null`: do not set. For newly created roles, use PostgreSQL's default. For existing roles, do not touch this clause.\n"}, "description": {"_type": "mdDoc", "text": "Grants the user, created by the ensureUser attr, login permissions. From the postgres docs:\n\nOnly roles that have the LOGIN attribute can be used as\nthe initial role name for a database connection. A role\nwith the LOGIN attribute can be considered the same as a\n\u201cdatabase user\u201d. To create a role with login privilege,\nuse either:\n\nCREATE ROLE name LOGIN; CREATE USER name;\n\n(CREATE USER is equivalent to CREATE ROLE except that\nCREATE USER includes LOGIN by default, while CREATE ROLE\ndoes not.)\n\nMore information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)\n"}, "loc": ["services", "postgresql", "ensureUsers", "*", "ensureClauses", "login"], "readOnly": false, "type": "null or boolean"}, "services.postgresql.ensureUsers.*.ensureClauses.replication": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalMD", "text": "`null`: do not set. For newly created roles, use PostgreSQL's default. For existing roles, do not touch this clause.\n"}, "description": {"_type": "mdDoc", "text": "Grants the user, created by the ensureUser attr, replication permissions. From the postgres docs:\n\nA role must explicitly be given permission to initiate\nstreaming replication (except for superusers, since those\nbypass all permission checks). A role used for streaming\nreplication must have LOGIN permission as well. To create\nsuch a role, use CREATE ROLE name REPLICATION LOGIN.\n\nMore information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)\n"}, "loc": ["services", "postgresql", "ensureUsers", "*", "ensureClauses", "replication"], "readOnly": false, "type": "null or boolean"}, "services.postgresql.ensureUsers.*.ensureClauses.superuser": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalMD", "text": "`null`: do not set. For newly created roles, use PostgreSQL's default. For existing roles, do not touch this clause.\n"}, "description": {"_type": "mdDoc", "text": "Grants the user, created by the ensureUser attr, superuser permissions. From the postgres docs:\n\nA database superuser bypasses all permission checks,\nexcept the right to log in. This is a dangerous privilege\nand should not be used carelessly; it is best to do most\nof your work as a role that is not a superuser. To create\na new database superuser, use CREATE ROLE name SUPERUSER.\nYou must do this as a role that is already a superuser.\n\nMore information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)\n"}, "loc": ["services", "postgresql", "ensureUsers", "*", "ensureClauses", "superuser"], "readOnly": false, "type": "null or boolean"}, "services.postgresql.ensureUsers.*.ensurePermissions": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Permissions to ensure for the user, specified as an attribute set.\nThe attribute names specify the database and tables to grant the permissions for.\nThe attribute values specify the permissions to grant. You may specify one or\nmultiple comma-separated SQL privileges here.\n\nFor more information on how to specify the target\nand on which privileges exist, see the\n[GRANT syntax](https://www.postgresql.org/docs/current/sql-grant.html).\nThe attributes are used as `GRANT ${attrValue} ON ${attrName}`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"DATABASE \\\"nextcloud\\\"\" = \"ALL PRIVILEGES\";\n  \"ALL TABLES IN SCHEMA public\" = \"ALL PRIVILEGES\";\n}\n"}, "loc": ["services", "postgresql", "ensureUsers", "*", "ensurePermissions"], "readOnly": false, "type": "attribute set of string"}, "services.postgresql.ensureUsers.*.name": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "description": {"_type": "mdDoc", "text": "Name of the user to ensure.\n"}, "loc": ["services", "postgresql", "ensureUsers", "*", "name"], "readOnly": false, "type": "string"}, "services.postgresql.extraPlugins": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of PostgreSQL plugins. PostgreSQL version for each plugin should\nmatch version for `services.postgresql.package` value.\n"}, "example": {"_type": "literalExpression", "text": "with pkgs.postgresql_11.pkgs; [ postgis pg_repack ]"}, "loc": ["services", "postgresql", "extraPlugins"], "readOnly": false, "type": "list of path"}, "services.postgresql.identMap": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Defines the mapping from system users to database users.\n\nThe general form is:\n\nmap-name system-username database-username\n"}, "loc": ["services", "postgresql", "identMap"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.postgresql.initdbArgs": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional arguments passed to `initdb` during data dir\ninitialisation.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--data-checksums\"\n  \"--allow-group-access\"\n]"}, "loc": ["services", "postgresql", "initdbArgs"], "readOnly": false, "type": "list of string"}, "services.postgresql.initialScript": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing SQL statements to execute on first startup.\n"}, "loc": ["services", "postgresql", "initialScript"], "readOnly": false, "type": "null or path"}, "services.postgresql.logLinePrefix": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "\"[%p] \""}, "description": {"_type": "mdDoc", "text": "A printf-style string that is output at the beginning of each log line.\nUpstream default is `'%m [%p] '`, i.e. it includes the timestamp. We do\nnot include the timestamp, because journal has it anyway.\n"}, "example": {"_type": "literalExpression", "text": "\"%m [%p] \""}, "loc": ["services", "postgresql", "logLinePrefix"], "readOnly": false, "type": "string"}, "services.postgresql.package": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "description": {"_type": "mdDoc", "text": "PostgreSQL package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.postgresql_11"}, "loc": ["services", "postgresql", "package"], "readOnly": false, "type": "package"}, "services.postgresql.port": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "5432"}, "description": {"_type": "mdDoc", "text": "The port on which PostgreSQL listens.\n"}, "loc": ["services", "postgresql", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.postgresql.recoveryConfig": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Contents of the {file}`recovery.conf` file.\n"}, "loc": ["services", "postgresql", "recoveryConfig"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.postgresql.settings": {"declarations": ["nixos/modules/services/databases/postgresql.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "PostgreSQL configuration. Refer to\n<https://www.postgresql.org/docs/11/config-setting.html#CONFIG-SETTING-CONFIGURATION-FILE>\nfor an overview of `postgresql.conf`.\n\n::: {.note}\nString values will automatically be enclosed in single quotes. Single quotes will be\nescaped with two single quotes as described by the upstream documentation linked above.\n:::\n"}, "example": {"_type": "literalExpression", "text": "{\n  log_connections = true;\n  log_statement = \"all\";\n  logging_collector = true\n  log_disconnections = true\n  log_destination = lib.mkForce \"syslog\";\n}\n"}, "loc": ["services", "postgresql", "settings"], "readOnly": false, "type": "attribute set of (boolean or floating point number or signed integer or string)"}, "services.postgresqlBackup.backupAll": {"declarations": ["nixos/modules/services/backup/postgresql-backup.nix"], "default": {"_type": "literalExpression", "text": "services.postgresqlBackup.databases == []"}, "description": {"_type": "mdDoc", "text": "Backup all databases using pg_dumpall.\nThis option is mutual exclusive to\n`services.postgresqlBackup.databases`.\nThe resulting backup dump will have the name all.sql.gz.\nThis option is the default if no databases are specified.\n"}, "loc": ["services", "postgresqlBackup", "backupAll"], "readOnly": false, "type": "boolean"}, "services.postgresqlBackup.compression": {"declarations": ["nixos/modules/services/backup/postgresql-backup.nix"], "default": {"_type": "literalExpression", "text": "\"gzip\""}, "description": {"_type": "mdDoc", "text": "The type of compression to use on the generated database dump.\n"}, "loc": ["services", "postgresqlBackup", "compression"], "readOnly": false, "type": "one of \"none\", \"gzip\", \"zstd\""}, "services.postgresqlBackup.compressionLevel": {"declarations": ["nixos/modules/services/backup/postgresql-backup.nix"], "default": {"_type": "literalExpression", "text": "6"}, "description": {"_type": "mdDoc", "text": "The compression level used when compression is enabled.\ngzip accepts levels 1 to 9. zstd accepts levels 1 to 19.\n"}, "loc": ["services", "postgresqlBackup", "compressionLevel"], "readOnly": false, "type": "integer between 1 and 19 (both inclusive)"}, "services.postgresqlBackup.databases": {"declarations": ["nixos/modules/services/backup/postgresql-backup.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of database names to dump.\n"}, "loc": ["services", "postgresqlBackup", "databases"], "readOnly": false, "type": "list of string"}, "services.postgresqlBackup.enable": {"declarations": ["nixos/modules/services/backup/postgresql-backup.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PostgreSQL dumps."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "postgresqlBackup", "enable"], "readOnly": false, "type": "boolean"}, "services.postgresqlBackup.location": {"declarations": ["nixos/modules/services/backup/postgresql-backup.nix"], "default": {"_type": "literalExpression", "text": "\"/var/backup/postgresql\""}, "description": {"_type": "mdDoc", "text": "Path of directory where the PostgreSQL database dumps will be placed.\n"}, "loc": ["services", "postgresqlBackup", "location"], "readOnly": false, "type": "path"}, "services.postgresqlBackup.pgdumpOptions": {"declarations": ["nixos/modules/services/backup/postgresql-backup.nix"], "default": {"_type": "literalExpression", "text": "\"-C\""}, "description": {"_type": "mdDoc", "text": "Command line options for pg_dump. This options is not used\nif `config.services.postgresqlBackup.backupAll` is enabled.\nNote that config.services.postgresqlBackup.backupAll is also active,\nwhen no databases where specified.\n"}, "loc": ["services", "postgresqlBackup", "pgdumpOptions"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.postgresqlBackup.startAt": {"declarations": ["nixos/modules/services/backup/postgresql-backup.nix"], "default": {"_type": "literalExpression", "text": "\"*-*-* 01:15:00\""}, "description": {"_type": "mdDoc", "text": "This option defines (see `systemd.time` for format) when the\ndatabases should be dumped.\nThe default is to update at 01:15 (at night) every day.\n"}, "loc": ["services", "postgresqlBackup", "startAt"], "readOnly": false, "type": "(list of string) or string"}, "services.postgresqlWalReceiver.receivers": {"declarations": ["nixos/modules/services/backup/postgresql-wal-receiver.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "PostgreSQL WAL receivers.\nStream write-ahead logs from a PostgreSQL server using {command}`pg_receivewal` (formerly {command}`pg_receivexlog`).\nSee [the man page](https://www.postgresql.org/docs/current/app-pgreceivewal.html) for more information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  main = {\n    postgresqlPackage = pkgs.postgresql_11;\n    directory = /mnt/pg_wal/main/;\n    slot = \"main_wal_receiver\";\n    connection = \"postgresql://user@somehost\";\n  };\n}\n"}, "loc": ["services", "postgresqlWalReceiver", "receivers"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.postgresqlWalReceiver.receivers.<name>.compress": {"declarations": ["nixos/modules/services/backup/postgresql-wal-receiver.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Enables gzip compression of write-ahead logs, and specifies the compression level\n(`0` through `9`, `0` being no compression and `9` being best compression).\nThe suffix `.gz` will automatically be added to all filenames.\n\nThis option requires PostgreSQL >= 10.\n"}, "loc": ["services", "postgresqlWalReceiver", "receivers", "<name>", "compress"], "readOnly": false, "type": "integer between 0 and 9 (both inclusive)"}, "services.postgresqlWalReceiver.receivers.<name>.connection": {"declarations": ["nixos/modules/services/backup/postgresql-wal-receiver.nix"], "description": {"_type": "mdDoc", "text": "Specifies parameters used to connect to the server, as a connection string.\nSee [Section 34.1.1 of the PostgreSQL manual](https://www.postgresql.org/docs/current/libpq-connect.html#LIBPQ-CONNSTRING) for more information.\n\nBecause {command}`pg_receivewal` doesn't connect to any particular database in the cluster,\ndatabase name in the connection string will be ignored.\n"}, "example": {"_type": "literalExpression", "text": "\"postgresql://user@somehost\""}, "loc": ["services", "postgresqlWalReceiver", "receivers", "<name>", "connection"], "readOnly": false, "type": "string"}, "services.postgresqlWalReceiver.receivers.<name>.directory": {"declarations": ["nixos/modules/services/backup/postgresql-wal-receiver.nix"], "description": {"_type": "mdDoc", "text": "Directory to write the output to.\n"}, "example": {"_type": "literalExpression", "text": "/mnt/pg_wal/main/"}, "loc": ["services", "postgresqlWalReceiver", "receivers", "<name>", "directory"], "readOnly": false, "type": "path"}, "services.postgresqlWalReceiver.receivers.<name>.environment": {"declarations": ["nixos/modules/services/backup/postgresql-wal-receiver.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables passed to the service.\nUsable parameters are listed in [Section 34.14 of the PostgreSQL manual](https://www.postgresql.org/docs/current/libpq-envars.html).\n"}, "example": {"_type": "literalExpression", "text": "{\n  PGPASSFILE = \"/private/passfile\";\n  PGSSLMODE = \"require\";\n}\n"}, "loc": ["services", "postgresqlWalReceiver", "receivers", "<name>", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.postgresqlWalReceiver.receivers.<name>.extraArgs": {"declarations": ["nixos/modules/services/backup/postgresql-wal-receiver.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of extra arguments to pass to the {command}`pg_receivewal` command.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--no-sync\"\n]\n"}, "loc": ["services", "postgresqlWalReceiver", "receivers", "<name>", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.postgresqlWalReceiver.receivers.<name>.postgresqlPackage": {"declarations": ["nixos/modules/services/backup/postgresql-wal-receiver.nix"], "description": {"_type": "mdDoc", "text": "PostgreSQL package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.postgresql_11"}, "loc": ["services", "postgresqlWalReceiver", "receivers", "<name>", "postgresqlPackage"], "readOnly": false, "type": "package"}, "services.postgresqlWalReceiver.receivers.<name>.slot": {"declarations": ["nixos/modules/services/backup/postgresql-wal-receiver.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Require {command}`pg_receivewal` to use an existing replication slot (see\n[Section 26.2.6 of the PostgreSQL manual](https://www.postgresql.org/docs/current/warm-standby.html#STREAMING-REPLICATION-SLOTS)).\nWhen this option is used, {command}`pg_receivewal` will report a flush position to the server,\nindicating when each segment has been synchronized to disk so that the server can remove that segment if it is not otherwise needed.\n\nWhen the replication client of {command}`pg_receivewal` is configured on the server as a synchronous standby,\nthen using a replication slot will report the flush position to the server, but only when a WAL file is closed.\nTherefore, that configuration will cause transactions on the primary to wait for a long time and effectively not work satisfactorily.\nThe option {option}`synchronous` must be specified in addition to make this work correctly.\n"}, "example": {"_type": "literalExpression", "text": "\"some_slot_name\""}, "loc": ["services", "postgresqlWalReceiver", "receivers", "<name>", "slot"], "readOnly": false, "type": "string"}, "services.postgresqlWalReceiver.receivers.<name>.statusInterval": {"declarations": ["nixos/modules/services/backup/postgresql-wal-receiver.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Specifies the number of seconds between status packets sent back to the server.\nThis allows for easier monitoring of the progress from server.\nA value of zero disables the periodic status updates completely,\nalthough an update will still be sent when requested by the server, to avoid timeout disconnect.\n"}, "loc": ["services", "postgresqlWalReceiver", "receivers", "<name>", "statusInterval"], "readOnly": false, "type": "signed integer"}, "services.postgresqlWalReceiver.receivers.<name>.synchronous": {"declarations": ["nixos/modules/services/backup/postgresql-wal-receiver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Flush the WAL data to disk immediately after it has been received.\nAlso send a status packet back to the server immediately after flushing, regardless of {option}`statusInterval`.\n\nThis option should be specified if the replication client of {command}`pg_receivewal` is configured on the server as a synchronous standby,\nto ensure that timely feedback is sent to the server.\n"}, "loc": ["services", "postgresqlWalReceiver", "receivers", "<name>", "synchronous"], "readOnly": false, "type": "boolean"}, "services.postgrey.IPv4CIDR": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "24"}, "description": {"_type": "mdDoc", "text": "Strip N bits from IPv4 addresses if lookupBySubnet is true"}, "loc": ["services", "postgrey", "IPv4CIDR"], "readOnly": false, "type": "signed integer"}, "services.postgrey.IPv6CIDR": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "64"}, "description": {"_type": "mdDoc", "text": "Strip N bits from IPv6 addresses if lookupBySubnet is true"}, "loc": ["services", "postgrey", "IPv6CIDR"], "readOnly": false, "type": "signed integer"}, "services.postgrey.autoWhitelist": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Whitelist clients after successful delivery of N messages"}, "loc": ["services", "postgrey", "autoWhitelist"], "readOnly": false, "type": "null or signed integer"}, "services.postgrey.delay": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "300"}, "description": {"_type": "mdDoc", "text": "Greylist for N seconds"}, "loc": ["services", "postgrey", "delay"], "readOnly": false, "type": "signed integer"}, "services.postgrey.enable": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the Postgrey daemon"}, "loc": ["services", "postgrey", "enable"], "readOnly": false, "type": "boolean"}, "services.postgrey.greylistAction": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "\"DEFER_IF_PERMIT\""}, "description": {"_type": "mdDoc", "text": "Response status for greylisted messages (see access(5))"}, "loc": ["services", "postgrey", "greylistAction"], "readOnly": false, "type": "string"}, "services.postgrey.greylistHeader": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "\"X-Greylist: delayed %%t seconds by postgrey-%%v at %%h; %%d\""}, "description": {"_type": "mdDoc", "text": "Prepend header to greylisted mails; use %%t for seconds delayed due to greylisting, %%v for the version of postgrey, %%d for the date, and %%h for the host"}, "loc": ["services", "postgrey", "greylistHeader"], "readOnly": false, "type": "string"}, "services.postgrey.greylistText": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "\"Greylisted for %%s seconds\""}, "description": {"_type": "mdDoc", "text": "Response status text for greylisted messages; use %%s for seconds left until greylisting is over and %%r for mail domain of recipient"}, "loc": ["services", "postgrey", "greylistText"], "readOnly": false, "type": "string"}, "services.postgrey.lookupBySubnet": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Strip the last N bits from IP addresses, determined by IPv4CIDR and IPv6CIDR"}, "loc": ["services", "postgrey", "lookupBySubnet"], "readOnly": false, "type": "boolean"}, "services.postgrey.maxAge": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "35"}, "description": {"_type": "mdDoc", "text": "Delete entries from whitelist if they haven't been seen for N days"}, "loc": ["services", "postgrey", "maxAge"], "readOnly": false, "type": "signed integer"}, "services.postgrey.privacy": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Store data using one-way hash functions (SHA1)"}, "loc": ["services", "postgrey", "privacy"], "readOnly": false, "type": "boolean"}, "services.postgrey.retryWindow": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Allow N days for the first retry. Use string with appended 'h' to specify time in hours"}, "example": {"_type": "literalExpression", "text": "\"12h\""}, "loc": ["services", "postgrey", "retryWindow"], "readOnly": false, "type": "string or signed integer"}, "services.postgrey.socket": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "{\n  mode = \"0777\";\n  path = \"/run/postgrey.sock\";\n}"}, "description": {"_type": "mdDoc", "text": "Socket to bind to"}, "example": {"_type": "literalExpression", "text": "{\n  addr = \"127.0.0.1\";\n  port = 10030;\n}"}, "loc": ["services", "postgrey", "socket"], "readOnly": false, "type": "(submodule) or (submodule)"}, "services.postgrey.whitelistClients": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Client address whitelist files (see postgrey(8))"}, "loc": ["services", "postgrey", "whitelistClients"], "readOnly": false, "type": "list of path"}, "services.postgrey.whitelistRecipients": {"declarations": ["nixos/modules/services/mail/postgrey.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Recipient address whitelist files (see postgrey(8))"}, "loc": ["services", "postgrey", "whitelistRecipients"], "readOnly": false, "type": "list of path"}, "services.postsrsd.domain": {"declarations": ["nixos/modules/services/mail/postsrsd.nix"], "description": {"_type": "mdDoc", "text": "Domain name for rewrite"}, "loc": ["services", "postsrsd", "domain"], "readOnly": false, "type": "string"}, "services.postsrsd.enable": {"declarations": ["nixos/modules/services/mail/postsrsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the postsrsd SRS server for Postfix."}, "loc": ["services", "postsrsd", "enable"], "readOnly": false, "type": "boolean"}, "services.postsrsd.excludeDomains": {"declarations": ["nixos/modules/services/mail/postsrsd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Origin domains to exclude from rewriting in addition to primary domain"}, "loc": ["services", "postsrsd", "excludeDomains"], "readOnly": false, "type": "list of string"}, "services.postsrsd.forwardPort": {"declarations": ["nixos/modules/services/mail/postsrsd.nix"], "default": {"_type": "literalExpression", "text": "10001"}, "description": {"_type": "mdDoc", "text": "Port for the forward SRS lookup"}, "loc": ["services", "postsrsd", "forwardPort"], "readOnly": false, "type": "signed integer"}, "services.postsrsd.group": {"declarations": ["nixos/modules/services/mail/postsrsd.nix"], "default": {"_type": "literalExpression", "text": "\"postsrsd\""}, "description": {"_type": "mdDoc", "text": "Group for the daemon"}, "loc": ["services", "postsrsd", "group"], "readOnly": false, "type": "string"}, "services.postsrsd.reversePort": {"declarations": ["nixos/modules/services/mail/postsrsd.nix"], "default": {"_type": "literalExpression", "text": "10002"}, "description": {"_type": "mdDoc", "text": "Port for the reverse SRS lookup"}, "loc": ["services", "postsrsd", "reversePort"], "readOnly": false, "type": "signed integer"}, "services.postsrsd.secretsFile": {"declarations": ["nixos/modules/services/mail/postsrsd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/postsrsd/postsrsd.secret\""}, "description": {"_type": "mdDoc", "text": "Secret keys used for signing and verification"}, "loc": ["services", "postsrsd", "secretsFile"], "readOnly": false, "type": "path"}, "services.postsrsd.separator": {"declarations": ["nixos/modules/services/mail/postsrsd.nix"], "default": {"_type": "literalExpression", "text": "\"=\""}, "description": {"_type": "mdDoc", "text": "First separator character in generated addresses"}, "loc": ["services", "postsrsd", "separator"], "readOnly": false, "type": "one of \"-\", \"=\", \"+\""}, "services.postsrsd.timeout": {"declarations": ["nixos/modules/services/mail/postsrsd.nix"], "default": {"_type": "literalExpression", "text": "1800"}, "description": {"_type": "mdDoc", "text": "Timeout for idle client connections in seconds"}, "loc": ["services", "postsrsd", "timeout"], "readOnly": false, "type": "signed integer"}, "services.postsrsd.user": {"declarations": ["nixos/modules/services/mail/postsrsd.nix"], "default": {"_type": "literalExpression", "text": "\"postsrsd\""}, "description": {"_type": "mdDoc", "text": "User for the daemon"}, "loc": ["services", "postsrsd", "user"], "readOnly": false, "type": "string"}, "services.power-profiles-daemon.enable": {"declarations": ["nixos/modules/services/hardware/power-profiles-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable power-profiles-daemon, a DBus daemon that allows\nchanging system behavior based upon user-selected power profiles.\n"}, "loc": ["services", "power-profiles-daemon", "enable"], "readOnly": false, "type": "boolean"}, "services.powerdns.enable": {"declarations": ["nixos/modules/services/networking/powerdns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PowerDNS domain name server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "powerdns", "enable"], "readOnly": false, "type": "boolean"}, "services.powerdns.extraConfig": {"declarations": ["nixos/modules/services/networking/powerdns.nix"], "default": {"_type": "literalExpression", "text": "\"launch=bind\""}, "description": {"_type": "mdDoc", "text": "PowerDNS configuration. Refer to\n<https://doc.powerdns.com/authoritative/settings.html>\nfor details on supported values.\n"}, "loc": ["services", "powerdns", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.powerdns.secretFile": {"declarations": ["nixos/modules/services/networking/powerdns.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment variables from this file will be interpolated into the\nfinal config file using envsubst with this syntax: `$ENVIRONMENT`\nor `${VARIABLE}`.\nThe file should contain lines formatted as `SECRET_VAR=SECRET_VALUE`.\nThis is useful to avoid putting secrets into the nix store.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/powerdns.env\""}, "loc": ["services", "powerdns", "secretFile"], "readOnly": false, "type": "null or path"}, "services.pppd.enable": {"declarations": ["nixos/modules/services/networking/pppd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable pppd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pppd", "enable"], "readOnly": false, "type": "boolean"}, "services.pppd.package": {"declarations": ["nixos/modules/services/networking/pppd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ppp"}, "description": {"_type": "mdDoc", "text": "pppd package to use."}, "loc": ["services", "pppd", "package"], "readOnly": false, "type": "package"}, "services.pppd.peers": {"declarations": ["nixos/modules/services/networking/pppd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "pppd peers."}, "loc": ["services", "pppd", "peers"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.pppd.peers.<name>.autostart": {"declarations": ["nixos/modules/services/networking/pppd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the PPP session is automatically started at boot time."}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "pppd", "peers", "<name>", "autostart"], "readOnly": false, "type": "boolean"}, "services.pppd.peers.<name>.config": {"declarations": ["nixos/modules/services/networking/pppd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "pppd configuration for this peer, see the pppd(8) man page."}, "loc": ["services", "pppd", "peers", "<name>", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.pppd.peers.<name>.enable": {"declarations": ["nixos/modules/services/networking/pppd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable this PPP peer."}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "pppd", "peers", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.pppd.peers.<name>.name": {"declarations": ["nixos/modules/services/networking/pppd.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Name of the PPP peer."}, "example": {"_type": "literalExpression", "text": "\"dialup\""}, "loc": ["services", "pppd", "peers", "<name>", "name"], "readOnly": false, "type": "string"}, "services.pptpd.clientIpRange": {"declarations": ["nixos/modules/services/networking/pptpd.nix"], "default": {"_type": "literalExpression", "text": "\"10.124.124.2-11\""}, "description": {"_type": "mdDoc", "text": "The range from which client IPs are drawn."}, "loc": ["services", "pptpd", "clientIpRange"], "readOnly": false, "type": "string"}, "services.pptpd.enable": {"declarations": ["nixos/modules/services/networking/pptpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable pptpd, the Point-to-Point Tunneling Protocol daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pptpd", "enable"], "readOnly": false, "type": "boolean"}, "services.pptpd.extraPppdOptions": {"declarations": ["nixos/modules/services/networking/pptpd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Adds extra lines to the pppd options file."}, "example": {"_type": "literalExpression", "text": "''\n  ms-dns 8.8.8.8\n  ms-dns 8.8.4.4\n''"}, "loc": ["services", "pptpd", "extraPppdOptions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.pptpd.extraPptpdOptions": {"declarations": ["nixos/modules/services/networking/pptpd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Adds extra lines to the pptpd configuration file."}, "loc": ["services", "pptpd", "extraPptpdOptions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.pptpd.maxClients": {"declarations": ["nixos/modules/services/networking/pptpd.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "The maximum number of simultaneous connections."}, "loc": ["services", "pptpd", "maxClients"], "readOnly": false, "type": "signed integer"}, "services.pptpd.serverIp": {"declarations": ["nixos/modules/services/networking/pptpd.nix"], "default": {"_type": "literalExpression", "text": "\"10.124.124.1\""}, "description": {"_type": "mdDoc", "text": "The server-side IP address."}, "loc": ["services", "pptpd", "serverIp"], "readOnly": false, "type": "string"}, "services.prayer.enable": {"declarations": ["nixos/modules/services/networking/prayer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prayer webmail http server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prayer", "enable"], "readOnly": false, "type": "boolean"}, "services.prayer.extraConfig": {"declarations": ["nixos/modules/services/networking/prayer.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration. Contents will be added verbatim to the configuration file.\n"}, "loc": ["services", "prayer", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.prayer.port": {"declarations": ["nixos/modules/services/networking/prayer.nix"], "default": {"_type": "literalExpression", "text": "2080"}, "description": {"_type": "mdDoc", "text": "Port the prayer http server is listening to.\n"}, "loc": ["services", "prayer", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.printing.allowFrom": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"localhost\"\n]"}, "description": {"_type": "mdDoc", "text": "From which hosts to allow unconditional access.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"all\"\n]"}, "loc": ["services", "printing", "allowFrom"], "readOnly": false, "type": "list of string"}, "services.printing.browsedConf": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The contents of the configuration. file of the CUPS Browsed daemon\n({file}`cups-browsed.conf`)\n"}, "example": {"_type": "literalExpression", "text": "''\n  BrowsePoll cups.example.com\n''"}, "loc": ["services", "printing", "browsedConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.printing.browsing": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Specifies whether shared printers are advertised.\n"}, "loc": ["services", "printing", "browsing"], "readOnly": false, "type": "boolean"}, "services.printing.clientConf": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The contents of the client configuration.\n({file}`client.conf`)\n"}, "example": {"_type": "literalExpression", "text": "''\n  ServerName server.example.com\n  Encryption Never\n''"}, "loc": ["services", "printing", "clientConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.printing.cups-pdf.enable": {"declarations": ["nixos/modules/services/printing/cups-pdf.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the cups-pdf virtual pdf printer backend.\nBy default, this will install a single printer `pdf`.\nbut this can be changed/extended with {option}`services.printing.cups-pdf.instances`\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "printing", "cups-pdf", "enable"], "readOnly": false, "type": "boolean"}, "services.printing.cups-pdf.instances": {"declarations": ["nixos/modules/services/printing/cups-pdf.nix"], "default": {"_type": "literalExpression", "text": "{\n  pdf = { };\n}"}, "description": {"_type": "mdDoc", "text": "Permits to raise one or more cups-pdf instances.\nEach instance is named by an attribute name, and the attribute's values control the instance' configuration.\n"}, "example": {"_type": "literalExpression", "text": "{\n  pdf = {\n    settings = {\n      Out = \"\\${HOME}/cups-pdf\";\n      UserUMask = \"0033\";\n    };\n  };\n}"}, "loc": ["services", "printing", "cups-pdf", "instances"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.printing.cups-pdf.instances.<name>.confFileText": {"declarations": ["nixos/modules/services/printing/cups-pdf.nix"], "description": {"_type": "mdDoc", "text": "This will contain the contents of {file}`cups-pdf.conf` for this instance, derived from {option}`settings`.\nYou can use this option to append text to the file.\n"}, "loc": ["services", "printing", "cups-pdf", "instances", "<name>", "confFileText"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.printing.cups-pdf.instances.<name>.enable": {"declarations": ["nixos/modules/services/printing/cups-pdf.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable this cups-pdf instance."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "printing", "cups-pdf", "instances", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.printing.cups-pdf.instances.<name>.installPrinter": {"declarations": ["nixos/modules/services/printing/cups-pdf.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable a CUPS printer queue for this instance.\nThe queue will be named after the instance and will use the {file}`CUPS-PDF_opt.ppd` ppd file.\nIf this is disabled, you need to add the queue yourself to use the instance\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "printing", "cups-pdf", "instances", "<name>", "installPrinter"], "readOnly": false, "type": "boolean"}, "services.printing.cups-pdf.instances.<name>.settings": {"declarations": ["nixos/modules/services/printing/cups-pdf.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings for a cups-pdf instance, see the descriptions in the template config file in the cups-pdf package.\nThe key value pairs declared here will be translated into proper key value pairs for {file}`cups-pdf.conf`.\nSetting a value to `null` disables the option and removes it from the file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Out = \"\\${HOME}/cups-pdf\";\n  UserUMask = \"0033\";\n}"}, "loc": ["services", "printing", "cups-pdf", "instances", "<name>", "settings"], "readOnly": false, "type": "null or signed integer or string or path or package"}, "services.printing.cups-pdf.instances.<name>.settings.AnonDirName": {"declarations": ["nixos/modules/services/printing/cups-pdf.nix"], "default": {"_type": "literalExpression", "text": "\"/var/spool/cups-pdf-{instance-name}/anonymous\""}, "description": {"_type": "mdDoc", "text": "path for anonymously created PDF files"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/cups-pdf\""}, "loc": ["services", "printing", "cups-pdf", "instances", "<name>", "settings", "AnonDirName"], "readOnly": false, "type": "null or (optionally newline-terminated) single-line string"}, "services.printing.cups-pdf.instances.<name>.settings.Anonuser": {"declarations": ["nixos/modules/services/printing/cups-pdf.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "User for anonymous PDF creation.\nAn empty string disables this feature.\n"}, "loc": ["services", "printing", "cups-pdf", "instances", "<name>", "settings", "Anonuser"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "services.printing.cups-pdf.instances.<name>.settings.GhostScript": {"declarations": ["nixos/modules/services/printing/cups-pdf.nix"], "default": {"_type": "literalExpression", "text": "lib.getExe pkgs.ghostscript"}, "description": {"_type": "mdDoc", "text": "location of GhostScript binary"}, "example": {"_type": "literalExpression", "text": "${pkgs.ghostscript}/bin/ps2pdf"}, "loc": ["services", "printing", "cups-pdf", "instances", "<name>", "settings", "GhostScript"], "readOnly": false, "type": "null or path"}, "services.printing.cups-pdf.instances.<name>.settings.Out": {"declarations": ["nixos/modules/services/printing/cups-pdf.nix"], "default": {"_type": "literalExpression", "text": "\"/var/spool/cups-pdf-{instance-name}/users/\\${USER}\""}, "description": {"_type": "mdDoc", "text": "output directory;\n`${HOME}` will be expanded to the user's home directory,\n`${USER}` will be expanded to the user name.\n"}, "example": {"_type": "literalExpression", "text": "\"\\${HOME}/cups-pdf\""}, "loc": ["services", "printing", "cups-pdf", "instances", "<name>", "settings", "Out"], "readOnly": false, "type": "null or (optionally newline-terminated) single-line string"}, "services.printing.cups-pdf.instances.<name>.settings.Spool": {"declarations": ["nixos/modules/services/printing/cups-pdf.nix"], "default": {"_type": "literalExpression", "text": "\"/var/spool/cups-pdf-{instance-name}/spool\""}, "description": {"_type": "mdDoc", "text": "spool directory"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/cups-pdf\""}, "loc": ["services", "printing", "cups-pdf", "instances", "<name>", "settings", "Spool"], "readOnly": false, "type": "null or (optionally newline-terminated) single-line string"}, "services.printing.defaultShared": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Specifies whether local printers are shared by default.\n"}, "loc": ["services", "printing", "defaultShared"], "readOnly": false, "type": "boolean"}, "services.printing.drivers": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "CUPS drivers to use. Drivers provided by CUPS, cups-filters,\nGhostscript and Samba are added unconditionally. If this list contains\nGutenprint (i.e. a derivation with\n`meta.isGutenprint = true`) the PPD files in\n{file}`/var/lib/cups/ppd` will be updated automatically\nto avoid errors due to incompatible versions.\n"}, "example": {"_type": "literalExpression", "text": "with pkgs; [ gutenprint hplip splix ]"}, "loc": ["services", "printing", "drivers"], "readOnly": false, "type": "list of path"}, "services.printing.enable": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable printing support through the CUPS daemon.\n"}, "loc": ["services", "printing", "enable"], "readOnly": false, "type": "boolean"}, "services.printing.extraConf": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra contents of the configuration file of the CUPS daemon\n({file}`cupsd.conf`).\n"}, "example": {"_type": "literalExpression", "text": "''\n  BrowsePoll cups.example.com\n  MaxCopies 42\n''"}, "loc": ["services", "printing", "extraConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.printing.extraFilesConf": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra contents of the configuration file of the CUPS daemon\n({file}`cups-files.conf`).\n"}, "loc": ["services", "printing", "extraFilesConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.printing.listenAddresses": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"localhost:631\"\n]"}, "description": {"_type": "mdDoc", "text": "A list of addresses and ports on which to listen.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"*:631\"\n]"}, "loc": ["services", "printing", "listenAddresses"], "readOnly": false, "type": "list of string"}, "services.printing.logLevel": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Specifies the cupsd logging verbosity.\n"}, "example": {"_type": "literalExpression", "text": "\"debug\""}, "loc": ["services", "printing", "logLevel"], "readOnly": false, "type": "string"}, "services.printing.snmpConf": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "''\n  Address @LOCAL\n''"}, "description": {"_type": "mdDoc", "text": "The contents of {file}`/etc/cups/snmp.conf`. See \"man\ncups-snmp.conf\" for a complete description.\n"}, "loc": ["services", "printing", "snmpConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.printing.startWhenNeeded": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set, CUPS is socket-activated; that is,\ninstead of having it permanently running as a daemon,\nsystemd will start it on the first incoming connection.\n"}, "loc": ["services", "printing", "startWhenNeeded"], "readOnly": false, "type": "boolean"}, "services.printing.stateless": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, all state directories relating to CUPS will be removed on\nstartup of the service.\n"}, "loc": ["services", "printing", "stateless"], "readOnly": false, "type": "boolean"}, "services.printing.tempDir": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "\"/tmp\""}, "description": {"_type": "mdDoc", "text": "CUPSd temporary directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/tmp/cups\""}, "loc": ["services", "printing", "tempDir"], "readOnly": false, "type": "path"}, "services.printing.webInterface": {"declarations": ["nixos/modules/services/printing/cupsd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Specifies whether the web interface is enabled.\n"}, "loc": ["services", "printing", "webInterface"], "readOnly": false, "type": "boolean"}, "services.privacyidea.adminEmail": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "description": {"_type": "mdDoc", "text": "Mail address for the admin user"}, "example": {"_type": "literalExpression", "text": "\"admin@example.com\""}, "loc": ["services", "privacyidea", "adminEmail"], "readOnly": false, "type": "string"}, "services.privacyidea.adminPasswordFile": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "description": {"_type": "mdDoc", "text": "File containing password for the admin user"}, "loc": ["services", "privacyidea", "adminPasswordFile"], "readOnly": false, "type": "path"}, "services.privacyidea.auditKeyPrivate": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.privacyidea.stateDir}/private.pem\""}, "description": {"_type": "mdDoc", "text": "Private Key for signing the audit log.\n"}, "loc": ["services", "privacyidea", "auditKeyPrivate"], "readOnly": false, "type": "string"}, "services.privacyidea.auditKeyPublic": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.privacyidea.stateDir}/public.pem\""}, "description": {"_type": "mdDoc", "text": "Public key for checking signatures of the audit log.\n"}, "loc": ["services", "privacyidea", "auditKeyPublic"], "readOnly": false, "type": "string"}, "services.privacyidea.enable": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PrivacyIDEA."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "privacyidea", "enable"], "readOnly": false, "type": "boolean"}, "services.privacyidea.encFile": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.privacyidea.stateDir}/enckey\""}, "description": {"_type": "mdDoc", "text": "This is used to encrypt the token data and token passwords\n"}, "loc": ["services", "privacyidea", "encFile"], "readOnly": false, "type": "string"}, "services.privacyidea.environmentFile": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File to load as environment file. Environment variables\nfrom this file will be interpolated into the config file\nusing `envsubst` which is helpful for specifying\nsecrets:\n```\n{ services.privacyidea.secretKey = \"$SECRET\"; }\n```\n\nThe environment-file can now specify the actual secret key:\n```\nSECRET=veryverytopsecret\n```\n"}, "example": {"_type": "literalExpression", "text": "\"/root/privacyidea.env\""}, "loc": ["services", "privacyidea", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.privacyidea.extraConfig": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options for pi.cfg.\n"}, "loc": ["services", "privacyidea", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.privacyidea.group": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "\"privacyidea\""}, "description": {"_type": "mdDoc", "text": "Group account under which PrivacyIDEA runs."}, "loc": ["services", "privacyidea", "group"], "readOnly": false, "type": "string"}, "services.privacyidea.ldap-proxy.configFile": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to PrivacyIDEA LDAP Proxy configuration (proxy.ini).\n"}, "loc": ["services", "privacyidea", "ldap-proxy", "configFile"], "readOnly": false, "type": "null or path"}, "services.privacyidea.ldap-proxy.enable": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PrivacyIDEA LDAP Proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "privacyidea", "ldap-proxy", "enable"], "readOnly": false, "type": "boolean"}, "services.privacyidea.ldap-proxy.environmentFile": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file containing secrets to be substituted into\n[](#opt-services.privacyidea.ldap-proxy.settings).\n"}, "loc": ["services", "privacyidea", "ldap-proxy", "environmentFile"], "readOnly": false, "type": "null or string"}, "services.privacyidea.ldap-proxy.group": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "\"pi-ldap-proxy\""}, "description": {"_type": "mdDoc", "text": "Group account under which PrivacyIDEA LDAP proxy runs."}, "loc": ["services", "privacyidea", "ldap-proxy", "group"], "readOnly": false, "type": "string"}, "services.privacyidea.ldap-proxy.settings": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute-set containing the settings for `privacyidea-ldap-proxy`.\nIt's possible to pass secrets using env-vars as substitutes and\nuse the option [](#opt-services.privacyidea.ldap-proxy.environmentFile)\nto inject them via `envsubst`.\n"}, "loc": ["services", "privacyidea", "ldap-proxy", "settings"], "readOnly": false, "type": "attribute set of attribute set of (string or boolean or signed integer or list of string)"}, "services.privacyidea.ldap-proxy.user": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "\"pi-ldap-proxy\""}, "description": {"_type": "mdDoc", "text": "User account under which PrivacyIDEA LDAP proxy runs."}, "loc": ["services", "privacyidea", "ldap-proxy", "user"], "readOnly": false, "type": "string"}, "services.privacyidea.pepper": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "description": {"_type": "mdDoc", "text": "This is used to encrypt the admin passwords.\n"}, "example": {"_type": "literalExpression", "text": "\"Never know...\""}, "loc": ["services", "privacyidea", "pepper"], "readOnly": false, "type": "string"}, "services.privacyidea.secretKey": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "description": {"_type": "mdDoc", "text": "This is used to encrypt the auth_token.\n"}, "example": {"_type": "literalExpression", "text": "\"t0p s3cr3t\""}, "loc": ["services", "privacyidea", "secretKey"], "readOnly": false, "type": "string"}, "services.privacyidea.stateDir": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/privacyidea\""}, "description": {"_type": "mdDoc", "text": "Directory where all PrivacyIDEA files will be placed by default.\n"}, "loc": ["services", "privacyidea", "stateDir"], "readOnly": false, "type": "string"}, "services.privacyidea.superuserRealm": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"super\"\n  \"administrators\"\n]"}, "description": {"_type": "mdDoc", "text": "The realm where users are allowed to login as administrators.\n"}, "loc": ["services", "privacyidea", "superuserRealm"], "readOnly": false, "type": "list of string"}, "services.privacyidea.tokenjanitor.action": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "description": {"_type": "mdDoc", "text": "Which action to take for matching tokens.\n"}, "loc": ["services", "privacyidea", "tokenjanitor", "action"], "readOnly": false, "type": "one of \"delete\", \"mark\", \"disable\", \"unassign\""}, "services.privacyidea.tokenjanitor.enable": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic runs of the token janitor."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "privacyidea", "tokenjanitor", "enable"], "readOnly": false, "type": "boolean"}, "services.privacyidea.tokenjanitor.interval": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "\"quarterly\""}, "description": {"_type": "mdDoc", "text": "Interval in which the cleanup program is supposed to run.\nSee {manpage}`systemd.time(7)` for further information.\n"}, "loc": ["services", "privacyidea", "tokenjanitor", "interval"], "readOnly": false, "type": "string"}, "services.privacyidea.tokenjanitor.orphaned": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to search for **orphaned** tokens\nand apply [](#opt-services.privacyidea.tokenjanitor.action)\nonto them.\n"}, "loc": ["services", "privacyidea", "tokenjanitor", "orphaned"], "readOnly": false, "type": "boolean"}, "services.privacyidea.tokenjanitor.unassigned": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to search for **unassigned** tokens\nand apply [](#opt-services.privacyidea.tokenjanitor.action)\nonto them.\n"}, "loc": ["services", "privacyidea", "tokenjanitor", "unassigned"], "readOnly": false, "type": "boolean"}, "services.privacyidea.user": {"declarations": ["nixos/modules/services/security/privacyidea.nix"], "default": {"_type": "literalExpression", "text": "\"privacyidea\""}, "description": {"_type": "mdDoc", "text": "User account under which PrivacyIDEA runs."}, "loc": ["services", "privacyidea", "user"], "readOnly": false, "type": "string"}, "services.privoxy.certsLifetime": {"declarations": ["nixos/modules/services/networking/privoxy.nix"], "default": {"_type": "literalExpression", "text": "\"10d\""}, "description": {"_type": "mdDoc", "text": "If `inspectHttps` is enabled, the time generated HTTPS\ncertificates will be stored in a temporary directory for reuse. Once\nthe lifetime has expired the directory will cleared and the certificate\nwill have to be generated again, on-demand.\n\nDepending on the traffic, you may want to reduce the lifetime to limit\nthe disk usage, since Privoxy itself never deletes the certificates.\n\n::: {.note}\nThe format is that of the `tmpfiles.d(5)`\nAge parameter.\n:::\n"}, "example": {"_type": "literalExpression", "text": "\"12h\""}, "loc": ["services", "privoxy", "certsLifetime"], "readOnly": false, "type": "tmpfiles.d(5) age format"}, "services.privoxy.enable": {"declarations": ["nixos/modules/services/networking/privoxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Privoxy, non-caching filtering proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "privoxy", "enable"], "readOnly": false, "type": "boolean"}, "services.privoxy.enableTor": {"declarations": ["nixos/modules/services/networking/privoxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to configure Privoxy to use Tor's faster SOCKS port,\nsuitable for HTTP.\n"}, "loc": ["services", "privoxy", "enableTor"], "readOnly": false, "type": "boolean"}, "services.privoxy.inspectHttps": {"declarations": ["nixos/modules/services/networking/privoxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to configure Privoxy to inspect HTTPS requests, meaning all\nencrypted traffic will be filtered as well. This works by decrypting\nand re-encrypting the requests using a per-domain generated certificate.\n\nTo issue per-domain certificates, Privoxy must be provided with a CA\ncertificate, using the `ca-cert-file`,\n`ca-key-file` settings.\n\n::: {.warning}\nThe CA certificate must also be added to the system trust roots,\notherwise browsers will reject all Privoxy certificates as invalid.\nYou can do so by using the option\n{option}`security.pki.certificateFiles`.\n:::\n"}, "loc": ["services", "privoxy", "inspectHttps"], "readOnly": false, "type": "boolean"}, "services.privoxy.settings": {"declarations": ["nixos/modules/services/networking/privoxy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option is mapped to the main Privoxy configuration file.\nCheck out the Privoxy user manual at\n<https://www.privoxy.org/user-manual/config.html>\nfor available settings and documentation.\n\n::: {.note}\nRepeated settings can be represented by using a list.\n:::\n"}, "example": {"_type": "literalExpression", "text": "{ # Listen on IPv6 only\n  listen-address = \"[::]:8118\";\n\n  # Forward .onion requests to Tor\n  forward-socks5 = \".onion localhost:9050 .\";\n\n  # Log redirects and filters\n  debug = [ 128 64 ];\n  # This is equivalent to writing these lines\n  # in the Privoxy configuration file:\n  # debug 128\n  # debug 64\n}\n"}, "loc": ["services", "privoxy", "settings"], "readOnly": false, "type": "privoxy configuration type. The format consists of an attribute\nset of settings. Each setting can be either a value (integer, string,\nboolean or path) or a list of such values.\n"}, "services.privoxy.settings.actionsfile": {"declarations": ["nixos/modules/services/networking/privoxy.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"match-all.action\"\n  \"default.action\"\n]"}, "description": {"_type": "mdDoc", "text": "List of paths to Privoxy action files. These paths may either be\nabsolute or relative to the privoxy configuration directory.\n"}, "loc": ["services", "privoxy", "settings", "actionsfile"], "readOnly": false, "type": "list of string"}, "services.privoxy.settings.enable-edit-actions": {"declarations": ["nixos/modules/services/networking/privoxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the web-based actions file editor may be used."}, "loc": ["services", "privoxy", "settings", "enable-edit-actions"], "readOnly": false, "type": "boolean"}, "services.privoxy.settings.filterfile": {"declarations": ["nixos/modules/services/networking/privoxy.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"default.filter\"\n]"}, "description": {"_type": "mdDoc", "text": "List of paths to Privoxy filter files. These paths may either be\nabsolute or relative to the privoxy configuration directory.\n"}, "loc": ["services", "privoxy", "settings", "filterfile"], "readOnly": false, "type": "list of string"}, "services.privoxy.settings.listen-address": {"declarations": ["nixos/modules/services/networking/privoxy.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:8118\""}, "description": {"_type": "mdDoc", "text": "Pair of address:port the proxy server is listening to."}, "loc": ["services", "privoxy", "settings", "listen-address"], "readOnly": false, "type": "string"}, "services.privoxy.userActions": {"declarations": ["nixos/modules/services/networking/privoxy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Actions to be included in a `user.action` file. This\nwill have a higher priority and can be used to override all other\nactions.\n"}, "loc": ["services", "privoxy", "userActions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.privoxy.userFilters": {"declarations": ["nixos/modules/services/networking/privoxy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Filters to be included in a `user.filter` file. This\nwill have a higher priority and can be used to override all other\nfilters definitions.\n"}, "loc": ["services", "privoxy", "userFilters"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.prometheus.alertmanager.checkConfig": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Check configuration with `amtool check-config`. The call to `amtool` is\nsubject to sandboxing by Nix.\n\nIf you use credentials stored in external files\n(`environmentFile`, etc),\nthey will not be visible to `amtool`\nand it will report errors, despite a correct configuration.\n"}, "loc": ["services", "prometheus", "alertmanager", "checkConfig"], "readOnly": false, "type": "boolean"}, "services.prometheus.alertmanager.clusterPeers": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Initial peers for HA cluster.\n"}, "loc": ["services", "prometheus", "alertmanager", "clusterPeers"], "readOnly": false, "type": "list of string"}, "services.prometheus.alertmanager.configText": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alertmanager configuration as YAML text. If non-null, this option\ndefines the text that is written to alertmanager.yml. If null, the\ncontents of alertmanager.yml is generated from the structured config\noptions.\n"}, "loc": ["services", "prometheus", "alertmanager", "configText"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.prometheus.alertmanager.configuration": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alertmanager configuration as nix attribute set.\n"}, "loc": ["services", "prometheus", "alertmanager", "configuration"], "readOnly": false, "type": "null or (attribute set)"}, "services.prometheus.alertmanager.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Prometheus Alertmanager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "alertmanager", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.alertmanager.environmentFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File to load as environment file. Environment variables\nfrom this file will be interpolated into the config file\nusing envsubst with this syntax:\n`$ENVIRONMENT ${VARIABLE}`\n"}, "example": {"_type": "literalExpression", "text": "\"/root/alertmanager.env\""}, "loc": ["services", "prometheus", "alertmanager", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.prometheus.alertmanager.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options when launching the Alertmanager.\n"}, "loc": ["services", "prometheus", "alertmanager", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.alertmanager.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Address to listen on for the web interface and API. Empty string will listen on all interfaces.\n\"localhost\" will listen on 127.0.0.1 (but not ::1).\n"}, "loc": ["services", "prometheus", "alertmanager", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.alertmanager.logFormat": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set use a syslog logger or JSON logging.\n"}, "loc": ["services", "prometheus", "alertmanager", "logFormat"], "readOnly": false, "type": "null or string"}, "services.prometheus.alertmanager.logLevel": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "\"warn\""}, "description": {"_type": "mdDoc", "text": "Only log messages with the given severity or above.\n"}, "loc": ["services", "prometheus", "alertmanager", "logLevel"], "readOnly": false, "type": "one of \"debug\", \"info\", \"warn\", \"error\", \"fatal\""}, "services.prometheus.alertmanager.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "alertmanager", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.alertmanager.package": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "pkgs.alertmanager"}, "description": {"_type": "mdDoc", "text": "Package that should be used for alertmanager.\n"}, "loc": ["services", "prometheus", "alertmanager", "package"], "readOnly": false, "type": "package"}, "services.prometheus.alertmanager.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "9093"}, "description": {"_type": "mdDoc", "text": "Port to listen on for the web interface and API.\n"}, "loc": ["services", "prometheus", "alertmanager", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.alertmanager.webExternalUrl": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL under which Alertmanager is externally reachable (for example, if Alertmanager is served via a reverse proxy).\nUsed for generating relative and absolute links back to Alertmanager itself.\nIf the URL has a path portion, it will be used to prefix all HTTP endoints served by Alertmanager.\nIf omitted, relevant URL components will be derived automatically.\n"}, "loc": ["services", "prometheus", "alertmanager", "webExternalUrl"], "readOnly": false, "type": "null or string"}, "services.prometheus.alertmanagerIrcRelay.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager-irc-relay.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Alertmanager IRC Relay."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "alertmanagerIrcRelay", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.alertmanagerIrcRelay.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager-irc-relay.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line options to pass to alertmanager-irc-relay."}, "loc": ["services", "prometheus", "alertmanagerIrcRelay", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.alertmanagerIrcRelay.package": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager-irc-relay.nix"], "default": {"_type": "literalExpression", "text": "pkgs.alertmanager-irc-relay"}, "description": {"_type": "mdDoc", "text": "Alertmanager IRC Relay package to use."}, "loc": ["services", "prometheus", "alertmanagerIrcRelay", "package"], "readOnly": false, "type": "package"}, "services.prometheus.alertmanagerIrcRelay.settings": {"declarations": ["nixos/modules/services/monitoring/prometheus/alertmanager-irc-relay.nix"], "description": {"_type": "mdDoc", "text": "Configuration for Alertmanager IRC Relay as a Nix attribute set.\nFor a reference, check out the\n[example configuration](https://github.com/google/alertmanager-irc-relay#configuring-and-running-the-bot)\nand the\n[source code](https://github.com/google/alertmanager-irc-relay/blob/master/config.go).\n\nNote: The webhook's URL MUST point to the IRC channel where the message\nshould be posted. For `#mychannel` from the example, this would be\n`http://localhost:8080/mychannel`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  http_host = \"localhost\";\n  http_port = 8000;\n\n  irc_host = \"irc.example.com\";\n  irc_port = 7000;\n  irc_nickname = \"myalertbot\";\n\n  irc_channels = [\n    { name = \"#mychannel\"; }\n  ];\n}\n"}, "loc": ["services", "prometheus", "alertmanagerIrcRelay", "settings"], "readOnly": false, "type": "YAML value"}, "services.prometheus.alertmanagerNotificationQueueCapacity": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "10000"}, "description": {"_type": "mdDoc", "text": "The capacity of the queue for pending alert manager notifications.\n"}, "loc": ["services", "prometheus", "alertmanagerNotificationQueueCapacity"], "readOnly": false, "type": "signed integer"}, "services.prometheus.alertmanagers": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of alertmanagers to send alerts to.\nSee [the official documentation](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#alertmanager_config) for more information.\n"}, "example": {"_type": "literalExpression", "text": "[ {\n  scheme = \"https\";\n  path_prefix = \"/alertmanager\";\n  static_configs = [ {\n    targets = [\n      \"prometheus.domain.tld\"\n    ];\n  } ];\n} ]\n"}, "loc": ["services", "prometheus", "alertmanagers"], "readOnly": false, "type": "list of (attribute set)"}, "services.prometheus.checkConfig": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Check configuration with `promtool check`. The call to `promtool` is\nsubject to sandboxing by Nix.\n\nIf you use credentials stored in external files\n(`password_file`, `bearer_token_file`, etc),\nthey will not be visible to `promtool`\nand it will report errors, despite a correct configuration.\nTo resolve this, you may set this option to `\"syntax-only\"`\nin order to only syntax check the Prometheus configuration.\n"}, "example": {"_type": "literalExpression", "text": "\"syntax-only\""}, "loc": ["services", "prometheus", "checkConfig"], "readOnly": false, "type": "boolean or value \"syntax-only\" (singular enum)"}, "services.prometheus.configText": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If non-null, this option defines the text that is written to\nprometheus.yml. If null, the contents of prometheus.yml is generated\nfrom the structured config options.\n"}, "loc": ["services", "prometheus", "configText"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.prometheus.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Prometheus monitoring daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.enableReload": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Reload prometheus when configuration file changes (instead of restart).\n\nThe following property holds: switching to a configuration\n(`switch-to-configuration`) that changes the prometheus\nconfiguration only finishes successfully when prometheus has finished\nloading the new configuration.\n"}, "loc": ["services", "prometheus", "enableReload"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Prometheus exporter configuration"}, "example": {"_type": "literalExpression", "text": "{\n  node = {\n    enable = true;\n    enabledCollectors = [ \"systemd\" ];\n  };\n  varnish.enable = true;\n}\n"}, "loc": ["services", "prometheus", "exporters"], "readOnly": false, "type": "submodule"}, "services.prometheus.exporters.apcupsd.apcupsdAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\":3551\""}, "description": {"_type": "mdDoc", "text": "Address of the apcupsd Network Information Server (NIS).\n"}, "loc": ["services", "prometheus", "exporters", "apcupsd", "apcupsdAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.apcupsd.apcupsdNetwork": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"tcp\""}, "description": {"_type": "mdDoc", "text": "Network of the apcupsd Network Information Server (NIS): one of \"tcp\", \"tcp4\", or \"tcp6\".\n"}, "loc": ["services", "prometheus", "exporters", "apcupsd", "apcupsdNetwork"], "readOnly": false, "type": "one of \"tcp\", \"tcp4\", \"tcp6\""}, "services.prometheus.exporters.apcupsd.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus apcupsd exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "apcupsd", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.apcupsd.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the apcupsd exporter.\n"}, "loc": ["services", "prometheus", "exporters", "apcupsd", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.apcupsd.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.apcupsd.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9162\"\n"}, "loc": ["services", "prometheus", "exporters", "apcupsd", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.apcupsd.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"apcupsd-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the apcupsd exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "apcupsd", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.apcupsd.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "apcupsd", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.apcupsd.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "apcupsd", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.apcupsd.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9162"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "apcupsd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.apcupsd.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"apcupsd-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the apcupsd exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "apcupsd", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.artifactory.artiAccessToken": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Access token for authentication against JFrog Artifactory API.\nOne of the password or access token needs to be set.\n"}, "loc": ["services", "prometheus", "exporters", "artifactory", "artiAccessToken"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.artifactory.artiPassword": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Password for authentication against JFrog Artifactory API.\nOne of the password or access token needs to be set.\n"}, "loc": ["services", "prometheus", "exporters", "artifactory", "artiPassword"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.artifactory.artiUsername": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Username for authentication against JFrog Artifactory API.\n"}, "loc": ["services", "prometheus", "exporters", "artifactory", "artiUsername"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.artifactory.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus artifactory exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "artifactory", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.artifactory.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the artifactory exporter.\n"}, "loc": ["services", "prometheus", "exporters", "artifactory", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.artifactory.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.artifactory.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9531\"\n"}, "loc": ["services", "prometheus", "exporters", "artifactory", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.artifactory.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"artifactory-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the artifactory exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "artifactory", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.artifactory.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "artifactory", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.artifactory.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "artifactory", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.artifactory.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9531"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "artifactory", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.artifactory.scrapeUri": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:8081/artifactory\""}, "description": {"_type": "mdDoc", "text": "URI on which to scrape JFrog Artifactory.\n"}, "loc": ["services", "prometheus", "exporters", "artifactory", "scrapeUri"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.artifactory.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"artifactory-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the artifactory exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "artifactory", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.bind.bindGroups": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"server\"\n  \"view\"\n]"}, "description": {"_type": "mdDoc", "text": "List of statistics to collect. Available: [server, view, tasks]\n"}, "loc": ["services", "prometheus", "exporters", "bind", "bindGroups"], "readOnly": false, "type": "list of (one of \"server\", \"view\", \"tasks\")"}, "services.prometheus.exporters.bind.bindTimeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"10s\""}, "description": {"_type": "mdDoc", "text": "Timeout for trying to get stats from Bind.\n"}, "loc": ["services", "prometheus", "exporters", "bind", "bindTimeout"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.bind.bindURI": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:8053/\""}, "description": {"_type": "mdDoc", "text": "HTTP XML API address of an Bind server.\n"}, "loc": ["services", "prometheus", "exporters", "bind", "bindURI"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.bind.bindVersion": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"auto\""}, "description": {"_type": "mdDoc", "text": "BIND statistics version. Can be detected automatically.\n"}, "loc": ["services", "prometheus", "exporters", "bind", "bindVersion"], "readOnly": false, "type": "one of \"xml.v2\", \"xml.v3\", \"auto\""}, "services.prometheus.exporters.bind.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus bind exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "bind", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.bind.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the bind exporter.\n"}, "loc": ["services", "prometheus", "exporters", "bind", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.bind.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.bind.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9119\"\n"}, "loc": ["services", "prometheus", "exporters", "bind", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.bind.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"bind-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the bind exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "bind", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.bind.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "bind", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.bind.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "bind", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.bind.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9119"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "bind", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.bind.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"bind-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the bind exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "bind", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.bird.birdSocket": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/run/bird/bird.ctl\""}, "description": {"_type": "mdDoc", "text": "Path to BIRD2 (or BIRD1 v4) socket.\n"}, "loc": ["services", "prometheus", "exporters", "bird", "birdSocket"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.bird.birdVersion": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Specifies whether BIRD1 or BIRD2 is in use.\n"}, "loc": ["services", "prometheus", "exporters", "bird", "birdVersion"], "readOnly": false, "type": "one of 1, 2"}, "services.prometheus.exporters.bird.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus bird exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "bird", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.bird.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the bird exporter.\n"}, "loc": ["services", "prometheus", "exporters", "bird", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.bird.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.bird.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9324\"\n"}, "loc": ["services", "prometheus", "exporters", "bird", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.bird.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"bird-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the bird exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "bird", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.bird.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "bird", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.bird.newMetricFormat": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable the new more-generic metric format.\n"}, "loc": ["services", "prometheus", "exporters", "bird", "newMetricFormat"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.bird.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "bird", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.bird.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9324"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "bird", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.bird.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"bird-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the bird exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "bird", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.bitcoin.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus bitcoin exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.bitcoin.extraEnv": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables for the exporter.\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "extraEnv"], "readOnly": false, "type": "attribute set of string"}, "services.prometheus.exporters.bitcoin.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the bitcoin exporter.\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.bitcoin.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.bitcoin.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9332\"\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.bitcoin.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"bitcoin-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the bitcoin exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.bitcoin.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.bitcoin.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.bitcoin.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9332"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.bitcoin.refreshSeconds": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "300"}, "description": {"_type": "mdDoc", "text": "How often to ask bitcoind for metrics.\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "refreshSeconds"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.prometheus.exporters.bitcoin.rpcHost": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "RPC host.\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "rpcHost"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.bitcoin.rpcPasswordFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "File containing RPC password.\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "rpcPasswordFile"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.bitcoin.rpcPort": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "8332"}, "description": {"_type": "mdDoc", "text": "RPC port number.\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "rpcPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.bitcoin.rpcScheme": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"http\""}, "description": {"_type": "mdDoc", "text": "Whether to connect to bitcoind over http or https.\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "rpcScheme"], "readOnly": false, "type": "one of \"http\", \"https\""}, "services.prometheus.exporters.bitcoin.rpcUser": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"bitcoinrpc\""}, "description": {"_type": "mdDoc", "text": "RPC user name.\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "rpcUser"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.bitcoin.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"bitcoin-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the bitcoin exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "bitcoin", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.blackbox.configFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Path to configuration file.\n"}, "loc": ["services", "prometheus", "exporters", "blackbox", "configFile"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.blackbox.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus blackbox exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "blackbox", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.blackbox.enableConfigCheck": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to run a correctness check for the configuration file. This depends\non the configuration file residing in the nix-store. Paths passed as string will\nbe copied to the store.\n"}, "loc": ["services", "prometheus", "exporters", "blackbox", "enableConfigCheck"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.blackbox.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the blackbox exporter.\n"}, "loc": ["services", "prometheus", "exporters", "blackbox", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.blackbox.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.blackbox.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9115\"\n"}, "loc": ["services", "prometheus", "exporters", "blackbox", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.blackbox.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"blackbox-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the blackbox exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "blackbox", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.blackbox.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "blackbox", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.blackbox.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "blackbox", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.blackbox.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9115"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "blackbox", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.blackbox.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"blackbox-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the blackbox exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "blackbox", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.buildkite-agent.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus buildkite-agent exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "buildkite-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.buildkite-agent.endpoint": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"https://agent.buildkite.com/v3\""}, "description": {"_type": "mdDoc", "text": "The Buildkite Agent API endpoint.\n"}, "loc": ["services", "prometheus", "exporters", "buildkite-agent", "endpoint"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.buildkite-agent.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the buildkite-agent exporter.\n"}, "loc": ["services", "prometheus", "exporters", "buildkite-agent", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.buildkite-agent.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.buildkite-agent.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9876\"\n"}, "loc": ["services", "prometheus", "exporters", "buildkite-agent", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.buildkite-agent.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"buildkite-agent-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the buildkite-agent exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "buildkite-agent", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.buildkite-agent.interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"30s\""}, "description": {"_type": "mdDoc", "text": "How often to update metrics.\n"}, "example": {"_type": "literalExpression", "text": "\"1min\""}, "loc": ["services", "prometheus", "exporters", "buildkite-agent", "interval"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.buildkite-agent.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "buildkite-agent", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.buildkite-agent.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "buildkite-agent", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.buildkite-agent.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9876"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "buildkite-agent", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.buildkite-agent.queues": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Which specific queues to process.\n"}, "example": {"_type": "literalExpression", "text": "[ \"my-queue1\" \"my-queue2\" ]"}, "loc": ["services", "prometheus", "exporters", "buildkite-agent", "queues"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.exporters.buildkite-agent.tokenPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "The token from your Buildkite \"Agents\" page.\n\nA run-time path to the token file, which is supposed to be provisioned\noutside of Nix store.\n"}, "loc": ["services", "prometheus", "exporters", "buildkite-agent", "tokenPath"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.buildkite-agent.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"buildkite-agent-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the buildkite-agent exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "buildkite-agent", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.collectd.collectdBinary.authFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File mapping user names to pre-shared keys (passwords)."}, "loc": ["services", "prometheus", "exporters", "collectd", "collectdBinary", "authFile"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.collectd.collectdBinary.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable collectd binary protocol receiver."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "collectd", "collectdBinary", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.collectd.collectdBinary.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on for binary network packets.\n"}, "loc": ["services", "prometheus", "exporters", "collectd", "collectdBinary", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.collectd.collectdBinary.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "25826"}, "description": {"_type": "mdDoc", "text": "Network address on which to accept collectd binary network packets."}, "loc": ["services", "prometheus", "exporters", "collectd", "collectdBinary", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.collectd.collectdBinary.securityLevel": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"None\""}, "description": {"_type": "mdDoc", "text": "Minimum required security level for accepted packets.\n"}, "loc": ["services", "prometheus", "exporters", "collectd", "collectdBinary", "securityLevel"], "readOnly": false, "type": "one of \"None\", \"Sign\", \"Encrypt\""}, "services.prometheus.exporters.collectd.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus collectd exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "collectd", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.collectd.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the collectd exporter.\n"}, "loc": ["services", "prometheus", "exporters", "collectd", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.collectd.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.collectd.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9103\"\n"}, "loc": ["services", "prometheus", "exporters", "collectd", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.collectd.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"collectd-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the collectd exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "collectd", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.collectd.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "collectd", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.collectd.logFormat": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"logfmt\""}, "description": {"_type": "mdDoc", "text": "Set the log format.\n"}, "example": {"_type": "literalExpression", "text": "\"json\""}, "loc": ["services", "prometheus", "exporters", "collectd", "logFormat"], "readOnly": false, "type": "one of \"logfmt\", \"json\""}, "services.prometheus.exporters.collectd.logLevel": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Only log messages with the given severity or above.\n"}, "loc": ["services", "prometheus", "exporters", "collectd", "logLevel"], "readOnly": false, "type": "one of \"debug\", \"info\", \"warn\", \"error\", \"fatal\""}, "services.prometheus.exporters.collectd.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "collectd", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.collectd.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9103"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "collectd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.collectd.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"collectd-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the collectd exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "collectd", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dmarc.debug": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to declare enable `--debug`.\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "debug"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.dmarc.deduplicationMaxSeconds": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"7 days (in seconds)\""}, "description": {"_type": "mdDoc", "text": "How long individual report IDs will be remembered to avoid\ncounting double delivered reports twice.\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "deduplicationMaxSeconds"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.prometheus.exporters.dmarc.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus dmarc exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "dmarc", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.dmarc.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the dmarc exporter.\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.dmarc.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.dmarc.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9797\"\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.dmarc.folders.done": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"Archive\""}, "description": {"_type": "mdDoc", "text": "IMAP mailbox that successfully processed reports are moved to.\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "folders", "done"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dmarc.folders.error": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"Invalid\""}, "description": {"_type": "mdDoc", "text": "IMAP mailbox that emails are moved to that could not be processed.\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "folders", "error"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dmarc.folders.inbox": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"INBOX\""}, "description": {"_type": "mdDoc", "text": "IMAP mailbox that is checked for incoming DMARC aggregate reports\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "folders", "inbox"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dmarc.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"dmarc-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the dmarc exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dmarc.imap.host": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Hostname of IMAP server to connect to.\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "imap", "host"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dmarc.imap.passwordFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "File containing the login password for the IMAP connection.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/secrets/dovecot_pw\""}, "loc": ["services", "prometheus", "exporters", "dmarc", "imap", "passwordFile"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dmarc.imap.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "993"}, "description": {"_type": "mdDoc", "text": "Port of the IMAP server to connect to.\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "imap", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.dmarc.imap.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Login username for the IMAP connection.\n"}, "example": {"_type": "literalExpression", "text": "\"postmaster@example.org\""}, "loc": ["services", "prometheus", "exporters", "dmarc", "imap", "username"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dmarc.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dmarc.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.dmarc.pollIntervalSeconds": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "60"}, "description": {"_type": "mdDoc", "text": "How often to poll the IMAP server in seconds.\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "pollIntervalSeconds"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.prometheus.exporters.dmarc.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9797"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.dmarc.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"dmarc-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the dmarc exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "dmarc", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dnsmasq.dnsmasqListenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:53\""}, "description": {"_type": "mdDoc", "text": "Address on which dnsmasq listens.\n"}, "loc": ["services", "prometheus", "exporters", "dnsmasq", "dnsmasqListenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dnsmasq.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus dnsmasq exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "dnsmasq", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.dnsmasq.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the dnsmasq exporter.\n"}, "loc": ["services", "prometheus", "exporters", "dnsmasq", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.dnsmasq.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.dnsmasq.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9153\"\n"}, "loc": ["services", "prometheus", "exporters", "dnsmasq", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.dnsmasq.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"dnsmasq-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the dnsmasq exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "dnsmasq", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dnsmasq.leasesPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/misc/dnsmasq.leases\""}, "description": {"_type": "mdDoc", "text": "Path to the `dnsmasq.leases` file.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/dnsmasq/dnsmasq.leases\""}, "loc": ["services", "prometheus", "exporters", "dnsmasq", "leasesPath"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.dnsmasq.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "dnsmasq", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dnsmasq.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "dnsmasq", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.dnsmasq.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9153"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "dnsmasq", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.dnsmasq.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"dnsmasq-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the dnsmasq exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "dnsmasq", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.domain.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus domain exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "domain", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.domain.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the domain exporter.\n"}, "loc": ["services", "prometheus", "exporters", "domain", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.domain.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.domain.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9222\"\n"}, "loc": ["services", "prometheus", "exporters", "domain", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.domain.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"domain-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the domain exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "domain", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.domain.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "domain", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.domain.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "domain", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.domain.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9222"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "domain", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.domain.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"domain-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the domain exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "domain", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dovecot.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus dovecot exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "dovecot", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.dovecot.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the dovecot exporter.\n"}, "loc": ["services", "prometheus", "exporters", "dovecot", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.dovecot.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.dovecot.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9166\"\n"}, "loc": ["services", "prometheus", "exporters", "dovecot", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.dovecot.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"dovecot-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the dovecot exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "dovecot", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dovecot.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "dovecot", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dovecot.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "dovecot", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.dovecot.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9166"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "dovecot", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.dovecot.scopes": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"user\"\n]"}, "description": {"_type": "mdDoc", "text": "Stats scopes to query.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"user\"\n  \"global\"\n]"}, "loc": ["services", "prometheus", "exporters", "dovecot", "scopes"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.dovecot.socketPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/var/run/dovecot/stats\""}, "description": {"_type": "mdDoc", "text": "Path under which the stats socket is placed.\nThe user/group under which the exporter runs,\nshould be able to access the socket in order\nto scrape the metrics successfully.\n\nPlease keep in mind that the stats module has changed in\n[Dovecot 2.3+](https://wiki2.dovecot.org/Upgrading/2.3) which\nis not [compatible with this exporter](https://github.com/kumina/dovecot_exporter/issues/8).\n\nThe following extra config has to be passed to Dovecot to ensure that recent versions\nwork with this exporter:\n```\n{\n  services.prometheus.exporters.dovecot.enable = true;\n  services.prometheus.exporters.dovecot.socketPath = \"/var/run/dovecot2/old-stats\";\n  services.dovecot2.mailPlugins.globally.enable = [ \"old_stats\" ];\n  services.dovecot2.extraConfig = ''\n    service old-stats {\n      unix_listener old-stats {\n        user = dovecot-exporter\n        group = dovecot-exporter\n        mode = 0660\n      }\n      fifo_listener old-stats-mail {\n        mode = 0660\n        user = dovecot\n        group = dovecot\n      }\n      fifo_listener old-stats-user {\n        mode = 0660\n        user = dovecot\n        group = dovecot\n      }\n    }\n    plugin {\n      old_stats_refresh = 30 secs\n      old_stats_track_cmds = yes\n    }\n  '';\n}\n```\n"}, "example": {"_type": "literalExpression", "text": "\"/var/run/dovecot2/old-stats\""}, "loc": ["services", "prometheus", "exporters", "dovecot", "socketPath"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.dovecot.telemetryPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/metrics\""}, "description": {"_type": "mdDoc", "text": "Path under which to expose metrics.\n"}, "loc": ["services", "prometheus", "exporters", "dovecot", "telemetryPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.dovecot.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"dovecot-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the dovecot exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "dovecot", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.fastly.configFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a fastly-exporter configuration file.\nExample one can be generated with `fastly-exporter --config-file-example`.\n"}, "example": {"_type": "literalExpression", "text": "\"./fastly-exporter-config.txt\""}, "loc": ["services", "prometheus", "exporters", "fastly", "configFile"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.fastly.debug": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Debug logging mode for fastly-exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "fastly", "debug"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.fastly.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus fastly exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "fastly", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.fastly.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the fastly exporter.\n"}, "loc": ["services", "prometheus", "exporters", "fastly", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.fastly.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.fastly.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9118\"\n"}, "loc": ["services", "prometheus", "exporters", "fastly", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.fastly.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"fastly-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the fastly exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "fastly", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.fastly.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "fastly", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.fastly.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "fastly", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.fastly.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9118"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "fastly", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.fastly.tokenPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "A run-time path to the token file, which is supposed to be provisioned\noutside of Nix store.\n"}, "loc": ["services", "prometheus", "exporters", "fastly", "tokenPath"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.fastly.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"fastly-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the fastly exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "fastly", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.flow.asn": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "The ASN being monitored."}, "example": {"_type": "literalExpression", "text": "65542"}, "loc": ["services", "prometheus", "exporters", "flow", "asn"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.prometheus.exporters.flow.brokers": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "List of Kafka brokers to connect to."}, "example": {"_type": "literalExpression", "text": "[ \"kafka.example.org:19092\" ]"}, "loc": ["services", "prometheus", "exporters", "flow", "brokers"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.flow.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus flow exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "flow", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.flow.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the flow exporter.\n"}, "loc": ["services", "prometheus", "exporters", "flow", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.flow.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.flow.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9590\"\n"}, "loc": ["services", "prometheus", "exporters", "flow", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.flow.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"flow-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the flow exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "flow", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.flow.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "flow", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.flow.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "flow", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.flow.partitions": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The number of the partitions to consume, none means all.\n"}, "loc": ["services", "prometheus", "exporters", "flow", "partitions"], "readOnly": false, "type": "list of signed integer"}, "services.prometheus.exporters.flow.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9590"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "flow", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.flow.topic": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "The Kafka topic to consume from."}, "example": {"_type": "literalExpression", "text": "\"pmacct.acct\""}, "loc": ["services", "prometheus", "exporters", "flow", "topic"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.flow.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"flow-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the flow exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "flow", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.fritzbox.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus fritzbox exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "fritzbox", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.fritzbox.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the fritzbox exporter.\n"}, "loc": ["services", "prometheus", "exporters", "fritzbox", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.fritzbox.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.fritzbox.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9133\"\n"}, "loc": ["services", "prometheus", "exporters", "fritzbox", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.fritzbox.gatewayAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"fritz.box\""}, "description": {"_type": "mdDoc", "text": "The hostname or IP of the FRITZ!Box.\n"}, "loc": ["services", "prometheus", "exporters", "fritzbox", "gatewayAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.fritzbox.gatewayPort": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "49000"}, "description": {"_type": "mdDoc", "text": "The port of the FRITZ!Box UPnP service.\n"}, "loc": ["services", "prometheus", "exporters", "fritzbox", "gatewayPort"], "readOnly": false, "type": "signed integer"}, "services.prometheus.exporters.fritzbox.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"fritzbox-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the fritzbox exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "fritzbox", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.fritzbox.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "fritzbox", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.fritzbox.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "fritzbox", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.fritzbox.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9133"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "fritzbox", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.fritzbox.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"fritzbox-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the fritzbox exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "fritzbox", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.influxdb.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus influxdb exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "influxdb", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.influxdb.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the influxdb exporter.\n"}, "loc": ["services", "prometheus", "exporters", "influxdb", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.influxdb.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.influxdb.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9122\"\n"}, "loc": ["services", "prometheus", "exporters", "influxdb", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.influxdb.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"influxdb-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the influxdb exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "influxdb", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.influxdb.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "influxdb", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.influxdb.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "influxdb", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.influxdb.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9122"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "influxdb", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.influxdb.sampleExpiry": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"5m\""}, "description": {"_type": "mdDoc", "text": "How long a sample is valid for"}, "example": {"_type": "literalExpression", "text": "\"10m\""}, "loc": ["services", "prometheus", "exporters", "influxdb", "sampleExpiry"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.influxdb.udpBindAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\":9122\""}, "description": {"_type": "mdDoc", "text": "Address on which to listen for udp packets"}, "example": {"_type": "literalExpression", "text": "\"192.0.2.1:9122\""}, "loc": ["services", "prometheus", "exporters", "influxdb", "udpBindAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.influxdb.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"influxdb-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the influxdb exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "influxdb", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.ipmi.configFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to configuration file.\n"}, "loc": ["services", "prometheus", "exporters", "ipmi", "configFile"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.ipmi.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus ipmi exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "ipmi", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.ipmi.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the ipmi exporter.\n"}, "loc": ["services", "prometheus", "exporters", "ipmi", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.ipmi.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.ipmi.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9290\"\n"}, "loc": ["services", "prometheus", "exporters", "ipmi", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.ipmi.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"ipmi-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the ipmi exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "ipmi", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.ipmi.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "ipmi", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.ipmi.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "ipmi", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.ipmi.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9290"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "ipmi", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.ipmi.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"ipmi-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the ipmi exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "ipmi", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.ipmi.webConfigFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to configuration file that can enable TLS or authentication.\n"}, "loc": ["services", "prometheus", "exporters", "ipmi", "webConfigFile"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.jitsi.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus jitsi exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "jitsi", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.jitsi.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the jitsi exporter.\n"}, "loc": ["services", "prometheus", "exporters", "jitsi", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.jitsi.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.jitsi.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9700\"\n"}, "loc": ["services", "prometheus", "exporters", "jitsi", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.jitsi.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"jitsi-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the jitsi exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "jitsi", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.jitsi.interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"30s\""}, "description": {"_type": "mdDoc", "text": "How often to scrape new data\n"}, "example": {"_type": "literalExpression", "text": "\"1min\""}, "loc": ["services", "prometheus", "exporters", "jitsi", "interval"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.jitsi.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "jitsi", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.jitsi.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "jitsi", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.jitsi.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9700"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "jitsi", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.jitsi.url": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:8080/colibri/stats\""}, "description": {"_type": "mdDoc", "text": "Jitsi Videobridge metrics URL to monitor.\nThis is usually /colibri/stats on port 8080 of the jitsi videobridge host.\n"}, "loc": ["services", "prometheus", "exporters", "jitsi", "url"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.jitsi.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"jitsi-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the jitsi exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "jitsi", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.json.configFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Path to configuration file.\n"}, "loc": ["services", "prometheus", "exporters", "json", "configFile"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.json.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus json exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "json", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.json.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the json exporter.\n"}, "loc": ["services", "prometheus", "exporters", "json", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.json.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.json.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 7979\"\n"}, "loc": ["services", "prometheus", "exporters", "json", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.json.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"json-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the json exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "json", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.json.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "json", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.json.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "json", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.json.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "7979"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "json", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.json.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"json-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the json exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "json", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.kea.controlSocketPaths": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Paths to kea control sockets\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/run/kea/kea-dhcp4.socket\"\n  \"/run/kea/kea-dhcp6.socket\"\n]\n"}, "loc": ["services", "prometheus", "exporters", "kea", "controlSocketPaths"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.kea.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus kea exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "kea", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.kea.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the kea exporter.\n"}, "loc": ["services", "prometheus", "exporters", "kea", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.kea.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.kea.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9547\"\n"}, "loc": ["services", "prometheus", "exporters", "kea", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.kea.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"kea-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the kea exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "kea", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.kea.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "kea", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.kea.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "kea", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.kea.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9547"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "kea", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.kea.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"kea-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the kea exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "kea", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.keylight.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus keylight exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "keylight", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.keylight.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the keylight exporter.\n"}, "loc": ["services", "prometheus", "exporters", "keylight", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.keylight.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.keylight.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9288\"\n"}, "loc": ["services", "prometheus", "exporters", "keylight", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.keylight.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"keylight-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the keylight exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "keylight", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.keylight.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "keylight", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.keylight.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "keylight", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.keylight.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9288"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "keylight", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.keylight.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"keylight-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the keylight exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "keylight", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.knot.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus knot exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "knot", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.knot.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the knot exporter.\n"}, "loc": ["services", "prometheus", "exporters", "knot", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.knot.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.knot.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9433\"\n"}, "loc": ["services", "prometheus", "exporters", "knot", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.knot.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"knot-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the knot exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "knot", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.knot.knotLibraryPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.knot-dns.out}/lib/libknot.so\""}, "description": {"_type": "mdDoc", "text": "Path to the library of `knot-dns`.\n"}, "loc": ["services", "prometheus", "exporters", "knot", "knotLibraryPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.knot.knotSocketPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/run/knot/knot.sock\""}, "description": {"_type": "mdDoc", "text": "Socket path of {manpage}`knotd(8)`.\n"}, "loc": ["services", "prometheus", "exporters", "knot", "knotSocketPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.knot.knotSocketTimeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "2000"}, "description": {"_type": "mdDoc", "text": "Timeout in seconds.\n"}, "loc": ["services", "prometheus", "exporters", "knot", "knotSocketTimeout"], "readOnly": false, "type": "signed integer"}, "services.prometheus.exporters.knot.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "knot", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.knot.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "knot", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.knot.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9433"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "knot", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.knot.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"knot-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the knot exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "knot", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.lnd.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus lnd exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "lnd", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.lnd.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the lnd exporter.\n"}, "loc": ["services", "prometheus", "exporters", "lnd", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.lnd.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.lnd.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9092\"\n"}, "loc": ["services", "prometheus", "exporters", "lnd", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.lnd.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"lnd-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the lnd exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "lnd", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.lnd.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "lnd", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.lnd.lndHost": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:10009\""}, "description": {"_type": "mdDoc", "text": "lnd instance gRPC address:port.\n"}, "loc": ["services", "prometheus", "exporters", "lnd", "lndHost"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.lnd.lndMacaroonDir": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Path to lnd macaroons.\n"}, "loc": ["services", "prometheus", "exporters", "lnd", "lndMacaroonDir"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.lnd.lndTlsPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Path to lnd TLS certificate.\n"}, "loc": ["services", "prometheus", "exporters", "lnd", "lndTlsPath"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.lnd.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "lnd", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.lnd.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9092"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "lnd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.lnd.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"lnd-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the lnd exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "lnd", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.mail.configFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the mailexporter configuration file to use.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "configFile"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.mail.configuration": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the mailexporter configuration file to use.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "configuration"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.exporters.mail.configuration.disableFileDeletion": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disables the exporter's function to delete probing mails.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "configuration", "disableFileDeletion"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.mail.configuration.mailCheckTimeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Timeout until mails are considered \"didn't make it\".\n"}, "loc": ["services", "prometheus", "exporters", "mail", "configuration", "mailCheckTimeout"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.mail.configuration.monitoringInterval": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Time interval between two probe attempts.\n"}, "example": {"_type": "literalExpression", "text": "\"10s\""}, "loc": ["services", "prometheus", "exporters", "mail", "configuration", "monitoringInterval"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.mail.configuration.servers": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of servers that should be probed.\n\n*Note:* if your mailserver has {manpage}`rspamd(8)` configured,\nit can happen that emails from this exporter are marked as spam.\n\nIt's possible to work around the issue with a config like this:\n```\n{\n  services.rspamd.locals.\"multimap.conf\".text = ''\n    ALLOWLIST_PROMETHEUS {\n      filter = \"email:domain:tld\";\n      type = \"from\";\n      map = \"${pkgs.writeText \"allowmap\" \"domain.tld\"}\";\n      score = -100.0;\n    }\n  '';\n}\n```\n"}, "example": {"_type": "literalExpression", "text": "[ {\n  name = \"testserver\";\n  server = \"smtp.domain.tld\";\n  port = 587;\n  from = \"exporteruser@domain.tld\";\n  to = \"exporteruser@domain.tld\";\n  detectionDir = \"/path/to/Maildir/new\";\n} ]\n"}, "loc": ["services", "prometheus", "exporters", "mail", "configuration", "servers"], "readOnly": false, "type": "list of (submodule)"}, "services.prometheus.exporters.mail.configuration.servers.*.detectionDir": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Directory in which new mails for the exporter user are placed.\nNote that this needs to exist when the exporter starts.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/spool/mail/exporteruser/new\""}, "loc": ["services", "prometheus", "exporters", "mail", "configuration", "servers", "*", "detectionDir"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.mail.configuration.servers.*.from": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Content of 'From' Header for probing mails.\n"}, "example": {"_type": "literalExpression", "text": "\"exporteruser@domain.tld\""}, "loc": ["services", "prometheus", "exporters", "mail", "configuration", "servers", "*", "from"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.mail.configuration.servers.*.login": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Username to use for SMTP authentication.\n"}, "example": {"_type": "literalExpression", "text": "\"exporteruser@domain.tld\""}, "loc": ["services", "prometheus", "exporters", "mail", "configuration", "servers", "*", "login"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.mail.configuration.servers.*.name": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Value for label 'configname' which will be added to all metrics.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "configuration", "servers", "*", "name"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.mail.configuration.servers.*.passphrase": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password to use for SMTP authentication.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "configuration", "servers", "*", "passphrase"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.mail.configuration.servers.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Port to use for SMTP.\n"}, "example": {"_type": "literalExpression", "text": "587"}, "loc": ["services", "prometheus", "exporters", "mail", "configuration", "servers", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.mail.configuration.servers.*.server": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Hostname of the server that should be probed.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "configuration", "servers", "*", "server"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.mail.configuration.servers.*.to": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Content of 'To' Header for probing mails.\n"}, "example": {"_type": "literalExpression", "text": "\"exporteruser@domain.tld\""}, "loc": ["services", "prometheus", "exporters", "mail", "configuration", "servers", "*", "to"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.mail.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus mail exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "mail", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.mail.environmentFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing env-vars to be substituted into the exporter's config.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "environmentFile"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.mail.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the mail exporter.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.mail.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.mail.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9225\"\n"}, "loc": ["services", "prometheus", "exporters", "mail", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.mail.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"mail-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the mail exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.mail.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.mail.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.mail.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9225"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.mail.telemetryPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/metrics\""}, "description": {"_type": "mdDoc", "text": "Path under which to expose metrics.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "telemetryPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.mail.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"mail-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the mail exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "mail", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.mikrotik.configFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a mikrotik exporter configuration file. Mutually exclusive with\n{option}`configuration` option.\n"}, "example": {"_type": "literalExpression", "text": "./mikrotik.yml"}, "loc": ["services", "prometheus", "exporters", "mikrotik", "configFile"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.mikrotik.configuration": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Mikrotik exporter configuration as nix attribute set. Mutually exclusive with\n{option}`configFile` option.\n\nSee <https://github.com/nshttpd/mikrotik-exporter/blob/master/README.md>\nfor the description of the configuration file format.\n"}, "example": {"_type": "literalExpression", "text": "{\n  devices = [\n    {\n      name = \"my_router\";\n      address = \"10.10.0.1\";\n      user = \"prometheus\";\n      password = \"changeme\";\n    }\n  ];\n  features = {\n    bgp = true;\n    dhcp = true;\n    routes = true;\n    optics = true;\n  };\n}\n"}, "loc": ["services", "prometheus", "exporters", "mikrotik", "configuration"], "readOnly": false, "type": "null or (attribute set)"}, "services.prometheus.exporters.mikrotik.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus mikrotik exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "mikrotik", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.mikrotik.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the mikrotik exporter.\n"}, "loc": ["services", "prometheus", "exporters", "mikrotik", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.mikrotik.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.mikrotik.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9436\"\n"}, "loc": ["services", "prometheus", "exporters", "mikrotik", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.mikrotik.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"mikrotik-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the mikrotik exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "mikrotik", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.mikrotik.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "mikrotik", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.mikrotik.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "mikrotik", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.mikrotik.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9436"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "mikrotik", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.mikrotik.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"mikrotik-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the mikrotik exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "mikrotik", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.minio.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus minio exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "minio", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.minio.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the minio exporter.\n"}, "loc": ["services", "prometheus", "exporters", "minio", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.minio.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.minio.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9290\"\n"}, "loc": ["services", "prometheus", "exporters", "minio", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.minio.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"minio-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the minio exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "minio", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.minio.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "minio", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.minio.minioAccessKey": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "The value of the Minio access key.\nIt is required in order to connect to the server.\nBy default this uses the one from the local minio server if enabled\nand `config.services.minio.accessKey`.\n"}, "example": {"_type": "literalExpression", "text": "\"yourMinioAccessKey\""}, "loc": ["services", "prometheus", "exporters", "minio", "minioAccessKey"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.minio.minioAccessSecret": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "The value of the Minio access secret.\nIt is required in order to connect to the server.\nBy default this uses the one from the local minio server if enabled\nand `config.services.minio.secretKey`.\n"}, "loc": ["services", "prometheus", "exporters", "minio", "minioAccessSecret"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.minio.minioAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "The URL of the minio server.\nUse HTTPS if Minio accepts secure connections only.\nBy default this connects to the local minio server if enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"https://10.0.0.1:9000\""}, "loc": ["services", "prometheus", "exporters", "minio", "minioAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.minio.minioBucketStats": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect statistics about the buckets and files in buckets.\nIt requires more computation, use it carefully in case of large buckets..\n"}, "loc": ["services", "prometheus", "exporters", "minio", "minioBucketStats"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.minio.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "minio", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.minio.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9290"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "minio", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.minio.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"minio-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the minio exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "minio", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.modemmanager.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus modemmanager exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "modemmanager", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.modemmanager.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the modemmanager exporter.\n"}, "loc": ["services", "prometheus", "exporters", "modemmanager", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.modemmanager.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.modemmanager.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9539\"\n"}, "loc": ["services", "prometheus", "exporters", "modemmanager", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.modemmanager.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"modemmanager-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the modemmanager exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "modemmanager", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.modemmanager.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "modemmanager", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.modemmanager.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "modemmanager", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.modemmanager.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9539"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "modemmanager", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.modemmanager.refreshRate": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"5s\""}, "description": {"_type": "mdDoc", "text": "How frequently ModemManager will refresh the extended signal quality\ninformation for each modem. The duration should be specified in seconds\n(\"5s\"), minutes (\"1m\"), or hours (\"1h\").\n"}, "loc": ["services", "prometheus", "exporters", "modemmanager", "refreshRate"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.modemmanager.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"modemmanager-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the modemmanager exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "modemmanager", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nextcloud.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus nextcloud exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "nextcloud", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.nextcloud.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the nextcloud exporter.\n"}, "loc": ["services", "prometheus", "exporters", "nextcloud", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.nextcloud.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.nextcloud.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9205\"\n"}, "loc": ["services", "prometheus", "exporters", "nextcloud", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.nextcloud.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"nextcloud-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the nextcloud exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "nextcloud", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nextcloud.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "nextcloud", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nextcloud.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "nextcloud", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.nextcloud.passwordFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "File containing the password for connecting to Nextcloud.\nMake sure that this file is readable by the exporter user.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/password-file\""}, "loc": ["services", "prometheus", "exporters", "nextcloud", "passwordFile"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.nextcloud.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9205"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "nextcloud", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.nextcloud.timeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"5s\""}, "description": {"_type": "mdDoc", "text": "Timeout for getting server info document.\n"}, "loc": ["services", "prometheus", "exporters", "nextcloud", "timeout"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nextcloud.url": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "URL to the Nextcloud serverinfo page.\nAdding the path to the serverinfo API is optional, it defaults\nto `/ocs/v2.php/apps/serverinfo/api/v1/info`.\n"}, "example": {"_type": "literalExpression", "text": "\"https://domain.tld\""}, "loc": ["services", "prometheus", "exporters", "nextcloud", "url"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nextcloud.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"nextcloud-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the nextcloud exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "nextcloud", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nextcloud.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"nextcloud-exporter\""}, "description": {"_type": "mdDoc", "text": "Username for connecting to Nextcloud.\nNote that this account needs to have admin privileges in Nextcloud.\n"}, "loc": ["services", "prometheus", "exporters", "nextcloud", "username"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nginx.constLabels": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of constant labels that will be used in every metric.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"label1=value1\"\n  \"label2=value2\"\n]"}, "loc": ["services", "prometheus", "exporters", "nginx", "constLabels"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.nginx.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus nginx exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "nginx", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.nginx.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the nginx exporter.\n"}, "loc": ["services", "prometheus", "exporters", "nginx", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.nginx.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.nginx.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9113\"\n"}, "loc": ["services", "prometheus", "exporters", "nginx", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.nginx.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"nginx-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the nginx exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "nginx", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nginx.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "nginx", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nginx.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "nginx", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.nginx.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9113"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "nginx", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.nginx.scrapeUri": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost/nginx_status\""}, "description": {"_type": "mdDoc", "text": "Address to access the nginx status page.\nCan be enabled with services.nginx.statusPage = true.\n"}, "loc": ["services", "prometheus", "exporters", "nginx", "scrapeUri"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nginx.sslVerify": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to perform certificate verification for https.\n"}, "loc": ["services", "prometheus", "exporters", "nginx", "sslVerify"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.nginx.telemetryPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/metrics\""}, "description": {"_type": "mdDoc", "text": "Path under which to expose metrics.\n"}, "loc": ["services", "prometheus", "exporters", "nginx", "telemetryPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nginx.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"nginx-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the nginx exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "nginx", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nginxlog.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus nginxlog exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "nginxlog", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.nginxlog.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the nginxlog exporter.\n"}, "loc": ["services", "prometheus", "exporters", "nginxlog", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.nginxlog.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.nginxlog.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9117\"\n"}, "loc": ["services", "prometheus", "exporters", "nginxlog", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.nginxlog.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"nginxlog-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the nginxlog exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "nginxlog", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nginxlog.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "nginxlog", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nginxlog.metricsEndpoint": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/metrics\""}, "description": {"_type": "mdDoc", "text": "Path under which to expose metrics.\n"}, "loc": ["services", "prometheus", "exporters", "nginxlog", "metricsEndpoint"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nginxlog.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "nginxlog", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.nginxlog.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9117"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "nginxlog", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.nginxlog.settings": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "All settings of nginxlog expressed as an Nix attrset.\n\nCheck the official documentation for the corresponding YAML\nsettings that can all be used here: https://github.com/martin-helmich/prometheus-nginxlog-exporter\n\nThe `listen` object is already generated by `port`, `listenAddress` and `metricsEndpoint` and\nwill be merged with the value of `settings` before writing it as JSON.\n"}, "loc": ["services", "prometheus", "exporters", "nginxlog", "settings"], "readOnly": false, "type": "attribute set"}, "services.prometheus.exporters.nginxlog.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"nginxlog-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the nginxlog exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "nginxlog", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.node.disabledCollectors": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Collectors to disable which are enabled by default.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"timex\"\n]"}, "loc": ["services", "prometheus", "exporters", "node", "disabledCollectors"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.node.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus node exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "node", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.node.enabledCollectors": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Collectors to enable. The collectors listed here are enabled in addition to the default ones.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"systemd\"\n]"}, "loc": ["services", "prometheus", "exporters", "node", "enabledCollectors"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.node.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the node exporter.\n"}, "loc": ["services", "prometheus", "exporters", "node", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.node.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.node.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9100\"\n"}, "loc": ["services", "prometheus", "exporters", "node", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.node.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"node-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the node exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "node", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.node.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "node", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.node.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "node", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.node.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9100"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "node", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.node.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"node-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the node exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "node", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nut.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus nut exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "nut", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.nut.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the nut exporter.\n"}, "loc": ["services", "prometheus", "exporters", "nut", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.nut.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.nut.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9199\"\n"}, "loc": ["services", "prometheus", "exporters", "nut", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.nut.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"nut-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the nut exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "nut", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nut.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "nut", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nut.nutServer": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Hostname or address of the NUT server\n"}, "loc": ["services", "prometheus", "exporters", "nut", "nutServer"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nut.nutUser": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The user to log in into NUT server. If set, passwordPath should\nalso be set.\n\nDefault NUT configs usually permit reading variables without\nauthentication.\n"}, "example": {"_type": "literalExpression", "text": "\"nut\""}, "loc": ["services", "prometheus", "exporters", "nut", "nutUser"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.nut.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "nut", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.nut.passwordPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A run-time path to the nutUser password file, which should be\nprovisioned outside of Nix store.\n"}, "loc": ["services", "prometheus", "exporters", "nut", "passwordPath"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.nut.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9199"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "nut", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.nut.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"nut-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the nut exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "nut", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.openldap.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus openldap exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "openldap", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.openldap.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the openldap exporter.\n"}, "loc": ["services", "prometheus", "exporters", "openldap", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.openldap.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.openldap.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9330\"\n"}, "loc": ["services", "prometheus", "exporters", "openldap", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.openldap.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"openldap-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the openldap exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "openldap", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.openldap.interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"30s\""}, "description": {"_type": "mdDoc", "text": "Scrape interval of the exporter.\n"}, "example": {"_type": "literalExpression", "text": "\"1m\""}, "loc": ["services", "prometheus", "exporters", "openldap", "interval"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.openldap.ldapAddr": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:389\""}, "description": {"_type": "mdDoc", "text": "Address of the `openldap`-instance.\n"}, "loc": ["services", "prometheus", "exporters", "openldap", "ldapAddr"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.openldap.ldapCredentialFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Environment file to contain the credentials to authenticate against\n`openldap`.\n\nThe file should look like this:\n```\n---\nldapUser: \"cn=monitoring,cn=Monitor\"\nldapPass: \"secret\"\n```\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/ldap_pass\""}, "loc": ["services", "prometheus", "exporters", "openldap", "ldapCredentialFile"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.openldap.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "openldap", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.openldap.metricsPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/metrics\""}, "description": {"_type": "mdDoc", "text": "URL path where metrics should be exposed.\n"}, "loc": ["services", "prometheus", "exporters", "openldap", "metricsPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.openldap.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "openldap", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.openldap.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9330"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "openldap", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.openldap.protocol": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"tcp\""}, "description": {"_type": "mdDoc", "text": "Which protocol to use to connect against `openldap`.\n"}, "example": {"_type": "literalExpression", "text": "\"udp\""}, "loc": ["services", "prometheus", "exporters", "openldap", "protocol"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.openldap.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"openldap-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the openldap exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "openldap", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.openvpn.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus openvpn exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "openvpn", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.openvpn.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the openvpn exporter.\n"}, "loc": ["services", "prometheus", "exporters", "openvpn", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.openvpn.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.openvpn.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9176\"\n"}, "loc": ["services", "prometheus", "exporters", "openvpn", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.openvpn.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"openvpn-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the openvpn exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "openvpn", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.openvpn.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "openvpn", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.openvpn.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "openvpn", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.openvpn.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9176"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "openvpn", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.openvpn.statusPaths": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Paths to OpenVPN status files. Please configure the OpenVPN option\n`status` accordingly.\n"}, "loc": ["services", "prometheus", "exporters", "openvpn", "statusPaths"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.openvpn.telemetryPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/metrics\""}, "description": {"_type": "mdDoc", "text": "Path under which to expose metrics.\n"}, "loc": ["services", "prometheus", "exporters", "openvpn", "telemetryPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.openvpn.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"openvpn-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the openvpn exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "openvpn", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.pihole.apiToken": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Pi-Hole API token which can be used instead of a password\n"}, "example": {"_type": "literalExpression", "text": "\"580a770cb40511eb85290242ac130003580a770cb40511eb85290242ac130003\""}, "loc": ["services", "prometheus", "exporters", "pihole", "apiToken"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.pihole.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus pihole exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "pihole", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.pihole.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the pihole exporter.\n"}, "loc": ["services", "prometheus", "exporters", "pihole", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.pihole.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.pihole.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9617\"\n"}, "loc": ["services", "prometheus", "exporters", "pihole", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.pihole.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"pihole-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the pihole exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "pihole", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.pihole.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "pihole", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.pihole.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "pihole", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.pihole.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The password to login into Pi-Hole. An api token can be used instead.\n"}, "example": {"_type": "literalExpression", "text": "\"password\""}, "loc": ["services", "prometheus", "exporters", "pihole", "password"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.pihole.piholeHostname": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"pihole\""}, "description": {"_type": "mdDoc", "text": "Hostname or address where to find the Pi-Hole webinterface\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "prometheus", "exporters", "pihole", "piholeHostname"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.pihole.piholePort": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "The port Pi-Hole webinterface is reachable on\n"}, "example": {"_type": "literalExpression", "text": "443"}, "loc": ["services", "prometheus", "exporters", "pihole", "piholePort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.pihole.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9617"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "pihole", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.pihole.protocol": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"http\""}, "description": {"_type": "mdDoc", "text": "The protocol which is used to connect to Pi-Hole\n"}, "example": {"_type": "literalExpression", "text": "\"https\""}, "loc": ["services", "prometheus", "exporters", "pihole", "protocol"], "readOnly": false, "type": "one of \"http\", \"https\""}, "services.prometheus.exporters.pihole.timeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"5s\""}, "description": {"_type": "mdDoc", "text": "Controls the timeout to connect to a Pi-Hole instance\n"}, "loc": ["services", "prometheus", "exporters", "pihole", "timeout"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.pihole.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"pihole-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the pihole exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "pihole", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.postfix.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus postfix exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "postfix", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.postfix.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the postfix exporter.\n"}, "loc": ["services", "prometheus", "exporters", "postfix", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.postfix.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.postfix.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9154\"\n"}, "loc": ["services", "prometheus", "exporters", "postfix", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.postfix.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Group under which the postfix exporter shall be run.\nIt should match the group that is allowed to access the\n`showq` socket in the `queue/public/` directory.\nDefaults to `services.postfix.setgidGroup` when postfix is enabled.\n"}, "loc": ["services", "prometheus", "exporters", "postfix", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.postfix.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "postfix", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.postfix.logfilePath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/var/log/postfix_exporter_input.log\""}, "description": {"_type": "mdDoc", "text": "Path where Postfix writes log entries.\nThis file will be truncated by this exporter!\n"}, "example": {"_type": "literalExpression", "text": "\"/var/log/mail.log\""}, "loc": ["services", "prometheus", "exporters", "postfix", "logfilePath"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.postfix.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "postfix", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.postfix.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9154"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "postfix", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.postfix.showqPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/postfix/queue/public/showq\""}, "description": {"_type": "mdDoc", "text": "Path where Postfix places its showq socket.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/spool/postfix/public/showq\""}, "loc": ["services", "prometheus", "exporters", "postfix", "showqPath"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.postfix.systemd.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable reading metrics from the systemd journal instead of from a logfile\n"}, "loc": ["services", "prometheus", "exporters", "postfix", "systemd", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.postfix.systemd.journalPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the systemd journal.\n"}, "loc": ["services", "prometheus", "exporters", "postfix", "systemd", "journalPath"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.postfix.systemd.slice": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the postfix systemd slice.\nThis overrides the {option}`systemd.unit`.\n"}, "loc": ["services", "prometheus", "exporters", "postfix", "systemd", "slice"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.postfix.systemd.unit": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"postfix.service\""}, "description": {"_type": "mdDoc", "text": "Name of the postfix systemd unit.\n"}, "loc": ["services", "prometheus", "exporters", "postfix", "systemd", "unit"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.postfix.telemetryPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/metrics\""}, "description": {"_type": "mdDoc", "text": "Path under which to expose metrics.\n"}, "loc": ["services", "prometheus", "exporters", "postfix", "telemetryPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.postfix.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"postfix-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the postfix exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "postfix", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.postgres.dataSourceName": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"user=postgres database=postgres host=/run/postgresql sslmode=disable\""}, "description": {"_type": "mdDoc", "text": "Accepts PostgreSQL URI form and key=value form arguments.\n"}, "example": {"_type": "literalExpression", "text": "\"postgresql://username:password@localhost:5432/postgres?sslmode=disable\""}, "loc": ["services", "prometheus", "exporters", "postgres", "dataSourceName"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.postgres.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus postgres exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "postgres", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.postgres.environmentFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file as defined in {manpage}`systemd.exec(5)`.\n\nSecrets may be passed to the service without adding them to the\nworld-readable Nix store, by specifying placeholder variables as\nthe option value in Nix and setting these variables accordingly in the\nenvironment file.\n\nEnvironment variables from this file will be interpolated into the\nconfig file using envsubst with this syntax:\n`$ENVIRONMENT ${VARIABLE}`\n\nThe main use is to set the DATA_SOURCE_NAME that contains the\npostgres password\n\nnote that contents from this file will override dataSourceName\nif you have set it from nix.\n\n```\n  # Content of the environment file\n  DATA_SOURCE_NAME=postgresql://username:password@localhost:5432/postgres?sslmode=disable\n```\n\nNote that this file needs to be available on the host on which\nthis exporter is running.\n"}, "example": {"_type": "literalExpression", "text": "\"/root/prometheus-postgres-exporter.env\""}, "loc": ["services", "prometheus", "exporters", "postgres", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.postgres.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the postgres exporter.\n"}, "loc": ["services", "prometheus", "exporters", "postgres", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.postgres.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.postgres.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9187\"\n"}, "loc": ["services", "prometheus", "exporters", "postgres", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.postgres.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"postgres-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the postgres exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "postgres", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.postgres.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "postgres", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.postgres.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "postgres", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.postgres.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9187"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "postgres", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.postgres.runAsLocalSuperUser": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the exporter as the local 'postgres' super user.\n"}, "loc": ["services", "prometheus", "exporters", "postgres", "runAsLocalSuperUser"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.postgres.telemetryPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/metrics\""}, "description": {"_type": "mdDoc", "text": "Path under which to expose metrics.\n"}, "loc": ["services", "prometheus", "exporters", "postgres", "telemetryPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.postgres.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"postgres-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the postgres exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "postgres", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.process.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus process exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "process", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.process.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the process exporter.\n"}, "loc": ["services", "prometheus", "exporters", "process", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.process.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.process.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9256\"\n"}, "loc": ["services", "prometheus", "exporters", "process", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.process.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"process-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the process exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "process", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.process.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "process", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.process.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "process", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.process.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9256"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "process", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.process.settings.process_names": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "All settings expressed as an Nix attrset.\n\nCheck the official documentation for the corresponding YAML\nsettings that can all be used here: <https://github.com/ncabatoff/process-exporter>\n"}, "example": {"_type": "literalExpression", "text": "[\n  # Remove nix store path from process name\n  { name = \"{{.Matches.Wrapped}} {{ .Matches.Args }}\"; cmdline = [ \"^/nix/store[^ ]*/(?P<Wrapped>[^ /]*) (?P<Args>.*)\" ]; }\n]\n"}, "loc": ["services", "prometheus", "exporters", "process", "settings", "process_names"], "readOnly": false, "type": "list of anything"}, "services.prometheus.exporters.process.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"process-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the process exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "process", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.pve.collectors.cluster": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Collect PVE cluster info\n"}, "loc": ["services", "prometheus", "exporters", "pve", "collectors", "cluster"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.pve.collectors.config": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Collect PVE onboot status\n"}, "loc": ["services", "prometheus", "exporters", "pve", "collectors", "config"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.pve.collectors.node": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Collect PVE node info\n"}, "loc": ["services", "prometheus", "exporters", "pve", "collectors", "node"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.pve.collectors.resources": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Collect PVE resources info\n"}, "loc": ["services", "prometheus", "exporters", "pve", "collectors", "resources"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.pve.collectors.status": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Collect Node/VM/CT status\n"}, "loc": ["services", "prometheus", "exporters", "pve", "collectors", "status"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.pve.collectors.version": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Collect PVE version info\n"}, "loc": ["services", "prometheus", "exporters", "pve", "collectors", "version"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.pve.configFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the service's config file. This path can either be a computed path in /nix/store or a path in the local filesystem.\n\nThe config file should NOT be stored in /nix/store as it will contain passwords and/or keys in plain text.\n\nIf both configFile and environmentFile are provided, the configFile option will be ignored.\n\nConfiguration reference: https://github.com/prometheus-pve/prometheus-pve-exporter/#authentication\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/prometheus-pve-exporter/pve.yml\""}, "loc": ["services", "prometheus", "exporters", "pve", "configFile"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.pve.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus pve exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "pve", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.pve.environmentFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the service's environment file. This path can either be a computed path in /nix/store or a path in the local filesystem.\n\nThe environment file should NOT be stored in /nix/store as it contains passwords and/or keys in plain text.\n\nEnvironment reference: https://github.com/prometheus-pve/prometheus-pve-exporter#authentication\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/prometheus-pve-exporter/pve.env\""}, "loc": ["services", "prometheus", "exporters", "pve", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.pve.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the pve exporter.\n"}, "loc": ["services", "prometheus", "exporters", "pve", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.pve.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.pve.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9221\"\n"}, "loc": ["services", "prometheus", "exporters", "pve", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.pve.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"pve-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the pve exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "pve", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.pve.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "pve", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.pve.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "pve", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.pve.package": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "pkgs.prometheus-pve-exporter"}, "description": {"_type": "mdDoc", "text": "The package to use for prometheus-pve-exporter\n"}, "example": {"_type": "literalExpression", "text": "pkgs.prometheus-pve-exporter"}, "loc": ["services", "prometheus", "exporters", "pve", "package"], "readOnly": false, "type": "package"}, "services.prometheus.exporters.pve.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9221"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "pve", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.pve.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"pve-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the pve exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "pve", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.py-air-control.deviceHostname": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "The hostname of the air purification device from which to scrape the metrics.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.1.123\""}, "loc": ["services", "prometheus", "exporters", "py-air-control", "deviceHostname"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.py-air-control.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus py-air-control exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "py-air-control", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.py-air-control.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the py-air-control exporter.\n"}, "loc": ["services", "prometheus", "exporters", "py-air-control", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.py-air-control.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.py-air-control.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9896\"\n"}, "loc": ["services", "prometheus", "exporters", "py-air-control", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.py-air-control.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"py-air-control-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the py-air-control exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "py-air-control", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.py-air-control.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "py-air-control", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.py-air-control.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "py-air-control", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.py-air-control.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9896"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "py-air-control", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.py-air-control.protocol": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"http\""}, "description": {"_type": "mdDoc", "text": "The protocol to use when communicating with the air purification device.\nAvailable: [http, coap, plain_coap]\n"}, "loc": ["services", "prometheus", "exporters", "py-air-control", "protocol"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.py-air-control.stateDir": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"prometheus-py-air-control-exporter\""}, "description": {"_type": "mdDoc", "text": "Directory below `/var/lib` to store runtime data.\nThis directory will be created automatically using systemd's StateDirectory mechanism.\n"}, "loc": ["services", "prometheus", "exporters", "py-air-control", "stateDir"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.py-air-control.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"py-air-control-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the py-air-control exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "py-air-control", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.redis.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus redis exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "redis", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.redis.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the redis exporter.\n"}, "loc": ["services", "prometheus", "exporters", "redis", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.redis.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.redis.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9121\"\n"}, "loc": ["services", "prometheus", "exporters", "redis", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.redis.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"redis-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the redis exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "redis", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.redis.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "redis", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.redis.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "redis", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.redis.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9121"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "redis", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.redis.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"redis-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the redis exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "redis", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.rspamd.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus rspamd exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "rspamd", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.rspamd.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the rspamd exporter.\n"}, "loc": ["services", "prometheus", "exporters", "rspamd", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.rspamd.extraLabels": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "{ host = config.networking.hostName; }"}, "description": {"_type": "mdDoc", "text": "Set of labels added to each metric."}, "example": {"_type": "literalExpression", "text": "{\n  host = config.networking.hostName;\n  custom_label = \"some_value\";\n}\n"}, "loc": ["services", "prometheus", "exporters", "rspamd", "extraLabels"], "readOnly": false, "type": "attribute set of string"}, "services.prometheus.exporters.rspamd.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.rspamd.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 7980\"\n"}, "loc": ["services", "prometheus", "exporters", "rspamd", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.rspamd.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"rspamd-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the rspamd exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "rspamd", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.rspamd.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "rspamd", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.rspamd.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "rspamd", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.rspamd.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "7980"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "rspamd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.rspamd.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"rspamd-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the rspamd exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "rspamd", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.rtl_433.channels": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of channel matchers to export.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    channel = 6543;\n    location = \"Kitchen\";\n    name = \"Acurite\";\n  }\n]"}, "loc": ["services", "prometheus", "exporters", "rtl_433", "channels"], "readOnly": false, "type": "list of (submodule)"}, "services.prometheus.exporters.rtl_433.channels.*.channel": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Channel to match."}, "loc": ["services", "prometheus", "exporters", "rtl_433", "channels", "*", "channel"], "readOnly": false, "type": "signed integer"}, "services.prometheus.exporters.rtl_433.channels.*.location": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Location to match."}, "loc": ["services", "prometheus", "exporters", "rtl_433", "channels", "*", "location"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.rtl_433.channels.*.name": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Name to match."}, "loc": ["services", "prometheus", "exporters", "rtl_433", "channels", "*", "name"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.rtl_433.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus rtl_433 exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "rtl_433", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.rtl_433.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the rtl_433 exporter.\n"}, "loc": ["services", "prometheus", "exporters", "rtl_433", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.rtl_433.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.rtl_433.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9550\"\n"}, "loc": ["services", "prometheus", "exporters", "rtl_433", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.rtl_433.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"rtl_433-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the rtl_433 exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "rtl_433", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.rtl_433.ids": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of ID matchers to export.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    id = 1;\n    location = \"Bedroom\";\n    name = \"Nexus\";\n  }\n]"}, "loc": ["services", "prometheus", "exporters", "rtl_433", "ids"], "readOnly": false, "type": "list of (submodule)"}, "services.prometheus.exporters.rtl_433.ids.*.id": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "ID to match."}, "loc": ["services", "prometheus", "exporters", "rtl_433", "ids", "*", "id"], "readOnly": false, "type": "signed integer"}, "services.prometheus.exporters.rtl_433.ids.*.location": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Location to match."}, "loc": ["services", "prometheus", "exporters", "rtl_433", "ids", "*", "location"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.rtl_433.ids.*.name": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Name to match."}, "loc": ["services", "prometheus", "exporters", "rtl_433", "ids", "*", "name"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.rtl_433.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "rtl_433", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.rtl_433.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "rtl_433", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.rtl_433.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9550"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "rtl_433", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.rtl_433.rtl433Flags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"-C si\""}, "description": {"_type": "mdDoc", "text": "Flags passed verbatim to rtl_433 binary.\nHaving `-C si` (the default) is recommended since only Celsius temperatures are parsed.\n"}, "example": {"_type": "literalExpression", "text": "\"-C si -R 19\""}, "loc": ["services", "prometheus", "exporters", "rtl_433", "rtl433Flags"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.rtl_433.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"rtl_433-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the rtl_433 exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "rtl_433", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.script.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus script exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "script", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.script.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the script exporter.\n"}, "loc": ["services", "prometheus", "exporters", "script", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.script.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.script.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9172\"\n"}, "loc": ["services", "prometheus", "exporters", "script", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.script.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"script-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the script exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "script", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.script.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "script", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.script.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "script", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.script.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9172"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "script", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.script.settings.scripts": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "All settings expressed as an Nix attrset.\n\nCheck the official documentation for the corresponding YAML\nsettings that can all be used here: <https://github.com/adhocteam/script_exporter#sample-configuration>\n"}, "example": {"_type": "literalExpression", "text": "{\n  scripts = [\n    { name = \"sleep\"; script = \"sleep 5\"; }\n  ];\n}\n"}, "loc": ["services", "prometheus", "exporters", "script", "settings", "scripts"], "readOnly": false, "type": "list of (submodule)"}, "services.prometheus.exporters.script.settings.scripts.*.name": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Name of the script."}, "example": {"_type": "literalExpression", "text": "\"sleep\""}, "loc": ["services", "prometheus", "exporters", "script", "settings", "scripts", "*", "name"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.script.settings.scripts.*.script": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Shell script to execute when metrics are requested."}, "example": {"_type": "literalExpression", "text": "\"sleep 5\""}, "loc": ["services", "prometheus", "exporters", "script", "settings", "scripts", "*", "script"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.script.settings.scripts.*.timeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional timeout for the script in seconds."}, "example": {"_type": "literalExpression", "text": "60"}, "loc": ["services", "prometheus", "exporters", "script", "settings", "scripts", "*", "timeout"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.exporters.script.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"script-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the script exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "script", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.shelly.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus shelly exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "shelly", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.shelly.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the shelly exporter.\n"}, "loc": ["services", "prometheus", "exporters", "shelly", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.shelly.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.shelly.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9784\"\n"}, "loc": ["services", "prometheus", "exporters", "shelly", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.shelly.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"shelly-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the shelly exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "shelly", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.shelly.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "shelly", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.shelly.metrics-file": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Path to the JSON file with the metric definitions\n"}, "loc": ["services", "prometheus", "exporters", "shelly", "metrics-file"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.shelly.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "shelly", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.shelly.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9784"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "shelly", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.shelly.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"shelly-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the shelly exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "shelly", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.smartctl.devices": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Paths to the disks that will be monitored. Will autodiscover\nall disks if none given.\n"}, "example": {"_type": "literalExpression", "text": "[ \"/dev/sda\", \"/dev/nvme0n1\" ];\n"}, "loc": ["services", "prometheus", "exporters", "smartctl", "devices"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.smartctl.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus smartctl exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "smartctl", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.smartctl.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the smartctl exporter.\n"}, "loc": ["services", "prometheus", "exporters", "smartctl", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.smartctl.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.smartctl.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9633\"\n"}, "loc": ["services", "prometheus", "exporters", "smartctl", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.smartctl.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"smartctl-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the smartctl exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "smartctl", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.smartctl.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "smartctl", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.smartctl.maxInterval": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"60s\""}, "description": {"_type": "mdDoc", "text": "Interval that limits how often a disk can be queried.\n"}, "example": {"_type": "literalExpression", "text": "\"2m\""}, "loc": ["services", "prometheus", "exporters", "smartctl", "maxInterval"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.smartctl.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "smartctl", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.smartctl.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9633"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "smartctl", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.smartctl.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"smartctl-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the smartctl exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "smartctl", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.smokeping.buckets": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"5e-05,0.0001,0.0002,0.0004,0.0008,0.0016,0.0032,0.0064,0.0128,0.0256,0.0512,0.1024,0.2048,0.4096,0.8192,1.6384,3.2768,6.5536,13.1072,26.2144\""}, "description": {"_type": "mdDoc", "text": "List of buckets to use for the response duration histogram.\n"}, "loc": ["services", "prometheus", "exporters", "smokeping", "buckets"], "readOnly": false, "type": "strings concatenated with \",\""}, "services.prometheus.exporters.smokeping.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus smokeping exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "smokeping", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.smokeping.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the smokeping exporter.\n"}, "loc": ["services", "prometheus", "exporters", "smokeping", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.smokeping.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.smokeping.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9374\"\n"}, "loc": ["services", "prometheus", "exporters", "smokeping", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.smokeping.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"smokeping-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the smokeping exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "smokeping", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.smokeping.hosts": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "List of endpoints to probe.\n"}, "loc": ["services", "prometheus", "exporters", "smokeping", "hosts"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.smokeping.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "smokeping", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.smokeping.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "smokeping", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.smokeping.pingInterval": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"1s\""}, "description": {"_type": "mdDoc", "text": "Interval between pings.\n"}, "loc": ["services", "prometheus", "exporters", "smokeping", "pingInterval"], "readOnly": false, "type": "Go duration (https://golang.org/pkg/time/#ParseDuration)"}, "services.prometheus.exporters.smokeping.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9374"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "smokeping", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.smokeping.telemetryPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/metrics\""}, "description": {"_type": "mdDoc", "text": "Path under which to expose metrics.\n"}, "loc": ["services", "prometheus", "exporters", "smokeping", "telemetryPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.smokeping.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"smokeping-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the smokeping exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "smokeping", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.snmp.configuration": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Snmp exporter configuration as nix attribute set. Mutually exclusive with 'configurationPath' option.\n"}, "example": {"_type": "literalExpression", "text": "{\n  default = {\n    auth = {\n      community = \"public\";\n    };\n    version = 2;\n  };\n}"}, "loc": ["services", "prometheus", "exporters", "snmp", "configuration"], "readOnly": false, "type": "null or (attribute set)"}, "services.prometheus.exporters.snmp.configurationPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a snmp exporter configuration file. Mutually exclusive with 'configuration' option.\n"}, "example": {"_type": "literalExpression", "text": "./snmp.yml"}, "loc": ["services", "prometheus", "exporters", "snmp", "configurationPath"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.snmp.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus snmp exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "snmp", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.snmp.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the snmp exporter.\n"}, "loc": ["services", "prometheus", "exporters", "snmp", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.snmp.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.snmp.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9116\"\n"}, "loc": ["services", "prometheus", "exporters", "snmp", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.snmp.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"snmp-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the snmp exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "snmp", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.snmp.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "snmp", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.snmp.logFormat": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"logfmt\""}, "description": {"_type": "mdDoc", "text": "Output format of log messages.\n"}, "loc": ["services", "prometheus", "exporters", "snmp", "logFormat"], "readOnly": false, "type": "one of \"logfmt\", \"json\""}, "services.prometheus.exporters.snmp.logLevel": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Only log messages with the given severity or above.\n"}, "loc": ["services", "prometheus", "exporters", "snmp", "logLevel"], "readOnly": false, "type": "one of \"debug\", \"info\", \"warn\", \"error\""}, "services.prometheus.exporters.snmp.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "snmp", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.snmp.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9116"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "snmp", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.snmp.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"snmp-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the snmp exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "snmp", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.sql.configFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to configuration file.\n"}, "loc": ["services", "prometheus", "exporters", "sql", "configFile"], "readOnly": false, "type": "null or path"}, "services.prometheus.exporters.sql.configuration": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Exporter configuration as nix attribute set. Mutually exclusive with 'configFile' option.\n"}, "loc": ["services", "prometheus", "exporters", "sql", "configuration"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.exporters.sql.configuration.jobs": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "An attrset of metrics scraping jobs to run."}, "loc": ["services", "prometheus", "exporters", "sql", "configuration", "jobs"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.prometheus.exporters.sql.configuration.jobs.<name>.connections": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "A list of connection strings of the SQL servers to scrape metrics from"}, "loc": ["services", "prometheus", "exporters", "sql", "configuration", "jobs", "<name>", "connections"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.sql.configuration.jobs.<name>.interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "How often to run this job, specified in\n[Go duration](https://golang.org/pkg/time/#ParseDuration) format.\n"}, "loc": ["services", "prometheus", "exporters", "sql", "configuration", "jobs", "<name>", "interval"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.sql.configuration.jobs.<name>.queries": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "SQL queries to run."}, "loc": ["services", "prometheus", "exporters", "sql", "configuration", "jobs", "<name>", "queries"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.help": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A human-readable description of this metric."}, "loc": ["services", "prometheus", "exporters", "sql", "configuration", "jobs", "<name>", "queries", "<name>", "help"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.labels": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A set of columns that will be used as Prometheus labels."}, "loc": ["services", "prometheus", "exporters", "sql", "configuration", "jobs", "<name>", "queries", "<name>", "labels"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.query": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "The SQL query to run."}, "loc": ["services", "prometheus", "exporters", "sql", "configuration", "jobs", "<name>", "queries", "<name>", "query"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.sql.configuration.jobs.<name>.queries.<name>.values": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "A set of columns that will be used as values of this metric."}, "loc": ["services", "prometheus", "exporters", "sql", "configuration", "jobs", "<name>", "queries", "<name>", "values"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.sql.configuration.jobs.<name>.startupSql": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of SQL statements to execute once after making a connection."}, "loc": ["services", "prometheus", "exporters", "sql", "configuration", "jobs", "<name>", "startupSql"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.sql.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus sql exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "sql", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.sql.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the sql exporter.\n"}, "loc": ["services", "prometheus", "exporters", "sql", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.sql.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.sql.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9237\"\n"}, "loc": ["services", "prometheus", "exporters", "sql", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.sql.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"sql-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the sql exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "sql", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.sql.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "sql", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.sql.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "sql", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.sql.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9237"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "sql", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.sql.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"sql-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the sql exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "sql", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.statsd.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus statsd exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "statsd", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.statsd.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the statsd exporter.\n"}, "loc": ["services", "prometheus", "exporters", "statsd", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.statsd.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.statsd.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9102\"\n"}, "loc": ["services", "prometheus", "exporters", "statsd", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.statsd.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"statsd-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the statsd exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "statsd", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.statsd.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "statsd", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.statsd.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "statsd", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.statsd.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9102"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "statsd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.statsd.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"statsd-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the statsd exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "statsd", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.surfboard.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus surfboard exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "surfboard", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.surfboard.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the surfboard exporter.\n"}, "loc": ["services", "prometheus", "exporters", "surfboard", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.surfboard.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.surfboard.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9239\"\n"}, "loc": ["services", "prometheus", "exporters", "surfboard", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.surfboard.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"surfboard-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the surfboard exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "surfboard", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.surfboard.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "surfboard", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.surfboard.modemAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"192.168.100.1\""}, "description": {"_type": "mdDoc", "text": "The hostname or IP of the cable modem.\n"}, "loc": ["services", "prometheus", "exporters", "surfboard", "modemAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.surfboard.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "surfboard", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.surfboard.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9239"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "surfboard", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.surfboard.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"surfboard-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the surfboard exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "surfboard", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.systemd.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus systemd exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "systemd", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.systemd.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the systemd exporter.\n"}, "loc": ["services", "prometheus", "exporters", "systemd", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.systemd.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.systemd.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9558\"\n"}, "loc": ["services", "prometheus", "exporters", "systemd", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.systemd.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"systemd-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the systemd exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "systemd", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.systemd.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "systemd", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.systemd.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "systemd", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.systemd.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9558"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "systemd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.systemd.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"systemd-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the systemd exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "systemd", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.tor.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus tor exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "tor", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.tor.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the tor exporter.\n"}, "loc": ["services", "prometheus", "exporters", "tor", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.tor.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.tor.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9130\"\n"}, "loc": ["services", "prometheus", "exporters", "tor", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.tor.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"tor-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the tor exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "tor", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.tor.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "tor", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.tor.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "tor", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.tor.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9130"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "tor", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.tor.torControlAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Tor control IP address or hostname.\n"}, "loc": ["services", "prometheus", "exporters", "tor", "torControlAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.tor.torControlPort": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9051"}, "description": {"_type": "mdDoc", "text": "Tor control port.\n"}, "loc": ["services", "prometheus", "exporters", "tor", "torControlPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.tor.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"tor-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the tor exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "tor", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unbound.controlInterface": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the unbound socket for uds mode or the control interface port for tcp mode.\n\nExample:\n  uds-mode: /run/unbound/unbound.socket\n  tcp-mode: 127.0.0.1:8953\n"}, "example": {"_type": "literalExpression", "text": "\"/run/unbound/unbound.socket\""}, "loc": ["services", "prometheus", "exporters", "unbound", "controlInterface"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.unbound.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus unbound exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "unbound", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unbound.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the unbound exporter.\n"}, "loc": ["services", "prometheus", "exporters", "unbound", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.unbound.fetchType": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"uds\""}, "description": {"_type": "mdDoc", "text": "Which methods the exporter uses to get the information from unbound.\n"}, "loc": ["services", "prometheus", "exporters", "unbound", "fetchType"], "readOnly": false, "type": "one of \"tcp\", \"uds\""}, "services.prometheus.exporters.unbound.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.unbound.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9167\"\n"}, "loc": ["services", "prometheus", "exporters", "unbound", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.unbound.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"unbound-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the unbound exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "unbound", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unbound.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "unbound", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unbound.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "unbound", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unbound.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9167"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "unbound", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.unbound.telemetryPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/metrics\""}, "description": {"_type": "mdDoc", "text": "Path under which to expose metrics.\n"}, "loc": ["services", "prometheus", "exporters", "unbound", "telemetryPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unbound.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"unbound-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the unbound exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "unbound", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unifi.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus unifi exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "unifi", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unifi.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the unifi exporter.\n"}, "loc": ["services", "prometheus", "exporters", "unifi", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.unifi.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.unifi.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9130\"\n"}, "loc": ["services", "prometheus", "exporters", "unifi", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.unifi.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"unifi-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the unifi exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "unifi", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unifi.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "unifi", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unifi.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "unifi", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unifi.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9130"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "unifi", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.unifi.unifiAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "URL of the UniFi Controller API.\n"}, "example": {"_type": "literalExpression", "text": "\"https://10.0.0.1:8443\""}, "loc": ["services", "prometheus", "exporters", "unifi", "unifiAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unifi.unifiInsecure": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled skip the verification of the TLS certificate of the UniFi Controller API.\nUse with caution.\n"}, "loc": ["services", "prometheus", "exporters", "unifi", "unifiInsecure"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unifi.unifiPassword": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "Password for authentication against UniFi Controller API.\n"}, "loc": ["services", "prometheus", "exporters", "unifi", "unifiPassword"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unifi.unifiTimeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"5s\""}, "description": {"_type": "mdDoc", "text": "Timeout including unit for UniFi Controller API requests.\n"}, "example": {"_type": "literalExpression", "text": "\"2m\""}, "loc": ["services", "prometheus", "exporters", "unifi", "unifiTimeout"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unifi.unifiUsername": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "description": {"_type": "mdDoc", "text": "username for authentication against UniFi Controller API.\n"}, "example": {"_type": "literalExpression", "text": "\"ReadOnlyUser\""}, "loc": ["services", "prometheus", "exporters", "unifi", "unifiUsername"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unifi.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"unifi-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the unifi exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "unifi", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unpoller.controllers": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of Unifi controllers to poll. Use defaults if empty.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "controllers"], "readOnly": false, "type": "list of (submodule)"}, "services.prometheus.exporters.unpoller.controllers.*.hash_pii": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Hash, with md5, client names and MAC addresses. This attempts\nto protect personally identifiable information.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "controllers", "*", "hash_pii"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.controllers.*.pass": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "unpoller-unifi-default.password"}, "description": {"_type": "mdDoc", "text": "Path of a file containing the password for the unifi service user.\nThis file needs to be readable by the unifi-poller user.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "controllers", "*", "pass"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.unpoller.controllers.*.save_alarms": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from UniFi alarms to influxdb and Loki.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "controllers", "*", "save_alarms"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.controllers.*.save_anomalies": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from UniFi anomalies to influxdb and Loki.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "controllers", "*", "save_anomalies"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.controllers.*.save_dpi": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from deep packet inspection.\nAdds around 150 data points and impacts performance.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "controllers", "*", "save_dpi"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.controllers.*.save_events": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from UniFi events to influxdb and Loki.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "controllers", "*", "save_events"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.controllers.*.save_ids": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from the intrusion detection system to influxdb and Loki.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "controllers", "*", "save_ids"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.controllers.*.save_sites": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Collect and save site data.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "controllers", "*", "save_sites"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.controllers.*.sites": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"all\""}, "description": {"_type": "mdDoc", "text": "List of site names for which statistics should be exported.\nOr the string \"default\" for the default site or the string \"all\" for all sites.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "controllers", "*", "sites"], "readOnly": false, "type": "one of \"default\", \"all\" or list of string"}, "services.prometheus.exporters.unpoller.controllers.*.url": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"https://unifi:8443\""}, "description": {"_type": "mdDoc", "text": "URL of the Unifi controller.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "controllers", "*", "url"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unpoller.controllers.*.user": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"unifi\""}, "description": {"_type": "mdDoc", "text": "Unifi service user name.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "controllers", "*", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unpoller.controllers.*.verify_ssl": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Verify the Unifi controller's certificate.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "controllers", "*", "verify_ssl"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus unpoller exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "unpoller", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the unpoller exporter.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.unpoller.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.unpoller.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9130\"\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.unpoller.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"unpoller-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the unpoller exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unpoller.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unpoller.log.debug": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable debug logging including line numbers, high resolution timestamps, per-device logs."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "unpoller", "log", "debug"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.log.prometheusErrors": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable emitting errors to prometheus."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "unpoller", "log", "prometheusErrors"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.log.quiet": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable startup and error logs only."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "unpoller", "log", "quiet"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.loki.interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"2m\""}, "description": {"_type": "mdDoc", "text": "How often the events are polled and pushed to Loki.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "loki", "interval"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unpoller.loki.pass": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"unpoller-influxdb-default.password\""}, "description": {"_type": "mdDoc", "text": "Path of a file containing the password for Loki.\nThis file needs to be readable by the unifi-poller user.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "loki", "pass"], "readOnly": false, "type": "path"}, "services.prometheus.exporters.unpoller.loki.tenant_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Tenant ID to use in Loki.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "loki", "tenant_id"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unpoller.loki.timeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"10s\""}, "description": {"_type": "mdDoc", "text": "Should be increased in case of timeout errors.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "loki", "timeout"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unpoller.loki.url": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "URL of the Loki host.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "loki", "url"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unpoller.loki.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Username for Loki.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "loki", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.unpoller.loki.verify_ssl": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Verify Loki's certificate.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "loki", "verify_ssl"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.unpoller.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9130"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.unpoller.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"unpoller-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the unpoller exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "unpoller", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.v2ray.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus v2ray exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "v2ray", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.v2ray.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the v2ray exporter.\n"}, "loc": ["services", "prometheus", "exporters", "v2ray", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.v2ray.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.v2ray.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9299\"\n"}, "loc": ["services", "prometheus", "exporters", "v2ray", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.v2ray.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"v2ray-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the v2ray exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "v2ray", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.v2ray.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "v2ray", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.v2ray.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "v2ray", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.v2ray.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9299"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "v2ray", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.v2ray.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"v2ray-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the v2ray exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "v2ray", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.v2ray.v2rayEndpoint": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:54321\""}, "description": {"_type": "mdDoc", "text": "v2ray grpc api endpoint\n"}, "loc": ["services", "prometheus", "exporters", "v2ray", "v2rayEndpoint"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.varnish.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus varnish exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "varnish", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.varnish.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the varnish exporter.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.varnish.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.varnish.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9131\"\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.varnish.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"varnish-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the varnish exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.varnish.healthPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path under which to expose healthcheck. Disabled unless configured.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "healthPath"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.varnish.instance": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "config.services.varnish.stateDir"}, "description": {"_type": "mdDoc", "text": "varnishstat -n value.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "instance"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.varnish.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.varnish.noExit": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Do not exit server on Varnish scrape errors.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "noExit"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.varnish.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.varnish.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9131"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.varnish.raw": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable raw stdout logging without timestamps.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "raw"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.varnish.telemetryPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/metrics\""}, "description": {"_type": "mdDoc", "text": "Path under which to expose metrics.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "telemetryPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.varnish.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"varnish-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the varnish exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.varnish.varnishStatPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"varnishstat\""}, "description": {"_type": "mdDoc", "text": "Path to varnishstat.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "varnishStatPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.varnish.verbose": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable verbose logging.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "verbose"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.varnish.withGoMetrics": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Export go runtime and http handler metrics.\n"}, "loc": ["services", "prometheus", "exporters", "varnish", "withGoMetrics"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.wireguard.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus wireguard exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "wireguard", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.wireguard.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the wireguard exporter.\n"}, "loc": ["services", "prometheus", "exporters", "wireguard", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.wireguard.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.wireguard.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9586\"\n"}, "loc": ["services", "prometheus", "exporters", "wireguard", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.wireguard.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"wireguard-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the wireguard exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "wireguard", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.wireguard.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "wireguard", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.wireguard.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "wireguard", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.wireguard.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9586"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "wireguard", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.wireguard.singleSubnetPerField": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "By default, all allowed IPs and subnets are comma-separated in the\n`allowed_ips` field. With this option enabled,\na single IP and subnet will be listed in fields like `allowed_ip_0`,\n`allowed_ip_1` and so on.\n"}, "loc": ["services", "prometheus", "exporters", "wireguard", "singleSubnetPerField"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.wireguard.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"wireguard-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the wireguard exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "wireguard", "user"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.wireguard.verbose": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Verbose logging mode for prometheus-wireguard-exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "wireguard", "verbose"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.wireguard.wireguardConfig": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the Wireguard Config to\n[add the peer's name to the stats of a peer](https://github.com/MindFlavor/prometheus_wireguard_exporter/tree/2.0.0#usage).\n\nPlease note that `networking.wg-quick` is required for this feature\nas `networking.wireguard` uses\n{manpage}`wg(8)`\nto set the peers up.\n"}, "loc": ["services", "prometheus", "exporters", "wireguard", "wireguardConfig"], "readOnly": false, "type": "null or path or string"}, "services.prometheus.exporters.wireguard.withRemoteIp": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not the remote IP of a WireGuard peer should be exposed via prometheus.\n"}, "loc": ["services", "prometheus", "exporters", "wireguard", "withRemoteIp"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.zfs.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prometheus zfs exporter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "exporters", "zfs", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.zfs.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to the zfs exporter.\n"}, "loc": ["services", "prometheus", "exporters", "zfs", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.exporters.zfs.firewallFilter": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a filter for iptables to use when\n{option}`services.prometheus.exporters.zfs.openFirewall`\nis true. It is used as `ip46tables -I nixos-fw firewallFilter -j nixos-fw-accept`.\n"}, "example": {"_type": "literalExpression", "text": "\"-i eth0 -p tcp -m tcp --dport 9134\"\n"}, "loc": ["services", "prometheus", "exporters", "zfs", "firewallFilter"], "readOnly": false, "type": "null or string"}, "services.prometheus.exporters.zfs.group": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"zfs-exporter\""}, "description": {"_type": "mdDoc", "text": "Group under which the zfs exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "zfs", "group"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.zfs.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "zfs", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.zfs.openFirewall": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open port in firewall for incoming connections.\n"}, "loc": ["services", "prometheus", "exporters", "zfs", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.prometheus.exporters.zfs.pools": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Name of the pool(s) to collect, repeat for multiple pools (default: all pools).\n"}, "loc": ["services", "prometheus", "exporters", "zfs", "pools"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.exporters.zfs.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "9134"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "exporters", "zfs", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.exporters.zfs.telemetryPath": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"/metrics\""}, "description": {"_type": "mdDoc", "text": "Path under which to expose metrics.\n"}, "loc": ["services", "prometheus", "exporters", "zfs", "telemetryPath"], "readOnly": false, "type": "string"}, "services.prometheus.exporters.zfs.user": {"declarations": ["nixos/modules/services/monitoring/prometheus/exporters.nix"], "default": {"_type": "literalExpression", "text": "\"zfs-exporter\""}, "description": {"_type": "mdDoc", "text": "User name under which the zfs exporter shall be run.\n"}, "loc": ["services", "prometheus", "exporters", "zfs", "user"], "readOnly": false, "type": "string"}, "services.prometheus.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options when launching Prometheus.\n"}, "loc": ["services", "prometheus", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.globalConfig": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Parameters that are valid in all  configuration contexts. They\nalso serve as defaults for other configuration sections\n"}, "loc": ["services", "prometheus", "globalConfig"], "readOnly": false, "type": "submodule"}, "services.prometheus.globalConfig.evaluation_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How frequently to evaluate rules by default.\n\nDefaults to ````1m```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "globalConfig", "evaluation_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.globalConfig.external_labels": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The labels to add to any time series or alerts when\ncommunicating with external systems (federation, remote\nstorage, Alertmanager).\n"}, "loc": ["services", "prometheus", "globalConfig", "external_labels"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.globalConfig.scrape_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How frequently to scrape targets by default.\n\nDefaults to ````1m```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "globalConfig", "scrape_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.globalConfig.scrape_timeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How long until a scrape request times out.\n\nDefaults to ````10s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "globalConfig", "scrape_timeout"], "readOnly": false, "type": "null or string"}, "services.prometheus.listenAddress": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on for the web interface, API, and telemetry.\n"}, "loc": ["services", "prometheus", "listenAddress"], "readOnly": false, "type": "string"}, "services.prometheus.package": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.prometheus"}, "description": {"_type": "mdDoc", "text": "The prometheus package that should be used.\n"}, "loc": ["services", "prometheus", "package"], "readOnly": false, "type": "package"}, "services.prometheus.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "9090"}, "description": {"_type": "mdDoc", "text": "Port to listen on.\n"}, "loc": ["services", "prometheus", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.pushgateway.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/pushgateway.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Prometheus Pushgateway."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "pushgateway", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.pushgateway.extraFlags": {"declarations": ["nixos/modules/services/monitoring/prometheus/pushgateway.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options when launching the Pushgateway.\n"}, "loc": ["services", "prometheus", "pushgateway", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prometheus.pushgateway.log.format": {"declarations": ["nixos/modules/services/monitoring/prometheus/pushgateway.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the log target and format.\n\n`null` will default to `logger:stderr`.\n"}, "example": {"_type": "literalExpression", "text": "\"logger:syslog?appname=bob&local=7\""}, "loc": ["services", "prometheus", "pushgateway", "log", "format"], "readOnly": false, "type": "null or string"}, "services.prometheus.pushgateway.log.level": {"declarations": ["nixos/modules/services/monitoring/prometheus/pushgateway.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Only log messages with the given severity or above.\n\n`null` will default to `info`.\n"}, "loc": ["services", "prometheus", "pushgateway", "log", "level"], "readOnly": false, "type": "null or one of \"debug\", \"info\", \"warn\", \"error\", \"fatal\""}, "services.prometheus.pushgateway.package": {"declarations": ["nixos/modules/services/monitoring/prometheus/pushgateway.nix"], "default": {"_type": "literalExpression", "text": "pkgs.prometheus-pushgateway"}, "description": {"_type": "mdDoc", "text": "Package that should be used for the prometheus pushgateway.\n"}, "loc": ["services", "prometheus", "pushgateway", "package"], "readOnly": false, "type": "package"}, "services.prometheus.pushgateway.persistMetrics": {"declarations": ["nixos/modules/services/monitoring/prometheus/pushgateway.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to persist metrics to a file.\n\nWhen enabled metrics will be saved to a file called\n`metrics` in the directory\n`/var/lib/pushgateway`. The directory below\n`/var/lib` can be set using\n{option}`services.prometheus.pushgateway.stateDir`.\n"}, "loc": ["services", "prometheus", "pushgateway", "persistMetrics"], "readOnly": false, "type": "boolean"}, "services.prometheus.pushgateway.persistence.interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/pushgateway.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The minimum interval at which to write out the persistence file.\n\n`null` will default to `5m`.\n"}, "example": {"_type": "literalExpression", "text": "\"10m\""}, "loc": ["services", "prometheus", "pushgateway", "persistence", "interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.pushgateway.stateDir": {"declarations": ["nixos/modules/services/monitoring/prometheus/pushgateway.nix"], "default": {"_type": "literalExpression", "text": "\"pushgateway\""}, "description": {"_type": "mdDoc", "text": "Directory below `/var/lib` to store metrics.\n\nThis directory will be created automatically using systemd's\nStateDirectory mechanism when\n{option}`services.prometheus.pushgateway.persistMetrics`\nis enabled.\n"}, "loc": ["services", "prometheus", "pushgateway", "stateDir"], "readOnly": false, "type": "string"}, "services.prometheus.pushgateway.web.external-url": {"declarations": ["nixos/modules/services/monitoring/prometheus/pushgateway.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL under which Pushgateway is externally reachable.\n"}, "loc": ["services", "prometheus", "pushgateway", "web", "external-url"], "readOnly": false, "type": "null or string"}, "services.prometheus.pushgateway.web.listen-address": {"declarations": ["nixos/modules/services/monitoring/prometheus/pushgateway.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to listen on for the web interface, API and telemetry.\n\n`null` will default to `:9091`.\n"}, "loc": ["services", "prometheus", "pushgateway", "web", "listen-address"], "readOnly": false, "type": "null or string"}, "services.prometheus.pushgateway.web.route-prefix": {"declarations": ["nixos/modules/services/monitoring/prometheus/pushgateway.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Prefix for the internal routes of web endpoints.\n\nDefaults to the path of\n{option}`services.prometheus.pushgateway.web.external-url`.\n"}, "loc": ["services", "prometheus", "pushgateway", "web", "route-prefix"], "readOnly": false, "type": "null or string"}, "services.prometheus.pushgateway.web.telemetry-path": {"declarations": ["nixos/modules/services/monitoring/prometheus/pushgateway.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path under which to expose metrics.\n\n`null` will default to `/metrics`.\n"}, "loc": ["services", "prometheus", "pushgateway", "web", "telemetry-path"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteRead": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Parameters of the endpoints to query from.\nSee [the official documentation](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#remote_read) for more information.\n"}, "loc": ["services", "prometheus", "remoteRead"], "readOnly": false, "type": "list of (submodule)"}, "services.prometheus.remoteRead.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the `Authorization` header on every remote read request with the\nconfigured username and password.\npassword and password_file are mutually exclusive.\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.remoteRead.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "remoteRead", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteRead.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "remoteRead", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteRead.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.remoteRead.*.bearer_token": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the `Authorization` header on every remote read request with\nthe configured bearer token. It is mutually exclusive with `bearer_token_file`.\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "bearer_token"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteRead.*.bearer_token_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the `Authorization` header on every remote read request with the bearer token\nread from the configured file. It is mutually exclusive with `bearer_token`.\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "bearer_token_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteRead.*.name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the remote read config, which if specified must be unique among remote read configs.\nThe name will be used in metrics and logging in place of a generated value to help users distinguish between\nremote read configs.\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "name"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteRead.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional Proxy URL."}, "loc": ["services", "prometheus", "remoteRead", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteRead.*.read_recent": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether reads should be made for queries for time ranges that\nthe local storage should have complete data for.\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "read_recent"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.remoteRead.*.remote_timeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Timeout for requests to the remote read endpoint.\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "remote_timeout"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteRead.*.required_matchers": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "An optional list of equality matchers which have to be\npresent in a selector to query the remote read endpoint.\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "required_matchers"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.remoteRead.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configures the remote read request's TLS settings.\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.remoteRead.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteRead.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteRead.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.remoteRead.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteRead.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteRead.*.url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "remoteRead", "*", "url"], "readOnly": false, "type": "string"}, "services.prometheus.remoteWrite": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Parameters of the endpoints to send samples to.\nSee [the official documentation](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#remote_write) for more information.\n"}, "loc": ["services", "prometheus", "remoteWrite"], "readOnly": false, "type": "list of (submodule)"}, "services.prometheus.remoteWrite.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the `Authorization` header on every remote write request with the\nconfigured username and password.\npassword and password_file are mutually exclusive.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.remoteWrite.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "remoteWrite", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "remoteWrite", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.remoteWrite.*.bearer_token": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the `Authorization` header on every remote write request with\nthe configured bearer token. It is mutually exclusive with `bearer_token_file`.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "bearer_token"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.bearer_token_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the `Authorization` header on every remote write request with the bearer token\nread from the configured file. It is mutually exclusive with `bearer_token`.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "bearer_token_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.metadata_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configures the sending of series metadata to remote storage.\nMetadata configuration is subject to change at any point\nor be removed in future releases.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "metadata_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.remoteWrite.*.metadata_config.send": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether metric metadata is sent to remote storage or not.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "metadata_config", "send"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.remoteWrite.*.metadata_config.send_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How frequently metric metadata is sent to remote storage.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "metadata_config", "send_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the remote write config, which if specified must be unique among remote write configs.\nThe name will be used in metrics and logging in place of a generated value to help users distinguish between\nremote write configs.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "name"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional Proxy URL."}, "loc": ["services", "prometheus", "remoteWrite", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.queue_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configures the queue used to write to remote storage.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "queue_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.remoteWrite.*.queue_config.batch_send_deadline": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum time a sample will wait in buffer.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "queue_config", "batch_send_deadline"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.queue_config.capacity": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of samples to buffer per shard before we block reading of more\nsamples from the WAL. It is recommended to have enough capacity in each\nshard to buffer several requests to keep throughput up while processing\noccasional slow remote requests.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "queue_config", "capacity"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.remoteWrite.*.queue_config.max_backoff": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum retry delay.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "queue_config", "max_backoff"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.queue_config.max_samples_per_send": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum number of samples per send.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "queue_config", "max_samples_per_send"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.remoteWrite.*.queue_config.max_shards": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum number of shards, i.e. amount of concurrency.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "queue_config", "max_shards"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.remoteWrite.*.queue_config.min_backoff": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Initial retry delay. Gets doubled for every retry.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "queue_config", "min_backoff"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.queue_config.min_shards": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Minimum number of shards, i.e. amount of concurrency.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "queue_config", "min_shards"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.remoteWrite.*.remote_timeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Timeout for requests to the remote write endpoint.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "remote_timeout"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configures the remote write request's TLS settings.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.remoteWrite.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.remoteWrite.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "url"], "readOnly": false, "type": "string"}, "services.prometheus.remoteWrite.*.write_relabel_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of remote write relabel configurations.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "write_relabel_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.remoteWrite.*.write_relabel_configs.*.action": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Action to perform based on regex matching.\n\nDefaults to ````replace```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "write_relabel_configs", "*", "action"], "readOnly": false, "type": "null or one of \"replace\", \"lowercase\", \"uppercase\", \"keep\", \"drop\", \"hashmod\", \"labelmap\", \"labeldrop\", \"labelkeep\""}, "services.prometheus.remoteWrite.*.write_relabel_configs.*.modulus": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Modulus to take of the hash of the source label values.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "write_relabel_configs", "*", "modulus"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.remoteWrite.*.write_relabel_configs.*.regex": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Regular expression against which the extracted value is matched.\n\nDefaults to ````(.*)```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "write_relabel_configs", "*", "regex"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.write_relabel_configs.*.replacement": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Replacement value against which a regex replace is performed if the\nregular expression matches.\n\nDefaults to ````$1```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "write_relabel_configs", "*", "replacement"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.write_relabel_configs.*.separator": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Separator placed between concatenated source label values.\n\nDefaults to ````;```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "write_relabel_configs", "*", "separator"], "readOnly": false, "type": "null or string"}, "services.prometheus.remoteWrite.*.write_relabel_configs.*.source_labels": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The source labels select values from existing labels. Their content\nis concatenated using the configured separator and matched against\nthe configured regular expression.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "write_relabel_configs", "*", "source_labels"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.remoteWrite.*.write_relabel_configs.*.target_label": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Label to which the resulting value is written in a replace action.\nIt is mandatory for replace actions.\n"}, "loc": ["services", "prometheus", "remoteWrite", "*", "write_relabel_configs", "*", "target_label"], "readOnly": false, "type": "null or string"}, "services.prometheus.retentionTime": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How long to retain samples in storage.\n"}, "example": {"_type": "literalExpression", "text": "\"15d\""}, "loc": ["services", "prometheus", "retentionTime"], "readOnly": false, "type": "null or string"}, "services.prometheus.ruleFiles": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Any additional rules files to include in this configuration.\n"}, "loc": ["services", "prometheus", "ruleFiles"], "readOnly": false, "type": "list of path"}, "services.prometheus.rules": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Alerting and/or Recording rules to evaluate at runtime.\n"}, "loc": ["services", "prometheus", "rules"], "readOnly": false, "type": "list of string"}, "services.prometheus.sachet.address": {"declarations": ["nixos/modules/services/monitoring/prometheus/sachet.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The address Sachet will listen to.\n"}, "loc": ["services", "prometheus", "sachet", "address"], "readOnly": false, "type": "string"}, "services.prometheus.sachet.configuration": {"declarations": ["nixos/modules/services/monitoring/prometheus/sachet.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sachet's configuration as a nix attribute set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  providers = {\n    twilio = {\n      # environment variables gets expanded at runtime\n      account_sid = \"$TWILIO_ACCOUNT\";\n      auth_token = \"$TWILIO_TOKEN\";\n    };\n  };\n  templates = [ ./some-template.tmpl ];\n  receivers = [{\n    name = \"pager\";\n    provider = \"twilio\";\n    to = [ \"+33123456789\" ];\n    text = \"{{ template \\\"message\\\" . }}\";\n  }];\n}\n"}, "loc": ["services", "prometheus", "sachet", "configuration"], "readOnly": false, "type": "null or (attribute set)"}, "services.prometheus.sachet.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/sachet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Sachet, an SMS alerting tool for the Prometheus Alertmanager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "sachet", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.sachet.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/sachet.nix"], "default": {"_type": "literalExpression", "text": "9876"}, "description": {"_type": "mdDoc", "text": "The port Sachet will listen to.\n"}, "loc": ["services", "prometheus", "sachet", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.scrapeConfigs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of scrape configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs"], "readOnly": false, "type": "list of (submodule)"}, "services.prometheus.scrapeConfigs.*.authorization": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the `Authorization` header on every scrape request with the configured credentials.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "authorization"], "readOnly": false, "type": "null or (attribute set)"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Azure service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.authentication_method": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The authentication method, either OAuth or ManagedIdentity.\nSee https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview\n\nDefaults to ````OAuth```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "authentication_method"], "readOnly": false, "type": "null or one of \"OAuth\", \"ManagedIdentity\""}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.client_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional client ID. Only required with authentication_method OAuth.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "client_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.client_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional client secret. Only required with authentication_method OAuth.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "client_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.environment": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The Azure environment.\n\nDefaults to ````AzurePublicCloud```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "environment"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to scrape metrics from. If using the public IP\naddress, this must instead be specified in the relabeling\nrule.\n\nDefaults to ````80```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refresh interval to re-read the instance list.\n\nDefaults to ````300s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.subscription_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The subscription ID.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "subscription_id"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tenant_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional tenant ID. Only required with authentication_method OAuth.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "tenant_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "azure_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the `Authorization` header on every scrape request with the\nconfigured username and password.\npassword and password_file are mutually exclusive.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.bearer_token": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the `Authorization` header on every scrape request with\nthe configured bearer token. It is mutually exclusive with\n{option}`bearer_token_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "bearer_token"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.bearer_token_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the `Authorization` header on every scrape request with\nthe bearer token read from the configured file. It is mutually\nexclusive with {option}`bearer_token`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "bearer_token_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.body_size_limit": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "An uncompressed response body larger than this many bytes will cause the\nscrape to fail. 0 means no limit. Example: 100MB.\nThis is an experimental feature, this behaviour could\nchange or be removed in the future.\n\nDefaults to ````0```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "body_size_limit"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Consul service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.allow_stale": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Allow stale Consul results\n(see <https://www.consul.io/api/index.html#consistency-modes>).\n\nWill reduce load on Consul.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "allow_stale"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional `Authorization` header configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "authorization"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.credentials": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials. It is mutually exclusive with `credentials_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "authorization", "credentials"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.credentials_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials to the credentials read from the configured file.\nIt is mutually exclusive with `credentials`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "authorization", "credentials_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.type": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the authentication type.\n\nDefaults to ````Bearer```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "authorization", "type"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional HTTP basic authentication information.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.datacenter": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Consul datacenter"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "datacenter"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.node_meta": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Node metadata used to filter nodes for a given service.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "node_meta"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional OAuth 2.0 configuration.\nCannot be used at the same time as basic_auth or authorization.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "oauth2"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client ID.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "oauth2", "client_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client secret.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "oauth2", "client_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_secret_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Read the client secret from a file. It is mutually exclusive with `client_secret`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "oauth2", "client_secret_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.endpoint_params": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional parameters to append to the token URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "oauth2", "endpoint_params"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.scopes": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Scopes for the token request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "oauth2", "scopes"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.token_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL to fetch the token from.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "oauth2", "token_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Consul password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The time after which the provided names are refreshed.\n\nOn large setup it might be a good idea to increase this value\nbecause the catalog will change all the time.\n\nDefaults to ````30s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.scheme": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Consul scheme\nDefaults to ````http```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "scheme"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.server": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Consul server to query.\n\nDefaults to ````localhost:8500```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "server"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.services": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A list of services for which targets are retrieved.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "services"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tag_separator": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The string by which Consul tags are joined into the tag label.\n\nDefaults to ````,```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "tag_separator"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tags": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "An optional list of tags used to filter nodes for a given\nservice. Services must contain all tags in the list.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "tags"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configures the Consul request's TLS settings.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.token": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Consul token"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "token"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.consul_sd_configs.*.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Consul username"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "consul_sd_configs", "*", "username"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of DigitalOcean service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional `Authorization` header configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "authorization"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.credentials": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials. It is mutually exclusive with `credentials_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "authorization", "credentials"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.credentials_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials to the credentials read from the configured file.\nIt is mutually exclusive with `credentials`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "authorization", "credentials_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.type": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the authentication type.\n\nDefaults to ````Bearer```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "authorization", "type"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional HTTP basic authentication information.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional OAuth 2.0 configuration.\nCannot be used at the same time as basic_auth or authorization.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "oauth2"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client ID.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "oauth2", "client_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client secret.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "oauth2", "client_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_secret_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Read the client secret from a file. It is mutually exclusive with `client_secret`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "oauth2", "client_secret_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.endpoint_params": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional parameters to append to the token URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "oauth2", "endpoint_params"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.scopes": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Scopes for the token request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "oauth2", "scopes"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.token_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL to fetch the token from.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "oauth2", "token_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to scrape metrics from.\n\nDefaults to ````80```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The time after which the droplets are refreshed.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "digitalocean_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dns_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of DNS service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dns_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.dns_sd_configs.*.names": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "A list of DNS SRV record names to be queried.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dns_sd_configs", "*", "names"], "readOnly": false, "type": "list of string"}, "services.prometheus.scrapeConfigs.*.dns_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port number used if the query type is not SRV.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dns_sd_configs", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.dns_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The time after which the provided names are refreshed.\n\nDefaults to ````30s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dns_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dns_sd_configs.*.type": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The type of DNS query to perform. One of SRV, A, or AAAA.\n\nDefaults to ````SRV```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dns_sd_configs", "*", "type"], "readOnly": false, "type": "null or one of \"SRV\", \"A\", \"AAAA\""}, "services.prometheus.scrapeConfigs.*.docker_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Docker service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional `Authorization` header configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "authorization"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.credentials": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials. It is mutually exclusive with `credentials_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "authorization", "credentials"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.credentials_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials to the credentials read from the configured file.\nIt is mutually exclusive with `credentials`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "authorization", "credentials_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.type": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the authentication type.\n\nDefaults to ````Bearer```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "authorization", "type"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional HTTP basic authentication information.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional filters to limit the discovery process to a subset of available resources.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "filters"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters.*.name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Name of the filter. The available filters are listed in the upstream documentation:\nServices: <https://docs.docker.com/engine/api/v1.40/#operation/ServiceList>\nTasks: <https://docs.docker.com/engine/api/v1.40/#operation/TaskList>\nNodes: <https://docs.docker.com/engine/api/v1.40/#operation/NodeList>\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "filters", "*", "name"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.filters.*.values": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Value for the filter.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "filters", "*", "values"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.host": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Address of the Docker daemon.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "host"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.host_networking_host": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The host to use if the container is in host networking mode.\n\nDefaults to ````localhost```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "host_networking_host"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional OAuth 2.0 configuration.\nCannot be used at the same time as basic_auth or authorization.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "oauth2"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client ID.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "oauth2", "client_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client secret.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "oauth2", "client_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_secret_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Read the client secret from a file. It is mutually exclusive with `client_secret`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "oauth2", "client_secret_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.endpoint_params": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional parameters to append to the token URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "oauth2", "endpoint_params"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.scopes": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Scopes for the token request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "oauth2", "scopes"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.token_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL to fetch the token from.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "oauth2", "token_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to scrape metrics from, when `role` is nodes, and for discovered\ntasks and services that don't have published ports.\n\nDefaults to ````80```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The time after which the containers are refreshed.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "docker_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Docker Swarm service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional `Authorization` header configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "authorization"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.credentials": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials. It is mutually exclusive with `credentials_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "authorization", "credentials"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.credentials_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials to the credentials read from the configured file.\nIt is mutually exclusive with `credentials`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "authorization", "credentials_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.type": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the authentication type.\n\nDefaults to ````Bearer```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "authorization", "type"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional HTTP basic authentication information.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional filters to limit the discovery process to a subset of available resources.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "filters"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters.*.name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Name of the filter. The available filters are listed in the upstream documentation:\nServices: <https://docs.docker.com/engine/api/v1.40/#operation/ServiceList>\nTasks: <https://docs.docker.com/engine/api/v1.40/#operation/TaskList>\nNodes: <https://docs.docker.com/engine/api/v1.40/#operation/NodeList>\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "filters", "*", "name"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.filters.*.values": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Value for the filter.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "filters", "*", "values"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.host": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Address of the Docker daemon.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "host"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional OAuth 2.0 configuration.\nCannot be used at the same time as basic_auth or authorization.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "oauth2"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client ID.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "oauth2", "client_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client secret.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "oauth2", "client_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_secret_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Read the client secret from a file. It is mutually exclusive with `client_secret`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "oauth2", "client_secret_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.endpoint_params": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional parameters to append to the token URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "oauth2", "endpoint_params"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.scopes": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Scopes for the token request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "oauth2", "scopes"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.token_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL to fetch the token from.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "oauth2", "token_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to scrape metrics from, when `role` is nodes, and for discovered\ntasks and services that don't have published ports.\n\nDefaults to ````80```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The time after which the containers are refreshed.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.role": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Role of the targets to retrieve. Must be `services`, `tasks`, or `nodes`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "role"], "readOnly": false, "type": "one of \"services\", \"tasks\", \"nodes\""}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "dockerswarm_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.ec2_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of EC2 service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "ec2_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.access_key": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The AWS API key id. If blank, the environment variable\n`AWS_ACCESS_KEY_ID` is used.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "ec2_sd_configs", "*", "access_key"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.endpoint": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Custom endpoint to be used.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "ec2_sd_configs", "*", "endpoint"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Filters can be used optionally to filter the instance list by other criteria.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "ec2_sd_configs", "*", "filters"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "See [this list](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DescribeInstances.html)\nfor the available filters.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "ec2_sd_configs", "*", "filters", "*", "name"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.filters.*.values": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Value of the filter.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "ec2_sd_configs", "*", "filters", "*", "values"], "readOnly": false, "type": "list of string"}, "services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to scrape metrics from. If using the public IP\naddress, this must instead be specified in the relabeling\nrule.\n\nDefaults to ````80```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "ec2_sd_configs", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.profile": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Named AWS profile used to connect to the API.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "ec2_sd_configs", "*", "profile"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refresh interval to re-read the instance list.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "ec2_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.region": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The AWS Region. If blank, the region from the instance metadata is used.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "ec2_sd_configs", "*", "region"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.role_arn": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "AWS Role ARN, an alternative to using AWS API keys.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "ec2_sd_configs", "*", "role_arn"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.ec2_sd_configs.*.secret_key": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The AWS API key secret. If blank, the environment variable\n `AWS_SECRET_ACCESS_KEY` is used.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "ec2_sd_configs", "*", "secret_key"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Eureka service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional `Authorization` header configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "authorization"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.credentials": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials. It is mutually exclusive with `credentials_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "authorization", "credentials"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.credentials_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials to the credentials read from the configured file.\nIt is mutually exclusive with `credentials`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "authorization", "credentials_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.type": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the authentication type.\n\nDefaults to ````Bearer```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "authorization", "type"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional HTTP basic authentication information.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional OAuth 2.0 configuration.\nCannot be used at the same time as basic_auth or authorization.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "oauth2"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client ID.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "oauth2", "client_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client secret.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "oauth2", "client_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_secret_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Read the client secret from a file. It is mutually exclusive with `client_secret`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "oauth2", "client_secret_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.endpoint_params": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional parameters to append to the token URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "oauth2", "endpoint_params"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.scopes": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Scopes for the token request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "oauth2", "scopes"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.token_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL to fetch the token from.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "oauth2", "token_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.server": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The URL to connect to the Eureka server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "server"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "eureka_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.file_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of file service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "file_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.file_sd_configs.*.files": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Patterns for files from which target groups are extracted. Refer\nto the Prometheus documentation for permitted filename patterns\nand formats.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "file_sd_configs", "*", "files"], "readOnly": false, "type": "list of string"}, "services.prometheus.scrapeConfigs.*.file_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refresh interval to re-read the files.\n\nDefaults to ````5m```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "file_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.gce_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Google Compute Engine service discovery configurations.\n\nSee [the relevant Prometheus configuration docs](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#gce_sd_config)\nfor more detail.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "gce_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.gce_sd_configs.*.filter": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Filter can be used optionally to filter the instance list by other\ncriteria Syntax of this filter string is described here in the filter\nquery parameter section: <https://cloud.google.com/compute/docs/reference/latest/instances/list>.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "gce_sd_configs", "*", "filter"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.gce_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to scrape metrics from. If using the public IP address, this\nmust instead be specified in the relabeling rule.\n\nDefaults to ````80```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "gce_sd_configs", "*", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.prometheus.scrapeConfigs.*.gce_sd_configs.*.project": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The GCP Project.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "gce_sd_configs", "*", "project"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.gce_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refresh interval to re-read the cloud instance list.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "gce_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.gce_sd_configs.*.tag_separator": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The tag separator used to separate concatenated GCE instance network tags.\n\nSee the GCP documentation on network tags for more information:\n<https://cloud.google.com/vpc/docs/add-remove-network-tags>\n\nDefaults to ````,```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "gce_sd_configs", "*", "tag_separator"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.gce_sd_configs.*.zone": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The zone of the scrape targets. If you need multiple zones use multiple\ngce_sd_configs.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "gce_sd_configs", "*", "zone"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Hetzner service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional `Authorization` header configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "authorization"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.credentials": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials. It is mutually exclusive with `credentials_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "authorization", "credentials"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.credentials_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials to the credentials read from the configured file.\nIt is mutually exclusive with `credentials`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "authorization", "credentials_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.type": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the authentication type.\n\nDefaults to ````Bearer```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "authorization", "type"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional HTTP basic authentication information.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional OAuth 2.0 configuration.\nCannot be used at the same time as basic_auth or authorization.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "oauth2"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client ID.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "oauth2", "client_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client secret.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "oauth2", "client_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_secret_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Read the client secret from a file. It is mutually exclusive with `client_secret`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "oauth2", "client_secret_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.endpoint_params": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional parameters to append to the token URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "oauth2", "endpoint_params"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.scopes": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Scopes for the token request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "oauth2", "scopes"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.token_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL to fetch the token from.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "oauth2", "token_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to scrape metrics from.\n\nDefaults to ````80```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The time after which the servers are refreshed.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.role": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The Hetzner role of entities that should be discovered.\nOne of `robot` or `hcloud`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "role"], "readOnly": false, "type": "one of \"robot\", \"hcloud\""}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "hetzner_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.honor_labels": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Controls how Prometheus handles conflicts between labels\nthat are already present in scraped data and labels that\nPrometheus would attach server-side (\"job\" and \"instance\"\nlabels, manually configured target labels, and labels\ngenerated by service discovery implementations).\n\nIf honor_labels is set to \"true\", label conflicts are\nresolved by keeping label values from the scraped data and\nignoring the conflicting server-side labels.\n\nIf honor_labels is set to \"false\", label conflicts are\nresolved by renaming conflicting labels in the scraped data\nto \"exported_\\<original-label\\>\" (for example\n\"exported_instance\", \"exported_job\") and then attaching\nserver-side labels. This is useful for use cases such as\nfederation, where all labels specified in the target should\nbe preserved.\n\nDefaults to ````false```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "honor_labels"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.honor_timestamps": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "honor_timestamps controls whether Prometheus respects the timestamps present\nin scraped data.\n\nIf honor_timestamps is set to `true`, the timestamps of the metrics exposed\nby the target will be used.\n\nIf honor_timestamps is set to `false`, the timestamps of the metrics exposed\nby the target will be ignored.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "honor_timestamps"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.http_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of HTTP service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Authentication information used to authenticate to the API server.\npassword and password_file are mutually exclusive.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refresh interval to re-query the endpoint.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configures the scrape request's TLS settings.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.http_sd_configs.*.url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "URL from which the targets are fetched.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "http_sd_configs", "*", "url"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.job_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The job name assigned to scraped metrics by default.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "job_name"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Kubernetes service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.api_server": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The API server addresses. If left empty, Prometheus is assumed to run inside\nof the cluster and will discover API servers automatically and use the pod's\nCA certificate and bearer token file at /var/run/secrets/kubernetes.io/serviceaccount/.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "api_server"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional `Authorization` header configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "authorization"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.credentials": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials. It is mutually exclusive with `credentials_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "authorization", "credentials"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.credentials_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials to the credentials read from the configured file.\nIt is mutually exclusive with `credentials`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "authorization", "credentials_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.type": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the authentication type.\n\nDefaults to ````Bearer```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "authorization", "type"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional HTTP basic authentication information.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.kubeconfig_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional path to a kubeconfig file.\nNote that api_server and kube_config are mutually exclusive.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "kubeconfig_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional namespace discovery. If omitted, all namespaces are used.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "namespaces"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.namespaces.names": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Namespace name.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "namespaces", "names"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional OAuth 2.0 configuration.\nCannot be used at the same time as basic_auth or authorization.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "oauth2"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client ID.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "oauth2", "client_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client secret.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "oauth2", "client_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_secret_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Read the client secret from a file. It is mutually exclusive with `client_secret`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "oauth2", "client_secret_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.endpoint_params": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional parameters to append to the token URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "oauth2", "endpoint_params"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.scopes": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Scopes for the token request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "oauth2", "scopes"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.token_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL to fetch the token from.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "oauth2", "token_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.role": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The Kubernetes role of entities that should be discovered.\nOne of endpoints, service, pod, node, or ingress.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "role"], "readOnly": false, "type": "one of \"endpoints\", \"service\", \"pod\", \"node\", \"ingress\""}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional label and field selectors to limit the discovery process to a subset of available resources.\nSee https://kubernetes.io/docs/concepts/overview/working-with-objects/field-selectors/\nand https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ to learn more about the possible\nfilters that can be used. Endpoints role supports pod, service and endpoints selectors, other roles\nonly support selectors matching the role itself (e.g. node role can only contain node selectors).\n\nNote: When making decision about using field/label selector make sure that this\nis the best approach - it will prevent Prometheus from reusing single list/watch\nfor all scrape configs. This might result in a bigger load on the Kubernetes API,\nbecause per each selector combination there will be additional LIST/WATCH. On the other hand,\nif you just want to monitor small subset of pods in large cluster it's recommended to use selectors.\nDecision, if selectors should be used or not depends on the particular situation.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "selectors"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors.*.field": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Selector field\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "selectors", "*", "field"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors.*.label": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Selector label\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "selectors", "*", "label"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.selectors.*.role": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Selector role\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "selectors", "*", "role"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kubernetes_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Kuma service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional `Authorization` header configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "authorization"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.credentials": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials. It is mutually exclusive with `credentials_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "authorization", "credentials"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.credentials_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials to the credentials read from the configured file.\nIt is mutually exclusive with `credentials`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "authorization", "credentials_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.type": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the authentication type.\n\nDefaults to ````Bearer```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "authorization", "type"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional HTTP basic authentication information.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.fetch_timeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The time after which the monitoring assignments are refreshed.\n\nDefaults to ````2m```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "fetch_timeout"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional OAuth 2.0 configuration.\nCannot be used at the same time as basic_auth or authorization.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "oauth2"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client ID.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "oauth2", "client_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client secret.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "oauth2", "client_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_secret_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Read the client secret from a file. It is mutually exclusive with `client_secret`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "oauth2", "client_secret_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.endpoint_params": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional parameters to append to the token URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "oauth2", "endpoint_params"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.scopes": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Scopes for the token request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "oauth2", "scopes"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.token_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL to fetch the token from.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "oauth2", "token_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The time to wait between polling update requests.\n\nDefaults to ````30s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.server": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Address of the Kuma Control Plane's MADS xDS server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "server"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "kuma_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.label_limit": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Per-scrape limit on number of labels that will be accepted for a sample. If\nmore than this number of labels are present post metric-relabeling, the\nentire scrape will be treated as failed. 0 means no limit.\n\nDefaults to ````0```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "label_limit"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.label_name_length_limit": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Per-scrape limit on length of labels name that will be accepted for a sample.\nIf a label name is longer than this number post metric-relabeling, the entire\nscrape will be treated as failed. 0 means no limit.\n\nDefaults to ````0```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "label_name_length_limit"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.label_value_length_limit": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Per-scrape limit on length of labels value that will be accepted for a sample.\nIf a label value is longer than this number post metric-relabeling, the\nentire scrape will be treated as failed. 0 means no limit.\n\nDefaults to ````0```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "label_value_length_limit"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.lightsail_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Lightsail service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "lightsail_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.access_key": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The AWS API keys. If blank, the environment variable `AWS_ACCESS_KEY_ID` is used.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "lightsail_sd_configs", "*", "access_key"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.endpoint": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Custom endpoint to be used.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "lightsail_sd_configs", "*", "endpoint"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to scrape metrics from. If using the public IP address, this must\ninstead be specified in the relabeling rule.\n\nDefaults to ````80```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "lightsail_sd_configs", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.profile": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Named AWS profile used to connect to the API.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "lightsail_sd_configs", "*", "profile"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refresh interval to re-read the instance list.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "lightsail_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.region": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The AWS region. If blank, the region from the instance metadata is used.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "lightsail_sd_configs", "*", "region"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.role_arn": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "AWS Role ARN, an alternative to using AWS API keys.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "lightsail_sd_configs", "*", "role_arn"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.lightsail_sd_configs.*.secret_key": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The AWS API keys. If blank, the environment variable `AWS_SECRET_ACCESS_KEY` is used.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "lightsail_sd_configs", "*", "secret_key"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Linode service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional `Authorization` header configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "authorization"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.credentials": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials. It is mutually exclusive with `credentials_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "authorization", "credentials"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.credentials_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials to the credentials read from the configured file.\nIt is mutually exclusive with `credentials`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "authorization", "credentials_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.type": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the authentication type.\n\nDefaults to ````Bearer```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "authorization", "type"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional HTTP basic authentication information.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional OAuth 2.0 configuration.\nCannot be used at the same time as basic_auth or authorization.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "oauth2"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client ID.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "oauth2", "client_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client secret.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "oauth2", "client_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_secret_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Read the client secret from a file. It is mutually exclusive with `client_secret`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "oauth2", "client_secret_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.endpoint_params": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional parameters to append to the token URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "oauth2", "endpoint_params"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.scopes": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Scopes for the token request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "oauth2", "scopes"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.token_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL to fetch the token from.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "oauth2", "token_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to scrape metrics from.\n\nDefaults to ````80```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The time after which the linode instances are refreshed.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tag_separator": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The string by which Linode Instance tags are joined into the tag label.\n\nDefaults to ````,```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "tag_separator"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "linode_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Marathon service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.auth_token": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional authentication information for token-based authentication:\n<https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token>\nIt is mutually exclusive with `auth_token_file` and other authentication mechanisms.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "auth_token"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.auth_token_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional authentication information for token-based authentication:\n<https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token>\nIt is mutually exclusive with `auth_token` and other authentication mechanisms.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "auth_token_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional `Authorization` header configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "authorization"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.credentials": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials. It is mutually exclusive with `credentials_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "authorization", "credentials"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.credentials_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials to the credentials read from the configured file.\nIt is mutually exclusive with `credentials`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "authorization", "credentials_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.type": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the authentication type.\n\nDefaults to ````Bearer```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "authorization", "type"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional HTTP basic authentication information.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional OAuth 2.0 configuration.\nCannot be used at the same time as basic_auth or authorization.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "oauth2"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client ID.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "oauth2", "client_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client secret.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "oauth2", "client_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_secret_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Read the client secret from a file. It is mutually exclusive with `client_secret`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "oauth2", "client_secret_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.endpoint_params": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional parameters to append to the token URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "oauth2", "endpoint_params"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.scopes": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Scopes for the token request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "oauth2", "scopes"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.token_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL to fetch the token from.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "oauth2", "token_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Polling interval.\n\nDefaults to ````30s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.servers": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "List of URLs to be used to contact Marathon servers. You need to provide at least one server URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "servers"], "readOnly": false, "type": "list of string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "marathon_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.metric_relabel_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of metric relabel configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "metric_relabel_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.action": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Action to perform based on regex matching.\n\nDefaults to ````replace```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "metric_relabel_configs", "*", "action"], "readOnly": false, "type": "null or one of \"replace\", \"lowercase\", \"uppercase\", \"keep\", \"drop\", \"hashmod\", \"labelmap\", \"labeldrop\", \"labelkeep\""}, "services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.modulus": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Modulus to take of the hash of the source label values.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "metric_relabel_configs", "*", "modulus"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.regex": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Regular expression against which the extracted value is matched.\n\nDefaults to ````(.*)```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "metric_relabel_configs", "*", "regex"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.replacement": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Replacement value against which a regex replace is performed if the\nregular expression matches.\n\nDefaults to ````$1```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "metric_relabel_configs", "*", "replacement"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.separator": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Separator placed between concatenated source label values.\n\nDefaults to ````;```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "metric_relabel_configs", "*", "separator"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.source_labels": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The source labels select values from existing labels. Their content\nis concatenated using the configured separator and matched against\nthe configured regular expression.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "metric_relabel_configs", "*", "source_labels"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.metric_relabel_configs.*.target_label": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Label to which the resulting value is written in a replace action.\nIt is mandatory for replace actions.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "metric_relabel_configs", "*", "target_label"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.metrics_path": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The HTTP resource path on which to fetch metrics from targets.\n\nDefaults to ````/metrics```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "metrics_path"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.nerve_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of AirBnB's Nerve service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "nerve_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.paths": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Paths can point to a single service, or the root of a tree of services.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "nerve_sd_configs", "*", "paths"], "readOnly": false, "type": "list of string"}, "services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.servers": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The Zookeeper servers.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "nerve_sd_configs", "*", "servers"], "readOnly": false, "type": "list of string"}, "services.prometheus.scrapeConfigs.*.nerve_sd_configs.*.timeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Timeout value.\n\nDefaults to ````10s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "nerve_sd_configs", "*", "timeout"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of OpenStack service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.all_tenants": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether the service discovery should list all instances for all projects.\nIt is only relevant for the 'instance' role and usually requires admin permissions.\n\nDefaults to ````false```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "all_tenants"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The application_credential_id or application_credential_name fields are\nrequired if using an application credential to authenticate. Some providers\nallow you to create an application credential to authenticate rather than a\npassword.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "application_credential_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The application_credential_id or application_credential_name fields are\nrequired if using an application credential to authenticate. Some providers\nallow you to create an application credential to authenticate rather than a\npassword.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "application_credential_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The application_credential_secret field is required if using an application\ncredential to authenticate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "application_credential_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.availability": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The availability of the endpoint to connect to. Must be one of public, admin or internal.\n\nDefaults to ````public```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "availability"], "readOnly": false, "type": "null or one of \"public\", \"admin\", \"internal\""}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "At most one of domain_id and domain_name must be provided if using username\nwith Identity V3. Otherwise, either are optional.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "domain_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.domain_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "At most one of domain_id and domain_name must be provided if using username\nwith Identity V3. Otherwise, either are optional.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "domain_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.identity_endpoint": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "identity_endpoint specifies the HTTP endpoint that is required to work with\nthe Identity API of the appropriate version. While it's ultimately needed by\nall of the identity services, it will often be populated by a provider-level\nfunction.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "identity_endpoint"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "password for the Identity V2 and V3 APIs. Consult with your provider's\ncontrol panel to discover your account's preferred method of authentication.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to scrape metrics from. If using the public IP address, this must\ninstead be specified in the relabeling rule.\n\nDefaults to ````80```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The project_id and project_name fields are optional for the Identity V2 API.\nSome providers allow you to specify a project_name instead of the project_id.\nSome require both. Your provider's authentication policies will determine\nhow these fields influence authentication.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "project_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The project_id and project_name fields are optional for the Identity V2 API.\nSome providers allow you to specify a project_name instead of the project_id.\nSome require both. Your provider's authentication policies will determine\nhow these fields influence authentication.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "project_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refresh interval to re-read the instance list.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.region": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The OpenStack Region.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "region"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.role": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The OpenStack role of entities that should be discovered.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "role"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.userid": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "username is required if using Identity V2 API. Consult with your provider's\ncontrol panel to discover your account's username. In Identity V3, either\nuserid or a combination of username and domain_id or domain_name are needed.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "userid"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "username is required if using Identity V2 API. Consult with your provider's\ncontrol panel to discover your account's username. In Identity V3, either\nuserid or a combination of username and domain_id or domain_name are needed.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "openstack_sd_configs", "*", "username"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.params": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional HTTP URL parameters.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "params"], "readOnly": false, "type": "null or (attribute set of list of string)"}, "services.prometheus.scrapeConfigs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of PuppetDB service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional `Authorization` header configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "authorization"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.credentials": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials. It is mutually exclusive with `credentials_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "authorization", "credentials"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.credentials_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials to the credentials read from the configured file.\nIt is mutually exclusive with `credentials`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "authorization", "credentials_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.type": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the authentication type.\n\nDefaults to ````Bearer```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "authorization", "type"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional HTTP basic authentication information.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.include_parameters": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to include the parameters as meta labels.\nDue to the differences between parameter types and Prometheus labels,\nsome parameters might not be rendered. The format of the parameters might\nalso change in future releases.\n\nNote: Enabling this exposes parameters in the Prometheus UI and API. Make sure\nthat you don't have secrets exposed as parameters if you enable this.\n\nDefaults to ````false```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "include_parameters"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional OAuth 2.0 configuration.\nCannot be used at the same time as basic_auth or authorization.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "oauth2"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client ID.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "oauth2", "client_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client secret.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "oauth2", "client_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_secret_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Read the client secret from a file. It is mutually exclusive with `client_secret`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "oauth2", "client_secret_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.endpoint_params": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional parameters to append to the token URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "oauth2", "endpoint_params"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.scopes": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Scopes for the token request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "oauth2", "scopes"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.token_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL to fetch the token from.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "oauth2", "token_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to scrape metrics from.\n\nDefaults to ````80```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.query": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Puppet Query Language (PQL) query. Only resources are supported.\nhttps://puppet.com/docs/puppetdb/latest/api/query/v4/pql.html\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "query"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refresh interval to re-read the resources list.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The URL of the PuppetDB root query endpoint.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "puppetdb_sd_configs", "*", "url"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.relabel_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of relabel configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "relabel_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.relabel_configs.*.action": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Action to perform based on regex matching.\n\nDefaults to ````replace```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "relabel_configs", "*", "action"], "readOnly": false, "type": "null or one of \"replace\", \"lowercase\", \"uppercase\", \"keep\", \"drop\", \"hashmod\", \"labelmap\", \"labeldrop\", \"labelkeep\""}, "services.prometheus.scrapeConfigs.*.relabel_configs.*.modulus": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Modulus to take of the hash of the source label values.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "relabel_configs", "*", "modulus"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.relabel_configs.*.regex": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Regular expression against which the extracted value is matched.\n\nDefaults to ````(.*)```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "relabel_configs", "*", "regex"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.relabel_configs.*.replacement": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Replacement value against which a regex replace is performed if the\nregular expression matches.\n\nDefaults to ````$1```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "relabel_configs", "*", "replacement"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.relabel_configs.*.separator": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Separator placed between concatenated source label values.\n\nDefaults to ````;```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "relabel_configs", "*", "separator"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.relabel_configs.*.source_labels": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The source labels select values from existing labels. Their content\nis concatenated using the configured separator and matched against\nthe configured regular expression.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "relabel_configs", "*", "source_labels"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.relabel_configs.*.target_label": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Label to which the resulting value is written in a replace action.\nIt is mandatory for replace actions.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "relabel_configs", "*", "target_label"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.sample_limit": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Per-scrape limit on number of scraped samples that will be accepted.\nIf more than this number of samples are present after metric relabelling\nthe entire scrape will be treated as failed. 0 means no limit.\n\nDefaults to ````0```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "sample_limit"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Scaleway service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.access_key": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Access key to use. https://console.scaleway.com/project/credentials\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "access_key"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.api_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "API URL to use when doing the server listing requests.\n\nDefaults to ````https://api.scaleway.com```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "api_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.name_filter": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a name filter (works as a LIKE) to apply on the server listing request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "name_filter"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to scrape metrics from.\n\nDefaults to ````80```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.project_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Project ID of the targets.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "project_id"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refresh interval to re-read the managed targets list.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.role": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Role of the targets to retrieve. Must be `instance` or `baremetal`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "role"], "readOnly": false, "type": "one of \"instance\", \"baremetal\""}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.secret_key": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Secret key to use when listing targets. https://console.scaleway.com/project/credentials\nIt is mutually exclusive with `secret_key_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "secret_key"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.secret_key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the secret key with the credentials read from the configured file.\nIt is mutually exclusive with `secret_key`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "secret_key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tags_filter": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a tag filter (a server needs to have all defined tags to be listed) to apply on the server listing request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "tags_filter"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.zone": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Zone is the availability zone of your targets (e.g. fr-par-1).\n\nDefaults to ````fr-par-1```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scaleway_sd_configs", "*", "zone"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.scheme": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL scheme with which to fetch metrics from targets.\n\nDefaults to ````http```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scheme"], "readOnly": false, "type": "null or one of \"http\", \"https\""}, "services.prometheus.scrapeConfigs.*.scrape_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How frequently to scrape targets from this job. Defaults to the\nglobally configured default.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scrape_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.scrape_timeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Per-target timeout when scraping this job. Defaults to the\nglobally configured default.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "scrape_timeout"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.serverset_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Zookeeper Serverset service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "serverset_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.paths": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Paths can point to a single service, or the root of a tree of services.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "serverset_sd_configs", "*", "paths"], "readOnly": false, "type": "list of string"}, "services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.servers": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The Zookeeper servers.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "serverset_sd_configs", "*", "servers"], "readOnly": false, "type": "list of string"}, "services.prometheus.scrapeConfigs.*.serverset_sd_configs.*.timeout": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Timeout value.\n\nDefaults to ````10s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "serverset_sd_configs", "*", "timeout"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.static_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of labeled target groups for this job.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "static_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.static_configs.*.labels": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Labels assigned to all metrics scraped from the targets.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "static_configs", "*", "labels"], "readOnly": false, "type": "attribute set of string"}, "services.prometheus.scrapeConfigs.*.static_configs.*.targets": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The targets specified by the target group.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "static_configs", "*", "targets"], "readOnly": false, "type": "list of string"}, "services.prometheus.scrapeConfigs.*.target_limit": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Per-scrape config limit on number of unique targets that will be\naccepted. If more than this number of targets are present after target\nrelabeling, Prometheus will mark the targets as failed without scraping them.\n0 means no limit. This is an experimental feature, this behaviour could\nchange in the future.\n\nDefaults to ````0```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "target_limit"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configures the scrape request's TLS settings.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Triton Serverset service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.account": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The account to use for discovering new targets.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "account"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.dns_suffix": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The DNS suffix which should be applied to target.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "dns_suffix"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.endpoint": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The Triton discovery endpoint (e.g. `cmon.us-east-3b.triton.zone`). This is\noften the same value as dns_suffix.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "endpoint"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.groups": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A list of groups for which targets are retrieved, only supported when targeting the `container` role.\nIf omitted all containers owned by the requesting account are scraped.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "groups"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.port": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port to use for discovery and metric scraping.\n\nDefaults to ````9163```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "port"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The interval which should be used for refreshing targets.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.role": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The type of targets to discover, can be set to:\n- \"container\" to discover virtual machines (SmartOS zones, lx/KVM/bhyve branded zones) running on Triton\n- \"cn\" to discover compute nodes (servers/global zones) making up the Triton infrastructure\n\nDefaults to ````container```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "role"], "readOnly": false, "type": "null or one of \"container\", \"cn\""}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.triton_sd_configs.*.version": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The Triton discovery API version.\n\nDefaults to ````1```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "triton_sd_configs", "*", "version"], "readOnly": false, "type": "null or signed integer"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of Uyuni Serverset service discovery configurations.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs"], "readOnly": false, "type": "null or (list of (submodule))"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional `Authorization` header configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "authorization"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.credentials": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials. It is mutually exclusive with `credentials_file`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "authorization", "credentials"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.credentials_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the credentials to the credentials read from the configured file.\nIt is mutually exclusive with `credentials`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "authorization", "credentials_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.type": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the authentication type.\n\nDefaults to ````Bearer```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "authorization", "type"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional HTTP basic authentication information.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "basic_auth"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "basic_auth", "password"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HTTP password file"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "basic_auth", "password_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "HTTP username\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "basic_auth", "username"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.entitlement": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The entitlement string to filter eligible systems.\n\nDefaults to ````monitoring_entitled```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "entitlement"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.follow_redirects": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure whether HTTP requests follow HTTP 3xx redirects.\n\nDefaults to ````true```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "follow_redirects"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional OAuth 2.0 configuration.\nCannot be used at the same time as basic_auth or authorization.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "oauth2"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_id": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client ID.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "oauth2", "client_id"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_secret": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "OAuth client secret.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "oauth2", "client_secret"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_secret_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Read the client secret from a file. It is mutually exclusive with `client_secret`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "oauth2", "client_secret_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.endpoint_params": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional parameters to append to the token URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "oauth2", "endpoint_params"], "readOnly": false, "type": "null or (attribute set of string)"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.scopes": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Scopes for the token request.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "oauth2", "scopes"], "readOnly": false, "type": "null or (list of string)"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.token_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL to fetch the token from.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "oauth2", "token_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.password": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Credentials are used to authenticate the requests to Uyuni API.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "password"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.proxy_url": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional proxy URL.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "proxy_url"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.refresh_interval": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refresh interval to re-read the managed targets list.\n\nDefaults to ````60s```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "refresh_interval"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.separator": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The string by which Uyuni group names are joined into the groups label\n\nDefaults to ````,```` in prometheus\nwhen set to `null`.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "separator"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.server": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "The URL to connect to the Uyuni server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "server"], "readOnly": false, "type": "string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS configuration.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "tls_config"], "readOnly": false, "type": "null or (submodule)"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.ca_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CA certificate to validate API server certificate with.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "tls_config", "ca_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.cert_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "tls_config", "cert_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.insecure_skip_verify": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Disable validation of the server certificate.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "tls_config", "insecure_skip_verify"], "readOnly": false, "type": "null or boolean"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.key_file": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key file for client cert authentication to the server.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "tls_config", "key_file"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.server_name": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ServerName extension to indicate the name of the server.\nhttp://tools.ietf.org/html/rfc4366#section-3.1\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "tls_config", "server_name"], "readOnly": false, "type": "null or string"}, "services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.username": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "description": {"_type": "mdDoc", "text": "Credentials are used to authenticate the requests to Uyuni API.\n"}, "loc": ["services", "prometheus", "scrapeConfigs", "*", "uyuni_sd_configs", "*", "username"], "readOnly": false, "type": "string"}, "services.prometheus.stateDir": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "\"prometheus2\""}, "description": {"_type": "mdDoc", "text": "Directory below `/var/lib` to store Prometheus metrics data.\nThis directory will be created automatically using systemd's StateDirectory mechanism.\n"}, "loc": ["services", "prometheus", "stateDir"], "readOnly": false, "type": "string"}, "services.prometheus.webConfigFile": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies which file should be used as web.config.file and be passed on startup.\nSee https://prometheus.io/docs/prometheus/latest/configuration/https/ for valid options.\n"}, "loc": ["services", "prometheus", "webConfigFile"], "readOnly": false, "type": "null or path"}, "services.prometheus.webExternalUrl": {"declarations": ["nixos/modules/services/monitoring/prometheus/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URL under which Prometheus is externally reachable (for example,\nif Prometheus is served via a reverse proxy).\n"}, "example": {"_type": "literalExpression", "text": "\"https://example.com/\""}, "loc": ["services", "prometheus", "webExternalUrl"], "readOnly": false, "type": "null or string"}, "services.prometheus.xmpp-alerts.enable": {"declarations": ["nixos/modules/services/monitoring/prometheus/xmpp-alerts.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable XMPP Web hook service for Alertmanager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prometheus", "xmpp-alerts", "enable"], "readOnly": false, "type": "boolean"}, "services.prometheus.xmpp-alerts.settings": {"declarations": ["nixos/modules/services/monitoring/prometheus/xmpp-alerts.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for prometheus xmpp-alerts, see\n<https://github.com/jelmer/prometheus-xmpp-alerts/blob/master/xmpp-alerts.yml.example>\nfor supported values.\n"}, "loc": ["services", "prometheus", "xmpp-alerts", "settings"], "readOnly": false, "type": "YAML value"}, "services.promtail.configuration": {"declarations": ["nixos/modules/services/logging/promtail.nix"], "description": {"_type": "mdDoc", "text": "Specify the configuration for Promtail in Nix.\n"}, "loc": ["services", "promtail", "configuration"], "readOnly": false, "type": "JSON value"}, "services.promtail.enable": {"declarations": ["nixos/modules/services/logging/promtail.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Promtail ingresser."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "promtail", "enable"], "readOnly": false, "type": "boolean"}, "services.promtail.extraFlags": {"declarations": ["nixos/modules/services/logging/promtail.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Specify a list of additional command line flags,\nwhich get escaped and are then passed to Loki.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--server.http-listen-port=3101\"\n]"}, "loc": ["services", "promtail", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.prosody-filer.enable": {"declarations": ["nixos/modules/services/web-apps/prosody-filer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Prosody Filer XMPP upload file server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prosody-filer", "enable"], "readOnly": false, "type": "boolean"}, "services.prosody-filer.settings": {"declarations": ["nixos/modules/services/web-apps/prosody-filer.nix"], "default": {"_type": "literalExpression", "text": "{\n  listenport = mkDefault \"127.0.0.1:5050\";\n  uploadSubDir = mkDefault \"upload/\";\n}\n"}, "description": {"_type": "mdDoc", "text": "Configuration for Prosody Filer.\nRefer to <https://github.com/ThomasLeister/prosody-filer#configure-prosody-filer> for details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  secret = \"mysecret\";\n  storeDir = \"/srv/http/nginx/prosody-upload\";\n}"}, "loc": ["services", "prosody-filer", "settings"], "readOnly": false, "type": "TOML value"}, "services.prosody.admins": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of administrators of the current host"}, "example": {"_type": "literalExpression", "text": "[\n  \"admin1@example.com\"\n  \"admin2@example.com\"\n]"}, "loc": ["services", "prosody", "admins"], "readOnly": false, "type": "list of string"}, "services.prosody.allowRegistration": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow account creation"}, "loc": ["services", "prosody", "allowRegistration"], "readOnly": false, "type": "boolean"}, "services.prosody.authentication": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "\"internal_hashed\""}, "description": {"_type": "mdDoc", "text": "Authentication mechanism used for logins."}, "example": {"_type": "literalExpression", "text": "\"internal_plain\""}, "loc": ["services", "prosody", "authentication"], "readOnly": false, "type": "one of \"internal_plain\", \"internal_hashed\", \"cyrus\", \"anonymous\""}, "services.prosody.c2sRequireEncryption": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Force clients to use encrypted connections? This option will\nprevent clients from authenticating unless they are using encryption.\n"}, "loc": ["services", "prosody", "c2sRequireEncryption"], "readOnly": false, "type": "boolean"}, "services.prosody.dataDir": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/prosody\""}, "description": {"_type": "mdDoc", "text": "The prosody home directory used to store all data. If left as the default value\nthis directory will automatically be created before the prosody server starts, otherwise\nyou are responsible for ensuring the directory exists with appropriate ownership\nand permissions.\n"}, "loc": ["services", "prosody", "dataDir"], "readOnly": false, "type": "path"}, "services.prosody.disco_items": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of discoverable items you want to advertise."}, "loc": ["services", "prosody", "disco_items"], "readOnly": false, "type": "list of (submodule)"}, "services.prosody.disco_items.*.description": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "description": {"_type": "mdDoc", "text": "A short description of the endpoint you want to advertise"}, "loc": ["services", "prosody", "disco_items", "*", "description"], "readOnly": false, "type": "string"}, "services.prosody.disco_items.*.url": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "description": {"_type": "mdDoc", "text": "URL of the endpoint you want to make discoverable"}, "loc": ["services", "prosody", "disco_items", "*", "url"], "readOnly": false, "type": "string"}, "services.prosody.enable": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the prosody server"}, "loc": ["services", "prosody", "enable"], "readOnly": false, "type": "boolean"}, "services.prosody.extraConfig": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional prosody configuration"}, "loc": ["services", "prosody", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.prosody.extraModules": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Enable custom modules"}, "loc": ["services", "prosody", "extraModules"], "readOnly": false, "type": "list of string"}, "services.prosody.extraPluginPaths": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional path in which to look find plugins/modules"}, "loc": ["services", "prosody", "extraPluginPaths"], "readOnly": false, "type": "list of path"}, "services.prosody.group": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "\"prosody\""}, "description": {"_type": "mdDoc", "text": "Group account under which prosody runs.\n\n::: {.note}\nIf left as the default value this group will automatically be created\non system activation, otherwise you are responsible for\nensuring the group exists before the prosody service starts.\n:::\n"}, "loc": ["services", "prosody", "group"], "readOnly": false, "type": "string"}, "services.prosody.httpInterfaces": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*\"\n  \"::\"\n]"}, "description": {"_type": "mdDoc", "text": "Interfaces on which the HTTP server will listen on."}, "loc": ["services", "prosody", "httpInterfaces"], "readOnly": false, "type": "list of string"}, "services.prosody.httpPorts": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "[\n  5280\n]"}, "description": {"_type": "mdDoc", "text": "Listening HTTP ports list for this service."}, "loc": ["services", "prosody", "httpPorts"], "readOnly": false, "type": "list of signed integer"}, "services.prosody.httpsInterfaces": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*\"\n  \"::\"\n]"}, "description": {"_type": "mdDoc", "text": "Interfaces on which the HTTPS server will listen on."}, "loc": ["services", "prosody", "httpsInterfaces"], "readOnly": false, "type": "list of string"}, "services.prosody.httpsPorts": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "[\n  5281\n]"}, "description": {"_type": "mdDoc", "text": "Listening HTTPS ports list for this service."}, "loc": ["services", "prosody", "httpsPorts"], "readOnly": false, "type": "list of signed integer"}, "services.prosody.modules.admin_adhoc": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allows administration via an XMPP client that supports ad-hoc commands"}, "loc": ["services", "prosody", "modules", "admin_adhoc"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.admin_telnet": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Opens telnet console interface on localhost port 5582"}, "loc": ["services", "prosody", "modules", "admin_telnet"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.announce": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Send announcement to all online users"}, "loc": ["services", "prosody", "modules", "announce"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.blocklist": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow users to block communications with other users"}, "loc": ["services", "prosody", "modules", "blocklist"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.bookmarks": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allows interop between older clients that use XEP-0048: Bookmarks in its 1.0 version and recent clients which use it in PEP"}, "loc": ["services", "prosody", "modules", "bookmarks"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.bosh": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable BOSH clients, aka 'Jabber over HTTP'"}, "loc": ["services", "prosody", "modules", "bosh"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.carbons": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Keep multiple clients in sync"}, "loc": ["services", "prosody", "modules", "carbons"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.cloud_notify": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Push notifications to inform users of new messages or other pertinent information even when they have no XMPP clients online"}, "loc": ["services", "prosody", "modules", "cloud_notify"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.csi": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Implements the CSI protocol that allows clients to report their active/inactive state to the server"}, "loc": ["services", "prosody", "modules", "csi"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.dialback": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "s2s dialback support"}, "loc": ["services", "prosody", "modules", "dialback"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.disco": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Service discovery"}, "loc": ["services", "prosody", "modules", "disco"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.groups": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Shared roster support"}, "loc": ["services", "prosody", "modules", "groups"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.http_files": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Serve static files from a directory over HTTP"}, "loc": ["services", "prosody", "modules", "http_files"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.legacyauth": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Legacy authentication. Only used by some old clients and bots"}, "loc": ["services", "prosody", "modules", "legacyauth"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.limits": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable bandwidth limiting for XMPP connections"}, "loc": ["services", "prosody", "modules", "limits"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.mam": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Store messages in an archive and allow users to access it"}, "loc": ["services", "prosody", "modules", "mam"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.motd": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Send a message to users when they log in"}, "loc": ["services", "prosody", "modules", "motd"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.pep": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enables users to publish their mood, activity, playing music and more"}, "loc": ["services", "prosody", "modules", "pep"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.ping": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Replies to XMPP pings with pongs"}, "loc": ["services", "prosody", "modules", "ping"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.private": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Private XML storage (for room bookmarks, etc.)"}, "loc": ["services", "prosody", "modules", "private"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.proxy65": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enables a file transfer proxy service which clients behind NAT can use"}, "loc": ["services", "prosody", "modules", "proxy65"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.register": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow users to register on this server using a client and change passwords"}, "loc": ["services", "prosody", "modules", "register"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.roster": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow users to have a roster"}, "loc": ["services", "prosody", "modules", "roster"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.saslauth": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Authentication for clients and servers. Recommended if you want to log in."}, "loc": ["services", "prosody", "modules", "saslauth"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.server_contact_info": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Publish contact information for this service"}, "loc": ["services", "prosody", "modules", "server_contact_info"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.smacks": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow a client to resume a disconnected session, and prevent message loss"}, "loc": ["services", "prosody", "modules", "smacks"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.time": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Let others know the time here on this server"}, "loc": ["services", "prosody", "modules", "time"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.tls": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Add support for secure TLS on c2s/s2s connections"}, "loc": ["services", "prosody", "modules", "tls"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.uptime": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Report how long server has been running"}, "loc": ["services", "prosody", "modules", "uptime"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.vcard": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow users to set vCards"}, "loc": ["services", "prosody", "modules", "vcard"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.vcard_legacy": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Converts users profiles and Avatars between old and new formats"}, "loc": ["services", "prosody", "modules", "vcard_legacy"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.version": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Replies to server version requests"}, "loc": ["services", "prosody", "modules", "version"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.watchregistrations": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Alert admins of registrations"}, "loc": ["services", "prosody", "modules", "watchregistrations"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.websocket": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable WebSocket support"}, "loc": ["services", "prosody", "modules", "websocket"], "readOnly": false, "type": "boolean"}, "services.prosody.modules.welcome": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Welcome users who register accounts"}, "loc": ["services", "prosody", "modules", "welcome"], "readOnly": false, "type": "boolean"}, "services.prosody.muc": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Multi User Chat (MUC) configuration"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    domain = \"conference.my-xmpp-example-host.org\";\n  }\n]"}, "loc": ["services", "prosody", "muc"], "readOnly": false, "type": "list of (submodule)"}, "services.prosody.muc.*.domain": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "description": {"_type": "mdDoc", "text": "Domain name of the MUC"}, "loc": ["services", "prosody", "muc", "*", "domain"], "readOnly": false, "type": "string"}, "services.prosody.muc.*.extraConfig": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional MUC specific configuration"}, "loc": ["services", "prosody", "muc", "*", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.prosody.muc.*.maxHistoryMessages": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "20"}, "description": {"_type": "mdDoc", "text": "Specifies a limit on what each room can be configured to keep"}, "loc": ["services", "prosody", "muc", "*", "maxHistoryMessages"], "readOnly": false, "type": "signed integer"}, "services.prosody.muc.*.name": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "\"Prosody Chatrooms\""}, "description": {"_type": "mdDoc", "text": "The name to return in service discovery responses for the MUC service itself"}, "loc": ["services", "prosody", "muc", "*", "name"], "readOnly": false, "type": "string"}, "services.prosody.muc.*.restrictRoomCreation": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Restrict room creation to server admins"}, "loc": ["services", "prosody", "muc", "*", "restrictRoomCreation"], "readOnly": false, "type": "one of true, false, \"admin\", \"local\""}, "services.prosody.muc.*.roomDefaultChangeSubject": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, the rooms will display the public JIDs by default."}, "loc": ["services", "prosody", "muc", "*", "roomDefaultChangeSubject"], "readOnly": false, "type": "boolean"}, "services.prosody.muc.*.roomDefaultHistoryLength": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "20"}, "description": {"_type": "mdDoc", "text": "Number of history message sent to participants by default."}, "loc": ["services", "prosody", "muc", "*", "roomDefaultHistoryLength"], "readOnly": false, "type": "signed integer"}, "services.prosody.muc.*.roomDefaultLanguage": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "\"en\""}, "description": {"_type": "mdDoc", "text": "Default room language."}, "loc": ["services", "prosody", "muc", "*", "roomDefaultLanguage"], "readOnly": false, "type": "string"}, "services.prosody.muc.*.roomDefaultMembersOnly": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, the MUC rooms will only be accessible to the members by default."}, "loc": ["services", "prosody", "muc", "*", "roomDefaultMembersOnly"], "readOnly": false, "type": "boolean"}, "services.prosody.muc.*.roomDefaultModerated": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, the MUC rooms will be moderated by default."}, "loc": ["services", "prosody", "muc", "*", "roomDefaultModerated"], "readOnly": false, "type": "boolean"}, "services.prosody.muc.*.roomDefaultPublic": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set, the MUC rooms will be public by default."}, "loc": ["services", "prosody", "muc", "*", "roomDefaultPublic"], "readOnly": false, "type": "boolean"}, "services.prosody.muc.*.roomDefaultPublicJids": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, the MUC rooms will display the public JIDs by default."}, "loc": ["services", "prosody", "muc", "*", "roomDefaultPublicJids"], "readOnly": false, "type": "boolean"}, "services.prosody.muc.*.roomLockTimeout": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "300"}, "description": {"_type": "mdDoc", "text": "Timeout after which the room is destroyed or unlocked if not\nconfigured, in seconds\n"}, "loc": ["services", "prosody", "muc", "*", "roomLockTimeout"], "readOnly": false, "type": "signed integer"}, "services.prosody.muc.*.roomLocking": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enables room locking, which means that a room must be\nconfigured before it can be used. Locked rooms are invisible\nand cannot be entered by anyone but the creator\n"}, "loc": ["services", "prosody", "muc", "*", "roomLocking"], "readOnly": false, "type": "boolean"}, "services.prosody.muc.*.tombstoneExpiry": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "2678400"}, "description": {"_type": "mdDoc", "text": "This settings controls how long a tombstone is considered\nvalid. It defaults to 31 days. After this time, the room in\nquestion can be created again.\n"}, "loc": ["services", "prosody", "muc", "*", "tombstoneExpiry"], "readOnly": false, "type": "signed integer"}, "services.prosody.muc.*.tombstones": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "When a room is destroyed, it leaves behind a tombstone which\nprevents the room being entered or recreated. It also allows\nanyone who was not in the room at the time it was destroyed\nto learn about it, and to update their bookmarks. Tombstones\nprevents the case where someone could recreate a previously\nsemi-anonymous room in order to learn the real JIDs of those\nwho often join there.\n"}, "loc": ["services", "prosody", "muc", "*", "tombstones"], "readOnly": false, "type": "boolean"}, "services.prosody.muc.*.vcard_muc": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Adds the ability to set vCard for Multi User Chat rooms"}, "loc": ["services", "prosody", "muc", "*", "vcard_muc"], "readOnly": false, "type": "boolean"}, "services.prosody.package": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "pkgs.prosody"}, "description": {"_type": "mdDoc", "text": "Prosody package to use"}, "example": {"_type": "literalExpression", "text": "pkgs.prosody.override {\n  withExtraLibs = [ pkgs.luaPackages.lpty ];\n  withCommunityModules = [ \"auth_external\" ];\n};\n"}, "loc": ["services", "prosody", "package"], "readOnly": false, "type": "package"}, "services.prosody.s2sInsecureDomains": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Some servers have invalid or self-signed certificates. You can list\nremote domains here that will not be required to authenticate using\ncertificates. They will be authenticated using DNS instead, even\nwhen s2s_secure_auth is enabled.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"insecure.example.com\"\n]"}, "loc": ["services", "prosody", "s2sInsecureDomains"], "readOnly": false, "type": "list of string"}, "services.prosody.s2sRequireEncryption": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Force servers to use encrypted connections? This option will\nprevent servers from authenticating unless they are using encryption.\nNote that this is different from authentication.\n"}, "loc": ["services", "prosody", "s2sRequireEncryption"], "readOnly": false, "type": "boolean"}, "services.prosody.s2sSecureAuth": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Force certificate authentication for server-to-server connections?\nThis provides ideal security, but requires servers you communicate\nwith to support encryption AND present valid, trusted certificates.\nFor more information see https://prosody.im/doc/s2s#security\n"}, "loc": ["services", "prosody", "s2sSecureAuth"], "readOnly": false, "type": "boolean"}, "services.prosody.s2sSecureDomains": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Even if you leave s2s_secure_auth disabled, you can still require valid\ncertificates for some domains by specifying a list here.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"jabber.org\"\n]"}, "loc": ["services", "prosody", "s2sSecureDomains"], "readOnly": false, "type": "list of string"}, "services.prosody.ssl": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Paths to SSL files"}, "loc": ["services", "prosody", "ssl"], "readOnly": false, "type": "null or (submodule)"}, "services.prosody.ssl.cert": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "description": {"_type": "mdDoc", "text": "Path to the certificate file."}, "loc": ["services", "prosody", "ssl", "cert"], "readOnly": false, "type": "path"}, "services.prosody.ssl.extraOptions": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra SSL configuration options."}, "loc": ["services", "prosody", "ssl", "extraOptions"], "readOnly": false, "type": "attribute set"}, "services.prosody.ssl.key": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "description": {"_type": "mdDoc", "text": "Path to the key file."}, "loc": ["services", "prosody", "ssl", "key"], "readOnly": false, "type": "path"}, "services.prosody.uploadHttp": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configures the Prosody builtin HTTP server to handle user uploads.\n"}, "example": {"_type": "literalExpression", "text": "{\n  domain = \"uploads.my-xmpp-example-host.org\";\n}"}, "loc": ["services", "prosody", "uploadHttp"], "readOnly": false, "type": "null or (submodule)"}, "services.prosody.uploadHttp.domain": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "description": {"_type": "mdDoc", "text": "Domain name for the http-upload service"}, "loc": ["services", "prosody", "uploadHttp", "domain"], "readOnly": false, "type": "null or string"}, "services.prosody.uploadHttp.httpUploadPath": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/prosody\""}, "description": {"_type": "mdDoc", "text": "Directory where the uploaded files will be stored. By\ndefault, uploaded files are put in a sub-directory of the\ndefault Prosody storage path (usually /var/lib/prosody).\n"}, "loc": ["services", "prosody", "uploadHttp", "httpUploadPath"], "readOnly": false, "type": "string"}, "services.prosody.uploadHttp.uploadExpireAfter": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "\"60 * 60 * 24 * 7\""}, "description": {"_type": "mdDoc", "text": "Max age of a file before it gets deleted, in seconds."}, "loc": ["services", "prosody", "uploadHttp", "uploadExpireAfter"], "readOnly": false, "type": "string"}, "services.prosody.uploadHttp.uploadFileSizeLimit": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "\"50 * 1024 * 1024\""}, "description": {"_type": "mdDoc", "text": "Maximum file size, in bytes. Defaults to 50MB."}, "loc": ["services", "prosody", "uploadHttp", "uploadFileSizeLimit"], "readOnly": false, "type": "string"}, "services.prosody.uploadHttp.userQuota": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum size of all uploaded files per user, in bytes. There\nwill be no quota if this option is set to null.\n"}, "example": {"_type": "literalExpression", "text": "1234"}, "loc": ["services", "prosody", "uploadHttp", "userQuota"], "readOnly": false, "type": "null or signed integer"}, "services.prosody.user": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "\"prosody\""}, "description": {"_type": "mdDoc", "text": "User account under which prosody runs.\n\n::: {.note}\nIf left as the default value this user will automatically be created\non system activation, otherwise you are responsible for\nensuring the user exists before the prosody service starts.\n:::\n"}, "loc": ["services", "prosody", "user"], "readOnly": false, "type": "string"}, "services.prosody.virtualHosts": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "{\n  localhost = {\n    domain = \"localhost\";\n    enabled = true;\n  };\n}"}, "description": {"_type": "mdDoc", "text": "Define the virtual hosts"}, "example": {"_type": "literalExpression", "text": "{\n  myhost = {\n    domain = \"my-xmpp-example-host.org\";\n    enabled = true;\n  };\n}"}, "loc": ["services", "prosody", "virtualHosts"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.prosody.virtualHosts.<name>.domain": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "description": {"_type": "mdDoc", "text": "Domain name"}, "loc": ["services", "prosody", "virtualHosts", "<name>", "domain"], "readOnly": false, "type": "string"}, "services.prosody.virtualHosts.<name>.enabled": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the virtual host"}, "loc": ["services", "prosody", "virtualHosts", "<name>", "enabled"], "readOnly": false, "type": "boolean"}, "services.prosody.virtualHosts.<name>.extraConfig": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional virtual host specific configuration"}, "loc": ["services", "prosody", "virtualHosts", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.prosody.virtualHosts.<name>.ssl": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Paths to SSL files"}, "loc": ["services", "prosody", "virtualHosts", "<name>", "ssl"], "readOnly": false, "type": "null or (submodule)"}, "services.prosody.virtualHosts.<name>.ssl.cert": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "description": {"_type": "mdDoc", "text": "Path to the certificate file."}, "loc": ["services", "prosody", "virtualHosts", "<name>", "ssl", "cert"], "readOnly": false, "type": "path"}, "services.prosody.virtualHosts.<name>.ssl.extraOptions": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra SSL configuration options."}, "loc": ["services", "prosody", "virtualHosts", "<name>", "ssl", "extraOptions"], "readOnly": false, "type": "attribute set"}, "services.prosody.virtualHosts.<name>.ssl.key": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "description": {"_type": "mdDoc", "text": "Path to the key file."}, "loc": ["services", "prosody", "virtualHosts", "<name>", "ssl", "key"], "readOnly": false, "type": "path"}, "services.prosody.xmppComplianceSuite": {"declarations": ["nixos/modules/services/networking/prosody.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "The XEP-0423 defines a set of recommended XEPs to implement\nfor a server. It's generally a good idea to implement this\nset of extensions if you want to provide your users with a\ngood XMPP experience.\n\nThis NixOS module aims to provide a \"advanced server\"\nexperience as per defined in the XEP-0423[1] specification.\n\nSetting this option to true will prevent you from building a\nNixOS configuration which won't comply with this standard.\nYou can explicitly decide to ignore this standard if you\nknow what you are doing by setting this option to false.\n\n[1] https://xmpp.org/extensions/xep-0423.html\n"}, "loc": ["services", "prosody", "xmppComplianceSuite"], "readOnly": false, "type": "boolean"}, "services.prowlarr.enable": {"declarations": ["nixos/modules/services/misc/prowlarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Prowlarr."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "prowlarr", "enable"], "readOnly": false, "type": "boolean"}, "services.prowlarr.openFirewall": {"declarations": ["nixos/modules/services/misc/prowlarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the Prowlarr web interface."}, "loc": ["services", "prowlarr", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.psd.enable": {"declarations": ["nixos/modules/services/desktops/profile-sync-daemon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Profile Sync daemon.\n"}, "loc": ["services", "psd", "enable"], "readOnly": false, "type": "boolean"}, "services.psd.resyncTimer": {"declarations": ["nixos/modules/services/desktops/profile-sync-daemon.nix"], "default": {"_type": "literalExpression", "text": "\"1h\""}, "description": {"_type": "mdDoc", "text": "The amount of time to wait before syncing browser profiles back to the\ndisk.\n\nTakes a systemd.unit time span. The time unit defaults to seconds if\nomitted.\n"}, "example": {"_type": "literalExpression", "text": "\"1h 30min\""}, "loc": ["services", "psd", "resyncTimer"], "readOnly": false, "type": "string"}, "services.public-inbox.enable": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the public-inbox mail archiver."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "public-inbox", "enable"], "readOnly": false, "type": "boolean"}, "services.public-inbox.http.args": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Command-line arguments to pass to {manpage}`public-inbox-httpd(1)`."}, "loc": ["services", "public-inbox", "http", "args"], "readOnly": false, "type": "list of string"}, "services.public-inbox.http.enable": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the public-inbox HTTP server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "public-inbox", "http", "enable"], "readOnly": false, "type": "boolean"}, "services.public-inbox.http.mounts": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"/\"\n]"}, "description": {"_type": "mdDoc", "text": "Root paths or URLs that public-inbox will be served on.\nIf domain parts are present, only requests to those\ndomains will be accepted.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/lists/archives\"\n]"}, "loc": ["services", "public-inbox", "http", "mounts"], "readOnly": false, "type": "list of string"}, "services.public-inbox.http.port": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Listening port or systemd's ListenStream= entry\nto be used as a reverse proxy, eg. in nginx:\n`locations.\"/inbox\".proxyPass = \"http://unix:${config.services.public-inbox.http.port}:/inbox\";`\nSet to null and use `systemd.sockets.public-inbox-httpd.listenStreams`\nif you need a more advanced listening.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/public-inbox-httpd.sock\""}, "loc": ["services", "public-inbox", "http", "port"], "readOnly": false, "type": "null or string or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.public-inbox.imap.args": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Command-line arguments to pass to {manpage}`public-inbox-imapd(1)`."}, "loc": ["services", "public-inbox", "imap", "args"], "readOnly": false, "type": "list of string"}, "services.public-inbox.imap.cert": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to TLS certificate to use for connections to {manpage}`public-inbox-imapd(1)`."}, "example": {"_type": "literalExpression", "text": "\"/path/to/fullchain.pem\""}, "loc": ["services", "public-inbox", "imap", "cert"], "readOnly": false, "type": "null or string"}, "services.public-inbox.imap.enable": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the public-inbox IMAP server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "public-inbox", "imap", "enable"], "readOnly": false, "type": "boolean"}, "services.public-inbox.imap.key": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to TLS key to use for connections to {manpage}`public-inbox-imapd(1)`."}, "example": {"_type": "literalExpression", "text": "\"/path/to/key.pem\""}, "loc": ["services", "public-inbox", "imap", "key"], "readOnly": false, "type": "null or string"}, "services.public-inbox.imap.port": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "993"}, "description": {"_type": "mdDoc", "text": "Listening port.\nBeware that public-inbox uses well-known ports number to decide whether to enable TLS or not.\nSet to null and use `systemd.sockets.public-inbox-imapd.listenStreams`\nif you need a more advanced listening.\n"}, "loc": ["services", "public-inbox", "imap", "port"], "readOnly": false, "type": "null or string or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.public-inbox.inboxes": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Inboxes to configure, where attribute names are inbox names.\n"}, "loc": ["services", "public-inbox", "inboxes"], "readOnly": false, "type": "attribute set of (attribute set of (INI atom (null, bool, int, float or string) or a list of them for duplicate keys))"}, "services.public-inbox.inboxes.<name>.address": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "description": {"_type": "mdDoc", "text": "The email addresses of the public-inbox."}, "example": {"_type": "literalExpression", "text": "\"example-discuss@example.org\""}, "loc": ["services", "public-inbox", "inboxes", "<name>", "address"], "readOnly": false, "type": "list of string"}, "services.public-inbox.inboxes.<name>.coderepo": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Nicknames of a 'coderepo' section associated with the inbox."}, "loc": ["services", "public-inbox", "inboxes", "<name>", "coderepo"], "readOnly": false, "type": "list of coderepo names"}, "services.public-inbox.inboxes.<name>.description": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "description": {"_type": "mdDoc", "text": "User-visible description for the repository."}, "example": {"_type": "literalExpression", "text": "\"user/dev discussion of public-inbox itself\""}, "loc": ["services", "public-inbox", "inboxes", "<name>", "description"], "readOnly": false, "type": "string"}, "services.public-inbox.inboxes.<name>.inboxdir": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/public-inbox/inboxes/\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The absolute path to the directory which hosts the public-inbox."}, "loc": ["services", "public-inbox", "inboxes", "<name>", "inboxdir"], "readOnly": false, "type": "string"}, "services.public-inbox.inboxes.<name>.newsgroup": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "NNTP group name for the inbox."}, "loc": ["services", "public-inbox", "inboxes", "<name>", "newsgroup"], "readOnly": false, "type": "null or string"}, "services.public-inbox.inboxes.<name>.url": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "URL where this inbox can be accessed over HTTP."}, "example": {"_type": "literalExpression", "text": "\"https://example.org/lists/example-discuss\""}, "loc": ["services", "public-inbox", "inboxes", "<name>", "url"], "readOnly": false, "type": "null or string"}, "services.public-inbox.inboxes.<name>.watch": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Paths for {manpage}`public-inbox-watch(1)` to monitor for new mail."}, "example": {"_type": "literalExpression", "text": "[\n  \"maildir:/path/to/test.example.com.git\"\n]"}, "loc": ["services", "public-inbox", "inboxes", "<name>", "watch"], "readOnly": false, "type": "list of string"}, "services.public-inbox.inboxes.<name>.watchheader": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If specified, {manpage}`public-inbox-watch(1)` will only process\nmail containing a matching header.\n"}, "example": {"_type": "literalExpression", "text": "\"List-Id:<test@example.com>\""}, "loc": ["services", "public-inbox", "inboxes", "<name>", "watchheader"], "readOnly": false, "type": "null or string"}, "services.public-inbox.mda.args": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Command-line arguments to pass to {manpage}`public-inbox-mda(1)`."}, "loc": ["services", "public-inbox", "mda", "args"], "readOnly": false, "type": "list of string"}, "services.public-inbox.mda.enable": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the public-inbox Mail Delivery Agent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "public-inbox", "mda", "enable"], "readOnly": false, "type": "boolean"}, "services.public-inbox.nntp.args": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Command-line arguments to pass to {manpage}`public-inbox-nntpd(1)`."}, "loc": ["services", "public-inbox", "nntp", "args"], "readOnly": false, "type": "list of string"}, "services.public-inbox.nntp.cert": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to TLS certificate to use for connections to {manpage}`public-inbox-nntpd(1)`."}, "example": {"_type": "literalExpression", "text": "\"/path/to/fullchain.pem\""}, "loc": ["services", "public-inbox", "nntp", "cert"], "readOnly": false, "type": "null or string"}, "services.public-inbox.nntp.enable": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the public-inbox NNTP server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "public-inbox", "nntp", "enable"], "readOnly": false, "type": "boolean"}, "services.public-inbox.nntp.key": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to TLS key to use for connections to {manpage}`public-inbox-nntpd(1)`."}, "example": {"_type": "literalExpression", "text": "\"/path/to/key.pem\""}, "loc": ["services", "public-inbox", "nntp", "key"], "readOnly": false, "type": "null or string"}, "services.public-inbox.nntp.port": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "563"}, "description": {"_type": "mdDoc", "text": "Listening port.\nBeware that public-inbox uses well-known ports number to decide whether to enable TLS or not.\nSet to null and use `systemd.sockets.public-inbox-nntpd.listenStreams`\nif you need a more advanced listening.\n"}, "loc": ["services", "public-inbox", "nntp", "port"], "readOnly": false, "type": "null or string or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.public-inbox.openFirewall": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable opening the firewall when using a port option."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "public-inbox", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.public-inbox.package": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "pkgs.public-inbox"}, "description": {"_type": "mdDoc", "text": "public-inbox package to use."}, "loc": ["services", "public-inbox", "package"], "readOnly": false, "type": "package"}, "services.public-inbox.path": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional packages to place in the path of public-inbox-mda,\npublic-inbox-watch, etc.\n"}, "example": {"_type": "literalExpression", "text": "with pkgs; [ spamassassin ]"}, "loc": ["services", "public-inbox", "path"], "readOnly": false, "type": "list of package"}, "services.public-inbox.postfix.enable": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the integration into Postfix."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "public-inbox", "postfix", "enable"], "readOnly": false, "type": "boolean"}, "services.public-inbox.settings": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings for the [public-inbox config file](https://public-inbox.org/public-inbox-config.html).\n"}, "loc": ["services", "public-inbox", "settings"], "readOnly": false, "type": "attribute set of attribute set of ((INI atom (null, bool, int, float or string) or a list of them for duplicate keys) or attribute set of (INI atom (null, bool, int, float or string) or a list of them for duplicate keys))"}, "services.public-inbox.settings.coderepo": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "code repositories"}, "loc": ["services", "public-inbox", "settings", "coderepo"], "readOnly": false, "type": "attribute set of (attribute set of (INI atom (null, bool, int, float or string) or a list of them for duplicate keys))"}, "services.public-inbox.settings.coderepo.<name>.cgitUrl": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "description": {"_type": "mdDoc", "text": "URL of a cgit instance"}, "loc": ["services", "public-inbox", "settings", "coderepo", "<name>", "cgitUrl"], "readOnly": false, "type": "string"}, "services.public-inbox.settings.coderepo.<name>.dir": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "description": {"_type": "mdDoc", "text": "Path to a git repository"}, "loc": ["services", "public-inbox", "settings", "coderepo", "<name>", "dir"], "readOnly": false, "type": "string"}, "services.public-inbox.settings.publicinbox": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "public inboxes"}, "loc": ["services", "public-inbox", "settings", "publicinbox"], "readOnly": false, "type": "attribute set of ((INI atom (null, bool, int, float or string) or a list of them for duplicate keys) or attribute set of (INI atom (null, bool, int, float or string) or a list of them for duplicate keys))"}, "services.public-inbox.settings.publicinbox.css": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The local path name of a CSS file for the PSGI web interface."}, "loc": ["services", "public-inbox", "settings", "publicinbox", "css"], "readOnly": false, "type": "list of string"}, "services.public-inbox.settings.publicinbox.nntpserver": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "NNTP URLs to this public-inbox instance"}, "example": {"_type": "literalExpression", "text": "[\n  \"nntp://news.public-inbox.org\"\n  \"nntps://news.public-inbox.org\"\n]"}, "loc": ["services", "public-inbox", "settings", "publicinbox", "nntpserver"], "readOnly": false, "type": "list of string"}, "services.public-inbox.settings.publicinbox.wwwlisting": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "\"404\""}, "description": {"_type": "mdDoc", "text": "Controls which lists (if any) are listed for when the root\npublic-inbox URL is accessed over HTTP.\n"}, "loc": ["services", "public-inbox", "settings", "publicinbox", "wwwlisting"], "readOnly": false, "type": "one of \"all\", \"404\", \"match=domain\""}, "services.public-inbox.settings.publicinboxmda.spamcheck": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "\"none\""}, "description": {"_type": "mdDoc", "text": "If set to spamc, {manpage}`public-inbox-watch(1)` will filter spam\nusing SpamAssassin.\n"}, "loc": ["services", "public-inbox", "settings", "publicinboxmda", "spamcheck"], "readOnly": false, "type": "one of \"spamc\", \"none\""}, "services.public-inbox.settings.publicinboxwatch.spamcheck": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "\"none\""}, "description": {"_type": "mdDoc", "text": "If set to spamc, {manpage}`public-inbox-watch(1)` will filter spam\nusing SpamAssassin.\n"}, "loc": ["services", "public-inbox", "settings", "publicinboxwatch", "spamcheck"], "readOnly": false, "type": "one of \"spamc\", \"none\""}, "services.public-inbox.settings.publicinboxwatch.watchspam": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, mail in this maildir will be trained as spam and\ndeleted from all watched inboxes\n"}, "example": {"_type": "literalExpression", "text": "\"maildir:/path/to/spam\""}, "loc": ["services", "public-inbox", "settings", "publicinboxwatch", "watchspam"], "readOnly": false, "type": "null or string"}, "services.public-inbox.spamAssassinRules": {"declarations": ["nixos/modules/services/mail/public-inbox.nix"], "default": {"_type": "literalExpression", "text": "${cfg.package.sa_config}/user/.spamassassin/user_prefs"}, "description": {"_type": "mdDoc", "text": "SpamAssassin configuration specific to public-inbox."}, "loc": ["services", "public-inbox", "spamAssassinRules"], "readOnly": false, "type": "null or path"}, "services.pufferpanel.enable": {"declarations": ["nixos/modules/services/misc/pufferpanel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable PufferPanel game management server.\n\nNote that [PufferPanel templates] and binaries downloaded by PufferPanel\nexpect [FHS environment]. It is possible to set {option}`package` option\nto use PufferPanel wrapper with FHS environment. For example, to use\n`Download Game from Steam` and `Download Java` template operations:\n```Nix\n{ lib, pkgs, ... }: {\n  services.pufferpanel = {\n    enable = true;\n    extraPackages = with pkgs; [ bash curl gawk gnutar gzip ];\n    package = pkgs.buildFHSEnv {\n      name = \"pufferpanel-fhs\";\n      runScript = lib.getExe pkgs.pufferpanel;\n      targetPkgs = pkgs': with pkgs'; [ icu openssl zlib ];\n    };\n  };\n}\n```\n\n[PufferPanel templates]: https://github.com/PufferPanel/templates\n[FHS environment]: https://wikipedia.org/wiki/Filesystem_Hierarchy_Standard\n"}, "loc": ["services", "pufferpanel", "enable"], "readOnly": false, "type": "boolean"}, "services.pufferpanel.environment": {"declarations": ["nixos/modules/services/misc/pufferpanel.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables to set for the service. Secrets should be\nspecified using {option}`environmentFile`.\n\nRefer to the [PufferPanel source code][] for the list of available\nconfiguration options. Variable name is an upper-cased configuration\nentry name with underscores instead of dots, prefixed with `PUFFER_`.\nFor example, `panel.settings.companyName` entry can be set using\n{env}`PUFFER_PANEL_SETTINGS_COMPANYNAME`.\n\nWhen running with panel enabled (configured with `PUFFER_PANEL_ENABLE`\nenvironment variable), it is recommended disable registration using\n`PUFFER_PANEL_REGISTRATIONENABLED` environment variable (registration is\nenabled by default). To create the initial administrator user, run\n{command}`pufferpanel --workDir /var/lib/pufferpanel user add --admin`.\n\nSome options override corresponding settings set via web interface (e.g.\n`PUFFER_PANEL_REGISTRATIONENABLED`). Those options can be temporarily\ntoggled or set in settings but do not persist between restarts.\n\n[PufferPanel source code]: https://github.com/PufferPanel/PufferPanel/blob/master/config/entries.go\n"}, "example": {"_type": "literalExpression", "text": "{\n  PUFFER_WEB_HOST = \":8080\";\n  PUFFER_DAEMON_SFTP_HOST = \":5657\";\n  PUFFER_DAEMON_CONSOLE_BUFFER = \"1000\";\n  PUFFER_DAEMON_CONSOLE_FORWARD = \"true\";\n  PUFFER_PANEL_REGISTRATIONENABLED = \"false\";\n}\n"}, "loc": ["services", "pufferpanel", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.pufferpanel.environmentFile": {"declarations": ["nixos/modules/services/misc/pufferpanel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File to load environment variables from. Loaded variables override\nvalues set in {option}`environment`.\n"}, "loc": ["services", "pufferpanel", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.pufferpanel.extraGroups": {"declarations": ["nixos/modules/services/misc/pufferpanel.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional groups for the systemd service.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"podman\"\n]"}, "loc": ["services", "pufferpanel", "extraGroups"], "readOnly": false, "type": "list of string"}, "services.pufferpanel.extraPackages": {"declarations": ["nixos/modules/services/misc/pufferpanel.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages to add to the PATH environment variable. Both the {file}`bin`\nand {file}`sbin` subdirectories of each package are added.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.jre ]"}, "loc": ["services", "pufferpanel", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.pufferpanel.package": {"declarations": ["nixos/modules/services/misc/pufferpanel.nix"], "default": {"_type": "literalExpression", "text": "pkgs.pufferpanel"}, "description": {"_type": "mdDoc", "text": "The pufferpanel package to use."}, "loc": ["services", "pufferpanel", "package"], "readOnly": false, "type": "package"}, "services.pykms.enable": {"declarations": ["nixos/modules/services/misc/pykms.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the PyKMS service."}, "loc": ["services", "pykms", "enable"], "readOnly": false, "type": "boolean"}, "services.pykms.extraArgs": {"declarations": ["nixos/modules/services/misc/pykms.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional arguments"}, "loc": ["services", "pykms", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.pykms.listenAddress": {"declarations": ["nixos/modules/services/misc/pykms.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "The IP address on which to listen."}, "loc": ["services", "pykms", "listenAddress"], "readOnly": false, "type": "string"}, "services.pykms.logLevel": {"declarations": ["nixos/modules/services/misc/pykms.nix"], "default": {"_type": "literalExpression", "text": "\"INFO\""}, "description": {"_type": "mdDoc", "text": "How much to log"}, "loc": ["services", "pykms", "logLevel"], "readOnly": false, "type": "one of \"CRITICAL\", \"ERROR\", \"WARNING\", \"INFO\", \"DEBUG\", \"MININFO\""}, "services.pykms.memoryLimit": {"declarations": ["nixos/modules/services/misc/pykms.nix"], "default": {"_type": "literalExpression", "text": "\"64M\""}, "description": {"_type": "mdDoc", "text": "How much memory to use at most."}, "loc": ["services", "pykms", "memoryLimit"], "readOnly": false, "type": "string"}, "services.pykms.openFirewallPort": {"declarations": ["nixos/modules/services/misc/pykms.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the listening port should be opened automatically."}, "loc": ["services", "pykms", "openFirewallPort"], "readOnly": false, "type": "boolean"}, "services.pykms.port": {"declarations": ["nixos/modules/services/misc/pykms.nix"], "default": {"_type": "literalExpression", "text": "1688"}, "description": {"_type": "mdDoc", "text": "The port on which to listen."}, "loc": ["services", "pykms", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.qdrant.enable": {"declarations": ["nixos/modules/services/search/qdrant.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Vector Search Engine for the next generation of AI applications."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "qdrant", "enable"], "readOnly": false, "type": "boolean"}, "services.qdrant.settings": {"declarations": ["nixos/modules/services/search/qdrant.nix"], "default": {"_type": "literalExpression", "text": "{\n  storage = {\n    storage_path = \"/var/lib/qdrant/storage\";\n    snapshots_path = \"/var/lib/qdrant/snapshots\";\n  };\n  hsnw_index = {\n    on_disk = true;\n  };\n  service = {\n    host = \"127.0.0.1\";\n    http_port = 6333;\n    grpc_port = 6334;\n  };\n  telemetry_disabled = true;\n}\n"}, "description": {"_type": "mdDoc", "text": "Configuration for Qdrant\nRefer to <https://github.com/qdrant/qdrant/blob/master/config/config.yaml> for details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  hsnw_index = {\n    on_disk = true;\n  };\n  service = {\n    grpc_port = 6334;\n    host = \"127.0.0.1\";\n    http_port = 6333;\n  };\n  storage = {\n    snapshots_path = \"/var/lib/qdrant/snapshots\";\n    storage_path = \"/var/lib/qdrant/storage\";\n  };\n  telemetry_disabled = true;\n}"}, "loc": ["services", "qdrant", "settings"], "readOnly": false, "type": "YAML value"}, "services.qemuGuest.enable": {"declarations": ["nixos/modules/virtualisation/qemu-guest-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the qemu guest agent."}, "loc": ["services", "qemuGuest", "enable"], "readOnly": false, "type": "boolean"}, "services.qemuGuest.package": {"declarations": ["nixos/modules/virtualisation/qemu-guest-agent.nix"], "default": {"_type": "literalExpression", "text": "pkgs.qemu_kvm.ga"}, "description": {"_type": "mdDoc", "text": "The QEMU guest agent package."}, "loc": ["services", "qemuGuest", "package"], "readOnly": false, "type": "package"}, "services.quake3-server.baseq3": {"declarations": ["nixos/modules/services/games/quake3-server.nix"], "default": {"_type": "literalMD", "text": "Manually downloaded Quake 3 installation directory."}, "description": {"_type": "mdDoc", "text": "Path to the baseq3 files (pak*.pk3). If this is on the nix store (type = package) all .pk3 files should be saved\nin the top-level directory. If this is on another filesystem (e.g /var/lib/baseq3) the .pk3 files are searched in\n$baseq3/.q3a/baseq3/\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/q3ds\""}, "loc": ["services", "quake3-server", "baseq3"], "readOnly": false, "type": "package or path"}, "services.quake3-server.enable": {"declarations": ["nixos/modules/services/games/quake3-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Quake 3 dedicated server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "quake3-server", "enable"], "readOnly": false, "type": "boolean"}, "services.quake3-server.extraConfig": {"declarations": ["nixos/modules/services/games/quake3-server.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options. Note that options changed via RCON will not be persisted. To list all possible\noptions, use \"cvarlist 1\" via RCON.\n"}, "example": {"_type": "literalExpression", "text": "''\n  seta rconPassword \"superSecret\"      // sets RCON password for remote console\n  seta sv_hostname \"My Quake 3 server\"      // name that appears in server list\n''"}, "loc": ["services", "quake3-server", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.quake3-server.openFirewall": {"declarations": ["nixos/modules/services/games/quake3-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open the firewall.\n"}, "loc": ["services", "quake3-server", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.quake3-server.port": {"declarations": ["nixos/modules/services/games/quake3-server.nix"], "default": {"_type": "literalExpression", "text": "27960"}, "description": {"_type": "mdDoc", "text": "UDP Port the server should listen on.\n"}, "loc": ["services", "quake3-server", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.quassel.certificateFile": {"declarations": ["nixos/modules/services/networking/quassel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the certificate used for SSL connections with clients.\n"}, "loc": ["services", "quassel", "certificateFile"], "readOnly": false, "type": "null or string"}, "services.quassel.dataDir": {"declarations": ["nixos/modules/services/networking/quassel.nix"], "default": {"_type": "literalExpression", "text": "\"/home/${config.services.quassel.user}/.config/quassel-irc.org\"\n"}, "description": {"_type": "mdDoc", "text": "The directory holding configuration files, the SQlite database and the SSL Cert.\n"}, "loc": ["services", "quassel", "dataDir"], "readOnly": false, "type": "string"}, "services.quassel.enable": {"declarations": ["nixos/modules/services/networking/quassel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Quassel IRC client daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "quassel", "enable"], "readOnly": false, "type": "boolean"}, "services.quassel.interfaces": {"declarations": ["nixos/modules/services/networking/quassel.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "description": {"_type": "mdDoc", "text": "The interfaces the Quassel daemon will be listening to.  If `[ 127.0.0.1 ]`,\nonly clients on the local host can connect to it; if `[ 0.0.0.0 ]`, clients\ncan access it from any network interface.\n"}, "loc": ["services", "quassel", "interfaces"], "readOnly": false, "type": "list of string"}, "services.quassel.package": {"declarations": ["nixos/modules/services/networking/quassel.nix"], "default": {"_type": "literalExpression", "text": "pkgs.quasselDaemon"}, "description": {"_type": "mdDoc", "text": "The package of the quassel daemon.\n"}, "loc": ["services", "quassel", "package"], "readOnly": false, "type": "package"}, "services.quassel.portNumber": {"declarations": ["nixos/modules/services/networking/quassel.nix"], "default": {"_type": "literalExpression", "text": "4242"}, "description": {"_type": "mdDoc", "text": "The port number the Quassel daemon will be listening to.\n"}, "loc": ["services", "quassel", "portNumber"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.quassel.requireSSL": {"declarations": ["nixos/modules/services/networking/quassel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Require SSL for connections from clients.\n"}, "loc": ["services", "quassel", "requireSSL"], "readOnly": false, "type": "boolean"}, "services.quassel.user": {"declarations": ["nixos/modules/services/networking/quassel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The existing user the Quassel daemon should run as. If left empty, a default \"quassel\" user will be created.\n"}, "loc": ["services", "quassel", "user"], "readOnly": false, "type": "null or string"}, "services.quicktun": {"declarations": ["nixos/modules/services/networking/quicktun.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "QuickTun tunnels"}, "loc": ["services", "quicktun"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.quicktun.<name>.localAddress": {"declarations": ["nixos/modules/services/networking/quicktun.nix"], "description": {"_type": "mdDoc", "text": ""}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "quicktun", "<name>", "localAddress"], "readOnly": false, "type": "string"}, "services.quicktun.<name>.localPort": {"declarations": ["nixos/modules/services/networking/quicktun.nix"], "default": {"_type": "literalExpression", "text": "2998"}, "description": {"_type": "mdDoc", "text": ""}, "loc": ["services", "quicktun", "<name>", "localPort"], "readOnly": false, "type": "signed integer"}, "services.quicktun.<name>.privateKey": {"declarations": ["nixos/modules/services/networking/quicktun.nix"], "description": {"_type": "mdDoc", "text": ""}, "loc": ["services", "quicktun", "<name>", "privateKey"], "readOnly": false, "type": "string"}, "services.quicktun.<name>.protocol": {"declarations": ["nixos/modules/services/networking/quicktun.nix"], "default": {"_type": "literalExpression", "text": "\"nacltai\""}, "description": {"_type": "mdDoc", "text": ""}, "loc": ["services", "quicktun", "<name>", "protocol"], "readOnly": false, "type": "string"}, "services.quicktun.<name>.publicKey": {"declarations": ["nixos/modules/services/networking/quicktun.nix"], "description": {"_type": "mdDoc", "text": ""}, "loc": ["services", "quicktun", "<name>", "publicKey"], "readOnly": false, "type": "string"}, "services.quicktun.<name>.remoteAddress": {"declarations": ["nixos/modules/services/networking/quicktun.nix"], "description": {"_type": "mdDoc", "text": ""}, "example": {"_type": "literalExpression", "text": "\"tunnel.example.com\""}, "loc": ["services", "quicktun", "<name>", "remoteAddress"], "readOnly": false, "type": "string"}, "services.quicktun.<name>.remoteFloat": {"declarations": ["nixos/modules/services/networking/quicktun.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": ""}, "loc": ["services", "quicktun", "<name>", "remoteFloat"], "readOnly": false, "type": "signed integer"}, "services.quicktun.<name>.remotePort": {"declarations": ["nixos/modules/services/networking/quicktun.nix"], "default": {"_type": "literalExpression", "text": "2998"}, "description": {"_type": "mdDoc", "text": ""}, "loc": ["services", "quicktun", "<name>", "remotePort"], "readOnly": false, "type": "signed integer"}, "services.quicktun.<name>.timeWindow": {"declarations": ["nixos/modules/services/networking/quicktun.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": ""}, "loc": ["services", "quicktun", "<name>", "timeWindow"], "readOnly": false, "type": "signed integer"}, "services.quicktun.<name>.tunMode": {"declarations": ["nixos/modules/services/networking/quicktun.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": ""}, "example": {"_type": "literalExpression", "text": "1"}, "loc": ["services", "quicktun", "<name>", "tunMode"], "readOnly": false, "type": "signed integer"}, "services.quicktun.<name>.upScript": {"declarations": ["nixos/modules/services/networking/quicktun.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": ""}, "loc": ["services", "quicktun", "<name>", "upScript"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.quorum.blockperiod": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Default minimum difference between two consecutive block's timestamps in seconds."}, "loc": ["services", "quorum", "blockperiod"], "readOnly": false, "type": "signed integer"}, "services.quorum.enable": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Quorum blockchain daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "quorum", "enable"], "readOnly": false, "type": "boolean"}, "services.quorum.genesis": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Blockchain genesis settings."}, "example": {"_type": "literalExpression", "text": "{\n         alloc = {\n           a47385db68718bdcbddc2d2bb7c54018066ec111 = {\n             balance = \"1000000000000000000000000000\";\n           };\n         };\n         coinbase = \"0x0000000000000000000000000000000000000000\";\n         config = {\n           byzantiumBlock = 4;\n           chainId = 494702925;\n           eip150Block = 2;\n           eip155Block = 3;\n           eip158Block = 3;\n           homesteadBlock = 1;\n           isQuorum = true;\n           istanbul = {\n             epoch = 30000;\n             policy = 0;\n           };\n         };\n         difficulty = \"0x1\";\n         extraData = \"0x0000000000000000000000000000000000000000000000000000000000000000f85ad59438f0508111273d8e482f49410ca4078afc86a961b8410000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0\";\n         gasLimit = \"0x2FEFD800\";\n         mixHash = \"0x63746963616c2062797a616e74696e65201111756c7420746f6c6572616e6365\";\n         nonce = \"0x0\";\n         parentHash = \"0x0000000000000000000000000000000000000000000000000000000000000000\";\n         timestamp = \"0x00\";\n         }"}, "loc": ["services", "quorum", "genesis"], "readOnly": false, "type": "null or (attribute set)"}, "services.quorum.group": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "config.services.quorum.user"}, "description": {"_type": "mdDoc", "text": "The group as which to run quorum."}, "loc": ["services", "quorum", "group"], "readOnly": false, "type": "string"}, "services.quorum.nodekeyFile": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/quorum/nodekey\""}, "description": {"_type": "mdDoc", "text": "Path to the nodekey."}, "loc": ["services", "quorum", "nodekeyFile"], "readOnly": false, "type": "path"}, "services.quorum.permissioned": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow only a defined list of nodes to connect."}, "loc": ["services", "quorum", "permissioned"], "readOnly": false, "type": "boolean"}, "services.quorum.port": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "21000"}, "description": {"_type": "mdDoc", "text": "Override the default port on which to listen for connections."}, "loc": ["services", "quorum", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.quorum.privateconfig": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "\"ignore\""}, "description": {"_type": "mdDoc", "text": "Configuration of privacy transaction manager."}, "loc": ["services", "quorum", "privateconfig"], "readOnly": false, "type": "string"}, "services.quorum.rpc.address": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Listening address for RPC connections."}, "loc": ["services", "quorum", "rpc", "address"], "readOnly": false, "type": "string"}, "services.quorum.rpc.api": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "\"admin,db,eth,debug,miner,net,shh,txpool,personal,web3,quorum,istanbul\""}, "description": {"_type": "mdDoc", "text": "API's offered over the HTTP-RPC interface."}, "loc": ["services", "quorum", "rpc", "api"], "readOnly": false, "type": "string"}, "services.quorum.rpc.enable": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable RPC interface."}, "loc": ["services", "quorum", "rpc", "enable"], "readOnly": false, "type": "boolean"}, "services.quorum.rpc.port": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "22004"}, "description": {"_type": "mdDoc", "text": "Override the default port on which to listen for RPC connections."}, "loc": ["services", "quorum", "rpc", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.quorum.staticNodes": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of validator nodes."}, "example": {"_type": "literalExpression", "text": "[\n  \"enode://dd333ec28f0a8910c92eb4d336461eea1c20803eed9cf2c056557f986e720f8e693605bba2f4e8f289b1162e5ac7c80c914c7178130711e393ca76abc1d92f57@0.0.0.0:30303?discport=0\"\n]"}, "loc": ["services", "quorum", "staticNodes"], "readOnly": false, "type": "list of string"}, "services.quorum.syncmode": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "\"full\""}, "description": {"_type": "mdDoc", "text": "Blockchain sync mode."}, "loc": ["services", "quorum", "syncmode"], "readOnly": false, "type": "one of \"fast\", \"full\", \"light\""}, "services.quorum.user": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "\"quorum\""}, "description": {"_type": "mdDoc", "text": "The user as which to run quorum."}, "loc": ["services", "quorum", "user"], "readOnly": false, "type": "string"}, "services.quorum.ws.address": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Listening address for WS-RPC connections."}, "loc": ["services", "quorum", "ws", "address"], "readOnly": false, "type": "string"}, "services.quorum.ws.api": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "\"admin,db,eth,debug,miner,net,shh,txpool,personal,web3,quorum,istanbul\""}, "description": {"_type": "mdDoc", "text": "API's offered over the WS-RPC interface."}, "loc": ["services", "quorum", "ws", "api"], "readOnly": false, "type": "string"}, "services.quorum.ws.enable": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable WS-RPC interface."}, "loc": ["services", "quorum", "ws", "enable"], "readOnly": false, "type": "boolean"}, "services.quorum.ws.origins": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "\"*\""}, "description": {"_type": "mdDoc", "text": "Origins from which to accept websockets requests"}, "loc": ["services", "quorum", "ws", "origins"], "readOnly": false, "type": "string"}, "services.quorum.ws.port": {"declarations": ["nixos/modules/services/networking/quorum.nix"], "default": {"_type": "literalExpression", "text": "8546"}, "description": {"_type": "mdDoc", "text": "Override the default port on which to listen for WS-RPC connections."}, "loc": ["services", "quorum", "ws", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.r53-ddns.domain": {"declarations": ["nixos/modules/services/networking/r53-ddns.nix"], "description": {"_type": "mdDoc", "text": "The name of your domain in Route53"}, "loc": ["services", "r53-ddns", "domain"], "readOnly": false, "type": "string"}, "services.r53-ddns.enable": {"declarations": ["nixos/modules/services/networking/r53-ddns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable r53-ddyns."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "r53-ddns", "enable"], "readOnly": false, "type": "boolean"}, "services.r53-ddns.environmentFile": {"declarations": ["nixos/modules/services/networking/r53-ddns.nix"], "description": {"_type": "mdDoc", "text": "File containing the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY\nin the format of an EnvironmentFile as described by systemd.exec(5)\n"}, "loc": ["services", "r53-ddns", "environmentFile"], "readOnly": false, "type": "string"}, "services.r53-ddns.hostname": {"declarations": ["nixos/modules/services/networking/r53-ddns.nix"], "description": {"_type": "mdDoc", "text": "Manually specify the hostname. Otherwise the tool will try to use the name\nreturned by the OS (Call to gethostname)\n"}, "loc": ["services", "r53-ddns", "hostname"], "readOnly": false, "type": "string"}, "services.r53-ddns.interval": {"declarations": ["nixos/modules/services/networking/r53-ddns.nix"], "default": {"_type": "literalExpression", "text": "\"15min\""}, "description": {"_type": "mdDoc", "text": "How often to update the entry"}, "loc": ["services", "r53-ddns", "interval"], "readOnly": false, "type": "string"}, "services.r53-ddns.zoneID": {"declarations": ["nixos/modules/services/networking/r53-ddns.nix"], "description": {"_type": "mdDoc", "text": "The ID of your zone in Route53"}, "loc": ["services", "r53-ddns", "zoneID"], "readOnly": false, "type": "string"}, "services.rabbitmq.config": {"declarations": ["nixos/modules/services/amqp/rabbitmq.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim advanced configuration file contents using the Erlang syntax.\nThis is also known as the `advanced.config` file or the old config format.\n\n`configItems` is preferred whenever possible. However, nested\ndata structures can only be expressed properly using the `config` option.\n\nThe contents of this option will be merged into the `configItems`\nby RabbitMQ at runtime to form the final configuration.\n\nSee the second table on https://www.rabbitmq.com/configure.html#config-items\nFor the distinct formats, see https://www.rabbitmq.com/configure.html#config-file-formats\n"}, "loc": ["services", "rabbitmq", "config"], "readOnly": false, "type": "string"}, "services.rabbitmq.configItems": {"declarations": ["nixos/modules/services/amqp/rabbitmq.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration options in RabbitMQ's new config file format,\nwhich is a simple key-value format that can not express nested\ndata structures. This is known as the `rabbitmq.conf` file,\nalthough outside NixOS that filename may have Erlang syntax, particularly\nprior to RabbitMQ 3.7.0.\n\nIf you do need to express nested data structures, you can use\n`config` option. Configuration from `config`\nwill be merged into these options by RabbitMQ at runtime to\nform the final configuration.\n\nSee https://www.rabbitmq.com/configure.html#config-items\nFor the distinct formats, see https://www.rabbitmq.com/configure.html#config-file-formats\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"auth_backends.1.authn\" = \"rabbit_auth_backend_ldap\";\n  \"auth_backends.1.authz\" = \"rabbit_auth_backend_internal\";\n}\n"}, "loc": ["services", "rabbitmq", "configItems"], "readOnly": false, "type": "attribute set of string"}, "services.rabbitmq.cookie": {"declarations": ["nixos/modules/services/amqp/rabbitmq.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Erlang cookie is a string of arbitrary length which must\nbe the same for several nodes to be allowed to communicate.\nLeave empty to generate automatically.\n"}, "loc": ["services", "rabbitmq", "cookie"], "readOnly": false, "type": "string"}, "services.rabbitmq.dataDir": {"declarations": ["nixos/modules/services/amqp/rabbitmq.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/rabbitmq\""}, "description": {"_type": "mdDoc", "text": "Data directory for rabbitmq.\n"}, "loc": ["services", "rabbitmq", "dataDir"], "readOnly": false, "type": "path"}, "services.rabbitmq.enable": {"declarations": ["nixos/modules/services/amqp/rabbitmq.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the RabbitMQ server, an Advanced Message\nQueuing Protocol (AMQP) broker.\n"}, "loc": ["services", "rabbitmq", "enable"], "readOnly": false, "type": "boolean"}, "services.rabbitmq.listenAddress": {"declarations": ["nixos/modules/services/amqp/rabbitmq.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "IP address on which RabbitMQ will listen for AMQP\nconnections.  Set to the empty string to listen on all\ninterfaces.  Note that RabbitMQ creates a user named\n`guest` with password\n`guest` by default, so you should delete\nthis user if you intend to allow external access.\n\nTogether with 'port' setting it's mostly an alias for\nconfigItems.\"listeners.tcp.1\" and it's left for backwards\ncompatibility with previous version of this module.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "rabbitmq", "listenAddress"], "readOnly": false, "type": "string"}, "services.rabbitmq.managementPlugin.enable": {"declarations": ["nixos/modules/services/amqp/rabbitmq.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the management plugin."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "rabbitmq", "managementPlugin", "enable"], "readOnly": false, "type": "boolean"}, "services.rabbitmq.managementPlugin.port": {"declarations": ["nixos/modules/services/amqp/rabbitmq.nix"], "default": {"_type": "literalExpression", "text": "15672"}, "description": {"_type": "mdDoc", "text": "On which port to run the management plugin\n"}, "loc": ["services", "rabbitmq", "managementPlugin", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.rabbitmq.package": {"declarations": ["nixos/modules/services/amqp/rabbitmq.nix"], "default": {"_type": "literalExpression", "text": "pkgs.rabbitmq-server"}, "description": {"_type": "mdDoc", "text": "Which rabbitmq package to use.\n"}, "loc": ["services", "rabbitmq", "package"], "readOnly": false, "type": "package"}, "services.rabbitmq.pluginDirs": {"declarations": ["nixos/modules/services/amqp/rabbitmq.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The list of directories containing external plugins"}, "loc": ["services", "rabbitmq", "pluginDirs"], "readOnly": false, "type": "list of path"}, "services.rabbitmq.plugins": {"declarations": ["nixos/modules/services/amqp/rabbitmq.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The names of plugins to enable"}, "loc": ["services", "rabbitmq", "plugins"], "readOnly": false, "type": "list of string"}, "services.rabbitmq.port": {"declarations": ["nixos/modules/services/amqp/rabbitmq.nix"], "default": {"_type": "literalExpression", "text": "5672"}, "description": {"_type": "mdDoc", "text": "Port on which RabbitMQ will listen for AMQP connections.\n"}, "loc": ["services", "rabbitmq", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.radarr.dataDir": {"declarations": ["nixos/modules/services/misc/radarr.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/radarr/.config/Radarr\""}, "description": {"_type": "mdDoc", "text": "The directory where Radarr stores its data files."}, "loc": ["services", "radarr", "dataDir"], "readOnly": false, "type": "string"}, "services.radarr.enable": {"declarations": ["nixos/modules/services/misc/radarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Radarr."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "radarr", "enable"], "readOnly": false, "type": "boolean"}, "services.radarr.group": {"declarations": ["nixos/modules/services/misc/radarr.nix"], "default": {"_type": "literalExpression", "text": "\"radarr\""}, "description": {"_type": "mdDoc", "text": "Group under which Radarr runs."}, "loc": ["services", "radarr", "group"], "readOnly": false, "type": "string"}, "services.radarr.openFirewall": {"declarations": ["nixos/modules/services/misc/radarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the Radarr web interface."}, "loc": ["services", "radarr", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.radarr.package": {"declarations": ["nixos/modules/services/misc/radarr.nix"], "default": {"_type": "literalExpression", "text": "pkgs.radarr"}, "description": {"_type": "mdDoc", "text": "Radarr package to use"}, "example": {"_type": "literalExpression", "text": "pkgs.radarr"}, "loc": ["services", "radarr", "package"], "readOnly": false, "type": "package"}, "services.radarr.user": {"declarations": ["nixos/modules/services/misc/radarr.nix"], "default": {"_type": "literalExpression", "text": "\"radarr\""}, "description": {"_type": "mdDoc", "text": "User account under which Radarr runs."}, "loc": ["services", "radarr", "user"], "readOnly": false, "type": "string"}, "services.radicale.config": {"declarations": ["nixos/modules/services/networking/radicale.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Radicale configuration, this will set the service\nconfiguration file.\nThis option is mutually exclusive with {option}`settings`.\nThis option is deprecated.  Use {option}`settings` instead.\n"}, "loc": ["services", "radicale", "config"], "readOnly": false, "type": "string"}, "services.radicale.enable": {"declarations": ["nixos/modules/services/networking/radicale.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Radicale CalDAV and CardDAV server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "radicale", "enable"], "readOnly": false, "type": "boolean"}, "services.radicale.extraArgs": {"declarations": ["nixos/modules/services/networking/radicale.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to the Radicale daemon."}, "loc": ["services", "radicale", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.radicale.package": {"declarations": ["nixos/modules/services/networking/radicale.nix"], "default": {"_type": "literalExpression", "text": "pkgs.radicale"}, "description": {"_type": "mdDoc", "text": "Radicale package to use."}, "loc": ["services", "radicale", "package"], "readOnly": false, "type": "package"}, "services.radicale.rights": {"declarations": ["nixos/modules/services/networking/radicale.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for Radicale's rights file. See\n<https://radicale.org/3.0.html#documentation/authentication-and-rights>.\nThis option only works in conjunction with {option}`settings`.\nSetting this will also set {option}`settings.rights.type` and\n{option}`settings.rights.file` to appropriate values.\n"}, "example": {"_type": "literalExpression", "text": "root = {\n  user = \".+\";\n  collection = \"\";\n  permissions = \"R\";\n};\nprincipal = {\n  user = \".+\";\n  collection = \"{user}\";\n  permissions = \"RW\";\n};\ncalendars = {\n  user = \".+\";\n  collection = \"{user}/[^/]+\";\n  permissions = \"rw\";\n};\n"}, "loc": ["services", "radicale", "rights"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string) or a non-empty list of them)"}, "services.radicale.settings": {"declarations": ["nixos/modules/services/networking/radicale.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for Radicale. See\n<https://radicale.org/3.0.html#documentation/configuration>.\nThis option is mutually exclusive with {option}`config`.\n"}, "example": {"_type": "literalExpression", "text": "server = {\n  hosts = [ \"0.0.0.0:5232\" \"[::]:5232\" ];\n};\nauth = {\n  type = \"htpasswd\";\n  htpasswd_filename = \"/etc/radicale/users\";\n  htpasswd_encryption = \"bcrypt\";\n};\nstorage = {\n  filesystem_folder = \"/var/lib/radicale/collections\";\n};\n"}, "loc": ["services", "radicale", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string) or a non-empty list of them)"}, "services.radvd.config": {"declarations": ["nixos/modules/services/networking/radvd.nix"], "description": {"_type": "mdDoc", "text": "The contents of the radvd configuration file.\n"}, "example": {"_type": "literalExpression", "text": "''\n  interface eth0 {\n    AdvSendAdvert on;\n    prefix 2001:db8:1234:5678::/64 { };\n  };\n''"}, "loc": ["services", "radvd", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.radvd.enable": {"declarations": ["nixos/modules/services/networking/radvd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Router Advertisement Daemon\n({command}`radvd`), which provides link-local\nadvertisements of IPv6 router addresses and prefixes using\nthe Neighbor Discovery Protocol (NDP).  This enables\nstateless address autoconfiguration in IPv6 clients on the\nnetwork.\n"}, "loc": ["services", "radvd", "enable"], "readOnly": false, "type": "boolean"}, "services.radvd.package": {"declarations": ["nixos/modules/services/networking/radvd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.radvd"}, "description": {"_type": "mdDoc", "text": "The RADVD package to use for the RADVD service.\n"}, "loc": ["services", "radvd", "package"], "readOnly": false, "type": "package"}, "services.ratbagd.enable": {"declarations": ["nixos/modules/services/hardware/ratbagd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ratbagd for configuring gaming mice."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ratbagd", "enable"], "readOnly": false, "type": "boolean"}, "services.rdnssd.enable": {"declarations": ["nixos/modules/services/networking/rdnssd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the RDNSS daemon\n({command}`rdnssd`), which configures DNS servers in\n{file}`/etc/resolv.conf` from RDNSS\nadvertisements sent by IPv6 routers.\n"}, "loc": ["services", "rdnssd", "enable"], "readOnly": false, "type": "boolean"}, "services.readarr.dataDir": {"declarations": ["nixos/modules/services/misc/readarr.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/readarr/\""}, "description": {"_type": "mdDoc", "text": "The directory where Readarr stores its data files."}, "loc": ["services", "readarr", "dataDir"], "readOnly": false, "type": "string"}, "services.readarr.enable": {"declarations": ["nixos/modules/services/misc/readarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Readarr."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "readarr", "enable"], "readOnly": false, "type": "boolean"}, "services.readarr.group": {"declarations": ["nixos/modules/services/misc/readarr.nix"], "default": {"_type": "literalExpression", "text": "\"readarr\""}, "description": {"_type": "mdDoc", "text": "Group under which Readarr runs.\n"}, "loc": ["services", "readarr", "group"], "readOnly": false, "type": "string"}, "services.readarr.openFirewall": {"declarations": ["nixos/modules/services/misc/readarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for Readarr\n"}, "loc": ["services", "readarr", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.readarr.package": {"declarations": ["nixos/modules/services/misc/readarr.nix"], "default": {"_type": "literalExpression", "text": "pkgs.readarr"}, "description": {"_type": "mdDoc", "text": "The Readarr package to use"}, "loc": ["services", "readarr", "package"], "readOnly": false, "type": "package"}, "services.readarr.user": {"declarations": ["nixos/modules/services/misc/readarr.nix"], "default": {"_type": "literalExpression", "text": "\"readarr\""}, "description": {"_type": "mdDoc", "text": "User account under which Readarr runs.\n"}, "loc": ["services", "readarr", "user"], "readOnly": false, "type": "string"}, "services.redis.package": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "pkgs.redis"}, "description": {"_type": "mdDoc", "text": "Which Redis derivation to use."}, "loc": ["services", "redis", "package"], "readOnly": false, "type": "package"}, "services.redis.servers": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration of multiple `redis-server` instances."}, "loc": ["services", "redis", "servers"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.redis.servers.<name>.appendFsync": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "\"everysec\""}, "description": {"_type": "mdDoc", "text": "How often to fsync the append-only log, options: no, always, everysec."}, "loc": ["services", "redis", "servers", "<name>", "appendFsync"], "readOnly": false, "type": "string"}, "services.redis.servers.<name>.appendOnly": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "By default data is only periodically persisted to disk, enable this option to use an append-only file for improved persistence."}, "loc": ["services", "redis", "servers", "<name>", "appendOnly"], "readOnly": false, "type": "boolean"}, "services.redis.servers.<name>.bind": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The IP interface to bind to.\n`null` means \"all interfaces\".\n"}, "example": {"_type": "literalExpression", "text": "\"192.0.2.1\""}, "loc": ["services", "redis", "servers", "<name>", "bind"], "readOnly": false, "type": "null or string"}, "services.redis.servers.<name>.databases": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "16"}, "description": {"_type": "mdDoc", "text": "Set the number of databases."}, "loc": ["services", "redis", "servers", "<name>", "databases"], "readOnly": false, "type": "signed integer"}, "services.redis.servers.<name>.enable": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Redis server.\n\nNote that the NixOS module for Redis disables kernel support\nfor Transparent Huge Pages (THP),\nbecause this features causes major performance problems for Redis,\ne.g. (https://redis.io/topics/latency).\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "redis", "servers", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.redis.servers.<name>.extraParams": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters to append to redis-server invocation"}, "example": {"_type": "literalExpression", "text": "[\n  \"--sentinel\"\n]"}, "loc": ["services", "redis", "servers", "<name>", "extraParams"], "readOnly": false, "type": "list of string"}, "services.redis.servers.<name>.logLevel": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "\"notice\""}, "description": {"_type": "mdDoc", "text": "Specify the server verbosity level, options: debug, verbose, notice, warning."}, "example": {"_type": "literalExpression", "text": "\"debug\""}, "loc": ["services", "redis", "servers", "<name>", "logLevel"], "readOnly": false, "type": "string"}, "services.redis.servers.<name>.logfile": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "\"/dev/null\""}, "description": {"_type": "mdDoc", "text": "Specify the log file name. Also 'stdout' can be used to force Redis to log on the standard output."}, "example": {"_type": "literalExpression", "text": "\"/var/log/redis.log\""}, "loc": ["services", "redis", "servers", "<name>", "logfile"], "readOnly": false, "type": "string"}, "services.redis.servers.<name>.masterAuth": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If the master is password protected (using the requirePass configuration)\n              it is possible to tell the slave to authenticate before starting the replication synchronization\n              process, otherwise the master will refuse the slave request.\n              (STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)"}, "loc": ["services", "redis", "servers", "<name>", "masterAuth"], "readOnly": false, "type": "null or string"}, "services.redis.servers.<name>.maxclients": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "10000"}, "description": {"_type": "mdDoc", "text": "Set the max number of connected clients at the same time."}, "loc": ["services", "redis", "servers", "<name>", "maxclients"], "readOnly": false, "type": "signed integer"}, "services.redis.servers.<name>.openFirewall": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open ports in the firewall for the server.\n"}, "loc": ["services", "redis", "servers", "<name>", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.redis.servers.<name>.port": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "if name == \"\" then 6379 else 0"}, "description": {"_type": "mdDoc", "text": "The TCP port to accept connections.\nIf port 0 is specified Redis will not listen on a TCP socket.\n"}, "loc": ["services", "redis", "servers", "<name>", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.redis.servers.<name>.requirePass": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password for database (STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE).\nUse requirePassFile to store it outside of the nix store in a dedicated file.\n"}, "example": {"_type": "literalExpression", "text": "\"letmein!\""}, "loc": ["services", "redis", "servers", "<name>", "requirePass"], "readOnly": false, "type": "null or string"}, "services.redis.servers.<name>.requirePassFile": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File with password for the database."}, "example": {"_type": "literalExpression", "text": "\"/run/keys/redis-password\""}, "loc": ["services", "redis", "servers", "<name>", "requirePassFile"], "readOnly": false, "type": "null or path"}, "services.redis.servers.<name>.save": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "[\n  [\n    900\n    1\n  ]\n  [\n    300\n    10\n  ]\n  [\n    60\n    10000\n  ]\n]"}, "description": {"_type": "mdDoc", "text": "The schedule in which data is persisted to disk, represented as a list of lists where the first element represent the amount of seconds and the second the number of changes.\n\nIf set to the empty list (`[]`) then RDB persistence will be disabled (useful if you are using AOF or don't want any persistence).\n"}, "loc": ["services", "redis", "servers", "<name>", "save"], "readOnly": false, "type": "list of list of signed integer"}, "services.redis.servers.<name>.settings": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Redis configuration. Refer to\n<https://redis.io/topics/config>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  loadmodule = [ \"/path/to/my_module.so\" \"/path/to/other_module.so\" ];\n}\n"}, "loc": ["services", "redis", "servers", "<name>", "settings"], "readOnly": false, "type": "attribute set of (boolean or signed integer or string or list of string)"}, "services.redis.servers.<name>.slaveOf": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IP and port to which this redis instance acts as a slave."}, "example": {"_type": "literalExpression", "text": "{\n  ip = \"192.168.1.100\";\n  port = 6379;\n}"}, "loc": ["services", "redis", "servers", "<name>", "slaveOf"], "readOnly": false, "type": "null or (submodule)"}, "services.redis.servers.<name>.slaveOf.ip": {"declarations": ["nixos/modules/services/databases/redis.nix"], "description": {"_type": "mdDoc", "text": "IP of the Redis master"}, "example": {"_type": "literalExpression", "text": "\"192.168.1.100\""}, "loc": ["services", "redis", "servers", "<name>", "slaveOf", "ip"], "readOnly": false, "type": "string"}, "services.redis.servers.<name>.slaveOf.port": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "6379"}, "description": {"_type": "mdDoc", "text": "port of the Redis master"}, "loc": ["services", "redis", "servers", "<name>", "slaveOf", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.redis.servers.<name>.slowLogLogSlowerThan": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "10000"}, "description": {"_type": "mdDoc", "text": "Log queries whose execution take longer than X in milliseconds."}, "example": {"_type": "literalExpression", "text": "1000"}, "loc": ["services", "redis", "servers", "<name>", "slowLogLogSlowerThan"], "readOnly": false, "type": "signed integer"}, "services.redis.servers.<name>.slowLogMaxLen": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "128"}, "description": {"_type": "mdDoc", "text": "Maximum number of items to keep in slow log."}, "loc": ["services", "redis", "servers", "<name>", "slowLogMaxLen"], "readOnly": false, "type": "signed integer"}, "services.redis.servers.<name>.syslog": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable logging to the system logger."}, "loc": ["services", "redis", "servers", "<name>", "syslog"], "readOnly": false, "type": "boolean"}, "services.redis.servers.<name>.unixSocket": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "if name == \"\" then \"/run/redis/redis.sock\" else \"/run/redis-${name}/redis.sock\"\n"}, "description": {"_type": "mdDoc", "text": "The path to the socket to bind to."}, "loc": ["services", "redis", "servers", "<name>", "unixSocket"], "readOnly": false, "type": "null or path"}, "services.redis.servers.<name>.unixSocketPerm": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "660"}, "description": {"_type": "mdDoc", "text": "Change permissions for the socket"}, "example": {"_type": "literalExpression", "text": "600"}, "loc": ["services", "redis", "servers", "<name>", "unixSocketPerm"], "readOnly": false, "type": "signed integer"}, "services.redis.servers.<name>.user": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "if name == \"\" then \"redis\" else \"redis-${name}\"\n"}, "description": {"_type": "mdDoc", "text": "The username and groupname for redis-server."}, "loc": ["services", "redis", "servers", "<name>", "user"], "readOnly": false, "type": "string"}, "services.redis.vmOverCommit": {"declarations": ["nixos/modules/services/databases/redis.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable setting of vm.overcommit_memory to 1\n(Suggested for Background Saving: http://redis.io/topics/faq)\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "redis", "vmOverCommit"], "readOnly": false, "type": "boolean"}, "services.redmine.components.breezy": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "bazaar integration."}, "loc": ["services", "redmine", "components", "breezy"], "readOnly": false, "type": "boolean"}, "services.redmine.components.cvs": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "cvs integration."}, "loc": ["services", "redmine", "components", "cvs"], "readOnly": false, "type": "boolean"}, "services.redmine.components.ghostscript": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allows exporting Gant diagrams as PDF."}, "loc": ["services", "redmine", "components", "ghostscript"], "readOnly": false, "type": "boolean"}, "services.redmine.components.git": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "git integration."}, "loc": ["services", "redmine", "components", "git"], "readOnly": false, "type": "boolean"}, "services.redmine.components.imagemagick": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allows exporting Gant diagrams as PNG."}, "loc": ["services", "redmine", "components", "imagemagick"], "readOnly": false, "type": "boolean"}, "services.redmine.components.mercurial": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Mercurial integration."}, "loc": ["services", "redmine", "components", "mercurial"], "readOnly": false, "type": "boolean"}, "services.redmine.components.minimagick_font_path": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "MiniMagick font path"}, "example": {"_type": "literalExpression", "text": "\"/run/current-system/sw/share/X11/fonts/LiberationSans-Regular.ttf\""}, "loc": ["services", "redmine", "components", "minimagick_font_path"], "readOnly": false, "type": "string"}, "services.redmine.components.subversion": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Subversion integration."}, "loc": ["services", "redmine", "components", "subversion"], "readOnly": false, "type": "boolean"}, "services.redmine.database.createLocally": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally."}, "loc": ["services", "redmine", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.redmine.database.host": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "redmine", "database", "host"], "readOnly": false, "type": "string"}, "services.redmine.database.name": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "\"redmine\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "redmine", "database", "name"], "readOnly": false, "type": "string"}, "services.redmine.database.passwordFile": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/redmine-dbpassword\""}, "loc": ["services", "redmine", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.redmine.database.port": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "3306"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "redmine", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.redmine.database.socket": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "/run/mysqld/mysqld.sock"}, "description": {"_type": "mdDoc", "text": "Path to the unix socket file to use for authentication."}, "example": {"_type": "literalExpression", "text": "\"/run/mysqld/mysqld.sock\""}, "loc": ["services", "redmine", "database", "socket"], "readOnly": false, "type": "null or path"}, "services.redmine.database.type": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "\"mysql2\""}, "description": {"_type": "mdDoc", "text": "Database engine to use."}, "example": {"_type": "literalExpression", "text": "\"postgresql\""}, "loc": ["services", "redmine", "database", "type"], "readOnly": false, "type": "one of \"mysql2\", \"postgresql\""}, "services.redmine.database.user": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "\"redmine\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "redmine", "database", "user"], "readOnly": false, "type": "string"}, "services.redmine.enable": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Redmine."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "redmine", "enable"], "readOnly": false, "type": "boolean"}, "services.redmine.extraEnv": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration in additional_environment.rb.\n\nSee <https://svn.redmine.org/redmine/trunk/config/additional_environment.rb.example>\nfor details.\n"}, "example": {"_type": "literalExpression", "text": "''\n  config.logger.level = Logger::DEBUG\n''"}, "loc": ["services", "redmine", "extraEnv"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.redmine.group": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "\"redmine\""}, "description": {"_type": "mdDoc", "text": "Group under which Redmine is ran."}, "loc": ["services", "redmine", "group"], "readOnly": false, "type": "string"}, "services.redmine.package": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "pkgs.redmine"}, "description": {"_type": "mdDoc", "text": "Which Redmine package to use."}, "example": {"_type": "literalExpression", "text": "pkgs.redmine.override { ruby = pkgs.ruby_2_7; }"}, "loc": ["services", "redmine", "package"], "readOnly": false, "type": "package"}, "services.redmine.plugins": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of plugins."}, "example": {"_type": "literalExpression", "text": "{\n  redmine_env_auth = builtins.fetchurl {\n    url = \"https://github.com/Intera/redmine_env_auth/archive/0.6.zip\";\n    sha256 = \"0yyr1yjd8gvvh832wdc8m3xfnhhxzk2pk3gm2psg5w9jdvd6skak\";\n  };\n}\n"}, "loc": ["services", "redmine", "plugins"], "readOnly": false, "type": "attribute set of path"}, "services.redmine.port": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Port on which Redmine is ran."}, "loc": ["services", "redmine", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.redmine.settings": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Redmine configuration ({file}`configuration.yml`). Refer to\n<https://guides.rubyonrails.org/action_mailer_basics.html#action-mailer-configuration>\nfor details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  email_delivery = {\n    delivery_method = \"smtp\";\n    smtp_settings = {\n      address = \"mail.example.com\";\n      port = 25;\n    };\n  };\n}\n"}, "loc": ["services", "redmine", "settings"], "readOnly": false, "type": "YAML value"}, "services.redmine.stateDir": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/redmine\""}, "description": {"_type": "mdDoc", "text": "The state directory, logs and plugins are stored here."}, "loc": ["services", "redmine", "stateDir"], "readOnly": false, "type": "string"}, "services.redmine.themes": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of themes."}, "example": {"_type": "literalExpression", "text": "{\n  dkuk-redmine_alex_skin = builtins.fetchurl {\n    url = \"https://bitbucket.org/dkuk/redmine_alex_skin/get/1842ef675ef3.zip\";\n    sha256 = \"0hrin9lzyi50k4w2bd2b30vrf1i4fi1c0gyas5801wn8i7kpm9yl\";\n  };\n}\n"}, "loc": ["services", "redmine", "themes"], "readOnly": false, "type": "attribute set of path"}, "services.redmine.user": {"declarations": ["nixos/modules/services/misc/redmine.nix"], "default": {"_type": "literalExpression", "text": "\"redmine\""}, "description": {"_type": "mdDoc", "text": "User under which Redmine is ran."}, "loc": ["services", "redmine", "user"], "readOnly": false, "type": "string"}, "services.redshift.brightness.day": {"declarations": ["nixos/modules/services/x11/redshift.nix"], "default": {"_type": "literalExpression", "text": "\"1\""}, "description": {"_type": "mdDoc", "text": "Screen brightness to apply during the day,\nbetween `0.1` and `1.0`.\n"}, "loc": ["services", "redshift", "brightness", "day"], "readOnly": false, "type": "string"}, "services.redshift.brightness.night": {"declarations": ["nixos/modules/services/x11/redshift.nix"], "default": {"_type": "literalExpression", "text": "\"1\""}, "description": {"_type": "mdDoc", "text": "Screen brightness to apply during the night,\nbetween `0.1` and `1.0`.\n"}, "loc": ["services", "redshift", "brightness", "night"], "readOnly": false, "type": "string"}, "services.redshift.enable": {"declarations": ["nixos/modules/services/x11/redshift.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Redshift to change your screen's colour temperature depending on\nthe time of day.\n"}, "loc": ["services", "redshift", "enable"], "readOnly": false, "type": "boolean"}, "services.redshift.executable": {"declarations": ["nixos/modules/services/x11/redshift.nix"], "default": {"_type": "literalExpression", "text": "\"/bin/redshift\""}, "description": {"_type": "mdDoc", "text": "Redshift executable to use within the package.\n"}, "example": {"_type": "literalExpression", "text": "\"/bin/redshift-gtk\""}, "loc": ["services", "redshift", "executable"], "readOnly": false, "type": "string"}, "services.redshift.extraOptions": {"declarations": ["nixos/modules/services/x11/redshift.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command-line arguments to pass to\n{command}`redshift`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-v\"\n  \"-m randr\"\n]"}, "loc": ["services", "redshift", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.redshift.package": {"declarations": ["nixos/modules/services/x11/redshift.nix"], "default": {"_type": "literalExpression", "text": "pkgs.redshift"}, "description": {"_type": "mdDoc", "text": "redshift derivation to use.\n"}, "loc": ["services", "redshift", "package"], "readOnly": false, "type": "package"}, "services.redshift.temperature.day": {"declarations": ["nixos/modules/services/x11/redshift.nix"], "default": {"_type": "literalExpression", "text": "5500"}, "description": {"_type": "mdDoc", "text": "Colour temperature to use during the day, between\n`1000` and `25000` K.\n"}, "loc": ["services", "redshift", "temperature", "day"], "readOnly": false, "type": "signed integer"}, "services.redshift.temperature.night": {"declarations": ["nixos/modules/services/x11/redshift.nix"], "default": {"_type": "literalExpression", "text": "3700"}, "description": {"_type": "mdDoc", "text": "Colour temperature to use at night, between\n`1000` and `25000` K.\n"}, "loc": ["services", "redshift", "temperature", "night"], "readOnly": false, "type": "signed integer"}, "services.redsocks.chroot": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Chroot under which to run redsocks. Log file is opened before\nchroot, but if logging to syslog /etc/localtime may be required.\n"}, "loc": ["services", "redsocks", "chroot"], "readOnly": false, "type": "null or string"}, "services.redsocks.enable": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable redsocks."}, "loc": ["services", "redsocks", "enable"], "readOnly": false, "type": "boolean"}, "services.redsocks.log": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "default": {"_type": "literalExpression", "text": "\"stderr\""}, "description": {"_type": "mdDoc", "text": "Where to send logs.\n\nPossible values are:\n  - stderr\n  - file:/path/to/file\n  - syslog:FACILITY where FACILITY is any of \"daemon\", \"local0\",\n    etc.\n"}, "loc": ["services", "redsocks", "log"], "readOnly": false, "type": "string"}, "services.redsocks.log_debug": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Log connection progress."}, "loc": ["services", "redsocks", "log_debug"], "readOnly": false, "type": "boolean"}, "services.redsocks.log_info": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Log start and end of client sessions."}, "loc": ["services", "redsocks", "log_info"], "readOnly": false, "type": "boolean"}, "services.redsocks.redsocks": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "description": {"_type": "mdDoc", "text": "Local port to proxy associations to be performed.\n\nThe example shows how to configure a proxy to handle port 80 as HTTP\nrelay, and all other ports as HTTP connect.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    doNotRedirect = [\n      \"-d 1.2.0.0/16\"\n    ];\n    port = 23456;\n    proxy = \"1.2.3.4:8080\";\n    redirectCondition = \"--dport 80\";\n    type = \"http-relay\";\n  }\n  {\n    doNotRedirect = [\n      \"-d 1.2.0.0/16\"\n    ];\n    port = 23457;\n    proxy = \"1.2.3.4:8080\";\n    redirectCondition = true;\n    type = \"http-connect\";\n  }\n]"}, "loc": ["services", "redsocks", "redsocks"], "readOnly": false, "type": "list of (submodule)"}, "services.redsocks.redsocks.*.disclose_src": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "default": {"_type": "literalExpression", "text": "\"false\""}, "description": {"_type": "mdDoc", "text": "Way to disclose client IP to the proxy.\n  - \"false\": do not disclose\n\nhttp-connect supports the following ways:\n  - \"X-Forwarded-For\": add header \"X-Forwarded-For: IP\"\n  - \"Forwarded_ip\": add header \"Forwarded: for=IP\" (see RFC7239)\n  - \"Forwarded_ipport\": add header 'Forwarded: for=\"IP:port\"'\n"}, "loc": ["services", "redsocks", "redsocks", "*", "disclose_src"], "readOnly": false, "type": "one of \"false\", \"X-Forwarded-For\", \"Forwarded_ip\", \"Forwarded_ipport\""}, "services.redsocks.redsocks.*.doNotRedirect": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Iptables filters that if matched will get the packet off of\nredsocks.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-d 1.2.3.4\"\n]"}, "loc": ["services", "redsocks", "redsocks", "*", "doNotRedirect"], "readOnly": false, "type": "list of string"}, "services.redsocks.redsocks.*.ip": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "IP on which redsocks should listen. Defaults to 127.0.0.1 for\nsecurity reasons.\n"}, "loc": ["services", "redsocks", "redsocks", "*", "ip"], "readOnly": false, "type": "string"}, "services.redsocks.redsocks.*.login": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Login to send to proxy."}, "loc": ["services", "redsocks", "redsocks", "*", "login"], "readOnly": false, "type": "null or string"}, "services.redsocks.redsocks.*.password": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password to send to proxy. WARNING, this will end up\nworld-readable in the store! Awaiting\nhttps://github.com/NixOS/nix/issues/8 to be able to fix.\n"}, "loc": ["services", "redsocks", "redsocks", "*", "password"], "readOnly": false, "type": "null or string"}, "services.redsocks.redsocks.*.port": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "default": {"_type": "literalExpression", "text": "12345"}, "description": {"_type": "mdDoc", "text": "Port on which redsocks should listen."}, "loc": ["services", "redsocks", "redsocks", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.redsocks.redsocks.*.proxy": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "description": {"_type": "mdDoc", "text": "Proxy through which redsocks should forward incoming traffic.\nExample: \"example.org:8080\"\n"}, "loc": ["services", "redsocks", "redsocks", "*", "proxy"], "readOnly": false, "type": "string"}, "services.redsocks.redsocks.*.redirectCondition": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Conditions to make outbound packets go through this redsocks\ninstance.\n\nIf set to false, no packet will be forwarded. If set to true,\nall packets will be forwarded (except packets excluded by\nredirectInternetOnly).\n\nIf set to a string, this is an iptables filter that will be\nmatched against packets before getting them into redsocks. For\nexample, setting it to \"--dport 80\" will only send\npackets to port 80 to redsocks. Note \"-p tcp\" is always\nimplicitly added, as udp can only be proxied through redudp or\nthe like.\n"}, "loc": ["services", "redsocks", "redsocks", "*", "redirectCondition"], "readOnly": false, "type": "boolean or string"}, "services.redsocks.redsocks.*.redirectInternetOnly": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Exclude all non-globally-routable IPs from redsocks"}, "loc": ["services", "redsocks", "redsocks", "*", "redirectInternetOnly"], "readOnly": false, "type": "boolean"}, "services.redsocks.redsocks.*.type": {"declarations": ["nixos/modules/services/networking/redsocks.nix"], "description": {"_type": "mdDoc", "text": "Type of proxy."}, "loc": ["services", "redsocks", "redsocks", "*", "type"], "readOnly": false, "type": "one of \"socks4\", \"socks5\", \"http-connect\", \"http-relay\""}, "services.replay-sorcery.autoStart": {"declarations": ["nixos/modules/services/video/replay-sorcery.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically start ReplaySorcery when graphical-session.target starts."}, "loc": ["services", "replay-sorcery", "autoStart"], "readOnly": false, "type": "boolean"}, "services.replay-sorcery.enable": {"declarations": ["nixos/modules/services/video/replay-sorcery.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the ReplaySorcery service for instant-replays."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "replay-sorcery", "enable"], "readOnly": false, "type": "boolean"}, "services.replay-sorcery.enableSysAdminCapability": {"declarations": ["nixos/modules/services/video/replay-sorcery.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the system admin capability to support hardware accelerated\nvideo capture. This is equivalent to running ReplaySorcery as\nroot, so use with caution."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "replay-sorcery", "enableSysAdminCapability"], "readOnly": false, "type": "boolean"}, "services.replay-sorcery.settings": {"declarations": ["nixos/modules/services/video/replay-sorcery.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "System-wide configuration for ReplaySorcery (/etc/replay-sorcery.conf)."}, "example": {"_type": "literalExpression", "text": "{\n  videoInput = \"hwaccel\"; # requires `services.replay-sorcery.enableSysAdminCapability = true`\n  videoFramerate = 60;\n}\n"}, "loc": ["services", "replay-sorcery", "settings"], "readOnly": false, "type": "attribute set of (string or signed integer)"}, "services.resilio.apiKey": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "API key, which enables the developer API."}, "loc": ["services", "resilio", "apiKey"], "readOnly": false, "type": "string"}, "services.resilio.checkForUpdates": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Determines whether to check for updates and alert the user\nabout them in the UI.\n"}, "loc": ["services", "resilio", "checkForUpdates"], "readOnly": false, "type": "boolean"}, "services.resilio.deviceName": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "Name of the Resilio Sync device.\n"}, "example": {"_type": "literalExpression", "text": "\"Voltron\""}, "loc": ["services", "resilio", "deviceName"], "readOnly": false, "type": "string"}, "services.resilio.directoryRoot": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Default directory to add folders in the web UI."}, "example": {"_type": "literalExpression", "text": "\"/media\""}, "loc": ["services", "resilio", "directoryRoot"], "readOnly": false, "type": "string"}, "services.resilio.downloadLimit": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Download speed limit. 0 is unlimited (default).\n"}, "example": {"_type": "literalExpression", "text": "1024"}, "loc": ["services", "resilio", "downloadLimit"], "readOnly": false, "type": "signed integer"}, "services.resilio.enable": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, start the Resilio Sync daemon. Once enabled, you can\ninteract with the service through the Web UI, or configure it in your\nNixOS configuration.\n"}, "loc": ["services", "resilio", "enable"], "readOnly": false, "type": "boolean"}, "services.resilio.enableWebUI": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Web UI for administration. Bound to the specified\n`httpListenAddress` and\n`httpListenPort`.\n"}, "loc": ["services", "resilio", "enableWebUI"], "readOnly": false, "type": "boolean"}, "services.resilio.encryptLAN": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Encrypt LAN data."}, "loc": ["services", "resilio", "encryptLAN"], "readOnly": false, "type": "boolean"}, "services.resilio.httpListenAddr": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "\"[::1]\""}, "description": {"_type": "mdDoc", "text": "HTTP address to bind to.\n"}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "resilio", "httpListenAddr"], "readOnly": false, "type": "string"}, "services.resilio.httpListenPort": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "9000"}, "description": {"_type": "mdDoc", "text": "HTTP port to bind on.\n"}, "loc": ["services", "resilio", "httpListenPort"], "readOnly": false, "type": "signed integer"}, "services.resilio.httpLogin": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "HTTP web login username.\n"}, "example": {"_type": "literalExpression", "text": "\"allyourbase\""}, "loc": ["services", "resilio", "httpLogin"], "readOnly": false, "type": "string"}, "services.resilio.httpPass": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "HTTP web login password.\n"}, "example": {"_type": "literalExpression", "text": "\"arebelongtous\""}, "loc": ["services", "resilio", "httpPass"], "readOnly": false, "type": "string"}, "services.resilio.listeningPort": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Listening port. Defaults to 0 which randomizes the port.\n"}, "example": {"_type": "literalExpression", "text": "44444"}, "loc": ["services", "resilio", "listeningPort"], "readOnly": false, "type": "signed integer"}, "services.resilio.sharedFolders": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Shared folder list. If enabled, web UI must be\ndisabled. Secrets can be generated using `rslsync --generate-secret`.\n\nIf you would like to be able to modify the contents of this\ndirectories, it is recommended that you make your user a\nmember of the `rslsync` group.\n\nDirectories in this list should be in the\n`rslsync` group, and that group must have\nwrite access to the directory. It is also recommended that\n`chmod g+s` is applied to the directory\nso that any sub directories created will also belong to\nthe `rslsync` group. Also,\n`setfacl -d -m group:rslsync:rwx` and\n`setfacl -m group:rslsync:rwx` should also\nbe applied so that the sub directories are writable by\nthe group.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    directory = \"/home/user/sync_test\";\n    knownHosts = [\n      \"192.168.1.2:4444\"\n      \"192.168.1.3:4444\"\n    ];\n    searchLAN = true;\n    secretFile = \"/run/resilio-secret\";\n    useDHT = false;\n    useRelayServer = true;\n    useSyncTrash = true;\n    useTracker = true;\n  }\n]"}, "loc": ["services", "resilio", "sharedFolders"], "readOnly": false, "type": "list of attribute set of anything"}, "services.resilio.storagePath": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/resilio-sync/\""}, "description": {"_type": "mdDoc", "text": "Where BitTorrent Sync will store it's database files (containing\nthings like username info and licenses). Generally, you should not\nneed to ever change this.\n"}, "loc": ["services", "resilio", "storagePath"], "readOnly": false, "type": "path"}, "services.resilio.uploadLimit": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Upload speed limit. 0 is unlimited (default).\n"}, "example": {"_type": "literalExpression", "text": "1024"}, "loc": ["services", "resilio", "uploadLimit"], "readOnly": false, "type": "signed integer"}, "services.resilio.useUpnp": {"declarations": ["nixos/modules/services/networking/resilio.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Use Universal Plug-n-Play (UPnP)\n"}, "loc": ["services", "resilio", "useUpnp"], "readOnly": false, "type": "boolean"}, "services.resolved.dnssec": {"declarations": ["nixos/modules/system/boot/resolved.nix"], "default": {"_type": "literalExpression", "text": "\"allow-downgrade\""}, "description": {"_type": "mdDoc", "text": "If set to\n- `\"true\"`:\n    all DNS lookups are DNSSEC-validated locally (excluding\n    LLMNR and Multicast DNS). Note that this mode requires a\n    DNS server that supports DNSSEC. If the DNS server does\n    not properly support DNSSEC all validations will fail.\n- `\"allow-downgrade\"`:\n    DNSSEC validation is attempted, but if the server does not\n    support DNSSEC properly, DNSSEC mode is automatically\n    disabled. Note that this mode makes DNSSEC validation\n    vulnerable to \"downgrade\" attacks, where an attacker might\n    be able to trigger a downgrade to non-DNSSEC mode by\n    synthesizing a DNS response that suggests DNSSEC was not\n    supported.\n- `\"false\"`: DNS lookups are not DNSSEC validated.\n"}, "example": {"_type": "literalExpression", "text": "\"true\""}, "loc": ["services", "resolved", "dnssec"], "readOnly": false, "type": "one of \"true\", \"allow-downgrade\", \"false\""}, "services.resolved.domains": {"declarations": ["nixos/modules/system/boot/resolved.nix"], "default": {"_type": "literalExpression", "text": "config.networking.search"}, "description": {"_type": "mdDoc", "text": "A list of domains. These domains are used as search suffixes\nwhen resolving single-label host names (domain names which\ncontain no dot), in order to qualify them into fully-qualified\ndomain names (FQDNs).\n\nFor compatibility reasons, if this setting is not specified,\nthe search domains listed in\n{file}`/etc/resolv.conf` are used instead, if\nthat file exists and any domains are configured in it.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"example.com\"\n]"}, "loc": ["services", "resolved", "domains"], "readOnly": false, "type": "list of string"}, "services.resolved.enable": {"declarations": ["nixos/modules/system/boot/resolved.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the systemd DNS resolver daemon, `systemd-resolved`.\n\nSearch for `services.resolved` to see all options.\n"}, "loc": ["services", "resolved", "enable"], "readOnly": false, "type": "boolean"}, "services.resolved.extraConfig": {"declarations": ["nixos/modules/system/boot/resolved.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config to append to resolved.conf.\n"}, "loc": ["services", "resolved", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.resolved.fallbackDns": {"declarations": ["nixos/modules/system/boot/resolved.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of IPv4 and IPv6 addresses to use as the fallback DNS servers.\nIf this option is empty, a compiled-in list of DNS servers is used instead.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"8.8.8.8\"\n  \"2001:4860:4860::8844\"\n]"}, "loc": ["services", "resolved", "fallbackDns"], "readOnly": false, "type": "list of string"}, "services.resolved.llmnr": {"declarations": ["nixos/modules/system/boot/resolved.nix"], "default": {"_type": "literalExpression", "text": "\"true\""}, "description": {"_type": "mdDoc", "text": "Controls Link-Local Multicast Name Resolution support\n(RFC 4795) on the local host.\n\nIf set to\n- `\"true\"`: Enables full LLMNR responder and resolver support.\n- `\"false\"`: Disables both.\n- `\"resolve\"`: Only resolution support is enabled, but responding is disabled.\n"}, "example": {"_type": "literalExpression", "text": "\"false\""}, "loc": ["services", "resolved", "llmnr"], "readOnly": false, "type": "one of \"true\", \"resolve\", \"false\""}, "services.restic.backups": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Periodic backups to create with Restic.\n"}, "example": {"_type": "literalExpression", "text": "{\n  localbackup = {\n    exclude = [\n      \"/home/*/.cache\"\n    ];\n    initialize = true;\n    passwordFile = \"/etc/nixos/secrets/restic-password\";\n    paths = [\n      \"/home\"\n    ];\n    repository = \"/mnt/backup-hdd\";\n  };\n  remotebackup = {\n    extraOptions = [\n      \"sftp.command='ssh backup@host -i /etc/nixos/secrets/backup-private-key -s sftp'\"\n    ];\n    passwordFile = \"/etc/nixos/secrets/restic-password\";\n    paths = [\n      \"/home\"\n    ];\n    repository = \"sftp:backup@host:/backups/home\";\n    timerConfig = {\n      OnCalendar = \"00:05\";\n      RandomizedDelaySec = \"5h\";\n    };\n  };\n}"}, "loc": ["services", "restic", "backups"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.restic.backups.<name>.backupCleanupCommand": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A script that must run after finishing the backup process.\n"}, "loc": ["services", "restic", "backups", "<name>", "backupCleanupCommand"], "readOnly": false, "type": "null or string"}, "services.restic.backups.<name>.backupPrepareCommand": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A script that must run before starting the backup process.\n"}, "loc": ["services", "restic", "backups", "<name>", "backupPrepareCommand"], "readOnly": false, "type": "null or string"}, "services.restic.backups.<name>.checkOpts": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of options for 'restic check', which is run after\npruning.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--with-cache\"\n]"}, "loc": ["services", "restic", "backups", "<name>", "checkOpts"], "readOnly": false, "type": "list of string"}, "services.restic.backups.<name>.dynamicFilesFrom": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A script that produces a list of files to back up.  The\nresults of this command are given to the '--files-from'\noption.\n"}, "example": {"_type": "literalExpression", "text": "\"find /home/matt/git -type d -name .git\""}, "loc": ["services", "restic", "backups", "<name>", "dynamicFilesFrom"], "readOnly": false, "type": "null or string"}, "services.restic.backups.<name>.environmentFile": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "file containing the credentials to access the repository, in the\nformat of an EnvironmentFile as described by systemd.exec(5)\n"}, "loc": ["services", "restic", "backups", "<name>", "environmentFile"], "readOnly": false, "type": "null or string"}, "services.restic.backups.<name>.exclude": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Patterns to exclude when backing up. See\nhttps://restic.readthedocs.io/en/latest/040_backup.html#excluding-files for\ndetails on syntax.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/var/cache\"\n  \"/home/*/.cache\"\n  \".git\"\n]"}, "loc": ["services", "restic", "backups", "<name>", "exclude"], "readOnly": false, "type": "list of string"}, "services.restic.backups.<name>.extraBackupArgs": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to restic backup.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--exclude-file=/etc/nixos/restic-ignore\"\n]"}, "loc": ["services", "restic", "backups", "<name>", "extraBackupArgs"], "readOnly": false, "type": "list of string"}, "services.restic.backups.<name>.extraOptions": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra extended options to be passed to the restic --option flag.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"sftp.command='ssh backup@192.168.1.100 -i /home/user/.ssh/id_rsa -s sftp'\"\n]"}, "loc": ["services", "restic", "backups", "<name>", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.restic.backups.<name>.initialize": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create the repository if it doesn't exist.\n"}, "loc": ["services", "restic", "backups", "<name>", "initialize"], "readOnly": false, "type": "boolean"}, "services.restic.backups.<name>.package": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "pkgs.restic"}, "description": {"_type": "mdDoc", "text": "Restic package to use.\n"}, "loc": ["services", "restic", "backups", "<name>", "package"], "readOnly": false, "type": "package"}, "services.restic.backups.<name>.passwordFile": {"declarations": ["nixos/modules/services/backup/restic.nix"], "description": {"_type": "mdDoc", "text": "Read the repository password from a file.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/nixos/restic-password\""}, "loc": ["services", "restic", "backups", "<name>", "passwordFile"], "readOnly": false, "type": "string"}, "services.restic.backups.<name>.paths": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Which paths to backup.  If null or an empty array, no\nbackup command will be run.  This can be used to create a\nprune-only job.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/var/lib/postgresql\"\n  \"/home/user/backup\"\n]"}, "loc": ["services", "restic", "backups", "<name>", "paths"], "readOnly": false, "type": "null or (list of string)"}, "services.restic.backups.<name>.pruneOpts": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of options (--keep-\\* et al.) for 'restic forget\n--prune', to automatically prune old snapshots.  The\n'forget' command is run *after* the 'backup' command, so\nkeep that in mind when constructing the --keep-\\* options.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--keep-daily 7\"\n  \"--keep-weekly 5\"\n  \"--keep-monthly 12\"\n  \"--keep-yearly 75\"\n]"}, "loc": ["services", "restic", "backups", "<name>", "pruneOpts"], "readOnly": false, "type": "list of string"}, "services.restic.backups.<name>.rcloneConfig": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration for the rclone remote being used for backup.\nSee the remote's specific options under rclone's docs at\n<https://rclone.org/docs/>. When specifying\noption names, use the \"config\" name specified in the docs.\nFor example, to set `--b2-hard-delete` for a B2\nremote, use `hard_delete = true` in the\nattribute set.\nWarning: Secrets set in here will be world-readable in the Nix\nstore! Consider using the `rcloneConfigFile`\noption instead to specify secret values separately. Note that\noptions set here will override those set in the config file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  account = \"xxx\";\n  hard_delete = true;\n  key = \"xxx\";\n  type = \"b2\";\n}"}, "loc": ["services", "restic", "backups", "<name>", "rcloneConfig"], "readOnly": false, "type": "null or (attribute set of (string or boolean))"}, "services.restic.backups.<name>.rcloneConfigFile": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the file containing rclone configuration. This file\nmust contain configuration for the remote specified in this backup\nset and also must be readable by root. Options set in\n`rcloneConfig` will override those set in this\nfile.\n"}, "loc": ["services", "restic", "backups", "<name>", "rcloneConfigFile"], "readOnly": false, "type": "null or path"}, "services.restic.backups.<name>.rcloneOptions": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Options to pass to rclone to control its behavior.\nSee <https://rclone.org/docs/#options> for\navailable options. When specifying option names, strip the\nleading `--`. To set a flag such as\n`--drive-use-trash`, which does not take a value,\nset the value to the Boolean `true`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  bwlimit = \"10M\";\n  drive-use-trash = \"true\";\n}"}, "loc": ["services", "restic", "backups", "<name>", "rcloneOptions"], "readOnly": false, "type": "null or (attribute set of (string or boolean))"}, "services.restic.backups.<name>.repository": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "repository to backup to.\n"}, "example": {"_type": "literalExpression", "text": "\"sftp:backup@192.168.1.100:/backups/\u2039name\u203a\""}, "loc": ["services", "restic", "backups", "<name>", "repository"], "readOnly": false, "type": "null or string"}, "services.restic.backups.<name>.repositoryFile": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the file containing the repository location to backup to.\n"}, "loc": ["services", "restic", "backups", "<name>", "repositoryFile"], "readOnly": false, "type": "null or path"}, "services.restic.backups.<name>.s3CredentialsFile": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "file containing the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY\nfor an S3-hosted repository, in the format of an EnvironmentFile\nas described by systemd.exec(5)\n"}, "loc": ["services", "restic", "backups", "<name>", "s3CredentialsFile"], "readOnly": false, "type": "null or string"}, "services.restic.backups.<name>.timerConfig": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "{\n  OnCalendar = \"daily\";\n  Persistent = true;\n}"}, "description": {"_type": "mdDoc", "text": "When to run the backup. See {manpage}`systemd.timer(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  OnCalendar = \"00:05\";\n  Persistent = true;\n  RandomizedDelaySec = \"5h\";\n}"}, "loc": ["services", "restic", "backups", "<name>", "timerConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "services.restic.backups.<name>.user": {"declarations": ["nixos/modules/services/backup/restic.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "As which user the backup should run.\n"}, "example": {"_type": "literalExpression", "text": "\"postgresql\""}, "loc": ["services", "restic", "backups", "<name>", "user"], "readOnly": false, "type": "string"}, "services.restic.server.appendOnly": {"declarations": ["nixos/modules/services/backup/restic-rest-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable append only mode.\nThis mode allows creation of new backups but prevents deletion and modification of existing backups.\nThis can be useful when backing up systems that have a potential of being hacked.\n"}, "loc": ["services", "restic", "server", "appendOnly"], "readOnly": false, "type": "boolean"}, "services.restic.server.dataDir": {"declarations": ["nixos/modules/services/backup/restic-rest-server.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/restic\""}, "description": {"_type": "mdDoc", "text": "The directory for storing the restic repository."}, "loc": ["services", "restic", "server", "dataDir"], "readOnly": false, "type": "path"}, "services.restic.server.enable": {"declarations": ["nixos/modules/services/backup/restic-rest-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Restic REST Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "restic", "server", "enable"], "readOnly": false, "type": "boolean"}, "services.restic.server.extraFlags": {"declarations": ["nixos/modules/services/backup/restic-rest-server.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra commandline options to pass to Restic REST server.\n"}, "loc": ["services", "restic", "server", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.restic.server.listenAddress": {"declarations": ["nixos/modules/services/backup/restic-rest-server.nix"], "default": {"_type": "literalExpression", "text": "\":8000\""}, "description": {"_type": "mdDoc", "text": "Listen on a specific IP address and port."}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1:8080\""}, "loc": ["services", "restic", "server", "listenAddress"], "readOnly": false, "type": "string"}, "services.restic.server.package": {"declarations": ["nixos/modules/services/backup/restic-rest-server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.restic-rest-server"}, "description": {"_type": "mdDoc", "text": "Restic REST server package to use."}, "loc": ["services", "restic", "server", "package"], "readOnly": false, "type": "package"}, "services.restic.server.privateRepos": {"declarations": ["nixos/modules/services/backup/restic-rest-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable private repos.\nGrants access only when a subdirectory with the same name as the user is specified in the repository URL.\n"}, "loc": ["services", "restic", "server", "privateRepos"], "readOnly": false, "type": "boolean"}, "services.restic.server.prometheus": {"declarations": ["nixos/modules/services/backup/restic-rest-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Prometheus metrics at /metrics."}, "loc": ["services", "restic", "server", "prometheus"], "readOnly": false, "type": "boolean"}, "services.restya-board.dataDir": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/restya-board\""}, "description": {"_type": "mdDoc", "text": "Data of the application.\n"}, "loc": ["services", "restya-board", "dataDir"], "readOnly": false, "type": "path"}, "services.restya-board.database.host": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host of the database. Leave 'null' to use a local PostgreSQL database.\nA local PostgreSQL database is initialized automatically.\n"}, "loc": ["services", "restya-board", "database", "host"], "readOnly": false, "type": "null or string"}, "services.restya-board.database.name": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "\"restya_board\""}, "description": {"_type": "mdDoc", "text": "Name of the database. The database must exist.\n"}, "loc": ["services", "restya-board", "database", "name"], "readOnly": false, "type": "string"}, "services.restya-board.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The database user's password. 'null' if no password is set.\n"}, "loc": ["services", "restya-board", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.restya-board.database.port": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "5432"}, "description": {"_type": "mdDoc", "text": "The database's port.\n"}, "loc": ["services", "restya-board", "database", "port"], "readOnly": false, "type": "null or signed integer"}, "services.restya-board.database.user": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "\"restya_board\""}, "description": {"_type": "mdDoc", "text": "The database user. The user must exist and have access to\nthe specified database.\n"}, "loc": ["services", "restya-board", "database", "user"], "readOnly": false, "type": "string"}, "services.restya-board.email.login": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "SMTP authentication login used when sending outgoing mail.\n"}, "loc": ["services", "restya-board", "email", "login"], "readOnly": false, "type": "string"}, "services.restya-board.email.password": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "SMTP authentication password used when sending outgoing mail.\n\nATTENTION: The password is stored world-readable in the nix-store!\n"}, "loc": ["services", "restya-board", "email", "password"], "readOnly": false, "type": "string"}, "services.restya-board.email.port": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "25"}, "description": {"_type": "mdDoc", "text": "Port used to connect to SMTP server.\n"}, "loc": ["services", "restya-board", "email", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.restya-board.email.server": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hostname to send outgoing mail. Null to use the system MTA.\n"}, "example": {"_type": "literalExpression", "text": "\"localhost\""}, "loc": ["services", "restya-board", "email", "server"], "readOnly": false, "type": "null or string"}, "services.restya-board.enable": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable restya-board."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "restya-board", "enable"], "readOnly": false, "type": "boolean"}, "services.restya-board.group": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "\"nginx\""}, "description": {"_type": "mdDoc", "text": "Group account under which the web-application runs.\n"}, "loc": ["services", "restya-board", "group"], "readOnly": false, "type": "string"}, "services.restya-board.timezone": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "\"GMT\""}, "description": {"_type": "mdDoc", "text": "Timezone the web-app runs in.\n"}, "loc": ["services", "restya-board", "timezone"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.restya-board.user": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "\"restya-board\""}, "description": {"_type": "mdDoc", "text": "User account under which the web-application runs.\n"}, "loc": ["services", "restya-board", "user"], "readOnly": false, "type": "string"}, "services.restya-board.virtualHost.listenHost": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Listen address for the virtualhost to use.\n"}, "loc": ["services", "restya-board", "virtualHost", "listenHost"], "readOnly": false, "type": "string"}, "services.restya-board.virtualHost.listenPort": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Listen port for the virtualhost to use.\n"}, "loc": ["services", "restya-board", "virtualHost", "listenPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.restya-board.virtualHost.serverName": {"declarations": ["nixos/modules/services/web-apps/restya-board.nix"], "default": {"_type": "literalExpression", "text": "\"restya.board\""}, "description": {"_type": "mdDoc", "text": "Name of the nginx virtualhost to use.\n"}, "loc": ["services", "restya-board", "virtualHost", "serverName"], "readOnly": false, "type": "string"}, "services.riemann-dash.config": {"declarations": ["nixos/modules/services/monitoring/riemann-dash.nix"], "description": {"_type": "mdDoc", "text": "Contents added to the end of the riemann-dash configuration file.\n"}, "loc": ["services", "riemann-dash", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.riemann-dash.dataDir": {"declarations": ["nixos/modules/services/monitoring/riemann-dash.nix"], "default": {"_type": "literalExpression", "text": "\"/var/riemann-dash\""}, "description": {"_type": "mdDoc", "text": "Location of the riemann-base dir. The dashboard configuration file is\nis stored to this directory. The directory is created automatically on\nservice start, and owner is set to the riemanndash user.\n"}, "loc": ["services", "riemann-dash", "dataDir"], "readOnly": false, "type": "string"}, "services.riemann-dash.enable": {"declarations": ["nixos/modules/services/monitoring/riemann-dash.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the riemann-dash dashboard daemon.\n"}, "loc": ["services", "riemann-dash", "enable"], "readOnly": false, "type": "boolean"}, "services.riemann-tools.enableHealth": {"declarations": ["nixos/modules/services/monitoring/riemann-tools.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the riemann-health daemon.\n"}, "loc": ["services", "riemann-tools", "enableHealth"], "readOnly": false, "type": "boolean"}, "services.riemann-tools.extraArgs": {"declarations": ["nixos/modules/services/monitoring/riemann-tools.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of commandline-switches forwarded to a riemann-tool.\nSee for example `riemann-health --help` for available options.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-p 5555\"\n  \"--timeout=30\"\n  \"--attribute=myattribute=42\"\n]"}, "loc": ["services", "riemann-tools", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.riemann-tools.riemannHost": {"declarations": ["nixos/modules/services/monitoring/riemann-tools.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address of the host riemann node. Defaults to localhost.\n"}, "loc": ["services", "riemann-tools", "riemannHost"], "readOnly": false, "type": "string"}, "services.riemann.config": {"declarations": ["nixos/modules/services/monitoring/riemann.nix"], "description": {"_type": "mdDoc", "text": "Contents of the Riemann configuration file. For more complicated\nconfig you should use configFile.\n"}, "loc": ["services", "riemann", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.riemann.configFile": {"declarations": ["nixos/modules/services/monitoring/riemann.nix"], "description": {"_type": "mdDoc", "text": "A Riemann config file. Any files in the same directory as this file\nwill be added to the classpath by Riemann.\n"}, "loc": ["services", "riemann", "configFile"], "readOnly": false, "type": "string"}, "services.riemann.configFiles": {"declarations": ["nixos/modules/services/monitoring/riemann.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra files containing Riemann configuration. These files will be\nloaded at runtime by Riemann (with Clojure's\n`load-file` function) at the end of the\nconfiguration if you use the config option, this is ignored if you\nuse configFile.\n"}, "loc": ["services", "riemann", "configFiles"], "readOnly": false, "type": "list of path"}, "services.riemann.enable": {"declarations": ["nixos/modules/services/monitoring/riemann.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Riemann network monitoring daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "riemann", "enable"], "readOnly": false, "type": "boolean"}, "services.riemann.extraClasspathEntries": {"declarations": ["nixos/modules/services/monitoring/riemann.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra entries added to the Java classpath when running Riemann.\n"}, "loc": ["services", "riemann", "extraClasspathEntries"], "readOnly": false, "type": "list of string"}, "services.riemann.extraJavaOpts": {"declarations": ["nixos/modules/services/monitoring/riemann.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra Java options used when launching Riemann.\n"}, "loc": ["services", "riemann", "extraJavaOpts"], "readOnly": false, "type": "list of string"}, "services.rippleDataApi.couchdb.create": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to create couchdb database needed by ripple data api."}, "loc": ["services", "rippleDataApi", "couchdb", "create"], "readOnly": false, "type": "boolean"}, "services.rippleDataApi.couchdb.db": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "\"rippled\""}, "description": {"_type": "mdDoc", "text": "Ripple data api couchdb database."}, "loc": ["services", "rippleDataApi", "couchdb", "db"], "readOnly": false, "type": "string"}, "services.rippleDataApi.couchdb.host": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Ripple data api couchdb host."}, "loc": ["services", "rippleDataApi", "couchdb", "host"], "readOnly": false, "type": "string"}, "services.rippleDataApi.couchdb.pass": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Ripple data api couchdb password."}, "loc": ["services", "rippleDataApi", "couchdb", "pass"], "readOnly": false, "type": "string"}, "services.rippleDataApi.couchdb.port": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "5984"}, "description": {"_type": "mdDoc", "text": "Ripple data api couchdb port."}, "loc": ["services", "rippleDataApi", "couchdb", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.rippleDataApi.couchdb.user": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "\"rippled\""}, "description": {"_type": "mdDoc", "text": "Ripple data api couchdb username."}, "loc": ["services", "rippleDataApi", "couchdb", "user"], "readOnly": false, "type": "string"}, "services.rippleDataApi.enable": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ripple data api."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "rippleDataApi", "enable"], "readOnly": false, "type": "boolean"}, "services.rippleDataApi.importMode": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "\"liveOnly\""}, "description": {"_type": "mdDoc", "text": "Ripple data api import mode."}, "loc": ["services", "rippleDataApi", "importMode"], "readOnly": false, "type": "one of \"live\", \"liveOnly\""}, "services.rippleDataApi.maxLedger": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Ripple data api maximal ledger to fetch."}, "loc": ["services", "rippleDataApi", "maxLedger"], "readOnly": false, "type": "null or signed integer"}, "services.rippleDataApi.minLedger": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Ripple data api minimal ledger to fetch."}, "loc": ["services", "rippleDataApi", "minLedger"], "readOnly": false, "type": "null or signed integer"}, "services.rippleDataApi.port": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "5993"}, "description": {"_type": "mdDoc", "text": "Ripple data api port"}, "loc": ["services", "rippleDataApi", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.rippleDataApi.redis.enable": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable caching of ripple data to redis."}, "loc": ["services", "rippleDataApi", "redis", "enable"], "readOnly": false, "type": "boolean"}, "services.rippleDataApi.redis.host": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Ripple data api redis host."}, "loc": ["services", "rippleDataApi", "redis", "host"], "readOnly": false, "type": "string"}, "services.rippleDataApi.redis.port": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "5984"}, "description": {"_type": "mdDoc", "text": "Ripple data api redis port."}, "loc": ["services", "rippleDataApi", "redis", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.rippleDataApi.rippleds": {"declarations": ["nixos/modules/services/misc/ripple-data-api.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"http://s_east.ripple.com:51234\"\n  \"http://s_west.ripple.com:51234\"\n]"}, "description": {"_type": "mdDoc", "text": "List of rippleds to be used by ripple data api."}, "loc": ["services", "rippleDataApi", "rippleds"], "readOnly": false, "type": "list of string"}, "services.rippled.databasePath": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/rippled\""}, "description": {"_type": "mdDoc", "text": "Path to the ripple database.\n"}, "loc": ["services", "rippled", "databasePath"], "readOnly": false, "type": "path"}, "services.rippled.enable": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable rippled."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "rippled", "enable"], "readOnly": false, "type": "boolean"}, "services.rippled.extraConfig": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to be added verbatim to the rippled.cfg configuration file.\n"}, "loc": ["services", "rippled", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.rippled.fetchDepth": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"full\""}, "description": {"_type": "mdDoc", "text": "The number of past ledgers to serve to other peers that request historical\nledger data (or \"full\" for no limit).\n"}, "loc": ["services", "rippled", "fetchDepth"], "readOnly": false, "type": "signed integer or value \"full\" (singular enum)"}, "services.rippled.importDb": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Settings for performing a one-time import."}, "loc": ["services", "rippled", "importDb"], "readOnly": false, "type": "null or (submodule)"}, "services.rippled.importDb.advisoryDelete": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, then require administrative RPC call \"can_delete\"\nto enable online deletion of ledger records.\n"}, "loc": ["services", "rippled", "importDb", "advisoryDelete"], "readOnly": false, "type": "null or boolean"}, "services.rippled.importDb.compression": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to enable snappy compression."}, "loc": ["services", "rippled", "importDb", "compression"], "readOnly": false, "type": "null or boolean"}, "services.rippled.importDb.extraOpts": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra database options."}, "loc": ["services", "rippled", "importDb", "extraOpts"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.rippled.importDb.onlineDelete": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "config.services.rippled.ledgerHistory"}, "description": {"_type": "mdDoc", "text": "Enable automatic purging of older ledger information."}, "loc": ["services", "rippled", "importDb", "onlineDelete"], "readOnly": false, "type": "null or signed integer"}, "services.rippled.importDb.path": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "config.services.rippled.databasePath"}, "description": {"_type": "mdDoc", "text": "Location to store the database."}, "loc": ["services", "rippled", "importDb", "path"], "readOnly": false, "type": "path"}, "services.rippled.importDb.type": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"rocksdb\""}, "description": {"_type": "mdDoc", "text": "Rippled database type."}, "loc": ["services", "rippled", "importDb", "type"], "readOnly": false, "type": "one of \"rocksdb\", \"nudb\""}, "services.rippled.ips": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"r.ripple.com 51235\"\n]"}, "description": {"_type": "mdDoc", "text": "List of hostnames or ips where the Ripple protocol is served.\nFor a starter list, you can either copy entries from:\nhttps://ripple.com/ripple.txt or if you prefer you can let it\n default to r.ripple.com 51235\n\nA port may optionally be specified after adding a space to the\naddress. By convention, if known, IPs are listed in from most\nto least trusted.\n"}, "loc": ["services", "rippled", "ips"], "readOnly": false, "type": "list of string"}, "services.rippled.ipsFixed": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of IP addresses or hostnames to which rippled should always\nattempt to maintain peer connections with. This is useful for\nmanually forming private networks, for example to configure a\nvalidation server that connects to the Ripple network through a\npublic-facing server, or for building a set of cluster peers.\n\nA port may optionally be specified after adding a space to the address\n"}, "loc": ["services", "rippled", "ipsFixed"], "readOnly": false, "type": "list of string"}, "services.rippled.ledgerHistory": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "1296000"}, "description": {"_type": "mdDoc", "text": "The number of past ledgers to acquire on server startup and the minimum\nto maintain while running.\n"}, "loc": ["services", "rippled", "ledgerHistory"], "readOnly": false, "type": "signed integer or value \"full\" (singular enum)"}, "services.rippled.logLevel": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"error\""}, "description": {"_type": "mdDoc", "text": "Logging verbosity."}, "loc": ["services", "rippled", "logLevel"], "readOnly": false, "type": "one of \"debug\", \"error\", \"info\""}, "services.rippled.nodeDb": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "{\n  extraOpts = ''\n    open_files=2000\n    filter_bits=12\n    cache_mb=256\n    file_size_pb=8\n    file_size_mult=2;\n  '';\n  type = \"rocksdb\";\n}"}, "description": {"_type": "mdDoc", "text": "Rippled main database options."}, "loc": ["services", "rippled", "nodeDb"], "readOnly": false, "type": "null or (submodule)"}, "services.rippled.nodeDb.advisoryDelete": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, then require administrative RPC call \"can_delete\"\nto enable online deletion of ledger records.\n"}, "loc": ["services", "rippled", "nodeDb", "advisoryDelete"], "readOnly": false, "type": "null or boolean"}, "services.rippled.nodeDb.compression": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to enable snappy compression."}, "loc": ["services", "rippled", "nodeDb", "compression"], "readOnly": false, "type": "null or boolean"}, "services.rippled.nodeDb.extraOpts": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra database options."}, "loc": ["services", "rippled", "nodeDb", "extraOpts"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.rippled.nodeDb.onlineDelete": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "config.services.rippled.ledgerHistory"}, "description": {"_type": "mdDoc", "text": "Enable automatic purging of older ledger information."}, "loc": ["services", "rippled", "nodeDb", "onlineDelete"], "readOnly": false, "type": "null or signed integer"}, "services.rippled.nodeDb.path": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "config.services.rippled.databasePath"}, "description": {"_type": "mdDoc", "text": "Location to store the database."}, "loc": ["services", "rippled", "nodeDb", "path"], "readOnly": false, "type": "path"}, "services.rippled.nodeDb.type": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"rocksdb\""}, "description": {"_type": "mdDoc", "text": "Rippled database type."}, "loc": ["services", "rippled", "nodeDb", "type"], "readOnly": false, "type": "one of \"rocksdb\", \"nudb\""}, "services.rippled.nodeSize": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"small\""}, "description": {"_type": "mdDoc", "text": "Rippled size of the node you are running.\n\"tiny\", \"small\", \"medium\", \"large\", and \"huge\"\n"}, "loc": ["services", "rippled", "nodeSize"], "readOnly": false, "type": "one of \"tiny\", \"small\", \"medium\", \"large\", \"huge\""}, "services.rippled.package": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "pkgs.rippled"}, "description": {"_type": "mdDoc", "text": "Which rippled package to use."}, "loc": ["services", "rippled", "package"], "readOnly": false, "type": "package"}, "services.rippled.ports": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "{\n  peer = {\n    ip = \"0.0.0.0\";\n    port = 51235;\n    protocol = [\n      \"peer\"\n    ];\n  };\n  rpc = {\n    admin = [\n      \"127.0.0.1\"\n    ];\n    port = 5005;\n    protocol = [\n      \"http\"\n    ];\n  };\n  ws_public = {\n    ip = \"0.0.0.0\";\n    port = 5006;\n    protocol = [\n      \"ws\"\n      \"wss\"\n    ];\n  };\n}"}, "description": {"_type": "mdDoc", "text": "Ports exposed by rippled"}, "loc": ["services", "rippled", "ports"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.rippled.ports.<name>.admin": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "description": {"_type": "mdDoc", "text": "A comma-separated list of admin IP addresses."}, "loc": ["services", "rippled", "ports", "<name>", "admin"], "readOnly": false, "type": "list of string"}, "services.rippled.ports.<name>.ip": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Ip where rippled listens."}, "loc": ["services", "rippled", "ports", "<name>", "ip"], "readOnly": false, "type": "string"}, "services.rippled.ports.<name>.password": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "When set, these credentials will be required on HTTP/S requests."}, "loc": ["services", "rippled", "ports", "<name>", "password"], "readOnly": false, "type": "string"}, "services.rippled.ports.<name>.port": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "description": {"_type": "mdDoc", "text": "Port where rippled listens."}, "loc": ["services", "rippled", "ports", "<name>", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.rippled.ports.<name>.protocol": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "description": {"_type": "mdDoc", "text": "Protocols expose by rippled."}, "loc": ["services", "rippled", "ports", "<name>", "protocol"], "readOnly": false, "type": "list of (one of \"http\", \"https\", \"ws\", \"wss\", \"peer\")"}, "services.rippled.ports.<name>.ssl.cert": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the path to the SSL certificate file in PEM format.\nThis is not needed if the chain includes it.\n"}, "loc": ["services", "rippled", "ports", "<name>", "ssl", "cert"], "readOnly": false, "type": "null or path"}, "services.rippled.ports.<name>.ssl.chain": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If you need a certificate chain, specify the path to the\ncertificate chain here. The chain may include the end certificate.\n"}, "loc": ["services", "rippled", "ports", "<name>", "ssl", "chain"], "readOnly": false, "type": "null or path"}, "services.rippled.ports.<name>.ssl.key": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the filename holding the SSL key in PEM format.\n"}, "loc": ["services", "rippled", "ports", "<name>", "ssl", "key"], "readOnly": false, "type": "null or path"}, "services.rippled.ports.<name>.user": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "When set, these credentials will be required on HTTP/S requests."}, "loc": ["services", "rippled", "ports", "<name>", "user"], "readOnly": false, "type": "string"}, "services.rippled.sntpServers": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"time.windows.com\"\n  \"time.apple.com\"\n  \"time.nist.gov\"\n  \"pool.ntp.org\"\n]"}, "description": {"_type": "mdDoc", "text": "IP address or domain of NTP servers to use for time synchronization.;\n"}, "loc": ["services", "rippled", "sntpServers"], "readOnly": false, "type": "list of string"}, "services.rippled.statsd.address": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:8125\""}, "description": {"_type": "mdDoc", "text": "The UDP address and port of the listening StatsD server."}, "loc": ["services", "rippled", "statsd", "address"], "readOnly": false, "type": "string"}, "services.rippled.statsd.enable": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable statsd monitoring for rippled."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "rippled", "statsd", "enable"], "readOnly": false, "type": "boolean"}, "services.rippled.statsd.prefix": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "A string prepended to each collected metric."}, "loc": ["services", "rippled", "statsd", "prefix"], "readOnly": false, "type": "string"}, "services.rippled.tempDb": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Rippled temporary database options."}, "loc": ["services", "rippled", "tempDb"], "readOnly": false, "type": "null or (submodule)"}, "services.rippled.tempDb.advisoryDelete": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, then require administrative RPC call \"can_delete\"\nto enable online deletion of ledger records.\n"}, "loc": ["services", "rippled", "tempDb", "advisoryDelete"], "readOnly": false, "type": "null or boolean"}, "services.rippled.tempDb.compression": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to enable snappy compression."}, "loc": ["services", "rippled", "tempDb", "compression"], "readOnly": false, "type": "null or boolean"}, "services.rippled.tempDb.extraOpts": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra database options."}, "loc": ["services", "rippled", "tempDb", "extraOpts"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.rippled.tempDb.onlineDelete": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "config.services.rippled.ledgerHistory"}, "description": {"_type": "mdDoc", "text": "Enable automatic purging of older ledger information."}, "loc": ["services", "rippled", "tempDb", "onlineDelete"], "readOnly": false, "type": "null or signed integer"}, "services.rippled.tempDb.path": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "config.services.rippled.databasePath"}, "description": {"_type": "mdDoc", "text": "Location to store the database."}, "loc": ["services", "rippled", "tempDb", "path"], "readOnly": false, "type": "path"}, "services.rippled.tempDb.type": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "\"rocksdb\""}, "description": {"_type": "mdDoc", "text": "Rippled database type."}, "loc": ["services", "rippled", "tempDb", "type"], "readOnly": false, "type": "one of \"rocksdb\", \"nudb\""}, "services.rippled.validationQuorum": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "The minimum number of trusted validations a ledger must have before\nthe server considers it fully validated.\n"}, "loc": ["services", "rippled", "validationQuorum"], "readOnly": false, "type": "signed integer"}, "services.rippled.validators": {"declarations": ["nixos/modules/services/misc/rippled.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"n949f75evCHwgyP4fPVgaHqNHxUVN15PsJEZ3B3HnXPcPjcZAoy7  RL1\"\n  \"n9MD5h24qrQqiyBC8aeqqCWvpiBiYQ3jxSr91uiDvmrkyHRdYLUj  RL2\"\n  \"n9L81uNCaPgtUJfaHh89gmdvXKAmSt5Gdsw2g1iPWaPkAHW5Nm4C  RL3\"\n  \"n9KiYM9CgngLvtRCQHZwgC2gjpdaZcCcbt3VboxiNFcKuwFVujzS  RL4\"\n  \"n9LdgEtkmGB9E2h3K4Vp7iGUaKuq23Zr32ehxiU8FWY7xoxbWTSA  RL5\"\n]"}, "description": {"_type": "mdDoc", "text": "List of nodes to always accept as validators. Nodes are specified by domain\nor public key.\n"}, "loc": ["services", "rippled", "validators"], "readOnly": false, "type": "list of string"}, "services.rmfakecloud.enable": {"declarations": ["nixos/modules/services/misc/rmfakecloud.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable rmfakecloud remarkable self-hosted cloud."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "rmfakecloud", "enable"], "readOnly": false, "type": "boolean"}, "services.rmfakecloud.environmentFile": {"declarations": ["nixos/modules/services/misc/rmfakecloud.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to an environment file loaded for the rmfakecloud service.\n\nThis can be used to securely store tokens and secrets outside of the\nworld-readable Nix store. Since this file is read by systemd, it may\nhave permission 0400 and be owned by root.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/secrets/rmfakecloud.env\""}, "loc": ["services", "rmfakecloud", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.rmfakecloud.extraSettings": {"declarations": ["nixos/modules/services/misc/rmfakecloud.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra settings in the form of a set of key-value pairs.\nFor tokens and secrets, use `environmentFile` instead.\n\nAvailable settings are listed on\nhttps://ddvk.github.io/rmfakecloud/install/configuration/.\n"}, "example": {"_type": "literalExpression", "text": "{\n  DATADIR = \"/custom/path/for/rmfakecloud/data\";\n}"}, "loc": ["services", "rmfakecloud", "extraSettings"], "readOnly": false, "type": "attribute set of string"}, "services.rmfakecloud.logLevel": {"declarations": ["nixos/modules/services/misc/rmfakecloud.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Logging level.\n"}, "loc": ["services", "rmfakecloud", "logLevel"], "readOnly": false, "type": "one of \"info\", \"debug\", \"warn\", \"error\""}, "services.rmfakecloud.package": {"declarations": ["nixos/modules/services/misc/rmfakecloud.nix"], "default": {"_type": "literalExpression", "text": "pkgs.rmfakecloud"}, "description": {"_type": "mdDoc", "text": "rmfakecloud package to use.\n\nThe default does not include the web user interface.\n"}, "loc": ["services", "rmfakecloud", "package"], "readOnly": false, "type": "package"}, "services.rmfakecloud.port": {"declarations": ["nixos/modules/services/misc/rmfakecloud.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Listening port number.\n"}, "loc": ["services", "rmfakecloud", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.rmfakecloud.storageUrl": {"declarations": ["nixos/modules/services/misc/rmfakecloud.nix"], "description": {"_type": "mdDoc", "text": "URL used by the tablet to access the rmfakecloud service.\n"}, "example": {"_type": "literalExpression", "text": "\"https://local.appspot.com\""}, "loc": ["services", "rmfakecloud", "storageUrl"], "readOnly": false, "type": "string"}, "services.robustirc-bridge.enable": {"declarations": ["nixos/modules/services/networking/robustirc-bridge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable RobustIRC bridge."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "robustirc-bridge", "enable"], "readOnly": false, "type": "boolean"}, "services.robustirc-bridge.extraFlags": {"declarations": ["nixos/modules/services/networking/robustirc-bridge.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags passed to the {command}`robustirc-bridge` command. See [RobustIRC Documentation](https://robustirc.net/docs/adminguide.html#_bridge) or robustirc-bridge(1) for details."}, "example": {"_type": "literalExpression", "text": "[\n  \"-network robustirc.net\"\n]"}, "loc": ["services", "robustirc-bridge", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.roon-bridge.enable": {"declarations": ["nixos/modules/services/audio/roon-bridge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Roon Bridge."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "roon-bridge", "enable"], "readOnly": false, "type": "boolean"}, "services.roon-bridge.group": {"declarations": ["nixos/modules/services/audio/roon-bridge.nix"], "default": {"_type": "literalExpression", "text": "\"roon-bridge\""}, "description": {"_type": "mdDoc", "text": "Group to run the Roon Bridge as.\n"}, "loc": ["services", "roon-bridge", "group"], "readOnly": false, "type": "string"}, "services.roon-bridge.openFirewall": {"declarations": ["nixos/modules/services/audio/roon-bridge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the bridge.\n"}, "loc": ["services", "roon-bridge", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.roon-bridge.user": {"declarations": ["nixos/modules/services/audio/roon-bridge.nix"], "default": {"_type": "literalExpression", "text": "\"roon-bridge\""}, "description": {"_type": "mdDoc", "text": "User to run the Roon bridge as.\n"}, "loc": ["services", "roon-bridge", "user"], "readOnly": false, "type": "string"}, "services.roon-server.enable": {"declarations": ["nixos/modules/services/audio/roon-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Roon Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "roon-server", "enable"], "readOnly": false, "type": "boolean"}, "services.roon-server.group": {"declarations": ["nixos/modules/services/audio/roon-server.nix"], "default": {"_type": "literalExpression", "text": "\"roon-server\""}, "description": {"_type": "mdDoc", "text": "Group to run the Roon Server as.\n"}, "loc": ["services", "roon-server", "group"], "readOnly": false, "type": "string"}, "services.roon-server.openFirewall": {"declarations": ["nixos/modules/services/audio/roon-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the server.\n"}, "loc": ["services", "roon-server", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.roon-server.user": {"declarations": ["nixos/modules/services/audio/roon-server.nix"], "default": {"_type": "literalExpression", "text": "\"roon-server\""}, "description": {"_type": "mdDoc", "text": "User to run the Roon Server as.\n"}, "loc": ["services", "roon-server", "user"], "readOnly": false, "type": "string"}, "services.roundcube.database.dbname": {"declarations": ["nixos/modules/services/mail/roundcube.nix"], "default": {"_type": "literalExpression", "text": "\"roundcube\""}, "description": {"_type": "mdDoc", "text": "Name of the postgresql database"}, "loc": ["services", "roundcube", "database", "dbname"], "readOnly": false, "type": "string"}, "services.roundcube.database.host": {"declarations": ["nixos/modules/services/mail/roundcube.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Host of the postgresql server. If this is not set to\n`localhost`, you have to create the\npostgresql user and database yourself, with appropriate\npermissions.\n"}, "loc": ["services", "roundcube", "database", "host"], "readOnly": false, "type": "string"}, "services.roundcube.database.password": {"declarations": ["nixos/modules/services/mail/roundcube.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Password for the postgresql connection. Do not use: the password will be stored world readable in the store; use `passwordFile` instead."}, "loc": ["services", "roundcube", "database", "password"], "readOnly": false, "type": "string"}, "services.roundcube.database.passwordFile": {"declarations": ["nixos/modules/services/mail/roundcube.nix"], "description": {"_type": "mdDoc", "text": "Password file for the postgresql connection.\nMust be formatted according to PostgreSQL .pgpass standard (see https://www.postgresql.org/docs/current/libpq-pgpass.html)\nbut only one line, no comments and readable by user `nginx`.\nIgnored if `database.host` is set to `localhost`, as peer authentication will be used.\n"}, "loc": ["services", "roundcube", "database", "passwordFile"], "readOnly": false, "type": "string"}, "services.roundcube.database.username": {"declarations": ["nixos/modules/services/mail/roundcube.nix"], "default": {"_type": "literalExpression", "text": "\"roundcube\""}, "description": {"_type": "mdDoc", "text": "Username for the postgresql connection.\nIf `database.host` is set to `localhost`, a unix user and group of the same name will be created as well.\n"}, "loc": ["services", "roundcube", "database", "username"], "readOnly": false, "type": "string"}, "services.roundcube.dicts": {"declarations": ["nixos/modules/services/mail/roundcube.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of aspell dictionaries for spell checking. If empty, spell checking is disabled.\n"}, "example": {"_type": "literalExpression", "text": "with pkgs.aspellDicts; [ en fr de ]"}, "loc": ["services", "roundcube", "dicts"], "readOnly": false, "type": "list of package"}, "services.roundcube.enable": {"declarations": ["nixos/modules/services/mail/roundcube.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable roundcube.\n\nAlso enables nginx virtual host management.\nFurther nginx configuration can be done by adapting `services.nginx.virtualHosts.<name>`.\nSee [](#opt-services.nginx.virtualHosts) for further information.\n"}, "loc": ["services", "roundcube", "enable"], "readOnly": false, "type": "boolean"}, "services.roundcube.extraConfig": {"declarations": ["nixos/modules/services/mail/roundcube.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration for roundcube webmail instance"}, "loc": ["services", "roundcube", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.roundcube.hostName": {"declarations": ["nixos/modules/services/mail/roundcube.nix"], "description": {"_type": "mdDoc", "text": "Hostname to use for the nginx vhost"}, "example": {"_type": "literalExpression", "text": "\"webmail.example.com\""}, "loc": ["services", "roundcube", "hostName"], "readOnly": false, "type": "string"}, "services.roundcube.maxAttachmentSize": {"declarations": ["nixos/modules/services/mail/roundcube.nix"], "default": {"_type": "literalExpression", "text": "18"}, "description": {"_type": "mdDoc", "text": "The maximum attachment size in MB.\n\nNote: Since roundcube only uses 70% of max upload values configured in php\n30% is added automatically to [](#opt-services.roundcube.maxAttachmentSize).\n"}, "loc": ["services", "roundcube", "maxAttachmentSize"], "readOnly": false, "type": "signed integer"}, "services.roundcube.package": {"declarations": ["nixos/modules/services/mail/roundcube.nix"], "default": {"_type": "literalExpression", "text": "pkgs.roundcube"}, "description": {"_type": "mdDoc", "text": "The package which contains roundcube's sources. Can be overridden to create\nan environment which contains roundcube and third-party plugins.\n"}, "example": {"_type": "literalExpression", "text": "roundcube.withPlugins (plugins: [ plugins.persistent_login ])\n"}, "loc": ["services", "roundcube", "package"], "readOnly": false, "type": "package"}, "services.roundcube.plugins": {"declarations": ["nixos/modules/services/mail/roundcube.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of roundcube plugins to enable. Currently, only those directly shipped with Roundcube are supported.\n"}, "loc": ["services", "roundcube", "plugins"], "readOnly": false, "type": "list of string"}, "services.routedns.configFile": {"declarations": ["nixos/modules/services/networking/routedns.nix"], "default": {"_type": "literalExpression", "text": "\"A RouteDNS configuration file automatically generated by values from services.routedns.*\""}, "description": {"_type": "mdDoc", "text": "Path to RouteDNS TOML configuration file."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.routedns}/cmd/routedns/example-config/use-case-1.toml\""}, "loc": ["services", "routedns", "configFile"], "readOnly": false, "type": "path"}, "services.routedns.enable": {"declarations": ["nixos/modules/services/networking/routedns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable RouteDNS - DNS stub resolver, proxy and router."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "routedns", "enable"], "readOnly": false, "type": "boolean"}, "services.routedns.package": {"declarations": ["nixos/modules/services/networking/routedns.nix"], "default": {"_type": "literalExpression", "text": "pkgs.routedns"}, "description": {"_type": "mdDoc", "text": "RouteDNS package to use."}, "loc": ["services", "routedns", "package"], "readOnly": false, "type": "package"}, "services.routedns.settings": {"declarations": ["nixos/modules/services/networking/routedns.nix"], "description": {"_type": "mdDoc", "text": "Configuration for RouteDNS, see <https://github.com/folbricht/routedns/blob/master/doc/configuration.md>\nfor more information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  resolvers.cloudflare-dot = {\n    address = \"1.1.1.1:853\";\n    protocol = \"dot\";\n  };\n  groups.cloudflare-cached = {\n    type = \"cache\";\n    resolvers = [\"cloudflare-dot\"];\n  };\n  listeners.local-udp = {\n    address = \"127.0.0.1:53\";\n    protocol = \"udp\";\n    resolver = \"cloudflare-cached\";\n  };\n  listeners.local-tcp = {\n    address = \"127.0.0.1:53\";\n    protocol = \"tcp\";\n    resolver = \"cloudflare-cached\";\n  };\n}\n"}, "loc": ["services", "routedns", "settings"], "readOnly": false, "type": "TOML value"}, "services.rpcbind.enable": {"declarations": ["nixos/modules/services/networking/rpcbind.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable `rpcbind`, an ONC RPC directory service\nnotably used by NFS and NIS, and which can be queried\nusing the rpcinfo(1) command. `rpcbind` is a replacement for\n`portmap`.\n"}, "loc": ["services", "rpcbind", "enable"], "readOnly": false, "type": "boolean"}, "services.rshim.backend": {"declarations": ["nixos/modules/services/misc/rshim.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the backend to attach. If not specified, the driver will scan\nall rshim backends unless the `device` option is given with a device\nname specified.\n"}, "example": {"_type": "literalExpression", "text": "\"pcie\""}, "loc": ["services", "rshim", "backend"], "readOnly": false, "type": "null or one of \"usb\", \"pcie\", \"pcie_lf\""}, "services.rshim.config": {"declarations": ["nixos/modules/services/misc/rshim.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Structural setting for the rshim configuration file\n(`/etc/rshim.conf`). It can be used to specify the static mapping\nbetween rshim devices and rshim names. It can also be used to ignore\nsome rshim devices.\n"}, "example": {"_type": "literalExpression", "text": "{\n  DISPLAY_LEVEL = 0;\n  none = \"usb-1-1.4\";\n  rshim0 = \"usb-2-1.7\";\n}"}, "loc": ["services", "rshim", "config"], "readOnly": false, "type": "attribute set of (signed integer or string)"}, "services.rshim.device": {"declarations": ["nixos/modules/services/misc/rshim.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the device name to attach. The backend driver can be deduced\nfrom the device name, thus the `backend` option is not needed.\n"}, "example": {"_type": "literalExpression", "text": "\"pcie-04:00.2\""}, "loc": ["services", "rshim", "device"], "readOnly": false, "type": "null or string"}, "services.rshim.enable": {"declarations": ["nixos/modules/services/misc/rshim.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable User-space rshim driver for the BlueField SoC."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "rshim", "enable"], "readOnly": false, "type": "boolean"}, "services.rshim.index": {"declarations": ["nixos/modules/services/misc/rshim.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the index to create device path `/dev/rshim<index>`. It's also\nused to create network interface name `tmfifo_net<index>`. This option\nis needed when multiple rshim instances are running.\n"}, "example": {"_type": "literalExpression", "text": "1"}, "loc": ["services", "rshim", "index"], "readOnly": false, "type": "null or signed integer"}, "services.rshim.log-level": {"declarations": ["nixos/modules/services/misc/rshim.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Specify the log level (0:none, 1:error, 2:warning, 3:notice, 4:debug).\n"}, "example": {"_type": "literalExpression", "text": "4"}, "loc": ["services", "rshim", "log-level"], "readOnly": false, "type": "signed integer"}, "services.rshim.package": {"declarations": ["nixos/modules/services/misc/rshim.nix"], "default": {"_type": "literalExpression", "text": "pkgs.rshim-user-space"}, "description": {"_type": "mdDoc", "text": "The rshim-user-space package to use."}, "loc": ["services", "rshim", "package"], "readOnly": false, "type": "package"}, "services.rsnapshot.cronIntervals": {"declarations": ["nixos/modules/services/backup/rsnapshot.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Periodicity at which intervals should be run by cron.\nNote that the intervals also have to exist in configuration\nas retain options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  daily = \"50 21 * * *\";\n  hourly = \"0 * * * *\";\n}"}, "loc": ["services", "rsnapshot", "cronIntervals"], "readOnly": false, "type": "attribute set of string"}, "services.rsnapshot.enable": {"declarations": ["nixos/modules/services/backup/rsnapshot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable rsnapshot backups."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "rsnapshot", "enable"], "readOnly": false, "type": "boolean"}, "services.rsnapshot.enableManualRsnapshot": {"declarations": ["nixos/modules/services/backup/rsnapshot.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable manual usage of the rsnapshot command with this module."}, "loc": ["services", "rsnapshot", "enableManualRsnapshot"], "readOnly": false, "type": "boolean"}, "services.rsnapshot.extraConfig": {"declarations": ["nixos/modules/services/backup/rsnapshot.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "rsnapshot configuration option in addition to the defaults from\nrsnapshot and this module.\n\nNote that tabs are required to separate option arguments, and\ndirectory names require trailing slashes.\n\nThe \"extra\" in the option name might be a little misleading right\nnow, as it is required to get a functional configuration.\n"}, "example": {"_type": "literalExpression", "text": "''\n  retains\thourly\t24\n  retain\tdaily\t365\n  backup\t/home/\tlocalhost/\n''"}, "loc": ["services", "rsnapshot", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.rspamd.debug": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the rspamd daemon in debug mode."}, "loc": ["services", "rspamd", "debug"], "readOnly": false, "type": "boolean"}, "services.rspamd.enable": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable rspamd, the Rapid spam filtering system."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "rspamd", "enable"], "readOnly": false, "type": "boolean"}, "services.rspamd.extraConfig": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to add at the end of the rspamd configuration\nfile.\n"}, "loc": ["services", "rspamd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.rspamd.group": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "\"rspamd\""}, "description": {"_type": "mdDoc", "text": "Group to use when no root privileges are required.\n"}, "loc": ["services", "rspamd", "group"], "readOnly": false, "type": "string"}, "services.rspamd.localLuaRules": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path of file to link to {file}`/etc/rspamd/rspamd.local.lua` for local\nrules written in Lua\n"}, "loc": ["services", "rspamd", "localLuaRules"], "readOnly": false, "type": "null or path"}, "services.rspamd.locals": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Local configuration files, written into {file}`/etc/rspamd/local.d/{name}`.\n"}, "example": {"_type": "literalExpression", "text": "{ \"redis.conf\".source = \"/nix/store/.../etc/dir/redis.conf\";\n  \"arc.conf\".text = \"allow_envfrom_empty = true;\";\n}\n"}, "loc": ["services", "rspamd", "locals"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.rspamd.locals.<name>.enable": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether this file locals should be generated.  This\noption allows specific locals files to be disabled.\n"}, "loc": ["services", "rspamd", "locals", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.rspamd.locals.<name>.source": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "description": {"_type": "mdDoc", "text": "Path of the source file."}, "loc": ["services", "rspamd", "locals", "<name>", "source"], "readOnly": false, "type": "path"}, "services.rspamd.locals.<name>.text": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Text of the file."}, "loc": ["services", "rspamd", "locals", "<name>", "text"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.rspamd.overrides": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Overridden configuration files, written into {file}`/etc/rspamd/override.d/{name}`.\n"}, "example": {"_type": "literalExpression", "text": "{ \"redis.conf\".source = \"/nix/store/.../etc/dir/redis.conf\";\n  \"arc.conf\".text = \"allow_envfrom_empty = true;\";\n}\n"}, "loc": ["services", "rspamd", "overrides"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.rspamd.overrides.<name>.enable": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether this file overrides should be generated.  This\noption allows specific overrides files to be disabled.\n"}, "loc": ["services", "rspamd", "overrides", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.rspamd.overrides.<name>.source": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "description": {"_type": "mdDoc", "text": "Path of the source file."}, "loc": ["services", "rspamd", "overrides", "<name>", "source"], "readOnly": false, "type": "path"}, "services.rspamd.overrides.<name>.text": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Text of the file."}, "loc": ["services", "rspamd", "overrides", "<name>", "text"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.rspamd.postfix.config": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "{\n  non_smtpd_milters = [\n    \"unix:/run/rspamd/rspamd-milter.sock\"\n  ];\n  smtpd_milters = [\n    \"unix:/run/rspamd/rspamd-milter.sock\"\n  ];\n}"}, "description": {"_type": "mdDoc", "text": "Addon to postfix configuration\n"}, "loc": ["services", "rspamd", "postfix", "config"], "readOnly": false, "type": "attribute set of (boolean or string or list of string)"}, "services.rspamd.postfix.enable": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Add rspamd milter to postfix main.conf"}, "loc": ["services", "rspamd", "postfix", "enable"], "readOnly": false, "type": "boolean"}, "services.rspamd.user": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "\"rspamd\""}, "description": {"_type": "mdDoc", "text": "User to use when no root privileges are required.\n"}, "loc": ["services", "rspamd", "user"], "readOnly": false, "type": "string"}, "services.rspamd.workers": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "{\n  controller = { };\n  normal = { };\n}"}, "description": {"_type": "mdDoc", "text": "Attribute set of workers to start.\n"}, "example": {"_type": "literalExpression", "text": "{\n  normal = {\n    includes = [ \"$CONFDIR/worker-normal.inc\" ];\n    bindSockets = [{\n      socket = \"/run/rspamd/rspamd.sock\";\n      mode = \"0660\";\n      owner = \"${config.services.rspamd.user}\";\n      group = \"${config.services.rspamd.group}\";\n    }];\n  };\n  controller = {\n    includes = [ \"$CONFDIR/worker-controller.inc\" ];\n    bindSockets = [ \"[::1]:11334\" ];\n  };\n}\n"}, "loc": ["services", "rspamd", "workers"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.rspamd.workers.<name>.bindSockets": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of sockets to listen, in format acceptable by rspamd\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    mode = \"0666\";\n    owner = \"rspamd\";\n    socket = \"/run/rspamd.sock\";\n  }\n  \"*:11333\"\n]"}, "loc": ["services", "rspamd", "workers", "<name>", "bindSockets"], "readOnly": false, "type": "list of (string or (submodule))"}, "services.rspamd.workers.<name>.count": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of worker instances to run\n"}, "loc": ["services", "rspamd", "workers", "<name>", "count"], "readOnly": false, "type": "null or signed integer"}, "services.rspamd.workers.<name>.enable": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to run the rspamd worker."}, "loc": ["services", "rspamd", "workers", "<name>", "enable"], "readOnly": false, "type": "null or boolean"}, "services.rspamd.workers.<name>.extraConfig": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional entries to put verbatim into worker section of rspamd config file."}, "loc": ["services", "rspamd", "workers", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.rspamd.workers.<name>.includes": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of files to include in configuration\n"}, "loc": ["services", "rspamd", "workers", "<name>", "includes"], "readOnly": false, "type": "list of string"}, "services.rspamd.workers.<name>.name": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Name of the worker"}, "loc": ["services", "rspamd", "workers", "<name>", "name"], "readOnly": false, "type": "null or string"}, "services.rspamd.workers.<name>.type": {"declarations": ["nixos/modules/services/mail/rspamd.nix"], "description": {"_type": "mdDoc", "text": "The type of this worker. The type `proxy` is\ndeprecated and only kept for backwards compatibility and should be\nreplaced with `rspamd_proxy`.\n"}, "loc": ["services", "rspamd", "workers", "<name>", "type"], "readOnly": false, "type": "null or one of \"normal\", \"controller\", \"fuzzy\", \"rspamd_proxy\", \"lua\", \"proxy\""}, "services.rss-bridge.dataDir": {"declarations": ["nixos/modules/services/web-apps/rss-bridge.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/rss-bridge\""}, "description": {"_type": "mdDoc", "text": "Location in which cache directory will be created.\nYou can put `config.ini.php` in here.\n"}, "loc": ["services", "rss-bridge", "dataDir"], "readOnly": false, "type": "string"}, "services.rss-bridge.enable": {"declarations": ["nixos/modules/services/web-apps/rss-bridge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable rss-bridge."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "rss-bridge", "enable"], "readOnly": false, "type": "boolean"}, "services.rss-bridge.group": {"declarations": ["nixos/modules/services/web-apps/rss-bridge.nix"], "default": {"_type": "literalExpression", "text": "\"nginx\""}, "description": {"_type": "mdDoc", "text": "Group under which the web-application run.\n"}, "loc": ["services", "rss-bridge", "group"], "readOnly": false, "type": "string"}, "services.rss-bridge.pool": {"declarations": ["nixos/modules/services/web-apps/rss-bridge.nix"], "default": {"_type": "literalExpression", "text": "\"rss-bridge\""}, "description": {"_type": "mdDoc", "text": "Name of existing phpfpm pool that is used to run web-application.\nIf not specified a pool will be created automatically with\ndefault values.\n"}, "loc": ["services", "rss-bridge", "pool"], "readOnly": false, "type": "string"}, "services.rss-bridge.user": {"declarations": ["nixos/modules/services/web-apps/rss-bridge.nix"], "default": {"_type": "literalExpression", "text": "\"nginx\""}, "description": {"_type": "mdDoc", "text": "User account under which both the service and the web-application run.\n"}, "loc": ["services", "rss-bridge", "user"], "readOnly": false, "type": "string"}, "services.rss-bridge.virtualHost": {"declarations": ["nixos/modules/services/web-apps/rss-bridge.nix"], "default": {"_type": "literalExpression", "text": "\"rss-bridge\""}, "description": {"_type": "mdDoc", "text": "Name of the nginx virtualhost to use and setup. If null, do not setup any virtualhost.\n"}, "loc": ["services", "rss-bridge", "virtualHost"], "readOnly": false, "type": "null or string"}, "services.rss-bridge.whitelist": {"declarations": ["nixos/modules/services/web-apps/rss-bridge.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of bridges to be whitelisted.\nIf the list is empty, rss-bridge will use whitelist.default.txt.\nUse `[ \"*\" ]` to whitelist all.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"Facebook\"\n  \"Instagram\"\n  \"Twitter\"\n]\n"}, "loc": ["services", "rss-bridge", "whitelist"], "readOnly": false, "type": "list of string"}, "services.rss2email.config": {"declarations": ["nixos/modules/services/mail/rss2email.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The configuration to give rss2email.\n\nDefault will use system-wide `sendmail` to send the\nemail. This is rss2email's default when running\n`r2e new`.\n\nThis set contains key-value associations that will be set in the\n`[DEFAULT]` block along with the\n`to` parameter.\n\nSee `man r2e` for more information on which\nparameters are accepted.\n"}, "loc": ["services", "rss2email", "config"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.rss2email.enable": {"declarations": ["nixos/modules/services/mail/rss2email.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable rss2email."}, "loc": ["services", "rss2email", "enable"], "readOnly": false, "type": "boolean"}, "services.rss2email.feeds": {"declarations": ["nixos/modules/services/mail/rss2email.nix"], "description": {"_type": "mdDoc", "text": "The feeds to watch."}, "loc": ["services", "rss2email", "feeds"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.rss2email.feeds.<name>.to": {"declarations": ["nixos/modules/services/mail/rss2email.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Email address to which to send feed items.\n\nIf `null`, this will not be set in the\nconfiguration file, and rss2email will make it default to\n`rss2email.to`.\n"}, "loc": ["services", "rss2email", "feeds", "<name>", "to"], "readOnly": false, "type": "null or string"}, "services.rss2email.feeds.<name>.url": {"declarations": ["nixos/modules/services/mail/rss2email.nix"], "description": {"_type": "mdDoc", "text": "The URL at which to fetch the feed."}, "loc": ["services", "rss2email", "feeds", "<name>", "url"], "readOnly": false, "type": "string"}, "services.rss2email.interval": {"declarations": ["nixos/modules/services/mail/rss2email.nix"], "default": {"_type": "literalExpression", "text": "\"12h\""}, "description": {"_type": "mdDoc", "text": "How often to check the feeds, in systemd interval format"}, "loc": ["services", "rss2email", "interval"], "readOnly": false, "type": "string"}, "services.rss2email.to": {"declarations": ["nixos/modules/services/mail/rss2email.nix"], "description": {"_type": "mdDoc", "text": "Mail address to which to send emails"}, "loc": ["services", "rss2email", "to"], "readOnly": false, "type": "string"}, "services.rstudio-server.enable": {"declarations": ["nixos/modules/services/development/rstudio-server/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable RStudio server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "rstudio-server", "enable"], "readOnly": false, "type": "boolean"}, "services.rstudio-server.listenAddr": {"declarations": ["nixos/modules/services/development/rstudio-server/default.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address to listen on (www-address in rserver.conf).\n"}, "loc": ["services", "rstudio-server", "listenAddr"], "readOnly": false, "type": "string"}, "services.rstudio-server.package": {"declarations": ["nixos/modules/services/development/rstudio-server/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.rstudio-server"}, "description": {"_type": "mdDoc", "text": "Rstudio server package to use. Can be set to rstudioServerWrapper to provide packages.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.rstudioServerWrapper.override { packages = [ pkgs.rPackages.ggplot2 ]; }"}, "loc": ["services", "rstudio-server", "package"], "readOnly": false, "type": "package"}, "services.rstudio-server.rserverExtraConfig": {"declarations": ["nixos/modules/services/development/rstudio-server/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra contents for rserver.conf.\n"}, "loc": ["services", "rstudio-server", "rserverExtraConfig"], "readOnly": false, "type": "string"}, "services.rstudio-server.rsessionExtraConfig": {"declarations": ["nixos/modules/services/development/rstudio-server/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra contents for resssion.conf.\n"}, "loc": ["services", "rstudio-server", "rsessionExtraConfig"], "readOnly": false, "type": "string"}, "services.rstudio-server.serverWorkingDir": {"declarations": ["nixos/modules/services/development/rstudio-server/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/rstudio-server\""}, "description": {"_type": "mdDoc", "text": "Default working directory for server (server-working-dir in rserver.conf).\n"}, "loc": ["services", "rstudio-server", "serverWorkingDir"], "readOnly": false, "type": "string"}, "services.rsyncd.enable": {"declarations": ["nixos/modules/services/network-filesystems/rsyncd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the rsync daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "rsyncd", "enable"], "readOnly": false, "type": "boolean"}, "services.rsyncd.port": {"declarations": ["nixos/modules/services/network-filesystems/rsyncd.nix"], "default": {"_type": "literalExpression", "text": "873"}, "description": {"_type": "mdDoc", "text": "TCP port the daemon will listen on."}, "loc": ["services", "rsyncd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.rsyncd.settings": {"declarations": ["nixos/modules/services/network-filesystems/rsyncd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for rsyncd. See\n{manpage}`rsyncd.conf(5)`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  cvs = {\n    \"auth users\" = [\n      \"tridge\"\n      \"susan\"\n    ];\n    comment = \"CVS repository (requires authentication)\";\n    path = \"/data/cvs\";\n    \"secrets file\" = \"/etc/rsyncd.secrets\";\n  };\n  ftp = {\n    comment = \"whole ftp area\";\n    path = \"/var/ftp/./pub\";\n  };\n  global = {\n    gid = \"nobody\";\n    \"max connections\" = 4;\n    uid = \"nobody\";\n    \"use chroot\" = true;\n  };\n}"}, "loc": ["services", "rsyncd", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.rsyncd.socketActivated": {"declarations": ["nixos/modules/services/network-filesystems/rsyncd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled Rsync will be socket-activated rather than run persistently."}, "loc": ["services", "rsyncd", "socketActivated"], "readOnly": false, "type": "boolean"}, "services.rsyslogd.defaultConfig": {"declarations": ["nixos/modules/services/logging/rsyslogd.nix"], "default": {"_type": "literalExpression", "text": "''\n  # \"local1\" is used for dhcpd messages.\n  local1.*                     -/var/log/dhcpd\n  \n  mail.*                       -/var/log/mail\n  \n  *.=warning;*.=err            -/var/log/warn\n  *.crit                        /var/log/warn\n  \n  *.*;mail.none;local1.none    -/var/log/messages\n''"}, "description": {"_type": "mdDoc", "text": "The default {file}`syslog.conf` file configures a\nfairly standard setup of log files, which can be extended by\nmeans of {var}`extraConfig`.\n"}, "loc": ["services", "rsyslogd", "defaultConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.rsyslogd.enable": {"declarations": ["nixos/modules/services/logging/rsyslogd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable syslogd.  Note that systemd also logs\nsyslog messages, so you normally don't need to run syslogd.\n"}, "loc": ["services", "rsyslogd", "enable"], "readOnly": false, "type": "boolean"}, "services.rsyslogd.extraConfig": {"declarations": ["nixos/modules/services/logging/rsyslogd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional text appended to {file}`syslog.conf`,\ni.e. the contents of {var}`defaultConfig`.\n"}, "example": {"_type": "literalExpression", "text": "\"news.* -/var/log/news\""}, "loc": ["services", "rsyslogd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.rsyslogd.extraParams": {"declarations": ["nixos/modules/services/logging/rsyslogd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional parameters passed to {command}`rsyslogd`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-m 0\"\n]"}, "loc": ["services", "rsyslogd", "extraParams"], "readOnly": false, "type": "list of string"}, "services.rtorrent.configText": {"declarations": ["nixos/modules/services/torrent/rtorrent.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The content of {file}`rtorrent.rc`. The [modernized configuration template](https://rtorrent-docs.readthedocs.io/en/latest/cookbook.html#modernized-configuration-template) with the values specified in this module will be prepended using mkBefore. You can use mkForce to overwrite the config completely.\n"}, "loc": ["services", "rtorrent", "configText"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.rtorrent.dataDir": {"declarations": ["nixos/modules/services/torrent/rtorrent.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/rtorrent\""}, "description": {"_type": "mdDoc", "text": "The directory where rtorrent stores its data files.\n"}, "loc": ["services", "rtorrent", "dataDir"], "readOnly": false, "type": "string"}, "services.rtorrent.dataPermissions": {"declarations": ["nixos/modules/services/torrent/rtorrent.nix"], "default": {"_type": "literalExpression", "text": "\"0750\""}, "description": {"_type": "mdDoc", "text": "Unix Permissions in octal on the rtorrent directory.\n"}, "example": {"_type": "literalExpression", "text": "\"0755\""}, "loc": ["services", "rtorrent", "dataPermissions"], "readOnly": false, "type": "string"}, "services.rtorrent.downloadDir": {"declarations": ["nixos/modules/services/torrent/rtorrent.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.rtorrent.dataDir}/download\""}, "description": {"_type": "mdDoc", "text": "Where to put downloaded files.\n"}, "loc": ["services", "rtorrent", "downloadDir"], "readOnly": false, "type": "string"}, "services.rtorrent.enable": {"declarations": ["nixos/modules/services/torrent/rtorrent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable rtorrent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "rtorrent", "enable"], "readOnly": false, "type": "boolean"}, "services.rtorrent.group": {"declarations": ["nixos/modules/services/torrent/rtorrent.nix"], "default": {"_type": "literalExpression", "text": "\"rtorrent\""}, "description": {"_type": "mdDoc", "text": "Group under which rtorrent runs.\n"}, "loc": ["services", "rtorrent", "group"], "readOnly": false, "type": "string"}, "services.rtorrent.openFirewall": {"declarations": ["nixos/modules/services/torrent/rtorrent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the firewall for the port in {option}`services.rtorrent.port`.\n"}, "loc": ["services", "rtorrent", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.rtorrent.package": {"declarations": ["nixos/modules/services/torrent/rtorrent.nix"], "default": {"_type": "literalExpression", "text": "pkgs.rtorrent"}, "description": {"_type": "mdDoc", "text": "The rtorrent package to use.\n"}, "loc": ["services", "rtorrent", "package"], "readOnly": false, "type": "package"}, "services.rtorrent.port": {"declarations": ["nixos/modules/services/torrent/rtorrent.nix"], "default": {"_type": "literalExpression", "text": "50000"}, "description": {"_type": "mdDoc", "text": "The rtorrent port.\n"}, "loc": ["services", "rtorrent", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.rtorrent.rpcSocket": {"declarations": ["nixos/modules/services/torrent/rtorrent.nix"], "default": {"_type": "literalExpression", "text": "\"/run/rtorrent/rpc.sock\""}, "description": {"_type": "mdDoc", "text": "RPC socket path.\n"}, "loc": ["services", "rtorrent", "rpcSocket"], "readOnly": true, "type": "string"}, "services.rtorrent.user": {"declarations": ["nixos/modules/services/torrent/rtorrent.nix"], "default": {"_type": "literalExpression", "text": "\"rtorrent\""}, "description": {"_type": "mdDoc", "text": "User account under which rtorrent runs.\n"}, "loc": ["services", "rtorrent", "user"], "readOnly": false, "type": "string"}, "services.sabnzbd.configFile": {"declarations": ["nixos/modules/services/networking/sabnzbd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/sabnzbd/sabnzbd.ini\""}, "description": {"_type": "mdDoc", "text": "Path to config file."}, "loc": ["services", "sabnzbd", "configFile"], "readOnly": false, "type": "path"}, "services.sabnzbd.enable": {"declarations": ["nixos/modules/services/networking/sabnzbd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the sabnzbd server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sabnzbd", "enable"], "readOnly": false, "type": "boolean"}, "services.sabnzbd.group": {"declarations": ["nixos/modules/services/networking/sabnzbd.nix"], "default": {"_type": "literalExpression", "text": "\"sabnzbd\""}, "description": {"_type": "mdDoc", "text": "Group to run the service as"}, "loc": ["services", "sabnzbd", "group"], "readOnly": false, "type": "string"}, "services.sabnzbd.package": {"declarations": ["nixos/modules/services/networking/sabnzbd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.sabnzbd"}, "description": {"_type": "mdDoc", "text": "The sabnzbd executable package run by the service."}, "loc": ["services", "sabnzbd", "package"], "readOnly": false, "type": "package"}, "services.sabnzbd.user": {"declarations": ["nixos/modules/services/networking/sabnzbd.nix"], "default": {"_type": "literalExpression", "text": "\"sabnzbd\""}, "description": {"_type": "mdDoc", "text": "User to run the service as"}, "loc": ["services", "sabnzbd", "user"], "readOnly": false, "type": "string"}, "services.safeeyes.enable": {"declarations": ["nixos/modules/services/misc/safeeyes.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the safeeyes OSGi service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "safeeyes", "enable"], "readOnly": false, "type": "boolean"}, "services.salt.master.configuration": {"declarations": ["nixos/modules/services/admin/salt/master.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Salt master configuration as Nix attribute set."}, "loc": ["services", "salt", "master", "configuration"], "readOnly": false, "type": "attribute set"}, "services.salt.master.enable": {"declarations": ["nixos/modules/services/admin/salt/master.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Salt master service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "salt", "master", "enable"], "readOnly": false, "type": "boolean"}, "services.salt.minion.configuration": {"declarations": ["nixos/modules/services/admin/salt/minion.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Salt minion configuration as Nix attribute set.\nSee <https://docs.saltstack.com/en/latest/ref/configuration/minion.html>\nfor details.\n"}, "loc": ["services", "salt", "minion", "configuration"], "readOnly": false, "type": "attribute set"}, "services.salt.minion.enable": {"declarations": ["nixos/modules/services/admin/salt/minion.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Salt minion service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "salt", "minion", "enable"], "readOnly": false, "type": "boolean"}, "services.samba-wsdd.discovery": {"declarations": ["nixos/modules/services/network-filesystems/samba-wsdd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable discovery operation mode."}, "loc": ["services", "samba-wsdd", "discovery"], "readOnly": false, "type": "boolean"}, "services.samba-wsdd.domain": {"declarations": ["nixos/modules/services/network-filesystems/samba-wsdd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set domain name (disables workgroup)."}, "loc": ["services", "samba-wsdd", "domain"], "readOnly": false, "type": "null or string"}, "services.samba-wsdd.enable": {"declarations": ["nixos/modules/services/network-filesystems/samba-wsdd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Web Services Dynamic Discovery host daemon. This enables (Samba) hosts, like your local NAS device,\nto be found by Web Service Discovery Clients like Windows.\n\n::: {.note}\nIf you use the firewall consider adding the following:\n\n    networking.firewall.allowedTCPPorts = [ 5357 ];\n    networking.firewall.allowedUDPPorts = [ 3702 ];\n:::\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "samba-wsdd", "enable"], "readOnly": false, "type": "boolean"}, "services.samba-wsdd.extraOptions": {"declarations": ["nixos/modules/services/network-filesystems/samba-wsdd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"--shortlog\"\n]"}, "description": {"_type": "mdDoc", "text": "Additional wsdd options."}, "example": {"_type": "literalExpression", "text": "[\n  \"--verbose\"\n  \"--no-http\"\n  \"--ipv4only\"\n  \"--no-host\"\n]"}, "loc": ["services", "samba-wsdd", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.samba-wsdd.hoplimit": {"declarations": ["nixos/modules/services/network-filesystems/samba-wsdd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hop limit for multicast packets (default = 1)."}, "example": {"_type": "literalExpression", "text": "2"}, "loc": ["services", "samba-wsdd", "hoplimit"], "readOnly": false, "type": "null or signed integer"}, "services.samba-wsdd.hostname": {"declarations": ["nixos/modules/services/network-filesystems/samba-wsdd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Override (NetBIOS) hostname to be used (default hostname)."}, "example": {"_type": "literalExpression", "text": "\"FILESERVER\""}, "loc": ["services", "samba-wsdd", "hostname"], "readOnly": false, "type": "null or string"}, "services.samba-wsdd.interface": {"declarations": ["nixos/modules/services/network-filesystems/samba-wsdd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Interface or address to use."}, "example": {"_type": "literalExpression", "text": "\"eth0\""}, "loc": ["services", "samba-wsdd", "interface"], "readOnly": false, "type": "null or string"}, "services.samba-wsdd.listen": {"declarations": ["nixos/modules/services/network-filesystems/samba-wsdd.nix"], "default": {"_type": "literalExpression", "text": "\"/run/wsdd/wsdd.sock\""}, "description": {"_type": "mdDoc", "text": "Listen on path or localhost port in discovery mode."}, "loc": ["services", "samba-wsdd", "listen"], "readOnly": false, "type": "string"}, "services.samba-wsdd.workgroup": {"declarations": ["nixos/modules/services/network-filesystems/samba-wsdd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set workgroup name (default WORKGROUP)."}, "example": {"_type": "literalExpression", "text": "\"HOME\""}, "loc": ["services", "samba-wsdd", "workgroup"], "readOnly": false, "type": "null or string"}, "services.samba.configText": {"declarations": ["nixos/modules/services/network-filesystems/samba.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Verbatim contents of smb.conf. If null (default), use the\nautogenerated file from NixOS instead.\n"}, "loc": ["services", "samba", "configText"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.samba.enable": {"declarations": ["nixos/modules/services/network-filesystems/samba.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Samba, which provides file and print\nservices to Windows clients through the SMB/CIFS protocol.\n\n::: {.note}\nIf you use the firewall consider adding the following:\n\n    services.samba.openFirewall = true;\n:::\n"}, "loc": ["services", "samba", "enable"], "readOnly": false, "type": "boolean"}, "services.samba.enableNmbd": {"declarations": ["nixos/modules/services/network-filesystems/samba.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable Samba's nmbd, which replies to NetBIOS over IP name\nservice requests. It also participates in the browsing protocols\nwhich make up the Windows \"Network Neighborhood\" view.\n"}, "loc": ["services", "samba", "enableNmbd"], "readOnly": false, "type": "boolean"}, "services.samba.enableWinbindd": {"declarations": ["nixos/modules/services/network-filesystems/samba.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable Samba's winbindd, which provides a number of services\nto the Name Service Switch capability found in most modern C libraries,\nto arbitrary applications via PAM and ntlm_auth and to Samba itself.\n"}, "loc": ["services", "samba", "enableWinbindd"], "readOnly": false, "type": "boolean"}, "services.samba.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/samba.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional global section and extra section lines go in here.\n"}, "example": {"_type": "literalExpression", "text": "''\n  guest account = nobody\n  map to guest = bad user\n''"}, "loc": ["services", "samba", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.samba.invalidUsers": {"declarations": ["nixos/modules/services/network-filesystems/samba.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"root\"\n]"}, "description": {"_type": "mdDoc", "text": "List of users who are denied to login via Samba.\n"}, "loc": ["services", "samba", "invalidUsers"], "readOnly": false, "type": "list of string"}, "services.samba.nsswins": {"declarations": ["nixos/modules/services/network-filesystems/samba.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the WINS NSS (Name Service Switch) plug-in.\nEnabling it allows applications to resolve WINS/NetBIOS names (a.k.a.\nWindows machine names) by transparently querying the winbindd daemon.\n"}, "loc": ["services", "samba", "nsswins"], "readOnly": false, "type": "boolean"}, "services.samba.openFirewall": {"declarations": ["nixos/modules/services/network-filesystems/samba.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to automatically open the necessary ports in the firewall.\n"}, "loc": ["services", "samba", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.samba.package": {"declarations": ["nixos/modules/services/network-filesystems/samba.nix"], "default": {"_type": "literalExpression", "text": "pkgs.samba"}, "description": {"_type": "mdDoc", "text": "Defines which package should be used for the samba server.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.samba4Full"}, "loc": ["services", "samba", "package"], "readOnly": false, "type": "package"}, "services.samba.securityType": {"declarations": ["nixos/modules/services/network-filesystems/samba.nix"], "default": {"_type": "literalExpression", "text": "\"user\""}, "description": {"_type": "mdDoc", "text": "Samba security type"}, "loc": ["services", "samba", "securityType"], "readOnly": false, "type": "string"}, "services.samba.shares": {"declarations": ["nixos/modules/services/network-filesystems/samba.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set describing shared resources.\nSee {command}`man smb.conf` for options.\n"}, "example": {"_type": "literalExpression", "text": "{ public =\n  { path = \"/srv/public\";\n    \"read only\" = true;\n    browseable = \"yes\";\n    \"guest ok\" = \"yes\";\n    comment = \"Public samba share.\";\n  };\n}\n"}, "loc": ["services", "samba", "shares"], "readOnly": false, "type": "attribute set of attribute set of unspecified value"}, "services.saned.enable": {"declarations": ["nixos/modules/services/hardware/sane.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable saned network daemon for remote connection to scanners.\n\nsaned would be run from `scanner` user; to allow\naccess to hardware that doesn't have `scanner` group\nyou should add needed groups to this user.\n"}, "loc": ["services", "saned", "enable"], "readOnly": false, "type": "boolean"}, "services.saned.extraConfig": {"declarations": ["nixos/modules/services/hardware/sane.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra saned configuration lines.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.0.0/24\""}, "loc": ["services", "saned", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.sanoid.datasets": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Datasets to snapshot."}, "loc": ["services", "sanoid", "datasets"], "readOnly": false, "type": "attribute set of (dataset/template options)"}, "services.sanoid.datasets.<name>.autoprune": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to automatically prune old snapshots."}, "loc": ["services", "sanoid", "datasets", "<name>", "autoprune"], "readOnly": false, "type": "null or boolean"}, "services.sanoid.datasets.<name>.autosnap": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to automatically take snapshots."}, "loc": ["services", "sanoid", "datasets", "<name>", "autosnap"], "readOnly": false, "type": "null or boolean"}, "services.sanoid.datasets.<name>.daily": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of daily snapshots."}, "loc": ["services", "sanoid", "datasets", "<name>", "daily"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "services.sanoid.datasets.<name>.hourly": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of hourly snapshots."}, "loc": ["services", "sanoid", "datasets", "<name>", "hourly"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "services.sanoid.datasets.<name>.monthly": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of monthly snapshots."}, "loc": ["services", "sanoid", "datasets", "<name>", "monthly"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "services.sanoid.datasets.<name>.processChildrenOnly": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to only snapshot child datasets if recursing."}, "loc": ["services", "sanoid", "datasets", "<name>", "processChildrenOnly"], "readOnly": false, "type": "boolean"}, "services.sanoid.datasets.<name>.process_children_only": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to only snapshot child datasets if recursing."}, "loc": ["services", "sanoid", "datasets", "<name>", "process_children_only"], "readOnly": false, "type": "boolean"}, "services.sanoid.datasets.<name>.recursive": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to recursively snapshot dataset children.\nYou can also set this to `\"zfs\"` to handle datasets\nrecursively in an atomic way without the possibility to\noverride settings for child datasets.\n"}, "loc": ["services", "sanoid", "datasets", "<name>", "recursive"], "readOnly": false, "type": "boolean or value \"zfs\" (singular enum)"}, "services.sanoid.datasets.<name>.useTemplate": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Names of the templates to use for this dataset."}, "loc": ["services", "sanoid", "datasets", "<name>", "useTemplate"], "readOnly": false, "type": "list of configured template name"}, "services.sanoid.datasets.<name>.use_template": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Names of the templates to use for this dataset."}, "loc": ["services", "sanoid", "datasets", "<name>", "use_template"], "readOnly": false, "type": "list of configured template name"}, "services.sanoid.datasets.<name>.yearly": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of yearly snapshots."}, "loc": ["services", "sanoid", "datasets", "<name>", "yearly"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "services.sanoid.enable": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Sanoid ZFS snapshotting service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sanoid", "enable"], "readOnly": false, "type": "boolean"}, "services.sanoid.extraArgs": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra arguments to pass to sanoid. See\n<https://github.com/jimsalterjrs/sanoid/#sanoid-command-line-options>\nfor allowed options.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--verbose\"\n  \"--readonly\"\n  \"--debug\"\n]"}, "loc": ["services", "sanoid", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sanoid.interval": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "\"hourly\""}, "description": {"_type": "mdDoc", "text": "Run sanoid at this interval. The default is to run hourly.\n\nThe format is described in\n{manpage}`systemd.time(7)`.\n"}, "example": {"_type": "literalExpression", "text": "\"daily\""}, "loc": ["services", "sanoid", "interval"], "readOnly": false, "type": "string"}, "services.sanoid.package": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "pkgs.sanoid"}, "description": {"_type": "mdDoc", "text": "The sanoid package to use."}, "loc": ["services", "sanoid", "package"], "readOnly": false, "type": "package"}, "services.sanoid.settings": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "description": {"_type": "mdDoc", "text": "Free-form settings written directly to the config file. See\n<https://github.com/jimsalterjrs/sanoid/blob/master/sanoid.defaults.conf>\nfor allowed values.\n"}, "loc": ["services", "sanoid", "settings"], "readOnly": false, "type": "attribute set of dataset/template options"}, "services.sanoid.templates": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Templates for datasets."}, "loc": ["services", "sanoid", "templates"], "readOnly": false, "type": "attribute set of (dataset/template options)"}, "services.sanoid.templates.<name>.autoprune": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to automatically prune old snapshots."}, "loc": ["services", "sanoid", "templates", "<name>", "autoprune"], "readOnly": false, "type": "null or boolean"}, "services.sanoid.templates.<name>.autosnap": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to automatically take snapshots."}, "loc": ["services", "sanoid", "templates", "<name>", "autosnap"], "readOnly": false, "type": "null or boolean"}, "services.sanoid.templates.<name>.daily": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of daily snapshots."}, "loc": ["services", "sanoid", "templates", "<name>", "daily"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "services.sanoid.templates.<name>.hourly": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of hourly snapshots."}, "loc": ["services", "sanoid", "templates", "<name>", "hourly"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "services.sanoid.templates.<name>.monthly": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of monthly snapshots."}, "loc": ["services", "sanoid", "templates", "<name>", "monthly"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "services.sanoid.templates.<name>.yearly": {"declarations": ["nixos/modules/services/backup/sanoid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of yearly snapshots."}, "loc": ["services", "sanoid", "templates", "<name>", "yearly"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "services.saslauthd.config": {"declarations": ["nixos/modules/services/system/saslauthd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration to use for Cyrus SASL authentication daemon."}, "loc": ["services", "saslauthd", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.saslauthd.enable": {"declarations": ["nixos/modules/services/system/saslauthd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable saslauthd, the Cyrus SASL authentication daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "saslauthd", "enable"], "readOnly": false, "type": "boolean"}, "services.saslauthd.mechanism": {"declarations": ["nixos/modules/services/system/saslauthd.nix"], "default": {"_type": "literalExpression", "text": "\"pam\""}, "description": {"_type": "mdDoc", "text": "Auth mechanism to use"}, "loc": ["services", "saslauthd", "mechanism"], "readOnly": false, "type": "string"}, "services.saslauthd.package": {"declarations": ["nixos/modules/services/system/saslauthd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.cyrus_sasl.bin"}, "description": {"_type": "mdDoc", "text": "Cyrus SASL package to use."}, "loc": ["services", "saslauthd", "package"], "readOnly": false, "type": "package"}, "services.schleuder.enable": {"declarations": ["nixos/modules/services/mail/schleuder.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Schleuder secure remailer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "schleuder", "enable"], "readOnly": false, "type": "boolean"}, "services.schleuder.enablePostfix": {"declarations": ["nixos/modules/services/mail/schleuder.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic postfix integration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "schleuder", "enablePostfix"], "readOnly": false, "type": "boolean"}, "services.schleuder.extraSettingsFile": {"declarations": ["nixos/modules/services/mail/schleuder.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "YAML file to merge into the schleuder config at runtime. This can be used for secrets such as API keys."}, "loc": ["services", "schleuder", "extraSettingsFile"], "readOnly": false, "type": "null or path"}, "services.schleuder.listDefaults": {"declarations": ["nixos/modules/services/mail/schleuder.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Default settings for lists (list-defaults.yml).\n\nCheck the [example configuration](https://0xacab.org/schleuder/schleuder/-/blob/master/etc/list-defaults.yml) for possible values.\n"}, "loc": ["services", "schleuder", "listDefaults"], "readOnly": false, "type": "YAML value"}, "services.schleuder.lists": {"declarations": ["nixos/modules/services/mail/schleuder.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of list addresses that should be handled by Schleuder.\n\nNote that this is only handled by the postfix integration, and\nthe setup of the lists, their members and their keys has to be\nperformed separately via schleuder's API, using a tool such as\nschleuder-cli.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"widget-team@example.com\"\n  \"security@example.com\"\n]"}, "loc": ["services", "schleuder", "lists"], "readOnly": false, "type": "list of string"}, "services.schleuder.settings": {"declarations": ["nixos/modules/services/mail/schleuder.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings for schleuder.yml.\n\nCheck the [example configuration](https://0xacab.org/schleuder/schleuder/blob/master/etc/schleuder.yml) for possible values.\n"}, "loc": ["services", "schleuder", "settings"], "readOnly": false, "type": "YAML value"}, "services.schleuder.settings.keyserver": {"declarations": ["nixos/modules/services/mail/schleuder.nix"], "default": {"_type": "literalExpression", "text": "\"keys.openpgp.org\""}, "description": {"_type": "mdDoc", "text": "Key server from which to fetch and update keys.\n\nNote that NixOS uses a different default from upstream, since the upstream default sks-keyservers.net is deprecated.\n"}, "loc": ["services", "schleuder", "settings", "keyserver"], "readOnly": false, "type": "string"}, "services.scollector.bosunHost": {"declarations": ["nixos/modules/services/monitoring/scollector.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:8070\""}, "description": {"_type": "mdDoc", "text": "Host and port of the bosun server that will store the collected\ndata.\n"}, "loc": ["services", "scollector", "bosunHost"], "readOnly": false, "type": "string"}, "services.scollector.collectors": {"declarations": ["nixos/modules/services/monitoring/scollector.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "An attribute set mapping the frequency of collection to a list of\nbinaries that should be executed at that frequency. You can use \"0\"\nto run a binary forever.\n"}, "example": {"_type": "literalExpression", "text": "{ \"0\" = [ \"${postgresStats}/bin/collect-stats\" ]; }"}, "loc": ["services", "scollector", "collectors"], "readOnly": false, "type": "attribute set of list of path"}, "services.scollector.enable": {"declarations": ["nixos/modules/services/monitoring/scollector.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run scollector.\n"}, "loc": ["services", "scollector", "enable"], "readOnly": false, "type": "boolean"}, "services.scollector.extraConfig": {"declarations": ["nixos/modules/services/monitoring/scollector.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra scollector configuration added to the end of scollector.toml\n"}, "loc": ["services", "scollector", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.scollector.extraOpts": {"declarations": ["nixos/modules/services/monitoring/scollector.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra scollector command line options\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-d\"\n]"}, "loc": ["services", "scollector", "extraOpts"], "readOnly": false, "type": "list of string"}, "services.scollector.group": {"declarations": ["nixos/modules/services/monitoring/scollector.nix"], "default": {"_type": "literalExpression", "text": "\"scollector\""}, "description": {"_type": "mdDoc", "text": "Group account under which scollector runs.\n"}, "loc": ["services", "scollector", "group"], "readOnly": false, "type": "string"}, "services.scollector.package": {"declarations": ["nixos/modules/services/monitoring/scollector.nix"], "default": {"_type": "literalExpression", "text": "pkgs.scollector"}, "description": {"_type": "mdDoc", "text": "scollector binary to use.\n"}, "loc": ["services", "scollector", "package"], "readOnly": false, "type": "package"}, "services.scollector.user": {"declarations": ["nixos/modules/services/monitoring/scollector.nix"], "default": {"_type": "literalExpression", "text": "\"scollector\""}, "description": {"_type": "mdDoc", "text": "User account under which scollector runs.\n"}, "loc": ["services", "scollector", "user"], "readOnly": false, "type": "string"}, "services.sdrplayApi.enable": {"declarations": ["nixos/modules/services/misc/sdrplay.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the SDRplay API service and udev rules.\n\n::: {.note}\nTo enable integration with SoapySDR and GUI applications like gqrx create an overlay containing\n`soapysdr-with-plugins = super.soapysdr.override { extraPackages = [ super.soapysdrplay ]; };`\n:::\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sdrplayApi", "enable"], "readOnly": false, "type": "boolean"}, "services.seafile.adminEmail": {"declarations": ["nixos/modules/services/networking/seafile.nix"], "description": {"_type": "mdDoc", "text": "Seafile Seahub Admin Account Email.\n"}, "example": {"_type": "literalExpression", "text": "\"john@example.com\""}, "loc": ["services", "seafile", "adminEmail"], "readOnly": false, "type": "string"}, "services.seafile.ccnetSettings": {"declarations": ["nixos/modules/services/networking/seafile.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for ccnet, see\n<https://manual.seafile.com/config/ccnet-conf/>\nfor supported values.\n"}, "loc": ["services", "seafile", "ccnetSettings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.seafile.ccnetSettings.General.SERVICE_URL": {"declarations": ["nixos/modules/services/networking/seafile.nix"], "description": {"_type": "mdDoc", "text": "Seahub public URL.\n"}, "example": {"_type": "literalExpression", "text": "\"https://www.example.com\""}, "loc": ["services", "seafile", "ccnetSettings", "General", "SERVICE_URL"], "readOnly": false, "type": "string"}, "services.seafile.enable": {"declarations": ["nixos/modules/services/networking/seafile.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Seafile server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "seafile", "enable"], "readOnly": false, "type": "boolean"}, "services.seafile.initialAdminPassword": {"declarations": ["nixos/modules/services/networking/seafile.nix"], "description": {"_type": "mdDoc", "text": "Seafile Seahub Admin Account initial password.\nShould be change via Seahub web front-end.\n"}, "example": {"_type": "literalExpression", "text": "\"someStrongPass\""}, "loc": ["services", "seafile", "initialAdminPassword"], "readOnly": false, "type": "string"}, "services.seafile.seafilePackage": {"declarations": ["nixos/modules/services/networking/seafile.nix"], "default": {"_type": "literalExpression", "text": "pkgs.seafile-server"}, "description": {"_type": "mdDoc", "text": "Which package to use for the seafile server."}, "loc": ["services", "seafile", "seafilePackage"], "readOnly": false, "type": "package"}, "services.seafile.seafileSettings": {"declarations": ["nixos/modules/services/networking/seafile.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for seafile-server, see\n<https://manual.seafile.com/config/seafile-conf/>\nfor supported values.\n"}, "loc": ["services", "seafile", "seafileSettings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.seafile.seafileSettings.fileserver.host": {"declarations": ["nixos/modules/services/networking/seafile.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The binding address used by seafile fileserver.\n"}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "seafile", "seafileSettings", "fileserver", "host"], "readOnly": false, "type": "string"}, "services.seafile.seafileSettings.fileserver.port": {"declarations": ["nixos/modules/services/networking/seafile.nix"], "default": {"_type": "literalExpression", "text": "8082"}, "description": {"_type": "mdDoc", "text": "The tcp port used by seafile fileserver.\n"}, "loc": ["services", "seafile", "seafileSettings", "fileserver", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.seafile.seahubExtraConf": {"declarations": ["nixos/modules/services/networking/seafile.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config to append to `seahub_settings.py` file.\nRefer to <https://manual.seafile.com/config/seahub_settings_py/>\nfor all available options.\n"}, "loc": ["services", "seafile", "seahubExtraConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.seafile.workers": {"declarations": ["nixos/modules/services/networking/seafile.nix"], "default": {"_type": "literalExpression", "text": "4"}, "description": {"_type": "mdDoc", "text": "The number of gunicorn worker processes for handling requests.\n"}, "example": {"_type": "literalExpression", "text": "10"}, "loc": ["services", "seafile", "workers"], "readOnly": false, "type": "signed integer"}, "services.searx.enable": {"declarations": ["nixos/modules/services/networking/searx.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Searx, the meta search engine."}, "loc": ["services", "searx", "enable"], "readOnly": false, "relatedPackages": "- [`pkgs.searx`](\n    https://search.nixos.org/packages?show=searx&sort=relevance&query=searx\n  )\n", "type": "boolean"}, "services.searx.environmentFile": {"declarations": ["nixos/modules/services/networking/searx.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file (see `systemd.exec(5)`\n\"EnvironmentFile=\" section for the syntax) to define variables for\nSearx. This option can be used to safely include secret keys into the\nSearx configuration.\n"}, "loc": ["services", "searx", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.searx.package": {"declarations": ["nixos/modules/services/networking/searx.nix"], "default": {"_type": "literalExpression", "text": "pkgs.searx"}, "description": {"_type": "mdDoc", "text": "searx package to use."}, "loc": ["services", "searx", "package"], "readOnly": false, "type": "package"}, "services.searx.runInUwsgi": {"declarations": ["nixos/modules/services/networking/searx.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run searx in uWSGI as a \"vassal\", instead of using its\nbuilt-in HTTP server. This is the recommended mode for public or\nlarge instances, but is unnecessary for LAN or local-only use.\n\n::: {.warning}\nThe built-in HTTP server logs all queries by default.\n:::\n"}, "loc": ["services", "searx", "runInUwsgi"], "readOnly": false, "type": "boolean"}, "services.searx.settings": {"declarations": ["nixos/modules/services/networking/searx.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Searx settings. These will be merged with (taking precedence over)\nthe default configuration. It's also possible to refer to\nenvironment variables\n(defined in [](#opt-services.searx.environmentFile))\nusing the syntax `@VARIABLE_NAME@`.\n\n::: {.note}\nFor available settings, see the Searx\n[docs](https://searx.github.io/searx/admin/settings.html).\n:::\n"}, "example": {"_type": "literalExpression", "text": "{ server.port = 8080;\n  server.bind_address = \"0.0.0.0\";\n  server.secret_key = \"@SEARX_SECRET_KEY@\";\n\n  engines = lib.singleton\n    { name = \"wolframalpha\";\n      shortcut = \"wa\";\n      api_key = \"@WOLFRAM_API_KEY@\";\n      engine = \"wolframalpha_api\";\n    };\n}\n"}, "loc": ["services", "searx", "settings"], "readOnly": false, "type": "attribute set of (JSON value)"}, "services.searx.settingsFile": {"declarations": ["nixos/modules/services/networking/searx.nix"], "default": {"_type": "literalExpression", "text": "\"/run/searx/settings.yml\""}, "description": {"_type": "mdDoc", "text": "The path of the Searx server settings.yml file. If no file is\nspecified, a default file is used (default config file has debug mode\nenabled). Note: setting this options overrides\n[](#opt-services.searx.settings).\n\n::: {.warning}\nThis file, along with any secret key it contains, will be copied\ninto the world-readable Nix store.\n:::\n"}, "loc": ["services", "searx", "settingsFile"], "readOnly": false, "type": "path"}, "services.searx.uwsgiConfig": {"declarations": ["nixos/modules/services/networking/searx.nix"], "default": {"_type": "literalExpression", "text": "{\n  http = \":8080\";\n}"}, "description": {"_type": "mdDoc", "text": "Additional configuration of the uWSGI vassal running searx. It\nshould notably specify on which interfaces and ports the vassal\nshould listen.\n"}, "example": {"_type": "literalExpression", "text": "{\n  disable-logging = true;\n  http = \":8080\";                   # serve via HTTP...\n  socket = \"/run/searx/searx.sock\"; # ...or UNIX socket\n  chmod-socket = \"660\";             # allow the searx group to read/write to the socket\n}\n"}, "loc": ["services", "searx", "uwsgiConfig"], "readOnly": false, "type": "Json value or lambda"}, "services.self-deploy.branch": {"declarations": ["nixos/modules/services/system/self-deploy.nix"], "default": {"_type": "literalExpression", "text": "\"master\""}, "description": {"_type": "mdDoc", "text": "Branch to track\n\nTechnically speaking any ref can be specified here, as this is\npassed directly to a `git fetch`, but for the use-case of\ncontinuous deployment you're likely to want to specify a branch.\n"}, "loc": ["services", "self-deploy", "branch"], "readOnly": false, "type": "string"}, "services.self-deploy.enable": {"declarations": ["nixos/modules/services/system/self-deploy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable self-deploy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "self-deploy", "enable"], "readOnly": false, "type": "boolean"}, "services.self-deploy.nixArgs": {"declarations": ["nixos/modules/services/system/self-deploy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Arguments to `nix-build` passed as `--argstr` or `--arg` depending on\nthe type.\n"}, "loc": ["services", "self-deploy", "nixArgs"], "readOnly": false, "type": "attribute set"}, "services.self-deploy.nixAttribute": {"declarations": ["nixos/modules/services/system/self-deploy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Attribute of `nixFile` that builds the current system.\n"}, "loc": ["services", "self-deploy", "nixAttribute"], "readOnly": false, "type": "null or string"}, "services.self-deploy.nixFile": {"declarations": ["nixos/modules/services/system/self-deploy.nix"], "default": {"_type": "literalExpression", "text": "\"/default.nix\""}, "description": {"_type": "mdDoc", "text": "Path to nix file in repository. Leading '/' refers to root of\ngit repository.\n"}, "loc": ["services", "self-deploy", "nixFile"], "readOnly": false, "type": "path"}, "services.self-deploy.repository": {"declarations": ["nixos/modules/services/system/self-deploy.nix"], "description": {"_type": "mdDoc", "text": "The repository to fetch from. Must be properly formatted for git.\n\nIf this value is set to a path (must begin with `/`) then it's\nassumed that the repository is local and the resulting service\nwon't wait for the network to be up.\n\nIf the repository will be fetched over SSH, you must add an\nentry to `programs.ssh.knownHosts` for the SSH host for the fetch\nto be successful.\n"}, "loc": ["services", "self-deploy", "repository"], "readOnly": false, "type": "path or string"}, "services.self-deploy.sshKeyFile": {"declarations": ["nixos/modules/services/system/self-deploy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to SSH private key used to fetch private repositories over\nSSH.\n"}, "loc": ["services", "self-deploy", "sshKeyFile"], "readOnly": false, "type": "null or path"}, "services.self-deploy.startAt": {"declarations": ["nixos/modules/services/system/self-deploy.nix"], "default": {"_type": "literalExpression", "text": "\"hourly\""}, "description": {"_type": "mdDoc", "text": "The schedule on which to run the `self-deploy` service. Format\nspecified by `systemd.time 7`.\n\nThis value can also be a list of `systemd.time 7` formatted\nstrings, in which case the service will be started on multiple\nschedules.\n"}, "loc": ["services", "self-deploy", "startAt"], "readOnly": false, "type": "string or list of string"}, "services.self-deploy.switchCommand": {"declarations": ["nixos/modules/services/system/self-deploy.nix"], "default": {"_type": "literalExpression", "text": "\"switch\""}, "description": {"_type": "mdDoc", "text": "The `switch-to-configuration` subcommand used.\n"}, "loc": ["services", "self-deploy", "switchCommand"], "readOnly": false, "type": "one of \"boot\", \"switch\", \"dry-activate\", \"test\""}, "services.selfoss.database.host": {"declarations": ["nixos/modules/services/web-apps/selfoss.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Host of the database (has no effect if type is \"sqlite\").\n"}, "loc": ["services", "selfoss", "database", "host"], "readOnly": false, "type": "string"}, "services.selfoss.database.name": {"declarations": ["nixos/modules/services/web-apps/selfoss.nix"], "default": {"_type": "literalExpression", "text": "\"tt_rss\""}, "description": {"_type": "mdDoc", "text": "Name of the existing database (has no effect if type is \"sqlite\").\n"}, "loc": ["services", "selfoss", "database", "name"], "readOnly": false, "type": "string"}, "services.selfoss.database.password": {"declarations": ["nixos/modules/services/web-apps/selfoss.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The database user's password (has no effect if type is \"sqlite\").\n"}, "loc": ["services", "selfoss", "database", "password"], "readOnly": false, "type": "null or string"}, "services.selfoss.database.port": {"declarations": ["nixos/modules/services/web-apps/selfoss.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The database's port. If not set, the default ports will be\nprovided (5432 and 3306 for pgsql and mysql respectively)\n(has no effect if type is \"sqlite\").\n"}, "loc": ["services", "selfoss", "database", "port"], "readOnly": false, "type": "null or signed integer"}, "services.selfoss.database.type": {"declarations": ["nixos/modules/services/web-apps/selfoss.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite\""}, "description": {"_type": "mdDoc", "text": "Database to store feeds. Supported are sqlite, pgsql and mysql.\n"}, "loc": ["services", "selfoss", "database", "type"], "readOnly": false, "type": "one of \"pgsql\", \"mysql\", \"sqlite\""}, "services.selfoss.database.user": {"declarations": ["nixos/modules/services/web-apps/selfoss.nix"], "default": {"_type": "literalExpression", "text": "\"tt_rss\""}, "description": {"_type": "mdDoc", "text": "The database user. The user must exist and has access to\nthe specified database (has no effect if type is \"sqlite\").\n"}, "loc": ["services", "selfoss", "database", "user"], "readOnly": false, "type": "string"}, "services.selfoss.enable": {"declarations": ["nixos/modules/services/web-apps/selfoss.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable selfoss."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "selfoss", "enable"], "readOnly": false, "type": "boolean"}, "services.selfoss.extraConfig": {"declarations": ["nixos/modules/services/web-apps/selfoss.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration added to config.ini\n"}, "loc": ["services", "selfoss", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.selfoss.pool": {"declarations": ["nixos/modules/services/web-apps/selfoss.nix"], "default": {"_type": "literalExpression", "text": "\"selfoss_pool\""}, "description": {"_type": "mdDoc", "text": "Name of existing phpfpm pool that is used to run web-application.\nIf not specified a pool will be created automatically with\ndefault values.\n"}, "loc": ["services", "selfoss", "pool"], "readOnly": false, "type": "string"}, "services.selfoss.user": {"declarations": ["nixos/modules/services/web-apps/selfoss.nix"], "default": {"_type": "literalExpression", "text": "\"nginx\""}, "description": {"_type": "mdDoc", "text": "User account under which both the service and the web-application run.\n"}, "loc": ["services", "selfoss", "user"], "readOnly": false, "type": "string"}, "services.serviio.dataDir": {"declarations": ["nixos/modules/services/misc/serviio.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/serviio\""}, "description": {"_type": "mdDoc", "text": "The directory where serviio stores its state, data, etc.\n"}, "loc": ["services", "serviio", "dataDir"], "readOnly": false, "type": "path"}, "services.serviio.enable": {"declarations": ["nixos/modules/services/misc/serviio.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Serviio Media Server.\n"}, "loc": ["services", "serviio", "enable"], "readOnly": false, "type": "boolean"}, "services.sftpgo.dataDir": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/sftpgo\""}, "description": {"_type": "mdDoc", "text": "The directory where SFTPGo stores its data files.\n"}, "loc": ["services", "sftpgo", "dataDir"], "readOnly": false, "type": "string"}, "services.sftpgo.enable": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "sftpgo"}, "loc": ["services", "sftpgo", "enable"], "readOnly": false, "type": "boolean"}, "services.sftpgo.extraArgs": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command line arguments to pass to the sftpgo daemon.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--log-level\"\n  \"info\"\n]"}, "loc": ["services", "sftpgo", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sftpgo.group": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "\"sftpgo\""}, "description": {"_type": "mdDoc", "text": "Group name under which SFTPGo runs.\n"}, "loc": ["services", "sftpgo", "group"], "readOnly": false, "type": "string"}, "services.sftpgo.loadDataFile": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a json file containing users and folders to load (or update) on startup.\nCheck the [documentation](https://github.com/drakkan/sftpgo/blob/main/docs/full-configuration.md)\nfor the `--loaddata-from` command line argument for more info.\n"}, "loc": ["services", "sftpgo", "loadDataFile"], "readOnly": false, "type": "null or path"}, "services.sftpgo.package": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "pkgs.sftpgo"}, "description": {"_type": "mdDoc", "text": "Which SFTPGo package to use.\n"}, "loc": ["services", "sftpgo", "package"], "readOnly": false, "type": "package"}, "services.sftpgo.settings": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The primary sftpgo configuration. See the\n[configuration reference](https://github.com/drakkan/sftpgo/blob/main/docs/full-configuration.md)\nfor possible values.\n"}, "loc": ["services", "sftpgo", "settings"], "readOnly": false, "type": "JSON value"}, "services.sftpgo.settings.ftpd.bindings": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Configure listen addresses and ports for ftpd.\n"}, "loc": ["services", "sftpgo", "settings", "ftpd", "bindings"], "readOnly": false, "type": "list of (JSON value)"}, "services.sftpgo.settings.ftpd.bindings.*.address": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Network listen address. Leave blank to listen on all available network interfaces.\nOn *NIX you can specify an absolute path to listen on a Unix-domain socket.\n"}, "loc": ["services", "sftpgo", "settings", "ftpd", "bindings", "*", "address"], "readOnly": false, "type": "string"}, "services.sftpgo.settings.ftpd.bindings.*.port": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "The port for serving FTP requests.\n\nSetting the port to `0` disables listening on this interface binding.\n"}, "loc": ["services", "sftpgo", "settings", "ftpd", "bindings", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sftpgo.settings.httpd.bindings": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Configure listen addresses and ports for httpd.\n"}, "loc": ["services", "sftpgo", "settings", "httpd", "bindings"], "readOnly": false, "type": "list of (JSON value)"}, "services.sftpgo.settings.httpd.bindings.*.address": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Network listen address. Leave blank to listen on all available network interfaces.\nOn *NIX you can specify an absolute path to listen on a Unix-domain socket.\n"}, "loc": ["services", "sftpgo", "settings", "httpd", "bindings", "*", "address"], "readOnly": false, "type": "string"}, "services.sftpgo.settings.httpd.bindings.*.enable_web_admin": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable the built-in web admin for this interface binding.\n"}, "loc": ["services", "sftpgo", "settings", "httpd", "bindings", "*", "enable_web_admin"], "readOnly": false, "type": "boolean"}, "services.sftpgo.settings.httpd.bindings.*.enable_web_client": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable the built-in web client for this interface binding.\n"}, "loc": ["services", "sftpgo", "settings", "httpd", "bindings", "*", "enable_web_client"], "readOnly": false, "type": "boolean"}, "services.sftpgo.settings.httpd.bindings.*.port": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "The port for serving HTTP(S) requests.\n\nSetting the port to `0` disables listening on this interface binding.\n"}, "loc": ["services", "sftpgo", "settings", "httpd", "bindings", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sftpgo.settings.sftpd.bindings": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Configure listen addresses and ports for sftpd.\n"}, "loc": ["services", "sftpgo", "settings", "sftpd", "bindings"], "readOnly": false, "type": "list of (JSON value)"}, "services.sftpgo.settings.sftpd.bindings.*.address": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Network listen address. Leave blank to listen on all available network interfaces.\nOn *NIX you can specify an absolute path to listen on a Unix-domain socket.\n"}, "loc": ["services", "sftpgo", "settings", "sftpd", "bindings", "*", "address"], "readOnly": false, "type": "string"}, "services.sftpgo.settings.sftpd.bindings.*.port": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "The port for serving SFTP requests.\n\nSetting the port to `0` disables listening on this interface binding.\n"}, "loc": ["services", "sftpgo", "settings", "sftpd", "bindings", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sftpgo.settings.smtp": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "SMTP configuration section.\n"}, "loc": ["services", "sftpgo", "settings", "smtp"], "readOnly": false, "type": "JSON value"}, "services.sftpgo.settings.smtp.auth_type": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "- `0`: Plain\n- `1`: Login\n- `2`: CRAM-MD5\n"}, "loc": ["services", "sftpgo", "settings", "smtp", "auth_type"], "readOnly": false, "type": "one of 0, 1, 2"}, "services.sftpgo.settings.smtp.encryption": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Encryption scheme:\n- `0`: No encryption\n- `1`: TLS\n- `2`: STARTTLS\n"}, "loc": ["services", "sftpgo", "settings", "smtp", "encryption"], "readOnly": false, "type": "one of 0, 1, 2"}, "services.sftpgo.settings.smtp.from": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "\"SFTPGo <sftpgo@example.com>\""}, "description": {"_type": "mdDoc", "text": "From address.\n"}, "loc": ["services", "sftpgo", "settings", "smtp", "from"], "readOnly": false, "type": "string"}, "services.sftpgo.settings.smtp.host": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Location of SMTP email server. Leave empty to disable email sending capabilities.\n"}, "loc": ["services", "sftpgo", "settings", "smtp", "host"], "readOnly": false, "type": "string"}, "services.sftpgo.settings.smtp.port": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "465"}, "description": {"_type": "mdDoc", "text": "Port of the SMTP Server."}, "loc": ["services", "sftpgo", "settings", "smtp", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sftpgo.settings.smtp.user": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "\"sftpgo\""}, "description": {"_type": "mdDoc", "text": "SMTP username."}, "loc": ["services", "sftpgo", "settings", "smtp", "user"], "readOnly": false, "type": "string"}, "services.sftpgo.settings.webdavd.bindings": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Configure listen addresses and ports for webdavd.\n"}, "loc": ["services", "sftpgo", "settings", "webdavd", "bindings"], "readOnly": false, "type": "list of (JSON value)"}, "services.sftpgo.settings.webdavd.bindings.*.address": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Network listen address. Leave blank to listen on all available network interfaces.\nOn *NIX you can specify an absolute path to listen on a Unix-domain socket.\n"}, "loc": ["services", "sftpgo", "settings", "webdavd", "bindings", "*", "address"], "readOnly": false, "type": "string"}, "services.sftpgo.settings.webdavd.bindings.*.port": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "The port for serving WebDAV requests.\n\nSetting the port to `0` disables listening on this interface binding.\n"}, "loc": ["services", "sftpgo", "settings", "webdavd", "bindings", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sftpgo.user": {"declarations": ["nixos/modules/services/web-apps/sftpgo.nix"], "default": {"_type": "literalExpression", "text": "\"sftpgo\""}, "description": {"_type": "mdDoc", "text": "User account name under which SFTPGo runs.\n"}, "loc": ["services", "sftpgo", "user"], "readOnly": false, "type": "string"}, "services.shadowsocks.enable": {"declarations": ["nixos/modules/services/networking/shadowsocks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run shadowsocks-libev shadowsocks server.\n"}, "loc": ["services", "shadowsocks", "enable"], "readOnly": false, "type": "boolean"}, "services.shadowsocks.encryptionMethod": {"declarations": ["nixos/modules/services/networking/shadowsocks.nix"], "default": {"_type": "literalExpression", "text": "\"chacha20-ietf-poly1305\""}, "description": {"_type": "mdDoc", "text": "Encryption method. See <https://github.com/shadowsocks/shadowsocks-org/wiki/AEAD-Ciphers>.\n"}, "loc": ["services", "shadowsocks", "encryptionMethod"], "readOnly": false, "type": "string"}, "services.shadowsocks.extraConfig": {"declarations": ["nixos/modules/services/networking/shadowsocks.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional configuration for shadowsocks that is not covered by the\nprovided options. The provided attrset will be serialized to JSON and\nhas to contain valid shadowsocks options. Unfortunately most\nadditional options are undocumented but it's easy to find out what is\navailable by looking into the source code of\n<https://github.com/shadowsocks/shadowsocks-libev/blob/master/src/jconf.c>\n"}, "example": {"_type": "literalExpression", "text": "{\n  nameserver = \"8.8.8.8\";\n}"}, "loc": ["services", "shadowsocks", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.shadowsocks.fastOpen": {"declarations": ["nixos/modules/services/networking/shadowsocks.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "use TCP fast-open\n"}, "loc": ["services", "shadowsocks", "fastOpen"], "readOnly": false, "type": "boolean"}, "services.shadowsocks.localAddress": {"declarations": ["nixos/modules/services/networking/shadowsocks.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"[::0]\"\n  \"0.0.0.0\"\n]"}, "description": {"_type": "mdDoc", "text": "Local addresses to which the server binds.\n"}, "loc": ["services", "shadowsocks", "localAddress"], "readOnly": false, "type": "(list of string) or string convertible to it"}, "services.shadowsocks.mode": {"declarations": ["nixos/modules/services/networking/shadowsocks.nix"], "default": {"_type": "literalExpression", "text": "\"tcp_and_udp\""}, "description": {"_type": "mdDoc", "text": "Relay protocols.\n"}, "loc": ["services", "shadowsocks", "mode"], "readOnly": false, "type": "one of \"tcp_only\", \"tcp_and_udp\", \"udp_only\""}, "services.shadowsocks.password": {"declarations": ["nixos/modules/services/networking/shadowsocks.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password for connecting clients.\n"}, "loc": ["services", "shadowsocks", "password"], "readOnly": false, "type": "null or string"}, "services.shadowsocks.passwordFile": {"declarations": ["nixos/modules/services/networking/shadowsocks.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password file with a password for connecting clients.\n"}, "loc": ["services", "shadowsocks", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.shadowsocks.plugin": {"declarations": ["nixos/modules/services/networking/shadowsocks.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SIP003 plugin for shadowsocks\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.shadowsocks-v2ray-plugin}/bin/v2ray-plugin\""}, "loc": ["services", "shadowsocks", "plugin"], "readOnly": false, "type": "null or string"}, "services.shadowsocks.pluginOpts": {"declarations": ["nixos/modules/services/networking/shadowsocks.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Options to pass to the plugin if one was specified\n"}, "example": {"_type": "literalExpression", "text": "\"server;host=example.com\""}, "loc": ["services", "shadowsocks", "pluginOpts"], "readOnly": false, "type": "string"}, "services.shadowsocks.port": {"declarations": ["nixos/modules/services/networking/shadowsocks.nix"], "default": {"_type": "literalExpression", "text": "8388"}, "description": {"_type": "mdDoc", "text": "Port which the server uses.\n"}, "loc": ["services", "shadowsocks", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.shairport-sync.arguments": {"declarations": ["nixos/modules/services/networking/shairport-sync.nix"], "default": {"_type": "literalExpression", "text": "\"-v -o pa\""}, "description": {"_type": "mdDoc", "text": "Arguments to pass to the daemon. Defaults to a local pulseaudio\nserver.\n"}, "loc": ["services", "shairport-sync", "arguments"], "readOnly": false, "type": "string"}, "services.shairport-sync.enable": {"declarations": ["nixos/modules/services/networking/shairport-sync.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the shairport-sync daemon.\n\nRunning with a local system-wide or remote pulseaudio server\nis recommended.\n"}, "loc": ["services", "shairport-sync", "enable"], "readOnly": false, "type": "boolean"}, "services.shairport-sync.group": {"declarations": ["nixos/modules/services/networking/shairport-sync.nix"], "default": {"_type": "literalExpression", "text": "\"shairport\""}, "description": {"_type": "mdDoc", "text": "Group account name under which to run shairport-sync. The account\nwill be created.\n"}, "loc": ["services", "shairport-sync", "group"], "readOnly": false, "type": "string"}, "services.shairport-sync.openFirewall": {"declarations": ["nixos/modules/services/networking/shairport-sync.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to automatically open ports in the firewall.\n"}, "loc": ["services", "shairport-sync", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.shairport-sync.user": {"declarations": ["nixos/modules/services/networking/shairport-sync.nix"], "default": {"_type": "literalExpression", "text": "\"shairport\""}, "description": {"_type": "mdDoc", "text": "User account name under which to run shairport-sync. The account\nwill be created.\n"}, "loc": ["services", "shairport-sync", "user"], "readOnly": false, "type": "string"}, "services.shellhub-agent.enable": {"declarations": ["nixos/modules/services/networking/shellhub-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ShellHub Agent daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "shellhub-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.shellhub-agent.keepAliveInterval": {"declarations": ["nixos/modules/services/networking/shellhub-agent.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "Determine the interval to send the keep alive message to\nthe server. This has a direct impact of the bandwidth\nused by the device.\n"}, "loc": ["services", "shellhub-agent", "keepAliveInterval"], "readOnly": false, "type": "signed integer"}, "services.shellhub-agent.package": {"declarations": ["nixos/modules/services/networking/shellhub-agent.nix"], "default": {"_type": "literalExpression", "text": "pkgs.shellhub-agent"}, "description": {"_type": "mdDoc", "text": "The shellhub-agent package to use."}, "loc": ["services", "shellhub-agent", "package"], "readOnly": false, "type": "package"}, "services.shellhub-agent.preferredHostname": {"declarations": ["nixos/modules/services/networking/shellhub-agent.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Set the device preferred hostname. This provides a hint to\nthe server to use this as hostname if it is available.\n"}, "loc": ["services", "shellhub-agent", "preferredHostname"], "readOnly": false, "type": "string"}, "services.shellhub-agent.privateKey": {"declarations": ["nixos/modules/services/networking/shellhub-agent.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/shellhub-agent/private.key\""}, "description": {"_type": "mdDoc", "text": "Location where to store the ShellHub Agent private\nkey.\n"}, "loc": ["services", "shellhub-agent", "privateKey"], "readOnly": false, "type": "path"}, "services.shellhub-agent.server": {"declarations": ["nixos/modules/services/networking/shellhub-agent.nix"], "default": {"_type": "literalExpression", "text": "\"https://cloud.shellhub.io\""}, "description": {"_type": "mdDoc", "text": "Server address of ShellHub Gateway to connect.\n"}, "loc": ["services", "shellhub-agent", "server"], "readOnly": false, "type": "string"}, "services.shellhub-agent.tenantId": {"declarations": ["nixos/modules/services/networking/shellhub-agent.nix"], "description": {"_type": "mdDoc", "text": "The tenant ID to use when connecting to the ShellHub\nGateway.\n"}, "example": {"_type": "literalExpression", "text": "\"ba0a880c-2ada-11eb-a35e-17266ef329d6\""}, "loc": ["services", "shellhub-agent", "tenantId"], "readOnly": false, "type": "string"}, "services.shibboleth-sp.configFile": {"declarations": ["nixos/modules/services/security/shibboleth-sp.nix"], "description": {"_type": "mdDoc", "text": "Path to shibboleth config file"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.shibboleth-sp}/etc/shibboleth/shibboleth2.xml\""}, "loc": ["services", "shibboleth-sp", "configFile"], "readOnly": false, "type": "path"}, "services.shibboleth-sp.enable": {"declarations": ["nixos/modules/services/security/shibboleth-sp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the shibboleth service"}, "loc": ["services", "shibboleth-sp", "enable"], "readOnly": false, "type": "boolean"}, "services.shibboleth-sp.fastcgi.enable": {"declarations": ["nixos/modules/services/security/shibboleth-sp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to include the shibauthorizer and shibresponder FastCGI processes"}, "loc": ["services", "shibboleth-sp", "fastcgi", "enable"], "readOnly": false, "type": "boolean"}, "services.shibboleth-sp.fastcgi.shibAuthorizerPort": {"declarations": ["nixos/modules/services/security/shibboleth-sp.nix"], "default": {"_type": "literalExpression", "text": "9100"}, "description": {"_type": "mdDoc", "text": "Port for shibauthorizer FastCGI process to bind to"}, "loc": ["services", "shibboleth-sp", "fastcgi", "shibAuthorizerPort"], "readOnly": false, "type": "signed integer"}, "services.shibboleth-sp.fastcgi.shibResponderPort": {"declarations": ["nixos/modules/services/security/shibboleth-sp.nix"], "default": {"_type": "literalExpression", "text": "9101"}, "description": {"_type": "mdDoc", "text": "Port for shibauthorizer FastCGI process to bind to"}, "loc": ["services", "shibboleth-sp", "fastcgi", "shibResponderPort"], "readOnly": false, "type": "signed integer"}, "services.shiori.address": {"declarations": ["nixos/modules/services/web-apps/shiori.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The IP address on which Shiori will listen.\nIf empty, listens on all interfaces.\n"}, "loc": ["services", "shiori", "address"], "readOnly": false, "type": "string"}, "services.shiori.enable": {"declarations": ["nixos/modules/services/web-apps/shiori.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Shiori simple bookmarks manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "shiori", "enable"], "readOnly": false, "type": "boolean"}, "services.shiori.package": {"declarations": ["nixos/modules/services/web-apps/shiori.nix"], "default": {"_type": "literalExpression", "text": "pkgs.shiori"}, "description": {"_type": "mdDoc", "text": "The Shiori package to use."}, "loc": ["services", "shiori", "package"], "readOnly": false, "type": "package"}, "services.shiori.port": {"declarations": ["nixos/modules/services/web-apps/shiori.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "The port of the Shiori web application"}, "loc": ["services", "shiori", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.shorewall.configs": {"declarations": ["nixos/modules/services/networking/shorewall.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option defines the Shorewall configs.\nThe attribute name defines the name of the config,\nand the attribute value defines the content of the config.\n"}, "loc": ["services", "shorewall", "configs"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.shorewall.enable": {"declarations": ["nixos/modules/services/networking/shorewall.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Shorewall IPv4 Firewall.\n\n::: {.warning}\nEnabling this service WILL disable the existing NixOS\nfirewall! Default firewall rules provided by packages are not\nconsidered at the moment.\n:::\n"}, "loc": ["services", "shorewall", "enable"], "readOnly": false, "type": "boolean"}, "services.shorewall.package": {"declarations": ["nixos/modules/services/networking/shorewall.nix"], "default": {"_type": "literalExpression", "text": "pkgs.shorewall"}, "description": {"_type": "mdDoc", "text": "The shorewall package to use."}, "loc": ["services", "shorewall", "package"], "readOnly": false, "type": "package"}, "services.shorewall6.configs": {"declarations": ["nixos/modules/services/networking/shorewall6.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "This option defines the Shorewall configs.\nThe attribute name defines the name of the config,\nand the attribute value defines the content of the config.\n"}, "loc": ["services", "shorewall6", "configs"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.shorewall6.enable": {"declarations": ["nixos/modules/services/networking/shorewall6.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Shorewall IPv6 Firewall.\n\n::: {.warning}\nEnabling this service WILL disable the existing NixOS\nfirewall! Default firewall rules provided by packages are not\nconsidered at the moment.\n:::\n"}, "loc": ["services", "shorewall6", "enable"], "readOnly": false, "type": "boolean"}, "services.shorewall6.package": {"declarations": ["nixos/modules/services/networking/shorewall6.nix"], "default": {"_type": "literalExpression", "text": "pkgs.shorewall"}, "description": {"_type": "mdDoc", "text": "The shorewall package to use."}, "loc": ["services", "shorewall6", "package"], "readOnly": false, "type": "package"}, "services.shout.config": {"declarations": ["nixos/modules/services/networking/shout.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Shout {file}`config.js` contents as attribute set (will be\nconverted to JSON to generate the configuration file).\n\nThe options defined here will be merged to the default configuration file.\n\nDocumentation: http://shout-irc.com/docs/server/configuration.html\n"}, "example": {"_type": "literalExpression", "text": "{\n  defaults = {\n    host = \"localhost\";\n    name = \"Your Network\";\n    port = 6697;\n  };\n  displayNetwork = false;\n}"}, "loc": ["services", "shout", "config"], "readOnly": false, "type": "attribute set"}, "services.shout.configFile": {"declarations": ["nixos/modules/services/networking/shout.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Contents of Shout's {file}`config.js` file.\n\nUsed for backward compatibility, recommended way is now to use\nthe `config` option.\n\nDocumentation: http://shout-irc.com/docs/server/configuration.html\n"}, "loc": ["services", "shout", "configFile"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.shout.enable": {"declarations": ["nixos/modules/services/networking/shout.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Shout web IRC client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "shout", "enable"], "readOnly": false, "type": "boolean"}, "services.shout.listenAddress": {"declarations": ["nixos/modules/services/networking/shout.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IP interface to listen on for http connections."}, "loc": ["services", "shout", "listenAddress"], "readOnly": false, "type": "string"}, "services.shout.port": {"declarations": ["nixos/modules/services/networking/shout.nix"], "default": {"_type": "literalExpression", "text": "9000"}, "description": {"_type": "mdDoc", "text": "TCP port to listen on for http connections."}, "loc": ["services", "shout", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.shout.private": {"declarations": ["nixos/modules/services/networking/shout.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Make your shout instance private. You will need to configure user\naccounts by adding entries in {file}`/var/lib/shout/users`.\n"}, "loc": ["services", "shout", "private"], "readOnly": false, "type": "boolean"}, "services.sickbeard.configFile": {"declarations": ["nixos/modules/services/misc/sickbeard.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.sickbeard.dataDir}/config.ini\""}, "description": {"_type": "mdDoc", "text": "Path to config file."}, "loc": ["services", "sickbeard", "configFile"], "readOnly": false, "type": "path"}, "services.sickbeard.dataDir": {"declarations": ["nixos/modules/services/misc/sickbeard.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/sickbeard\""}, "description": {"_type": "mdDoc", "text": "Path where to store data files."}, "loc": ["services", "sickbeard", "dataDir"], "readOnly": false, "type": "path"}, "services.sickbeard.enable": {"declarations": ["nixos/modules/services/misc/sickbeard.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the sickbeard server."}, "loc": ["services", "sickbeard", "enable"], "readOnly": false, "type": "boolean"}, "services.sickbeard.group": {"declarations": ["nixos/modules/services/misc/sickbeard.nix"], "default": {"_type": "literalExpression", "text": "\"sickbeard\""}, "description": {"_type": "mdDoc", "text": "Group to run the service as"}, "loc": ["services", "sickbeard", "group"], "readOnly": false, "type": "string"}, "services.sickbeard.package": {"declarations": ["nixos/modules/services/misc/sickbeard.nix"], "default": {"_type": "literalExpression", "text": "pkgs.sickbeard"}, "description": {"_type": "mdDoc", "text": "Enable `pkgs.sickrage` or `pkgs.sickgear`\nas an alternative to SickBeard\n"}, "example": {"_type": "literalExpression", "text": "pkgs.sickrage"}, "loc": ["services", "sickbeard", "package"], "readOnly": false, "type": "package"}, "services.sickbeard.port": {"declarations": ["nixos/modules/services/misc/sickbeard.nix"], "default": {"_type": "literalExpression", "text": "8081"}, "description": {"_type": "mdDoc", "text": "Port to bind to."}, "loc": ["services", "sickbeard", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sickbeard.user": {"declarations": ["nixos/modules/services/misc/sickbeard.nix"], "default": {"_type": "literalExpression", "text": "\"sickbeard\""}, "description": {"_type": "mdDoc", "text": "User to run the service as"}, "loc": ["services", "sickbeard", "user"], "readOnly": false, "type": "string"}, "services.signald.enable": {"declarations": ["nixos/modules/services/misc/signald.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the signald service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "signald", "enable"], "readOnly": false, "type": "boolean"}, "services.signald.group": {"declarations": ["nixos/modules/services/misc/signald.nix"], "default": {"_type": "literalExpression", "text": "\"signald\""}, "description": {"_type": "mdDoc", "text": "Group under which signald runs."}, "loc": ["services", "signald", "group"], "readOnly": false, "type": "string"}, "services.signald.socketPath": {"declarations": ["nixos/modules/services/misc/signald.nix"], "default": {"_type": "literalExpression", "text": "\"/run/signald/signald.sock\""}, "description": {"_type": "mdDoc", "text": "Path to the signald socket"}, "loc": ["services", "signald", "socketPath"], "readOnly": false, "type": "string"}, "services.signald.user": {"declarations": ["nixos/modules/services/misc/signald.nix"], "default": {"_type": "literalExpression", "text": "\"signald\""}, "description": {"_type": "mdDoc", "text": "User under which signald runs."}, "loc": ["services", "signald", "user"], "readOnly": false, "type": "string"}, "services.siproxd.enable": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Siproxd SIP\nproxy/masquerading daemon.\n"}, "loc": ["services", "siproxd", "enable"], "readOnly": false, "type": "boolean"}, "services.siproxd.extraConfig": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to add to siproxd configuration.\n"}, "loc": ["services", "siproxd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.siproxd.hostsAllowReg": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Access control list for incoming SIP registrations.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168.1.0/24\"\n  \"192.168.2.0/24\"\n]"}, "loc": ["services", "siproxd", "hostsAllowReg"], "readOnly": false, "type": "list of string"}, "services.siproxd.hostsAllowSip": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Access control list for incoming SIP traffic.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"123.45.0.0/16\"\n  \"123.46.0.0/16\"\n]"}, "loc": ["services", "siproxd", "hostsAllowSip"], "readOnly": false, "type": "list of string"}, "services.siproxd.hostsDenySip": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Access control list for denying incoming\nSIP registrations and traffic.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"10.0.0.0/8\"\n  \"11.0.0.0/8\"\n]"}, "loc": ["services", "siproxd", "hostsDenySip"], "readOnly": false, "type": "list of string"}, "services.siproxd.ifInbound": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "description": {"_type": "mdDoc", "text": "Local network interface"}, "example": {"_type": "literalExpression", "text": "\"eth0\""}, "loc": ["services", "siproxd", "ifInbound"], "readOnly": false, "type": "string"}, "services.siproxd.ifOutbound": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "description": {"_type": "mdDoc", "text": "Public network interface"}, "example": {"_type": "literalExpression", "text": "\"ppp0\""}, "loc": ["services", "siproxd", "ifOutbound"], "readOnly": false, "type": "string"}, "services.siproxd.passwordFile": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Path to per-user password file.\n"}, "loc": ["services", "siproxd", "passwordFile"], "readOnly": false, "type": "string"}, "services.siproxd.rtpDscp": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "default": {"_type": "literalExpression", "text": "46"}, "description": {"_type": "mdDoc", "text": "DSCP (differentiated services) value to be assigned\nto RTP packets. Allows QOS aware routers to handle\ndifferent types traffic with different priorities.\n"}, "loc": ["services", "siproxd", "rtpDscp"], "readOnly": false, "type": "signed integer"}, "services.siproxd.rtpPortHigh": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "default": {"_type": "literalExpression", "text": "7089"}, "description": {"_type": "mdDoc", "text": "Top of UDP port range for incoming and outgoing RTP traffic\n"}, "loc": ["services", "siproxd", "rtpPortHigh"], "readOnly": false, "type": "signed integer"}, "services.siproxd.rtpPortLow": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "default": {"_type": "literalExpression", "text": "7070"}, "description": {"_type": "mdDoc", "text": "Bottom of UDP port range for incoming and outgoing RTP traffic\n"}, "loc": ["services", "siproxd", "rtpPortLow"], "readOnly": false, "type": "signed integer"}, "services.siproxd.rtpTimeout": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "default": {"_type": "literalExpression", "text": "300"}, "description": {"_type": "mdDoc", "text": "Timeout for an RTP stream. If for the specified\nnumber of seconds no data is relayed on an active\nstream, it is considered dead and will be killed.\n"}, "loc": ["services", "siproxd", "rtpTimeout"], "readOnly": false, "type": "signed integer"}, "services.siproxd.sipDscp": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "DSCP (differentiated services) value to be assigned\nto SIP packets. Allows QOS aware routers to handle\ndifferent types traffic with different priorities.\n"}, "loc": ["services", "siproxd", "sipDscp"], "readOnly": false, "type": "signed integer"}, "services.siproxd.sipListenPort": {"declarations": ["nixos/modules/services/misc/siproxd.nix"], "default": {"_type": "literalExpression", "text": "5060"}, "description": {"_type": "mdDoc", "text": "Port to listen for incoming SIP messages.\n"}, "loc": ["services", "siproxd", "sipListenPort"], "readOnly": false, "type": "signed integer"}, "services.sks.dataDir": {"declarations": ["nixos/modules/services/security/sks.nix"], "default": {"_type": "literalExpression", "text": "\"/var/db/sks\""}, "description": {"_type": "mdDoc", "text": "Data directory (-basedir) for SKS, where the database and all\nconfiguration files are located (e.g. KDB, PTree, membership and\nsksconf).\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/sks\""}, "loc": ["services", "sks", "dataDir"], "readOnly": false, "type": "path"}, "services.sks.enable": {"declarations": ["nixos/modules/services/security/sks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SKS (synchronizing key server for OpenPGP) and start the database\nserver. You need to create \"${dataDir}/dump/*.gpg\" for the initial\nimport."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sks", "enable"], "readOnly": false, "type": "boolean"}, "services.sks.extraDbConfig": {"declarations": ["nixos/modules/services/security/sks.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Set contents of the files \"KDB/DB_CONFIG\" and \"PTree/DB_CONFIG\" within\nthe ${dataDir} directory. This is used to configure options for the\ndatabase for the sks key server.\n\nDocumentation of available options are available in the file named\n\"sampleConfig/DB_CONFIG\" in the following repository:\nhttps://bitbucket.org/skskeyserver/sks-keyserver/src\n"}, "loc": ["services", "sks", "extraDbConfig"], "readOnly": false, "type": "string"}, "services.sks.hkpAddress": {"declarations": ["nixos/modules/services/security/sks.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"::1\"\n]"}, "description": {"_type": "mdDoc", "text": "Domain names, IPv4 and/or IPv6 addresses to listen on for HKP\nrequests.\n"}, "loc": ["services", "sks", "hkpAddress"], "readOnly": false, "type": "list of string"}, "services.sks.hkpPort": {"declarations": ["nixos/modules/services/security/sks.nix"], "default": {"_type": "literalExpression", "text": "11371"}, "description": {"_type": "mdDoc", "text": "HKP port to listen on."}, "loc": ["services", "sks", "hkpPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sks.package": {"declarations": ["nixos/modules/services/security/sks.nix"], "default": {"_type": "literalExpression", "text": "pkgs.sks"}, "description": {"_type": "mdDoc", "text": "Which SKS derivation to use."}, "loc": ["services", "sks", "package"], "readOnly": false, "type": "package"}, "services.sks.webroot": {"declarations": ["nixos/modules/services/security/sks.nix"], "default": {"_type": "literalExpression", "text": "\"${package.webSamples}/OpenPKG\""}, "description": {"_type": "mdDoc", "text": "Source directory (will be symlinked, if not null) for the files the\nbuilt-in webserver should serve. SKS (${pkgs.sks.webSamples})\nprovides the following examples: \"HTML5\", \"OpenPKG\", and \"XHTML+ES\".\nThe index file can be named index.html, index.htm, index.xhtm, or\nindex.xhtml. Files with the extensions .css, .es, .js, .jpg, .jpeg,\n.png, or .gif are supported. Subdirectories and filenames with\nanything other than alphanumeric characters and the '.' character\nwill be ignored.\n"}, "loc": ["services", "sks", "webroot"], "readOnly": false, "type": "null or path"}, "services.skydns.address": {"declarations": ["nixos/modules/services/networking/skydns.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0:53\""}, "description": {"_type": "mdDoc", "text": "Skydns address to bind to."}, "loc": ["services", "skydns", "address"], "readOnly": false, "type": "string"}, "services.skydns.domain": {"declarations": ["nixos/modules/services/networking/skydns.nix"], "default": {"_type": "literalExpression", "text": "\"skydns.local.\""}, "description": {"_type": "mdDoc", "text": "Skydns default domain if not specified by etcd config."}, "loc": ["services", "skydns", "domain"], "readOnly": false, "type": "string"}, "services.skydns.enable": {"declarations": ["nixos/modules/services/networking/skydns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable skydns service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "skydns", "enable"], "readOnly": false, "type": "boolean"}, "services.skydns.etcd.caCert": {"declarations": ["nixos/modules/services/networking/skydns.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Skydns path of TLS certificate authority public key."}, "loc": ["services", "skydns", "etcd", "caCert"], "readOnly": false, "type": "null or path"}, "services.skydns.etcd.machines": {"declarations": ["nixos/modules/services/networking/skydns.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"http://127.0.0.1:2379\"\n]"}, "description": {"_type": "mdDoc", "text": "Skydns list of etcd endpoints to connect to."}, "loc": ["services", "skydns", "etcd", "machines"], "readOnly": false, "type": "list of string"}, "services.skydns.etcd.tlsKey": {"declarations": ["nixos/modules/services/networking/skydns.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Skydns path of TLS client certificate - private key."}, "loc": ["services", "skydns", "etcd", "tlsKey"], "readOnly": false, "type": "null or path"}, "services.skydns.etcd.tlsPem": {"declarations": ["nixos/modules/services/networking/skydns.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Skydns path of TLS client certificate - public key."}, "loc": ["services", "skydns", "etcd", "tlsPem"], "readOnly": false, "type": "null or path"}, "services.skydns.extraConfig": {"declarations": ["nixos/modules/services/networking/skydns.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Skydns attribute set of extra config options passed as environment variables."}, "loc": ["services", "skydns", "extraConfig"], "readOnly": false, "type": "attribute set of string"}, "services.skydns.nameservers": {"declarations": ["nixos/modules/services/networking/skydns.nix"], "default": {"_type": "literalExpression", "text": "map (n: n + \":53\") config.networking.nameservers"}, "description": {"_type": "mdDoc", "text": "Skydns list of nameservers to forward DNS requests to when not authoritative for a domain."}, "example": {"_type": "literalExpression", "text": "[\n  \"8.8.8.8:53\"\n  \"8.8.4.4:53\"\n]"}, "loc": ["services", "skydns", "nameservers"], "readOnly": false, "type": "list of string"}, "services.skydns.package": {"declarations": ["nixos/modules/services/networking/skydns.nix"], "default": {"_type": "literalExpression", "text": "pkgs.skydns"}, "description": {"_type": "mdDoc", "text": "Skydns package to use."}, "loc": ["services", "skydns", "package"], "readOnly": false, "type": "package"}, "services.slimserver.dataDir": {"declarations": ["nixos/modules/services/audio/slimserver.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/slimserver\""}, "description": {"_type": "mdDoc", "text": "The directory where slimserver stores its state, tag cache,\nplaylists etc.\n"}, "loc": ["services", "slimserver", "dataDir"], "readOnly": false, "type": "path"}, "services.slimserver.enable": {"declarations": ["nixos/modules/services/audio/slimserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable slimserver.\n"}, "loc": ["services", "slimserver", "enable"], "readOnly": false, "type": "boolean"}, "services.slimserver.package": {"declarations": ["nixos/modules/services/audio/slimserver.nix"], "default": {"_type": "literalExpression", "text": "pkgs.slimserver"}, "description": {"_type": "mdDoc", "text": "Slimserver package to use."}, "loc": ["services", "slimserver", "package"], "readOnly": false, "type": "package"}, "services.slurm.client.enable": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable slurm client daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "slurm", "client", "enable"], "readOnly": false, "type": "boolean"}, "services.slurm.clusterName": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "\"default\""}, "description": {"_type": "mdDoc", "text": "Necessary to distinguish accounting records in a multi-cluster environment.\n"}, "example": {"_type": "literalExpression", "text": "\"myCluster\""}, "loc": ["services", "slurm", "clusterName"], "readOnly": false, "type": "string"}, "services.slurm.controlAddr": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "config.services.slurm.controlMachine"}, "description": {"_type": "mdDoc", "text": "Name that ControlMachine should be referred to in establishing a\ncommunications path.\n"}, "example": {"_type": "literalExpression", "text": "null"}, "loc": ["services", "slurm", "controlAddr"], "readOnly": false, "type": "null or string"}, "services.slurm.controlMachine": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The short hostname of the machine where SLURM control functions are\nexecuted (i.e. the name returned by the command \"hostname -s\", use \"tux001\"\nrather than \"tux001.my.com\").\n"}, "example": {"_type": "literalExpression", "text": "null"}, "loc": ["services", "slurm", "controlMachine"], "readOnly": false, "type": "null or string"}, "services.slurm.dbdserver.dbdHost": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "Hostname of the machine where `slurmdbd`\nis running (i.e. name returned by `hostname -s`).\n"}, "loc": ["services", "slurm", "dbdserver", "dbdHost"], "readOnly": false, "type": "string"}, "services.slurm.dbdserver.enable": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SlurmDBD service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "slurm", "dbdserver", "enable"], "readOnly": false, "type": "boolean"}, "services.slurm.dbdserver.extraConfig": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration for `slurmdbd.conf` See also:\n{manpage}`slurmdbd.conf(8)`.\n"}, "loc": ["services", "slurm", "dbdserver", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.slurm.dbdserver.storagePassFile": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to file with database password. The content of this will be used to\ncreate the password for the `StoragePass` option.\n"}, "loc": ["services", "slurm", "dbdserver", "storagePassFile"], "readOnly": false, "type": "null or string"}, "services.slurm.dbdserver.storageUser": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "config.services.slurm.user"}, "description": {"_type": "mdDoc", "text": "Database user name.\n"}, "loc": ["services", "slurm", "dbdserver", "storageUser"], "readOnly": false, "type": "string"}, "services.slurm.enableSrunX11": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled srun will accept the option \"--x11\" to allow for X11 forwarding\nfrom within an interactive session or a batch job. This activates the\nslurm-spank-x11 module. Note that this option also enables\n{option}`services.openssh.forwardX11` on the client.\n\nThis option requires slurm to be compiled without native X11 support.\nThe default behavior is to re-compile the slurm package with native X11\nsupport disabled if this option is set to true.\n\nTo use the native X11 support add `PrologFlags=X11` in {option}`extraConfig`.\nNote that this method will only work RSA SSH host keys.\n"}, "loc": ["services", "slurm", "enableSrunX11"], "readOnly": false, "type": "boolean"}, "services.slurm.enableStools": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to provide a slurm.conf file.\nEnable this option if you do not run a slurm daemon on this host\n(i.e. `server.enable` and `client.enable` are `false`)\nbut you still want to run slurm commands from this host.\n"}, "loc": ["services", "slurm", "enableStools"], "readOnly": false, "type": "boolean"}, "services.slurm.extraCgroupConfig": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration for `cgroup.conf`. This file is\nused when `procTrackType=proctrack/cgroup`.\n"}, "loc": ["services", "slurm", "extraCgroupConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.slurm.extraConfig": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options that will be added verbatim at\nthe end of the slurm configuration file.\n"}, "loc": ["services", "slurm", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.slurm.extraConfigPaths": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Slurm expects config files for plugins in the same path\nas `slurm.conf`. Add extra nix store\npaths that should be merged into same directory as\n`slurm.conf`.\n"}, "loc": ["services", "slurm", "extraConfigPaths"], "readOnly": false, "type": "list of path"}, "services.slurm.extraPlugstackConfig": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration that will be added to the end of `plugstack.conf`.\n"}, "loc": ["services", "slurm", "extraPlugstackConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.slurm.nodeName": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Name that SLURM uses to refer to a node (or base partition for BlueGene\nsystems). Typically this would be the string that \"/bin/hostname -s\"\nreturns. Note that now you have to write node's parameters after the name.\n"}, "example": {"_type": "literalExpression", "text": "[ \"linux[1-32] CPUs=1 State=UNKNOWN\" ];"}, "loc": ["services", "slurm", "nodeName"], "readOnly": false, "type": "list of string"}, "services.slurm.package": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "pkgs.slurm"}, "description": {"_type": "mdDoc", "text": "The package to use for slurm binaries.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.slurm-full"}, "loc": ["services", "slurm", "package"], "readOnly": false, "type": "package"}, "services.slurm.partitionName": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Name by which the partition may be referenced. Note that now you have\nto write the partition's parameters after the name.\n"}, "example": {"_type": "literalExpression", "text": "[ \"debug Nodes=linux[1-32] Default=YES MaxTime=INFINITE State=UP\" ];"}, "loc": ["services", "slurm", "partitionName"], "readOnly": false, "type": "list of string"}, "services.slurm.procTrackType": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "\"proctrack/linuxproc\""}, "description": {"_type": "mdDoc", "text": "Plugin to be used for process tracking on a job step basis.\nThe slurmd daemon uses this mechanism to identify all processes\nwhich are children of processes it spawns for a user job step.\n"}, "loc": ["services", "slurm", "procTrackType"], "readOnly": false, "type": "string"}, "services.slurm.server.enable": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the slurm control daemon.\nNote that the standard authentication method is \"munge\".\nThe \"munge\" service needs to be provided with a password file in order for\nslurm to work properly (see `services.munge.password`).\n"}, "loc": ["services", "slurm", "server", "enable"], "readOnly": false, "type": "boolean"}, "services.slurm.stateSaveLocation": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "\"/var/spool/slurmctld\""}, "description": {"_type": "mdDoc", "text": "Directory into which the Slurm controller, slurmctld, saves its state.\n"}, "loc": ["services", "slurm", "stateSaveLocation"], "readOnly": false, "type": "string"}, "services.slurm.user": {"declarations": ["nixos/modules/services/computing/slurm/slurm.nix"], "default": {"_type": "literalExpression", "text": "\"slurm\""}, "description": {"_type": "mdDoc", "text": "Set this option when you want to run the slurmctld daemon\nas something else than the default slurm user \"slurm\".\nNote that the UID of this user needs to be the same\non all nodes.\n"}, "loc": ["services", "slurm", "user"], "readOnly": false, "type": "string"}, "services.smartd.autodetect": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whenever smartd should monitor all devices connected to the\nmachine at the time it's being started (the default).\n\nSet to false to monitor the devices listed in\n{option}`services.smartd.devices` only.\n"}, "loc": ["services", "smartd", "autodetect"], "readOnly": false, "type": "boolean"}, "services.smartd.defaults.autodetected": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "config.services.smartd.defaults.monitored"}, "description": {"_type": "mdDoc", "text": "Like {option}`services.smartd.defaults.monitored`, but for the\nautodetected devices.\n"}, "loc": ["services", "smartd", "defaults", "autodetected"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.smartd.defaults.monitored": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "\"-a\""}, "description": {"_type": "mdDoc", "text": "Common default options for explicitly monitored (listed in\n{option}`services.smartd.devices`) devices.\n\nThe default value turns on monitoring of all the things (see\n`man 5 smartd.conf`).\n\nThe example also turns on SMART Automatic Offline Testing on\nstartup, and schedules short self-tests daily, and long\nself-tests weekly.\n"}, "example": {"_type": "literalExpression", "text": "\"-a -o on -s (S/../.././02|L/../../7/04)\""}, "loc": ["services", "smartd", "defaults", "monitored"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.smartd.devices": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of devices to monitor."}, "example": {"_type": "literalExpression", "text": "[\n  {\n    device = \"/dev/sda\";\n  }\n  {\n    device = \"/dev/sdb\";\n    options = \"-d sat\";\n  }\n]"}, "loc": ["services", "smartd", "devices"], "readOnly": false, "type": "list of (submodule)"}, "services.smartd.devices.*.device": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "description": {"_type": "mdDoc", "text": "Location of the device."}, "example": {"_type": "literalExpression", "text": "\"/dev/sda\""}, "loc": ["services", "smartd", "devices", "*", "device"], "readOnly": false, "type": "string"}, "services.smartd.devices.*.options": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Options that determine how smartd monitors the device."}, "example": {"_type": "literalExpression", "text": "\"-d sat\""}, "loc": ["services", "smartd", "devices", "*", "options"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.smartd.enable": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable smartd daemon from `smartmontools` package."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "smartd", "enable"], "readOnly": false, "type": "boolean"}, "services.smartd.extraOptions": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command-line options passed to the `smartd`\ndaemon on startup.\n\n(See `man 8 smartd`.)\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-A /var/log/smartd/\"\n  \"--interval=3600\"\n]"}, "loc": ["services", "smartd", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.smartd.notifications.mail.enable": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "config.services.mail.sendmailSetuidWrapper != null"}, "description": {"_type": "mdDoc", "text": "Whenever to send e-mail notifications."}, "loc": ["services", "smartd", "notifications", "mail", "enable"], "readOnly": false, "type": "boolean"}, "services.smartd.notifications.mail.mailer": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "\"/run/wrappers/bin/sendmail\""}, "description": {"_type": "mdDoc", "text": "Sendmail-compatible binary to be used to send the messages.\n\nYou should probably enable\n{option}`services.postfix` or some other MTA for\nthis to work.\n"}, "loc": ["services", "smartd", "notifications", "mail", "mailer"], "readOnly": false, "type": "path"}, "services.smartd.notifications.mail.recipient": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "Recipient of the notification messages."}, "loc": ["services", "smartd", "notifications", "mail", "recipient"], "readOnly": false, "type": "string"}, "services.smartd.notifications.mail.sender": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "Sender of the notification messages.\nActs as the value of `email` in the emails' `From: ...` field.\n"}, "example": {"_type": "literalExpression", "text": "\"example@domain.tld\""}, "loc": ["services", "smartd", "notifications", "mail", "sender"], "readOnly": false, "type": "string"}, "services.smartd.notifications.test": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whenever to send a test notification on startup."}, "loc": ["services", "smartd", "notifications", "test"], "readOnly": false, "type": "boolean"}, "services.smartd.notifications.wall.enable": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whenever to send wall notifications to all users."}, "loc": ["services", "smartd", "notifications", "wall", "enable"], "readOnly": false, "type": "boolean"}, "services.smartd.notifications.x11.display": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "\":${toString config.services.xserver.display}\""}, "description": {"_type": "mdDoc", "text": "DISPLAY to send X11 notifications to."}, "loc": ["services", "smartd", "notifications", "x11", "display"], "readOnly": false, "type": "string"}, "services.smartd.notifications.x11.enable": {"declarations": ["nixos/modules/services/monitoring/smartd.nix"], "default": {"_type": "literalExpression", "text": "config.services.xserver.enable"}, "description": {"_type": "mdDoc", "text": "Whenever to send X11 xmessage notifications."}, "loc": ["services", "smartd", "notifications", "x11", "enable"], "readOnly": false, "type": "boolean"}, "services.smartdns.bindPort": {"declarations": ["nixos/modules/services/networking/smartdns.nix"], "default": {"_type": "literalExpression", "text": "53"}, "description": {"_type": "mdDoc", "text": "DNS listening port number."}, "loc": ["services", "smartdns", "bindPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.smartdns.enable": {"declarations": ["nixos/modules/services/networking/smartdns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SmartDNS DNS server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "smartdns", "enable"], "readOnly": false, "type": "boolean"}, "services.smartdns.settings": {"declarations": ["nixos/modules/services/networking/smartdns.nix"], "description": {"_type": "mdDoc", "text": "A set that will be generated into configuration file, see the [SmartDNS README](https://github.com/pymumu/smartdns/blob/master/ReadMe_en.md#configuration-parameter) for details of configuration parameters.\nYou could override the options here like {option}`services.smartdns.bindPort` by writing `settings.bind = \":5353 -no-rule -group example\";`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  bind = \":5353 -no-rule -group example\";\n  cache-size = 4096;\n  server-tls = [ \"8.8.8.8:853\" \"1.1.1.1:853\" ];\n  server-https = \"https://cloudflare-dns.com/dns-query -exclude-default-group\";\n  prefetch-domain = true;\n  speed-check-mode = \"ping,tcp:80\";\n};\n"}, "loc": ["services", "smartdns", "settings"], "readOnly": false, "type": "attribute set of ((list of (string or signed integer or boolean)) or (string or signed integer or boolean) convertible to it)"}, "services.smokeping.alertConfig": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "''\n  to = root@localhost\n  from = smokeping@localhost\n''"}, "description": {"_type": "mdDoc", "text": "Configuration for alerts."}, "example": {"_type": "literalExpression", "text": "''\n  to = alertee@address.somewhere\n  from = smokealert@company.xy\n  \n  +someloss\n  type = loss\n  # in percent\n  pattern = >0%,*12*,>0%,*12*,>0%\n  comment = loss 3 times  in a row;\n''"}, "loc": ["services", "smokeping", "alertConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.smokeping.cgiUrl": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "\"http://${hostName}:${toString port}/smokeping.cgi\""}, "description": {"_type": "mdDoc", "text": "URL to the smokeping cgi."}, "example": {"_type": "literalExpression", "text": "\"https://somewhere.example.com/smokeping.cgi\""}, "loc": ["services", "smokeping", "cgiUrl"], "readOnly": false, "type": "string"}, "services.smokeping.config": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Full smokeping config supplied by the user. Overrides\nand replaces any other configuration supplied.\n"}, "loc": ["services", "smokeping", "config"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.smokeping.databaseConfig": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "''\n  step     = 300\n  pings    = 20\n  # consfn mrhb steps total\n  AVERAGE  0.5   1  1008\n  AVERAGE  0.5  12  4320\n      MIN  0.5  12  4320\n      MAX  0.5  12  4320\n  AVERAGE  0.5 144   720\n      MAX  0.5 144   720\n      MIN  0.5 144   720\n  \n''"}, "description": {"_type": "mdDoc", "text": "Configure the ping frequency and retention of the rrd files.\n          Once set, changing the interval will require deletion or migration of all\n          the collected data."}, "example": {"_type": "literalExpression", "text": "''\n  # near constant pings.\n  step     = 30\n  pings    = 20\n  # consfn mrhb steps total\n  AVERAGE  0.5   1  10080\n  AVERAGE  0.5  12  43200\n      MIN  0.5  12  43200\n      MAX  0.5  12  43200\n  AVERAGE  0.5 144   7200\n      MAX  0.5 144   7200\n      MIN  0.5 144   7200\n''"}, "loc": ["services", "smokeping", "databaseConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.smokeping.enable": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable smokeping service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "smokeping", "enable"], "readOnly": false, "type": "boolean"}, "services.smokeping.extraConfig": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Any additional customization not already included."}, "loc": ["services", "smokeping", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.smokeping.host": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Host/IP to bind to for the web server.\n\nSetting it to `null` skips passing the -h option to thttpd,\nwhich makes it bind to all interfaces.\n"}, "example": {"_type": "literalExpression", "text": "\"192.0.2.1\""}, "loc": ["services", "smokeping", "host"], "readOnly": false, "type": "null or string"}, "services.smokeping.hostName": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "config.networking.fqdn"}, "description": {"_type": "mdDoc", "text": "DNS name for the urls generated in the cgi."}, "example": {"_type": "literalExpression", "text": "\"somewhere.example.com\""}, "loc": ["services", "smokeping", "hostName"], "readOnly": false, "type": "string"}, "services.smokeping.imgUrl": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "\"cache\""}, "description": {"_type": "mdDoc", "text": "Base url for images generated in the cgi.\n\nThe default is a relative URL to ensure it works also when e.g. forwarding\nthe GUI port via SSH.\n"}, "example": {"_type": "literalExpression", "text": "\"https://somewhere.example.com/cache\""}, "loc": ["services", "smokeping", "imgUrl"], "readOnly": false, "type": "string"}, "services.smokeping.linkStyle": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "\"relative\""}, "description": {"_type": "mdDoc", "text": "DNS name for the urls generated in the cgi."}, "example": {"_type": "literalExpression", "text": "\"absolute\""}, "loc": ["services", "smokeping", "linkStyle"], "readOnly": false, "type": "one of \"original\", \"absolute\", \"relative\""}, "services.smokeping.mailHost": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Use this SMTP server to send alerts"}, "example": {"_type": "literalExpression", "text": "\"localhost\""}, "loc": ["services", "smokeping", "mailHost"], "readOnly": false, "type": "string"}, "services.smokeping.owner": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "\"nobody\""}, "description": {"_type": "mdDoc", "text": "Real name of the owner of the instance"}, "example": {"_type": "literalExpression", "text": "\"Bob Foobawr\""}, "loc": ["services", "smokeping", "owner"], "readOnly": false, "type": "string"}, "services.smokeping.ownerEmail": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "\"no-reply@${hostName}\""}, "description": {"_type": "mdDoc", "text": "Email contact for owner"}, "example": {"_type": "literalExpression", "text": "\"no-reply@yourdomain.com\""}, "loc": ["services", "smokeping", "ownerEmail"], "readOnly": false, "type": "string"}, "services.smokeping.package": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "pkgs.smokeping"}, "description": {"_type": "mdDoc", "text": "Specify a custom smokeping package"}, "loc": ["services", "smokeping", "package"], "readOnly": false, "type": "package"}, "services.smokeping.port": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "8081"}, "description": {"_type": "mdDoc", "text": "TCP port to use for the web server."}, "loc": ["services", "smokeping", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.smokeping.presentationConfig": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "''\n  + charts\n  menu = Charts\n  title = The most interesting destinations\n  ++ stddev\n  sorter = StdDev(entries=>4)\n  title = Top Standard Deviation\n  menu = Std Deviation\n  format = Standard Deviation %f\n  ++ max\n  sorter = Max(entries=>5)\n  title = Top Max Roundtrip Time\n  menu = by Max\n  format = Max Roundtrip Time %f seconds\n  ++ loss\n  sorter = Loss(entries=>5)\n  title = Top Packet Loss\n  menu = Loss\n  format = Packets Lost %f\n  ++ median\n  sorter = Median(entries=>5)\n  title = Top Median Roundtrip Time\n  menu = by Median\n  format = Median RTT %f seconds\n  + overview\n  width = 600\n  height = 50\n  range = 10h\n  + detail\n  width = 600\n  height = 200\n  unison_tolerance = 2\n  \"Last 3 Hours\"    3h\n  \"Last 30 Hours\"   30h\n  \"Last 10 Days\"    10d\n  \"Last 360 Days\"   360d\n''"}, "description": {"_type": "mdDoc", "text": "presentation graph style"}, "loc": ["services", "smokeping", "presentationConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.smokeping.presentationTemplate": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.smokeping}/etc/basepage.html.dist\""}, "description": {"_type": "mdDoc", "text": "Default page layout for the web UI."}, "loc": ["services", "smokeping", "presentationTemplate"], "readOnly": false, "type": "string"}, "services.smokeping.probeConfig": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "''\n  + FPing\n  binary = ${config.security.wrapperDir}/fping\n''\n"}, "description": {"_type": "mdDoc", "text": "Probe configuration"}, "loc": ["services", "smokeping", "probeConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.smokeping.sendmail": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use this sendmail compatible script to deliver alerts"}, "example": {"_type": "literalExpression", "text": "\"/run/wrappers/bin/sendmail\""}, "loc": ["services", "smokeping", "sendmail"], "readOnly": false, "type": "null or path"}, "services.smokeping.smokeMailTemplate": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "\"${package}/etc/smokemail.dist\""}, "description": {"_type": "mdDoc", "text": "Specify the smokemail template for alerts."}, "loc": ["services", "smokeping", "smokeMailTemplate"], "readOnly": false, "type": "string"}, "services.smokeping.targetConfig": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "''\n  probe = FPing\n  menu = Top\n  title = Network Latency Grapher\n  remark = Welcome to the SmokePing website of xxx Company. \\\n           Here you will learn all about the latency of our network.\n  + Local\n  menu = Local\n  title = Local Network\n  ++ LocalMachine\n  menu = Local Machine\n  title = This host\n  host = localhost\n''"}, "description": {"_type": "mdDoc", "text": "Target configuration"}, "loc": ["services", "smokeping", "targetConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.smokeping.user": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "\"smokeping\""}, "description": {"_type": "mdDoc", "text": "User that runs smokeping and (optionally) thttpd. A group of the same name will be created as well."}, "loc": ["services", "smokeping", "user"], "readOnly": false, "type": "string"}, "services.smokeping.webService": {"declarations": ["nixos/modules/services/networking/smokeping.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable a smokeping web interface"}, "loc": ["services", "smokeping", "webService"], "readOnly": false, "type": "boolean"}, "services.snapper.cleanupInterval": {"declarations": ["nixos/modules/services/misc/snapper.nix"], "default": {"_type": "literalExpression", "text": "\"1d\""}, "description": {"_type": "mdDoc", "text": "Cleanup interval.\n\nThe format is described in\n{manpage}`systemd.time(7)`.\n"}, "loc": ["services", "snapper", "cleanupInterval"], "readOnly": false, "type": "string"}, "services.snapper.configs": {"declarations": ["nixos/modules/services/misc/snapper.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Subvolume configuration. Any option mentioned in man:snapper-configs(5)\nis valid here, even if NixOS doesn't document it.\n"}, "example": {"_type": "literalExpression", "text": "{\n  home = {\n    SUBVOLUME = \"/home\";\n    ALLOW_USERS = [ \"alice\" ];\n    TIMELINE_CREATE = true;\n    TIMELINE_CLEANUP = true;\n  };\n}\n"}, "loc": ["services", "snapper", "configs"], "readOnly": false, "type": "attribute set of (attribute set of ((list of (string without line breaks or quotes)) or boolean or string without line breaks or quotes or signed integer or floating point number))"}, "services.snapper.configs.<name>.ALLOW_GROUPS": {"declarations": ["nixos/modules/services/misc/snapper.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of groups allowed to operate with the config.\n\nAlso see the PERMISSIONS section in man:snapper(8).\n"}, "loc": ["services", "snapper", "configs", "<name>", "ALLOW_GROUPS"], "readOnly": false, "type": "list of (string without line breaks or quotes)"}, "services.snapper.configs.<name>.ALLOW_USERS": {"declarations": ["nixos/modules/services/misc/snapper.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of users allowed to operate with the config. \"root\" is always\nimplicitly included.\n\nAlso see the PERMISSIONS section in man:snapper(8).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"alice\"\n]"}, "loc": ["services", "snapper", "configs", "<name>", "ALLOW_USERS"], "readOnly": false, "type": "list of (string without line breaks or quotes)"}, "services.snapper.configs.<name>.FSTYPE": {"declarations": ["nixos/modules/services/misc/snapper.nix"], "default": {"_type": "literalExpression", "text": "\"btrfs\""}, "description": {"_type": "mdDoc", "text": "Filesystem type. Only btrfs is stable and tested.\n"}, "loc": ["services", "snapper", "configs", "<name>", "FSTYPE"], "readOnly": false, "type": "value \"btrfs\" (singular enum)"}, "services.snapper.configs.<name>.SUBVOLUME": {"declarations": ["nixos/modules/services/misc/snapper.nix"], "description": {"_type": "mdDoc", "text": "Path of the subvolume or mount point.\nThis path is a subvolume and has to contain a subvolume named\n.snapshots.\nSee also man:snapper(8) section PERMISSIONS.\n"}, "loc": ["services", "snapper", "configs", "<name>", "SUBVOLUME"], "readOnly": false, "type": "path"}, "services.snapper.configs.<name>.TIMELINE_CLEANUP": {"declarations": ["nixos/modules/services/misc/snapper.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Defines whether the timeline cleanup algorithm should be run for the config.\n"}, "loc": ["services", "snapper", "configs", "<name>", "TIMELINE_CLEANUP"], "readOnly": false, "type": "boolean"}, "services.snapper.configs.<name>.TIMELINE_CREATE": {"declarations": ["nixos/modules/services/misc/snapper.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Defines whether hourly snapshots should be created.\n"}, "loc": ["services", "snapper", "configs", "<name>", "TIMELINE_CREATE"], "readOnly": false, "type": "boolean"}, "services.snapper.filters": {"declarations": ["nixos/modules/services/misc/snapper.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Global display difference filter. See man:snapper(8) for more details.\n"}, "loc": ["services", "snapper", "filters"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.snapper.snapshotInterval": {"declarations": ["nixos/modules/services/misc/snapper.nix"], "default": {"_type": "literalExpression", "text": "\"hourly\""}, "description": {"_type": "mdDoc", "text": "Snapshot interval.\n\nThe format is described in\n{manpage}`systemd.time(7)`.\n"}, "loc": ["services", "snapper", "snapshotInterval"], "readOnly": false, "type": "string"}, "services.snapper.snapshotRootOnBoot": {"declarations": ["nixos/modules/services/misc/snapper.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to snapshot root on boot\n"}, "loc": ["services", "snapper", "snapshotRootOnBoot"], "readOnly": false, "type": "boolean"}, "services.snapserver.buffer": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Network buffer in ms.\n"}, "example": {"_type": "literalExpression", "text": "1000"}, "loc": ["services", "snapserver", "buffer"], "readOnly": false, "type": "null or signed integer"}, "services.snapserver.codec": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Default audio compression method.\n"}, "example": {"_type": "literalExpression", "text": "\"flac\""}, "loc": ["services", "snapserver", "codec"], "readOnly": false, "type": "null or string"}, "services.snapserver.enable": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable snapserver.\n"}, "loc": ["services", "snapserver", "enable"], "readOnly": false, "type": "boolean"}, "services.snapserver.http.docRoot": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to serve from the HTTP servers root.\n"}, "loc": ["services", "snapserver", "http", "docRoot"], "readOnly": false, "type": "null or path"}, "services.snapserver.http.enable": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the JSON-RPC via HTTP.\n"}, "loc": ["services", "snapserver", "http", "enable"], "readOnly": false, "type": "boolean"}, "services.snapserver.http.listenAddress": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "\"::\""}, "description": {"_type": "mdDoc", "text": "The address where the HTTP JSON-RPC listens on.\n"}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "snapserver", "http", "listenAddress"], "readOnly": false, "type": "string"}, "services.snapserver.http.port": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "1780"}, "description": {"_type": "mdDoc", "text": "The port where the HTTP JSON-RPC listens on.\n"}, "loc": ["services", "snapserver", "http", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.snapserver.listenAddress": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "\"::\""}, "description": {"_type": "mdDoc", "text": "The address where snapclients can connect.\n"}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "snapserver", "listenAddress"], "readOnly": false, "type": "string"}, "services.snapserver.openFirewall": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to automatically open the specified ports in the firewall.\n"}, "loc": ["services", "snapserver", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.snapserver.port": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "1704"}, "description": {"_type": "mdDoc", "text": "The port that snapclients can connect to.\n"}, "loc": ["services", "snapserver", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.snapserver.sampleFormat": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Default sample format.\n"}, "example": {"_type": "literalExpression", "text": "\"48000:16:2\""}, "loc": ["services", "snapserver", "sampleFormat"], "readOnly": false, "type": "null or string"}, "services.snapserver.sendToMuted": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Send audio to muted clients.\n"}, "loc": ["services", "snapserver", "sendToMuted"], "readOnly": false, "type": "boolean"}, "services.snapserver.streamBuffer": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Stream read (input) buffer in ms.\n"}, "example": {"_type": "literalExpression", "text": "20"}, "loc": ["services", "snapserver", "streamBuffer"], "readOnly": false, "type": "null or signed integer"}, "services.snapserver.streams": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "{\n  default = { };\n}"}, "description": {"_type": "mdDoc", "text": "The definition for an input source.\n"}, "example": {"_type": "literalExpression", "text": "{\n  mpd = {\n    type = \"pipe\";\n    location = \"/run/snapserver/mpd\";\n    sampleFormat = \"48000:16:2\";\n    codec = \"pcm\";\n  };\n};\n"}, "loc": ["services", "snapserver", "streams"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.snapserver.streams.<name>.codec": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Default audio compression method.\n"}, "example": {"_type": "literalExpression", "text": "\"flac\""}, "loc": ["services", "snapserver", "streams", "<name>", "codec"], "readOnly": false, "type": "null or string"}, "services.snapserver.streams.<name>.location": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "description": {"_type": "mdDoc", "text": "For type `pipe` or `file`, the path to the pipe or file.\nFor type `librespot`, `airplay` or `process`, the path to the corresponding binary.\nFor type `tcp`, the `host:port` address to connect to or listen on.\nFor type `meta`, a list of stream names in the form `/one/two/...`. Don't forget the leading slash.\nFor type `alsa`, use an empty string.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/pipe\"\n\"/path/to/librespot\"\n\"192.168.1.2:4444\"\n\"/MyTCP/Spotify/MyPipe\"\n"}, "loc": ["services", "snapserver", "streams", "<name>", "location"], "readOnly": false, "type": "path or string"}, "services.snapserver.streams.<name>.query": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Key-value pairs that convey additional parameters about a stream.\n"}, "example": {"_type": "literalExpression", "text": "# for type == \"pipe\":\n{\n  mode = \"create\";\n};\n# for type == \"process\":\n{\n  params = \"--param1 --param2\";\n  logStderr = \"true\";\n};\n# for type == \"tcp\":\n{\n  mode = \"client\";\n}\n# for type == \"alsa\":\n{\n  device = \"hw:0,0\";\n}\n"}, "loc": ["services", "snapserver", "streams", "<name>", "query"], "readOnly": false, "type": "attribute set of string"}, "services.snapserver.streams.<name>.sampleFormat": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Default sample format.\n"}, "example": {"_type": "literalExpression", "text": "\"48000:16:2\""}, "loc": ["services", "snapserver", "streams", "<name>", "sampleFormat"], "readOnly": false, "type": "null or string"}, "services.snapserver.streams.<name>.type": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "\"pipe\""}, "description": {"_type": "mdDoc", "text": "The type of input stream.\n"}, "loc": ["services", "snapserver", "streams", "<name>", "type"], "readOnly": false, "type": "one of \"pipe\", \"librespot\", \"airplay\", \"file\", \"process\", \"tcp\", \"alsa\", \"spotify\", \"meta\""}, "services.snapserver.tcp.enable": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the JSON-RPC via TCP.\n"}, "loc": ["services", "snapserver", "tcp", "enable"], "readOnly": false, "type": "boolean"}, "services.snapserver.tcp.listenAddress": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "\"::\""}, "description": {"_type": "mdDoc", "text": "The address where the TCP JSON-RPC listens on.\n"}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "snapserver", "tcp", "listenAddress"], "readOnly": false, "type": "string"}, "services.snapserver.tcp.port": {"declarations": ["nixos/modules/services/audio/snapserver.nix"], "default": {"_type": "literalExpression", "text": "1705"}, "description": {"_type": "mdDoc", "text": "The port where the TCP JSON-RPC listens on.\n"}, "loc": ["services", "snapserver", "tcp", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.snipe-it.appKeyFile": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "description": {"_type": "mdDoc", "text": "A file containing the Laravel APP_KEY - a 32 character long,\nbase64 encoded key used for encryption where needed. Can be\ngenerated with `head -c 32 /dev/urandom | base64`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/snipe-it/appkey\""}, "loc": ["services", "snipe-it", "appKeyFile"], "readOnly": false, "type": "path"}, "services.snipe-it.appURL": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "''\n  http''${lib.optionalString tlsEnabled \"s\"}://''${cfg.hostName}\n''"}, "description": {"_type": "mdDoc", "text": "The root URL that you want to host Snipe-IT on. All URLs in Snipe-IT will be generated using this value.\nIf you change this in the future you may need to run a command to update stored URLs in the database.\nCommand example: `snipe-it snipe-it:update-url https://old.example.com https://new.example.com`\n"}, "example": {"_type": "literalExpression", "text": "\"https://example.com\""}, "loc": ["services", "snipe-it", "appURL"], "readOnly": false, "type": "string"}, "services.snipe-it.config": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Snipe-IT configuration options to set in the\n{file}`.env` file.\nRefer to <https://snipe-it.readme.io/docs/configuration>\nfor details on supported values.\n\nSettings containing secret data should be set to an attribute\nset containing the attribute `_secret` - a\nstring pointing to a file containing the value the option\nshould be set to. See the example to get a better picture of\nthis: in the resulting {file}`.env` file, the\n`OIDC_CLIENT_SECRET` key will be set to the\ncontents of the {file}`/run/keys/oidc_secret`\nfile.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ALLOWED_IFRAME_HOSTS = \"https://example.com\";\n  WKHTMLTOPDF = \"${pkgs.wkhtmltopdf}/bin/wkhtmltopdf\";\n  AUTH_METHOD = \"oidc\";\n  OIDC_NAME = \"MyLogin\";\n  OIDC_DISPLAY_NAME_CLAIMS = \"name\";\n  OIDC_CLIENT_ID = \"snipe-it\";\n  OIDC_CLIENT_SECRET = {_secret = \"/run/keys/oidc_secret\"};\n  OIDC_ISSUER = \"https://keycloak.example.com/auth/realms/My%20Realm\";\n  OIDC_ISSUER_DISCOVER = true;\n}\n"}, "loc": ["services", "snipe-it", "config"], "readOnly": false, "type": "attribute set of (null or boolean or signed integer or 16 bit unsigned integer; between 0 and 65535 (both inclusive) or path or string or (submodule))"}, "services.snipe-it.dataDir": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/snipe-it\""}, "description": {"_type": "mdDoc", "text": "snipe-it data directory"}, "loc": ["services", "snipe-it", "dataDir"], "readOnly": false, "type": "path"}, "services.snipe-it.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally."}, "loc": ["services", "snipe-it", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.snipe-it.database.host": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "snipe-it", "database", "host"], "readOnly": false, "type": "string"}, "services.snipe-it.database.name": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"snipeit\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "snipe-it", "database", "name"], "readOnly": false, "type": "string"}, "services.snipe-it.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/snipe-it/dbpassword\""}, "loc": ["services", "snipe-it", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.snipe-it.database.port": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "3306"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "snipe-it", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.snipe-it.database.user": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "user"}, "description": {"_type": "mdDoc", "text": "Database username."}, "loc": ["services", "snipe-it", "database", "user"], "readOnly": false, "type": "string"}, "services.snipe-it.enable": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable A free open source IT asset/license management system."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "snipe-it", "enable"], "readOnly": false, "type": "boolean"}, "services.snipe-it.group": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"snipeit\""}, "description": {"_type": "mdDoc", "text": "Group snipe-it runs as."}, "loc": ["services", "snipe-it", "group"], "readOnly": false, "type": "string"}, "services.snipe-it.hostName": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "config.networking.fqdnOrHostName"}, "description": {"_type": "mdDoc", "text": "The hostname to serve Snipe-IT on.\n"}, "example": {"_type": "literalExpression", "text": "\"snipe-it.example.com\""}, "loc": ["services", "snipe-it", "hostName"], "readOnly": false, "type": "string"}, "services.snipe-it.mail.backupNotificationAddress": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"backup@example.com\""}, "description": {"_type": "mdDoc", "text": "Email Address to send Backup Notifications to."}, "loc": ["services", "snipe-it", "mail", "backupNotificationAddress"], "readOnly": false, "type": "string"}, "services.snipe-it.mail.driver": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"smtp\""}, "description": {"_type": "mdDoc", "text": "Mail driver to use."}, "loc": ["services", "snipe-it", "mail", "driver"], "readOnly": false, "type": "one of \"smtp\", \"sendmail\""}, "services.snipe-it.mail.encryption": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SMTP encryption mechanism to use."}, "loc": ["services", "snipe-it", "mail", "encryption"], "readOnly": false, "type": "null or one of \"tls\", \"ssl\""}, "services.snipe-it.mail.from.address": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"mail@example.com\""}, "description": {"_type": "mdDoc", "text": "Mail \"from\" address."}, "loc": ["services", "snipe-it", "mail", "from", "address"], "readOnly": false, "type": "string"}, "services.snipe-it.mail.from.name": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"Snipe-IT Asset Management\""}, "description": {"_type": "mdDoc", "text": "Mail \"from\" name."}, "loc": ["services", "snipe-it", "mail", "from", "name"], "readOnly": false, "type": "string"}, "services.snipe-it.mail.host": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Mail host address."}, "loc": ["services", "snipe-it", "mail", "host"], "readOnly": false, "type": "string"}, "services.snipe-it.mail.passwordFile": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`mail.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/snipe-it/mailpassword\""}, "loc": ["services", "snipe-it", "mail", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.snipe-it.mail.port": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "1025"}, "description": {"_type": "mdDoc", "text": "Mail host port."}, "loc": ["services", "snipe-it", "mail", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.snipe-it.mail.replyTo.address": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"mail@example.com\""}, "description": {"_type": "mdDoc", "text": "Mail \"reply-to\" address."}, "loc": ["services", "snipe-it", "mail", "replyTo", "address"], "readOnly": false, "type": "string"}, "services.snipe-it.mail.replyTo.name": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"Snipe-IT Asset Management\""}, "description": {"_type": "mdDoc", "text": "Mail \"reply-to\" name."}, "loc": ["services", "snipe-it", "mail", "replyTo", "name"], "readOnly": false, "type": "string"}, "services.snipe-it.mail.user": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Mail username."}, "example": {"_type": "literalExpression", "text": "\"snipeit\""}, "loc": ["services", "snipe-it", "mail", "user"], "readOnly": false, "type": "null or string"}, "services.snipe-it.maxUploadSize": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"18M\""}, "description": {"_type": "mdDoc", "text": "The maximum size for uploads (e.g. images)."}, "example": {"_type": "literalExpression", "text": "\"1G\""}, "loc": ["services", "snipe-it", "maxUploadSize"], "readOnly": false, "type": "string"}, "services.snipe-it.nginx": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "With this option, you can customize the nginx virtualHost settings.\n"}, "example": {"_type": "literalExpression", "text": "{\n  serverAliases = [\n    \"snipe-it.${config.networking.domain}\"\n  ];\n  # To enable encryption and let let's encrypt take care of certificate\n  forceSSL = true;\n  enableACME = true;\n}\n"}, "loc": ["services", "snipe-it", "nginx"], "readOnly": false, "type": "submodule"}, "services.snipe-it.nginx.acmeFallbackHost": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host which to proxy requests to if ACME challenge is not found. Useful\nif you want multiple hosts to be able to verify the same domain name.\n\nWith this option, you could request certificates for the present domain\nwith an ACME client that is running on another host, which you would\nspecify here.\n"}, "loc": ["services", "snipe-it", "nginx", "acmeFallbackHost"], "readOnly": false, "type": "null or string"}, "services.snipe-it.nginx.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the ACME challenge, which is **public**. Don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "snipe-it", "nginx", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.snipe-it.nginx.addSSL": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "snipe-it", "nginx", "addSSL"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.basicAuth": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "snipe-it", "nginx", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.snipe-it.nginx.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "snipe-it", "nginx", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.snipe-it.nginx.default": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Makes this vhost the default.\n"}, "loc": ["services", "snipe-it", "nginx", "default"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.enableACME": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "snipe-it", "nginx", "enableACME"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.extraConfig": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the vhost verbatim.\n"}, "loc": ["services", "snipe-it", "nginx", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.snipe-it.nginx.forceSSL": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "snipe-it", "nginx", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given hostname.\n"}, "example": {"_type": "literalExpression", "text": "\"newserver.example.org\""}, "loc": ["services", "snipe-it", "nginx", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.snipe-it.nginx.http2": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/2 protocol.\nNote that (as of writing) due to nginx's implementation, to disable\nHTTP/2 you have to disable it on all vhosts that use a given\nIP address / port.\nIf there is one server block configured to enable http2, then it is\nenabled for all server blocks on this IP.\nSee https://stackoverflow.com/a/39466948/263061.\n"}, "loc": ["services", "snipe-it", "nginx", "http2"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.http3": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/3 protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that HTTP/3 support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "snipe-it", "nginx", "http3"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.http3_hq": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that special application protocol support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "snipe-it", "nginx", "http3_hq"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.kTLS": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kTLS support.\nImplementing TLS in the kernel (kTLS) improves performance by significantly\nreducing the need for copying operations between user space and the kernel.\nRequired Nginx version 1.21.4 or later.\n"}, "loc": ["services", "snipe-it", "nginx", "kTLS"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.listen": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\nIPv6 addresses must be enclosed in square brackets.\nNote: this option overrides `addSSL`\nand `onlySSL`.\n\nIf you only want to set the addresses manually and not\nthe ports, take a look at `listenAddresses`\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    addr = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    addr = \"192.154.1.1\";\n    port = 80;\n  }\n]"}, "loc": ["services", "snipe-it", "nginx", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.snipe-it.nginx.listen.*.addr": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "description": {"_type": "mdDoc", "text": "IP address."}, "loc": ["services", "snipe-it", "nginx", "listen", "*", "addr"], "readOnly": false, "type": "string"}, "services.snipe-it.nginx.listen.*.extraParameters": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters of this listen directive."}, "example": {"_type": "literalExpression", "text": "[\n  \"backlog=1024\"\n  \"deferred\"\n]"}, "loc": ["services", "snipe-it", "nginx", "listen", "*", "extraParameters"], "readOnly": false, "type": "list of string"}, "services.snipe-it.nginx.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Port number."}, "loc": ["services", "snipe-it", "nginx", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.snipe-it.nginx.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SSL."}, "loc": ["services", "snipe-it", "nginx", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n\nNote: This option overrides `enableIPv6`\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"[::1]\"\n]"}, "loc": ["services", "snipe-it", "nginx", "listenAddresses"], "readOnly": false, "type": "list of string"}, "services.snipe-it.nginx.locations": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n};\n"}, "loc": ["services", "snipe-it", "nginx", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.snipe-it.nginx.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "snipe-it", "nginx", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.snipe-it.nginx.locations.<name>.basicAuth": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "snipe-it", "nginx", "locations", "<name>", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.snipe-it.nginx.locations.<name>.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "snipe-it", "nginx", "locations", "<name>", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.snipe-it.nginx.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "snipe-it", "nginx", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.snipe-it.nginx.locations.<name>.fastcgiParams": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "FastCGI parameters to override.  Unlike in the Nginx\nconfiguration file, overriding only some default parameters\nwon't unset the default values for other parameters.\n"}, "loc": ["services", "snipe-it", "nginx", "locations", "<name>", "fastcgiParams"], "readOnly": false, "type": "attribute set of (string or path)"}, "services.snipe-it.nginx.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds index directive.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "snipe-it", "nginx", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.snipe-it.nginx.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "snipe-it", "nginx", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.snipe-it.nginx.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds proxy_pass directive and sets recommended proxy headers if\nrecommendedProxySettings is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "snipe-it", "nginx", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.snipe-it.nginx.locations.<name>.proxyWebsockets": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to support proxying websocket connections with HTTP/1.1.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "snipe-it", "nginx", "locations", "<name>", "proxyWebsockets"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.locations.<name>.recommendedProxySettings": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "config.services.nginx.recommendedProxySettings"}, "description": {"_type": "mdDoc", "text": "Enable recommended proxy settings.\n"}, "loc": ["services", "snipe-it", "nginx", "locations", "<name>", "recommendedProxySettings"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.locations.<name>.return": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds a return directive, for e.g. redirections.\n"}, "example": {"_type": "literalExpression", "text": "\"301 http://example.com$request_uri\""}, "loc": ["services", "snipe-it", "nginx", "locations", "<name>", "return"], "readOnly": false, "type": "null or string"}, "services.snipe-it.nginx.locations.<name>.root": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Root directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/root/directory\""}, "loc": ["services", "snipe-it", "nginx", "locations", "<name>", "root"], "readOnly": false, "type": "null or path"}, "services.snipe-it.nginx.locations.<name>.tryFiles": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds try_files directive.\n"}, "example": {"_type": "literalExpression", "text": "\"$uri =404\""}, "loc": ["services", "snipe-it", "nginx", "locations", "<name>", "tryFiles"], "readOnly": false, "type": "null or string"}, "services.snipe-it.nginx.onlySSL": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "snipe-it", "nginx", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.quic": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the QUIC transport protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.\nNote that QUIC support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "snipe-it", "nginx", "quic"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.rejectSSL": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to listen for and reject all HTTPS connections to this vhost. Useful in\n[default](#opt-services.nginx.virtualHosts._name_.default)\nserver blocks to avoid serving the certificate for another vhost. Uses the\n`ssl_reject_handshake` directive available in nginx versions\n1.19.4 and above.\n"}, "loc": ["services", "snipe-it", "nginx", "rejectSSL"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.reuseport": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create an individual listening socket .\nIt is required to specify only once on one of the hosts.\n"}, "loc": ["services", "snipe-it", "nginx", "reuseport"], "readOnly": false, "type": "boolean"}, "services.snipe-it.nginx.root": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of the web root directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "snipe-it", "nginx", "root"], "readOnly": false, "type": "null or path"}, "services.snipe-it.nginx.serverAliases": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"example.org\"\n]"}, "loc": ["services", "snipe-it", "nginx", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.snipe-it.nginx.serverName": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of this virtual host. Defaults to attribute name in virtualHosts.\n"}, "example": {"_type": "literalExpression", "text": "\"example.org\""}, "loc": ["services", "snipe-it", "nginx", "serverName"], "readOnly": false, "type": "null or string"}, "services.snipe-it.nginx.sslCertificate": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "snipe-it", "nginx", "sslCertificate"], "readOnly": false, "type": "path"}, "services.snipe-it.nginx.sslCertificateKey": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "snipe-it", "nginx", "sslCertificateKey"], "readOnly": false, "type": "path"}, "services.snipe-it.nginx.sslTrustedCertificate": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to root SSL certificate for stapling and client certificates."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\""}, "loc": ["services", "snipe-it", "nginx", "sslTrustedCertificate"], "readOnly": false, "type": "null or path"}, "services.snipe-it.nginx.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "snipe-it", "nginx", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.snipe-it.poolConfig": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = 32;\n  \"pm.max_requests\" = 500;\n  \"pm.max_spare_servers\" = 4;\n  \"pm.min_spare_servers\" = 2;\n  \"pm.start_servers\" = 2;\n}"}, "description": {"_type": "mdDoc", "text": "Options for the snipe-it PHP pool. See the documentation on `php-fpm.conf`\nfor details on configuration directives.\n"}, "loc": ["services", "snipe-it", "poolConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.snipe-it.user": {"declarations": ["nixos/modules/services/web-apps/snipe-it.nix"], "default": {"_type": "literalExpression", "text": "\"snipeit\""}, "description": {"_type": "mdDoc", "text": "User snipe-it runs as."}, "loc": ["services", "snipe-it", "user"], "readOnly": false, "type": "string"}, "services.sniproxy.config": {"declarations": ["nixos/modules/services/networking/sniproxy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "sniproxy.conf configuration excluding the daemon username and pid file."}, "example": {"_type": "literalExpression", "text": "''\n  error_log {\n    filename /var/log/sniproxy/error.log\n  }\n  access_log {\n    filename /var/log/sniproxy/access.log\n  }\n  listen 443 {\n    proto tls\n  }\n  table {\n    example.com 192.0.2.10\n    example.net 192.0.2.20\n  }\n''"}, "loc": ["services", "sniproxy", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.sniproxy.enable": {"declarations": ["nixos/modules/services/networking/sniproxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sniproxy server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sniproxy", "enable"], "readOnly": false, "type": "boolean"}, "services.sniproxy.group": {"declarations": ["nixos/modules/services/networking/sniproxy.nix"], "default": {"_type": "literalExpression", "text": "\"sniproxy\""}, "description": {"_type": "mdDoc", "text": "Group under which sniproxy runs."}, "loc": ["services", "sniproxy", "group"], "readOnly": false, "type": "string"}, "services.sniproxy.user": {"declarations": ["nixos/modules/services/networking/sniproxy.nix"], "default": {"_type": "literalExpression", "text": "\"sniproxy\""}, "description": {"_type": "mdDoc", "text": "User account under which sniproxy runs."}, "loc": ["services", "sniproxy", "user"], "readOnly": false, "type": "string"}, "services.snowflake-proxy.broker": {"declarations": ["nixos/modules/services/networking/snowflake-proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Broker URL (default \"https://snowflake-broker.torproject.net/\")"}, "loc": ["services", "snowflake-proxy", "broker"], "readOnly": false, "type": "null or string"}, "services.snowflake-proxy.capacity": {"declarations": ["nixos/modules/services/networking/snowflake-proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Limits the amount of maximum concurrent clients allowed."}, "loc": ["services", "snowflake-proxy", "capacity"], "readOnly": false, "type": "null or signed integer"}, "services.snowflake-proxy.enable": {"declarations": ["nixos/modules/services/networking/snowflake-proxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable System to defeat internet censorship."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "snowflake-proxy", "enable"], "readOnly": false, "type": "boolean"}, "services.snowflake-proxy.relay": {"declarations": ["nixos/modules/services/networking/snowflake-proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "websocket relay URL (default \"wss://snowflake.bamsoftware.com/\")"}, "loc": ["services", "snowflake-proxy", "relay"], "readOnly": false, "type": "null or string"}, "services.snowflake-proxy.stun": {"declarations": ["nixos/modules/services/networking/snowflake-proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "STUN broker URL (default \"stun:stun.stunprotocol.org:3478\")"}, "loc": ["services", "snowflake-proxy", "stun"], "readOnly": false, "type": "null or string"}, "services.softether.dataDir": {"declarations": ["nixos/modules/services/networking/softether.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/softether\""}, "description": {"_type": "mdDoc", "text": "Data directory for SoftEther VPN.\n"}, "loc": ["services", "softether", "dataDir"], "readOnly": false, "type": "path"}, "services.softether.enable": {"declarations": ["nixos/modules/services/networking/softether.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SoftEther VPN services."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "softether", "enable"], "readOnly": false, "type": "boolean"}, "services.softether.package": {"declarations": ["nixos/modules/services/networking/softether.nix"], "default": {"_type": "literalExpression", "text": "pkgs.softether"}, "description": {"_type": "mdDoc", "text": "softether derivation to use.\n"}, "loc": ["services", "softether", "package"], "readOnly": false, "type": "package"}, "services.softether.vpnbridge.enable": {"declarations": ["nixos/modules/services/networking/softether.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SoftEther VPN Bridge."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "softether", "vpnbridge", "enable"], "readOnly": false, "type": "boolean"}, "services.softether.vpnclient.down": {"declarations": ["nixos/modules/services/networking/softether.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed when the Virtual Network Adapter(s) is/are shutting down.\n"}, "loc": ["services", "softether", "vpnclient", "down"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.softether.vpnclient.enable": {"declarations": ["nixos/modules/services/networking/softether.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SoftEther VPN Client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "softether", "vpnclient", "enable"], "readOnly": false, "type": "boolean"}, "services.softether.vpnclient.up": {"declarations": ["nixos/modules/services/networking/softether.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed when the Virtual Network Adapter(s) is/are starting.\n"}, "loc": ["services", "softether", "vpnclient", "up"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.softether.vpnserver.enable": {"declarations": ["nixos/modules/services/networking/softether.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SoftEther VPN Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "softether", "vpnserver", "enable"], "readOnly": false, "type": "boolean"}, "services.sogo.configReplaces": {"declarations": ["nixos/modules/services/web-apps/sogo.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Replacement-filepath mapping for sogo.conf.\nEvery key is replaced with the contents of the file specified as value.\n\nIn the example, every occurrence of LDAP_BINDPW will be replaced with the text of the\nspecified file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  LDAP_BINDPW = \"/var/lib/secrets/sogo/ldappw\";\n}"}, "loc": ["services", "sogo", "configReplaces"], "readOnly": false, "type": "attribute set of string"}, "services.sogo.ealarmsCredFile": {"declarations": ["nixos/modules/services/web-apps/sogo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional path to a credentials file for email alarms"}, "loc": ["services", "sogo", "ealarmsCredFile"], "readOnly": false, "type": "null or string"}, "services.sogo.enable": {"declarations": ["nixos/modules/services/web-apps/sogo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SOGo groupware."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sogo", "enable"], "readOnly": false, "type": "boolean"}, "services.sogo.extraConfig": {"declarations": ["nixos/modules/services/web-apps/sogo.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra sogo.conf configuration lines"}, "loc": ["services", "sogo", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.sogo.language": {"declarations": ["nixos/modules/services/web-apps/sogo.nix"], "default": {"_type": "literalExpression", "text": "\"English\""}, "description": {"_type": "mdDoc", "text": "Language of SOGo"}, "loc": ["services", "sogo", "language"], "readOnly": false, "type": "string"}, "services.sogo.timezone": {"declarations": ["nixos/modules/services/web-apps/sogo.nix"], "description": {"_type": "mdDoc", "text": "Timezone of your SOGo instance"}, "example": {"_type": "literalExpression", "text": "\"America/Montreal\""}, "loc": ["services", "sogo", "timezone"], "readOnly": false, "type": "string"}, "services.sogo.vhostName": {"declarations": ["nixos/modules/services/web-apps/sogo.nix"], "default": {"_type": "literalExpression", "text": "\"sogo\""}, "description": {"_type": "mdDoc", "text": "Name of the nginx vhost"}, "loc": ["services", "sogo", "vhostName"], "readOnly": false, "type": "string"}, "services.soju.acceptProxyIP": {"declarations": ["nixos/modules/services/networking/soju.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Allow the specified IPs to act as a proxy. Proxys have the ability to\noverwrite the remote and local connection addresses (via the X-Forwarded-\\*\nHTTP header fields). The special name \"localhost\" accepts the loopback\naddresses 127.0.0.0/8 and ::1/128. By default, all IPs are rejected.\n"}, "loc": ["services", "soju", "acceptProxyIP"], "readOnly": false, "type": "list of string"}, "services.soju.enable": {"declarations": ["nixos/modules/services/networking/soju.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable soju."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "soju", "enable"], "readOnly": false, "type": "boolean"}, "services.soju.enableMessageLogging": {"declarations": ["nixos/modules/services/networking/soju.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable message logging."}, "loc": ["services", "soju", "enableMessageLogging"], "readOnly": false, "type": "boolean"}, "services.soju.extraConfig": {"declarations": ["nixos/modules/services/networking/soju.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Lines added verbatim to the configuration file."}, "loc": ["services", "soju", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.soju.hostName": {"declarations": ["nixos/modules/services/networking/soju.nix"], "default": {"_type": "literalExpression", "text": "config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "Server hostname."}, "loc": ["services", "soju", "hostName"], "readOnly": false, "type": "string"}, "services.soju.httpOrigins": {"declarations": ["nixos/modules/services/networking/soju.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of allowed HTTP origins for WebSocket listeners. The parameters are\ninterpreted as shell patterns, see\n{manpage}`glob(7)`.\n"}, "loc": ["services", "soju", "httpOrigins"], "readOnly": false, "type": "list of string"}, "services.soju.listen": {"declarations": ["nixos/modules/services/networking/soju.nix"], "default": {"_type": "literalExpression", "text": "[\n  \":6697\"\n]"}, "description": {"_type": "mdDoc", "text": "Where soju should listen for incoming connections. See the\n`listen` directive in\n{manpage}`soju(1)`.\n"}, "loc": ["services", "soju", "listen"], "readOnly": false, "type": "list of string"}, "services.soju.tlsCertificate": {"declarations": ["nixos/modules/services/networking/soju.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to server TLS certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "soju", "tlsCertificate"], "readOnly": false, "type": "null or path"}, "services.soju.tlsCertificateKey": {"declarations": ["nixos/modules/services/networking/soju.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to server TLS certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "soju", "tlsCertificateKey"], "readOnly": false, "type": "null or path"}, "services.solanum.config": {"declarations": ["nixos/modules/services/networking/solanum.nix"], "default": {"_type": "literalExpression", "text": "''\n  serverinfo {\n    name = \"irc.example.com\";\n    sid = \"1ix\";\n    description = \"irc!\";\n  \n    vhost = \"0.0.0.0\";\n    vhost6 = \"::\";\n  };\n  \n  listen {\n    host = \"0.0.0.0\";\n    port = 6667;\n  };\n  \n  auth {\n    user = \"*@*\";\n    class = \"users\";\n    flags = exceed_limit;\n  };\n  channel {\n    default_split_user_count = 0;\n  };\n''"}, "description": {"_type": "mdDoc", "text": "Solanum IRC daemon configuration file.\ncheck <https://github.com/solanum-ircd/solanum/blob/main/doc/reference.conf> for all options.\n"}, "loc": ["services", "solanum", "config"], "readOnly": false, "type": "string"}, "services.solanum.enable": {"declarations": ["nixos/modules/services/networking/solanum.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Solanum IRC daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "solanum", "enable"], "readOnly": false, "type": "boolean"}, "services.solanum.motd": {"declarations": ["nixos/modules/services/networking/solanum.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Solanum MOTD text.\n\nSolanum will read its MOTD from `/etc/solanum/ircd.motd`.\nIf set, the value of this option will be written to this path.\n"}, "loc": ["services", "solanum", "motd"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.solanum.openFilesLimit": {"declarations": ["nixos/modules/services/networking/solanum.nix"], "default": {"_type": "literalExpression", "text": "1024"}, "description": {"_type": "mdDoc", "text": "Maximum number of open files. Limits the clients and server connections.\n"}, "loc": ["services", "solanum", "openFilesLimit"], "readOnly": false, "type": "signed integer"}, "services.sonarr.dataDir": {"declarations": ["nixos/modules/services/misc/sonarr.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/sonarr/.config/NzbDrone\""}, "description": {"_type": "mdDoc", "text": "The directory where Sonarr stores its data files."}, "loc": ["services", "sonarr", "dataDir"], "readOnly": false, "type": "string"}, "services.sonarr.enable": {"declarations": ["nixos/modules/services/misc/sonarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Sonarr."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sonarr", "enable"], "readOnly": false, "type": "boolean"}, "services.sonarr.group": {"declarations": ["nixos/modules/services/misc/sonarr.nix"], "default": {"_type": "literalExpression", "text": "\"sonarr\""}, "description": {"_type": "mdDoc", "text": "Group under which Sonaar runs."}, "loc": ["services", "sonarr", "group"], "readOnly": false, "type": "string"}, "services.sonarr.openFirewall": {"declarations": ["nixos/modules/services/misc/sonarr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the Sonarr web interface\n"}, "loc": ["services", "sonarr", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.sonarr.package": {"declarations": ["nixos/modules/services/misc/sonarr.nix"], "default": {"_type": "literalExpression", "text": "pkgs.sonarr"}, "description": {"_type": "mdDoc", "text": "Sonarr package to use.\n"}, "loc": ["services", "sonarr", "package"], "readOnly": false, "type": "package"}, "services.sonarr.user": {"declarations": ["nixos/modules/services/misc/sonarr.nix"], "default": {"_type": "literalExpression", "text": "\"sonarr\""}, "description": {"_type": "mdDoc", "text": "User account under which Sonaar runs."}, "loc": ["services", "sonarr", "user"], "readOnly": false, "type": "string"}, "services.sourcehut.builds.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable builds service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "builds", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.builds.enableWorker": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable worker for builds.sr.ht\n\n::: {.warning}\nFor smaller deployments, job runners can be installed alongside the master server\nbut even if you only build your own software, integration with other services\nmay cause you to run untrusted builds\n(e.g. automatic testing of patches via listssrht).\nSee <https://man.sr.ht/builds.sr.ht/configuration.md#security-model>.\n:::\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "builds", "enableWorker"], "readOnly": false, "type": "boolean"}, "services.sourcehut.builds.group": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"buildsrht\""}, "description": {"_type": "mdDoc", "text": "Group for builds.sr.ht.\nMembership grants access to the Git/Mercurial repositories by default,\nbut not to the config.ini file (where secrets are).\n"}, "loc": ["services", "sourcehut", "builds", "group"], "readOnly": false, "type": "string"}, "services.sourcehut.builds.gunicorn.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--timeout 120\"\n  \"--workers 1\"\n  \"--log-level=info\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to Gunicorn."}, "loc": ["services", "sourcehut", "builds", "gunicorn", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.builds.images": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Images for builds.sr.ht. Each package should be distro.release.arch and point to a /nix/store/package/root.img.qcow2.\n"}, "example": {"_type": "literalExpression", "text": "(let\n            # Pinning unstable to allow usage with flakes and limit rebuilds.\n            pkgs_unstable = builtins.fetchGit {\n                url = \"https://github.com/NixOS/nixpkgs\";\n                rev = \"ff96a0fa5635770390b184ae74debea75c3fd534\";\n                ref = \"nixos-unstable\";\n            };\n            image_from_nixpkgs = (import (\"${pkgs.sourcehut.buildsrht}/lib/images/nixos/image.nix\") {\n              pkgs = (import pkgs_unstable {});\n            });\n          in\n          {\n            nixos.unstable.x86_64 = image_from_nixpkgs;\n          }\n        )"}, "loc": ["services", "sourcehut", "builds", "images"], "readOnly": false, "type": "attribute set of attribute set of attribute set of package"}, "services.sourcehut.builds.port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "5002"}, "description": {"_type": "mdDoc", "text": "Port on which the \"builds\" backend should listen.\n"}, "loc": ["services", "sourcehut", "builds", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sourcehut.builds.postgresql.database": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"builds.sr.ht\""}, "description": {"_type": "mdDoc", "text": "PostgreSQL database name for the builds.sr.ht service,\nused if [](#opt-services.sourcehut.postgresql.enable) is `true`.\n"}, "loc": ["services", "sourcehut", "builds", "postgresql", "database"], "readOnly": false, "type": "string"}, "services.sourcehut.builds.redis.host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"unix:///run/redis-sourcehut-buildsrht/redis.sock?db=0\""}, "description": {"_type": "mdDoc", "text": "The redis host URL. This is used for caching and temporary storage, and must\nbe shared between nodes (e.g. git1.sr.ht and git2.sr.ht), but need not be\nshared between services. It may be shared between services, however, with no\nill effect, if this better suits your infrastructure.\n"}, "example": {"_type": "literalExpression", "text": "\"redis://shared.wireguard:6379/0\""}, "loc": ["services", "sourcehut", "builds", "redis", "host"], "readOnly": false, "type": "string"}, "services.sourcehut.builds.user": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"buildsrht\""}, "description": {"_type": "mdDoc", "text": "User for builds.sr.ht.\n"}, "loc": ["services", "sourcehut", "builds", "user"], "readOnly": false, "type": "string"}, "services.sourcehut.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sourcehut - git hosting, continuous integration, mailing list, ticket tracking, wiki\nand account management services\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.git.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable git service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "git", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.git.fcgiwrap.preforkProcess": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "4"}, "description": {"_type": "mdDoc", "text": "Number of fcgiwrap processes to prefork."}, "loc": ["services", "sourcehut", "git", "fcgiwrap", "preforkProcess"], "readOnly": false, "type": "signed integer"}, "services.sourcehut.git.group": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"gitsrht\""}, "description": {"_type": "mdDoc", "text": "Group for git.sr.ht.\nMembership grants access to the Git/Mercurial repositories by default,\nbut not to the config.ini file (where secrets are).\n"}, "loc": ["services", "sourcehut", "git", "group"], "readOnly": false, "type": "string"}, "services.sourcehut.git.gunicorn.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--timeout 120\"\n  \"--workers 1\"\n  \"--log-level=info\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to Gunicorn."}, "loc": ["services", "sourcehut", "git", "gunicorn", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.git.package": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "pkgs.git"}, "description": {"_type": "mdDoc", "text": "Git package for git.sr.ht. This can help silence collisions.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.gitFull"}, "loc": ["services", "sourcehut", "git", "package"], "readOnly": false, "type": "package"}, "services.sourcehut.git.port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "5001"}, "description": {"_type": "mdDoc", "text": "Port on which the \"git\" backend should listen.\n"}, "loc": ["services", "sourcehut", "git", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sourcehut.git.postgresql.database": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"git.sr.ht\""}, "description": {"_type": "mdDoc", "text": "PostgreSQL database name for the git.sr.ht service,\nused if [](#opt-services.sourcehut.postgresql.enable) is `true`.\n"}, "loc": ["services", "sourcehut", "git", "postgresql", "database"], "readOnly": false, "type": "string"}, "services.sourcehut.git.redis.host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"unix:///run/redis-sourcehut-gitsrht/redis.sock?db=0\""}, "description": {"_type": "mdDoc", "text": "The redis host URL. This is used for caching and temporary storage, and must\nbe shared between nodes (e.g. git1.sr.ht and git2.sr.ht), but need not be\nshared between services. It may be shared between services, however, with no\nill effect, if this better suits your infrastructure.\n"}, "example": {"_type": "literalExpression", "text": "\"redis://shared.wireguard:6379/0\""}, "loc": ["services", "sourcehut", "git", "redis", "host"], "readOnly": false, "type": "string"}, "services.sourcehut.git.user": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"gitsrht\""}, "description": {"_type": "mdDoc", "text": "User for git.sr.ht.\n"}, "loc": ["services", "sourcehut", "git", "user"], "readOnly": false, "type": "string"}, "services.sourcehut.git.webhooks.celeryConfig": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Content of the `celeryconfig.py` used by the Celery responsible for webhooks."}, "loc": ["services", "sourcehut", "git", "webhooks", "celeryConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.sourcehut.git.webhooks.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--loglevel DEBUG\"\n  \"--pool eventlet\"\n  \"--without-heartbeat\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to the Celery responsible for webhooks."}, "loc": ["services", "sourcehut", "git", "webhooks", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.hg.cloneBundles": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Generate clonebundles (which require more disk space but dramatically speed up cloning large repositories).\n"}, "loc": ["services", "sourcehut", "hg", "cloneBundles"], "readOnly": false, "type": "boolean"}, "services.sourcehut.hg.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable hg service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "hg", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.hg.group": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"hgsrht\""}, "description": {"_type": "mdDoc", "text": "Group for hg.sr.ht.\nMembership grants access to the Git/Mercurial repositories by default,\nbut not to the config.ini file (where secrets are).\n"}, "loc": ["services", "sourcehut", "hg", "group"], "readOnly": false, "type": "string"}, "services.sourcehut.hg.gunicorn.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--timeout 120\"\n  \"--workers 1\"\n  \"--log-level=info\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to Gunicorn."}, "loc": ["services", "sourcehut", "hg", "gunicorn", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.hg.package": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "pkgs.mercurial"}, "description": {"_type": "mdDoc", "text": "Mercurial package for hg.sr.ht. This can help silence collisions.\n"}, "loc": ["services", "sourcehut", "hg", "package"], "readOnly": false, "type": "package"}, "services.sourcehut.hg.port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "5010"}, "description": {"_type": "mdDoc", "text": "Port on which the \"hg\" backend should listen.\n"}, "loc": ["services", "sourcehut", "hg", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sourcehut.hg.postgresql.database": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"hg.sr.ht\""}, "description": {"_type": "mdDoc", "text": "PostgreSQL database name for the hg.sr.ht service,\nused if [](#opt-services.sourcehut.postgresql.enable) is `true`.\n"}, "loc": ["services", "sourcehut", "hg", "postgresql", "database"], "readOnly": false, "type": "string"}, "services.sourcehut.hg.redis.host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"unix:///run/redis-sourcehut-hgsrht/redis.sock?db=0\""}, "description": {"_type": "mdDoc", "text": "The redis host URL. This is used for caching and temporary storage, and must\nbe shared between nodes (e.g. git1.sr.ht and git2.sr.ht), but need not be\nshared between services. It may be shared between services, however, with no\nill effect, if this better suits your infrastructure.\n"}, "example": {"_type": "literalExpression", "text": "\"redis://shared.wireguard:6379/0\""}, "loc": ["services", "sourcehut", "hg", "redis", "host"], "readOnly": false, "type": "string"}, "services.sourcehut.hg.user": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"hgsrht\""}, "description": {"_type": "mdDoc", "text": "User for hg.sr.ht.\n"}, "loc": ["services", "sourcehut", "hg", "user"], "readOnly": false, "type": "string"}, "services.sourcehut.hg.webhooks.celeryConfig": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Content of the `celeryconfig.py` used by the Celery responsible for webhooks."}, "loc": ["services", "sourcehut", "hg", "webhooks", "celeryConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.sourcehut.hg.webhooks.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--loglevel DEBUG\"\n  \"--pool eventlet\"\n  \"--without-heartbeat\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to the Celery responsible for webhooks."}, "loc": ["services", "sourcehut", "hg", "webhooks", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.hub.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable hub service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "hub", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.hub.group": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"hubsrht\""}, "description": {"_type": "mdDoc", "text": "Group for hub.sr.ht.\nMembership grants access to the Git/Mercurial repositories by default,\nbut not to the config.ini file (where secrets are).\n"}, "loc": ["services", "sourcehut", "hub", "group"], "readOnly": false, "type": "string"}, "services.sourcehut.hub.gunicorn.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--timeout 120\"\n  \"--workers 1\"\n  \"--log-level=info\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to Gunicorn."}, "loc": ["services", "sourcehut", "hub", "gunicorn", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.hub.port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "5014"}, "description": {"_type": "mdDoc", "text": "Port on which the \"hub\" backend should listen.\n"}, "loc": ["services", "sourcehut", "hub", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sourcehut.hub.postgresql.database": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"hub.sr.ht\""}, "description": {"_type": "mdDoc", "text": "PostgreSQL database name for the hub.sr.ht service,\nused if [](#opt-services.sourcehut.postgresql.enable) is `true`.\n"}, "loc": ["services", "sourcehut", "hub", "postgresql", "database"], "readOnly": false, "type": "string"}, "services.sourcehut.hub.redis.host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"unix:///run/redis-sourcehut-hubsrht/redis.sock?db=0\""}, "description": {"_type": "mdDoc", "text": "The redis host URL. This is used for caching and temporary storage, and must\nbe shared between nodes (e.g. git1.sr.ht and git2.sr.ht), but need not be\nshared between services. It may be shared between services, however, with no\nill effect, if this better suits your infrastructure.\n"}, "example": {"_type": "literalExpression", "text": "\"redis://shared.wireguard:6379/0\""}, "loc": ["services", "sourcehut", "hub", "redis", "host"], "readOnly": false, "type": "string"}, "services.sourcehut.hub.user": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"hubsrht\""}, "description": {"_type": "mdDoc", "text": "User for hub.sr.ht.\n"}, "loc": ["services", "sourcehut", "hub", "user"], "readOnly": false, "type": "string"}, "services.sourcehut.listenAddress": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to."}, "loc": ["services", "sourcehut", "listenAddress"], "readOnly": false, "type": "string"}, "services.sourcehut.lists.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable lists service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "lists", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.lists.group": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"listssrht\""}, "description": {"_type": "mdDoc", "text": "Group for lists.sr.ht.\nMembership grants access to the Git/Mercurial repositories by default,\nbut not to the config.ini file (where secrets are).\n"}, "loc": ["services", "sourcehut", "lists", "group"], "readOnly": false, "type": "string"}, "services.sourcehut.lists.gunicorn.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--timeout 120\"\n  \"--workers 1\"\n  \"--log-level=info\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to Gunicorn."}, "loc": ["services", "sourcehut", "lists", "gunicorn", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.lists.port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "5006"}, "description": {"_type": "mdDoc", "text": "Port on which the \"lists\" backend should listen.\n"}, "loc": ["services", "sourcehut", "lists", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sourcehut.lists.postgresql.database": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"lists.sr.ht\""}, "description": {"_type": "mdDoc", "text": "PostgreSQL database name for the lists.sr.ht service,\nused if [](#opt-services.sourcehut.postgresql.enable) is `true`.\n"}, "loc": ["services", "sourcehut", "lists", "postgresql", "database"], "readOnly": false, "type": "string"}, "services.sourcehut.lists.process.celeryConfig": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Content of the `celeryconfig.py` used by the Celery of `listssrht-process`."}, "loc": ["services", "sourcehut", "lists", "process", "celeryConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.sourcehut.lists.process.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--loglevel DEBUG\"\n  \"--pool eventlet\"\n  \"--without-heartbeat\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to the Celery responsible for processing mails."}, "loc": ["services", "sourcehut", "lists", "process", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.lists.redis.host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"unix:///run/redis-sourcehut-listssrht/redis.sock?db=0\""}, "description": {"_type": "mdDoc", "text": "The redis host URL. This is used for caching and temporary storage, and must\nbe shared between nodes (e.g. git1.sr.ht and git2.sr.ht), but need not be\nshared between services. It may be shared between services, however, with no\nill effect, if this better suits your infrastructure.\n"}, "example": {"_type": "literalExpression", "text": "\"redis://shared.wireguard:6379/0\""}, "loc": ["services", "sourcehut", "lists", "redis", "host"], "readOnly": false, "type": "string"}, "services.sourcehut.lists.user": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"listssrht\""}, "description": {"_type": "mdDoc", "text": "User for lists.sr.ht.\n"}, "loc": ["services", "sourcehut", "lists", "user"], "readOnly": false, "type": "string"}, "services.sourcehut.lists.webhooks.celeryConfig": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Content of the `celeryconfig.py` used by the Celery responsible for webhooks."}, "loc": ["services", "sourcehut", "lists", "webhooks", "celeryConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.sourcehut.lists.webhooks.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--loglevel DEBUG\"\n  \"--pool eventlet\"\n  \"--without-heartbeat\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to the Celery responsible for webhooks."}, "loc": ["services", "sourcehut", "lists", "webhooks", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.man.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable man service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "man", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.man.group": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"mansrht\""}, "description": {"_type": "mdDoc", "text": "Group for man.sr.ht.\nMembership grants access to the Git/Mercurial repositories by default,\nbut not to the config.ini file (where secrets are).\n"}, "loc": ["services", "sourcehut", "man", "group"], "readOnly": false, "type": "string"}, "services.sourcehut.man.gunicorn.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--timeout 120\"\n  \"--workers 1\"\n  \"--log-level=info\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to Gunicorn."}, "loc": ["services", "sourcehut", "man", "gunicorn", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.man.port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "5004"}, "description": {"_type": "mdDoc", "text": "Port on which the \"man\" backend should listen.\n"}, "loc": ["services", "sourcehut", "man", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sourcehut.man.postgresql.database": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"man.sr.ht\""}, "description": {"_type": "mdDoc", "text": "PostgreSQL database name for the man.sr.ht service,\nused if [](#opt-services.sourcehut.postgresql.enable) is `true`.\n"}, "loc": ["services", "sourcehut", "man", "postgresql", "database"], "readOnly": false, "type": "string"}, "services.sourcehut.man.redis.host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"unix:///run/redis-sourcehut-mansrht/redis.sock?db=0\""}, "description": {"_type": "mdDoc", "text": "The redis host URL. This is used for caching and temporary storage, and must\nbe shared between nodes (e.g. git1.sr.ht and git2.sr.ht), but need not be\nshared between services. It may be shared between services, however, with no\nill effect, if this better suits your infrastructure.\n"}, "example": {"_type": "literalExpression", "text": "\"redis://shared.wireguard:6379/0\""}, "loc": ["services", "sourcehut", "man", "redis", "host"], "readOnly": false, "type": "string"}, "services.sourcehut.man.user": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"mansrht\""}, "description": {"_type": "mdDoc", "text": "User for man.sr.ht.\n"}, "loc": ["services", "sourcehut", "man", "user"], "readOnly": false, "type": "string"}, "services.sourcehut.meta.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable meta service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "meta", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.meta.group": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"metasrht\""}, "description": {"_type": "mdDoc", "text": "Group for meta.sr.ht.\nMembership grants access to the Git/Mercurial repositories by default,\nbut not to the config.ini file (where secrets are).\n"}, "loc": ["services", "sourcehut", "meta", "group"], "readOnly": false, "type": "string"}, "services.sourcehut.meta.gunicorn.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--timeout 120\"\n  \"--workers 1\"\n  \"--log-level=info\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to Gunicorn."}, "loc": ["services", "sourcehut", "meta", "gunicorn", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.meta.port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Port on which the \"meta\" backend should listen.\n"}, "loc": ["services", "sourcehut", "meta", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sourcehut.meta.postgresql.database": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"meta.sr.ht\""}, "description": {"_type": "mdDoc", "text": "PostgreSQL database name for the meta.sr.ht service,\nused if [](#opt-services.sourcehut.postgresql.enable) is `true`.\n"}, "loc": ["services", "sourcehut", "meta", "postgresql", "database"], "readOnly": false, "type": "string"}, "services.sourcehut.meta.redis.host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"unix:///run/redis-sourcehut-metasrht/redis.sock?db=0\""}, "description": {"_type": "mdDoc", "text": "The redis host URL. This is used for caching and temporary storage, and must\nbe shared between nodes (e.g. git1.sr.ht and git2.sr.ht), but need not be\nshared between services. It may be shared between services, however, with no\nill effect, if this better suits your infrastructure.\n"}, "example": {"_type": "literalExpression", "text": "\"redis://shared.wireguard:6379/0\""}, "loc": ["services", "sourcehut", "meta", "redis", "host"], "readOnly": false, "type": "string"}, "services.sourcehut.meta.user": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"metasrht\""}, "description": {"_type": "mdDoc", "text": "User for meta.sr.ht.\n"}, "loc": ["services", "sourcehut", "meta", "user"], "readOnly": false, "type": "string"}, "services.sourcehut.meta.webhooks.celeryConfig": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Content of the `celeryconfig.py` used by the Celery responsible for webhooks."}, "loc": ["services", "sourcehut", "meta", "webhooks", "celeryConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.sourcehut.meta.webhooks.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--loglevel DEBUG\"\n  \"--pool eventlet\"\n  \"--without-heartbeat\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to the Celery responsible for webhooks."}, "loc": ["services", "sourcehut", "meta", "webhooks", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.minio.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable local minio integration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "minio", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.nginx.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable local nginx integration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "nginx", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.nginx.virtualHost": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Virtual-host configuration merged with all Sourcehut's virtual-hosts."}, "loc": ["services", "sourcehut", "nginx", "virtualHost"], "readOnly": false, "type": "attribute set"}, "services.sourcehut.pages.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable pages service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "pages", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.pages.group": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"pagessrht\""}, "description": {"_type": "mdDoc", "text": "Group for pages.sr.ht.\nMembership grants access to the Git/Mercurial repositories by default,\nbut not to the config.ini file (where secrets are).\n"}, "loc": ["services", "sourcehut", "pages", "group"], "readOnly": false, "type": "string"}, "services.sourcehut.pages.gunicorn.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--timeout 120\"\n  \"--workers 1\"\n  \"--log-level=info\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to Gunicorn."}, "loc": ["services", "sourcehut", "pages", "gunicorn", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.pages.port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "5112"}, "description": {"_type": "mdDoc", "text": "Port on which the \"pages\" backend should listen.\n"}, "loc": ["services", "sourcehut", "pages", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sourcehut.pages.postgresql.database": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"pages.sr.ht\""}, "description": {"_type": "mdDoc", "text": "PostgreSQL database name for the pages.sr.ht service,\nused if [](#opt-services.sourcehut.postgresql.enable) is `true`.\n"}, "loc": ["services", "sourcehut", "pages", "postgresql", "database"], "readOnly": false, "type": "string"}, "services.sourcehut.pages.redis.host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"unix:///run/redis-sourcehut-pagessrht/redis.sock?db=0\""}, "description": {"_type": "mdDoc", "text": "The redis host URL. This is used for caching and temporary storage, and must\nbe shared between nodes (e.g. git1.sr.ht and git2.sr.ht), but need not be\nshared between services. It may be shared between services, however, with no\nill effect, if this better suits your infrastructure.\n"}, "example": {"_type": "literalExpression", "text": "\"redis://shared.wireguard:6379/0\""}, "loc": ["services", "sourcehut", "pages", "redis", "host"], "readOnly": false, "type": "string"}, "services.sourcehut.pages.user": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"pagessrht\""}, "description": {"_type": "mdDoc", "text": "User for pages.sr.ht.\n"}, "loc": ["services", "sourcehut", "pages", "user"], "readOnly": false, "type": "string"}, "services.sourcehut.paste.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable paste service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "paste", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.paste.group": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"pastesrht\""}, "description": {"_type": "mdDoc", "text": "Group for paste.sr.ht.\nMembership grants access to the Git/Mercurial repositories by default,\nbut not to the config.ini file (where secrets are).\n"}, "loc": ["services", "sourcehut", "paste", "group"], "readOnly": false, "type": "string"}, "services.sourcehut.paste.gunicorn.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--timeout 120\"\n  \"--workers 1\"\n  \"--log-level=info\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to Gunicorn."}, "loc": ["services", "sourcehut", "paste", "gunicorn", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.paste.port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "5011"}, "description": {"_type": "mdDoc", "text": "Port on which the \"paste\" backend should listen.\n"}, "loc": ["services", "sourcehut", "paste", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sourcehut.paste.postgresql.database": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"paste.sr.ht\""}, "description": {"_type": "mdDoc", "text": "PostgreSQL database name for the paste.sr.ht service,\nused if [](#opt-services.sourcehut.postgresql.enable) is `true`.\n"}, "loc": ["services", "sourcehut", "paste", "postgresql", "database"], "readOnly": false, "type": "string"}, "services.sourcehut.paste.redis.host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"unix:///run/redis-sourcehut-pastesrht/redis.sock?db=0\""}, "description": {"_type": "mdDoc", "text": "The redis host URL. This is used for caching and temporary storage, and must\nbe shared between nodes (e.g. git1.sr.ht and git2.sr.ht), but need not be\nshared between services. It may be shared between services, however, with no\nill effect, if this better suits your infrastructure.\n"}, "example": {"_type": "literalExpression", "text": "\"redis://shared.wireguard:6379/0\""}, "loc": ["services", "sourcehut", "paste", "redis", "host"], "readOnly": false, "type": "string"}, "services.sourcehut.paste.user": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"pastesrht\""}, "description": {"_type": "mdDoc", "text": "User for paste.sr.ht.\n"}, "loc": ["services", "sourcehut", "paste", "user"], "readOnly": false, "type": "string"}, "services.sourcehut.postfix.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable local postfix integration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "postfix", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.postgresql.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable local postgresql integration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "postgresql", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.redis.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable local redis integration in a dedicated redis-server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "redis", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.services": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"locally enabled services\""}, "description": {"_type": "mdDoc", "text": "Services that may be displayed as links in the title bar of the Web interface.\n"}, "loc": ["services", "sourcehut", "services"], "readOnly": false, "type": "list of (one of \"builds\", \"git\", \"hg\", \"hub\", \"lists\", \"man\", \"meta\", \"pages\", \"paste\", \"todo\")"}, "services.sourcehut.settings": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The configuration for the sourcehut network.\n"}, "loc": ["services", "sourcehut", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string) or a non-empty list of them)"}, "services.sourcehut.settings.\"builds.sr.ht\".allow-free": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nonpaying users to submit builds."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht", "allow-free"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"builds.sr.ht\".connection-string": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"postgresql:///localhost?user=buildssrht&host=/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "SQLAlchemy connection string for the database."}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht", "connection-string"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"builds.sr.ht\".debug-host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht", "debug-host"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"builds.sr.ht\".debug-port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht", "debug-port"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"builds.sr.ht\".migrate-on-upgrade": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic migrations on package upgrade."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht", "migrate-on-upgrade"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"builds.sr.ht\".oauth-client-id": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "builds.sr.ht's OAuth client id for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht", "oauth-client-id"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"builds.sr.ht\".oauth-client-secret": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "builds.sr.ht's OAuth client secret for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht", "oauth-client-secret"], "readOnly": false, "type": "path"}, "services.sourcehut.settings.\"builds.sr.ht\".origin": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://builds.example.com\""}, "description": {"_type": "mdDoc", "text": "URL builds.sr.ht is being served at (protocol://domain)"}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht", "origin"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"builds.sr.ht\".redis": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"redis+socket:///run/redis-sourcehut-buildsrht/redis.sock?virtual_host=2\""}, "description": {"_type": "mdDoc", "text": "The Redis connection used for the Celery worker."}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht", "redis"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"builds.sr.ht\".shell": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"/usr/bin/master-shell\""}, "description": {"_type": "mdDoc", "text": "Scripts used to launch on SSH connection.\n`/usr/bin/master-shell` on master,\n`/usr/bin/runner-shell` on runner.\nIf master and worker are on the same system\nset to `/usr/bin/runner-shell`.\n"}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht", "shell"], "readOnly": false, "type": "one of \"/usr/bin/master-shell\", \"/usr/bin/runner-shell\""}, "services.sourcehut.settings.\"builds.sr.ht::worker\".bind-address": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"localhost:8080\""}, "description": {"_type": "mdDoc", "text": "HTTP bind address for serving local build information/monitoring.\n"}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht::worker", "bind-address"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"builds.sr.ht::worker\".buildlogs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"/var/log/sourcehut/buildsrht-worker\""}, "description": {"_type": "mdDoc", "text": "Path to write build logs."}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht::worker", "buildlogs"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"builds.sr.ht::worker\".name": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"localhost:5020\""}, "description": {"_type": "mdDoc", "text": "Listening address and listening port\nof the build runner (with HTTP port if not 80).\n"}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht::worker", "name"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"builds.sr.ht::worker\".timeout": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"3m\""}, "description": {"_type": "mdDoc", "text": "Max build duration.\nSee <https://golang.org/pkg/time/#ParseDuration>.\n"}, "loc": ["services", "sourcehut", "settings", "builds.sr.ht::worker", "timeout"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"git.sr.ht\".connection-string": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"postgresql:///localhost?user=gitsrht&host=/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "SQLAlchemy connection string for the database."}, "loc": ["services", "sourcehut", "settings", "git.sr.ht", "connection-string"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"git.sr.ht\".debug-host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "git.sr.ht", "debug-host"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"git.sr.ht\".debug-port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "git.sr.ht", "debug-port"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"git.sr.ht\".migrate-on-upgrade": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic migrations on package upgrade."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "git.sr.ht", "migrate-on-upgrade"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"git.sr.ht\".oauth-client-id": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "git.sr.ht's OAuth client id for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "git.sr.ht", "oauth-client-id"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"git.sr.ht\".oauth-client-secret": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "git.sr.ht's OAuth client secret for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "git.sr.ht", "oauth-client-secret"], "readOnly": false, "type": "path"}, "services.sourcehut.settings.\"git.sr.ht\".origin": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://git.example.com\""}, "description": {"_type": "mdDoc", "text": "URL git.sr.ht is being served at (protocol://domain)"}, "loc": ["services", "sourcehut", "settings", "git.sr.ht", "origin"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"git.sr.ht\".outgoing-domain": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://git.localhost.localdomain\""}, "description": {"_type": "mdDoc", "text": "Outgoing domain."}, "loc": ["services", "sourcehut", "settings", "git.sr.ht", "outgoing-domain"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"git.sr.ht\".post-update-script": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"\\${pkgs.sourcehut.gitsrht}/bin/gitsrht-update-hook\""}, "description": {"_type": "mdDoc", "text": "A post-update script which is installed in every git repo.\nThis setting is propagated to newer and existing repositories.\n"}, "loc": ["services", "sourcehut", "settings", "git.sr.ht", "post-update-script"], "readOnly": false, "type": "path"}, "services.sourcehut.settings.\"git.sr.ht\".repos": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"/var/lib/sourcehut/gitsrht/repos\""}, "description": {"_type": "mdDoc", "text": "Path to git repositories on disk.\nIf changing the default, you must ensure that\nthe gitsrht's user as read and write access to it.\n"}, "loc": ["services", "sourcehut", "settings", "git.sr.ht", "repos"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"git.sr.ht\".webhooks": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"redis+socket:///run/redis-sourcehut-gitsrht/redis.sock?virtual_host=1\""}, "description": {"_type": "mdDoc", "text": "The Redis connection used for the webhooks worker."}, "loc": ["services", "sourcehut", "settings", "git.sr.ht", "webhooks"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"git.sr.ht::api\".internal-ipnet": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.0/8\"\n  \"::1/128\"\n]"}, "description": {"_type": "mdDoc", "text": "Set of IP subnets which are permitted to utilize internal API\nauthentication. This should be limited to the subnets\nfrom which your *.sr.ht services are running.\nSee [](#opt-services.sourcehut.listenAddress).\n"}, "loc": ["services", "sourcehut", "settings", "git.sr.ht::api", "internal-ipnet"], "readOnly": false, "type": "list of string"}, "services.sourcehut.settings.\"hg.sr.ht\".changegroup-script": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"\\${cfg.python}/bin/hgsrht-hook-changegroup\""}, "description": {"_type": "mdDoc", "text": "A changegroup script which is installed in every mercurial repo.\nThis setting is propagated to newer and existing repositories.\n"}, "loc": ["services", "sourcehut", "settings", "hg.sr.ht", "changegroup-script"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"hg.sr.ht\".clone_bundle_threshold": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "50"}, "description": {"_type": "mdDoc", "text": ".hg/store size (in MB) past which the nightly job generates clone bundles."}, "loc": ["services", "sourcehut", "settings", "hg.sr.ht", "clone_bundle_threshold"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.sourcehut.settings.\"hg.sr.ht\".connection-string": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"postgresql:///localhost?user=hgsrht&host=/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "SQLAlchemy connection string for the database."}, "loc": ["services", "sourcehut", "settings", "hg.sr.ht", "connection-string"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"hg.sr.ht\".debug-host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "hg.sr.ht", "debug-host"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"hg.sr.ht\".debug-port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "hg.sr.ht", "debug-port"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"hg.sr.ht\".hg_ssh": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"\\${pkgs.mercurial}/bin/hg-ssh\""}, "description": {"_type": "mdDoc", "text": "Path to hg-ssh (if not in $PATH)."}, "loc": ["services", "sourcehut", "settings", "hg.sr.ht", "hg_ssh"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"hg.sr.ht\".migrate-on-upgrade": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic migrations on package upgrade."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "hg.sr.ht", "migrate-on-upgrade"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"hg.sr.ht\".oauth-client-id": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "hg.sr.ht's OAuth client id for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "hg.sr.ht", "oauth-client-id"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"hg.sr.ht\".oauth-client-secret": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "hg.sr.ht's OAuth client secret for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "hg.sr.ht", "oauth-client-secret"], "readOnly": false, "type": "path"}, "services.sourcehut.settings.\"hg.sr.ht\".origin": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://hg.example.com\""}, "description": {"_type": "mdDoc", "text": "URL hg.sr.ht is being served at (protocol://domain)"}, "loc": ["services", "sourcehut", "settings", "hg.sr.ht", "origin"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"hg.sr.ht\".repos": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"/var/lib/sourcehut/hgsrht/repos\""}, "description": {"_type": "mdDoc", "text": "Path to mercurial repositories on disk.\nIf changing the default, you must ensure that\nthe hgsrht's user as read and write access to it.\n"}, "loc": ["services", "sourcehut", "settings", "hg.sr.ht", "repos"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"hg.sr.ht\".srhtext": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the srht mercurial extension\n(defaults to where the hgsrht code is)\n"}, "loc": ["services", "sourcehut", "settings", "hg.sr.ht", "srhtext"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"hg.sr.ht\".webhooks": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"redis+socket:///run/redis-sourcehut-hgsrht/redis.sock?virtual_host=1\""}, "description": {"_type": "mdDoc", "text": "The Redis connection used for the webhooks worker."}, "loc": ["services", "sourcehut", "settings", "hg.sr.ht", "webhooks"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"hub.sr.ht\".connection-string": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"postgresql:///localhost?user=hubsrht&host=/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "SQLAlchemy connection string for the database."}, "loc": ["services", "sourcehut", "settings", "hub.sr.ht", "connection-string"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"hub.sr.ht\".debug-host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "hub.sr.ht", "debug-host"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"hub.sr.ht\".debug-port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "hub.sr.ht", "debug-port"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"hub.sr.ht\".migrate-on-upgrade": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic migrations on package upgrade."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "hub.sr.ht", "migrate-on-upgrade"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"hub.sr.ht\".oauth-client-id": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "hub.sr.ht's OAuth client id for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "hub.sr.ht", "oauth-client-id"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"hub.sr.ht\".oauth-client-secret": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "hub.sr.ht's OAuth client secret for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "hub.sr.ht", "oauth-client-secret"], "readOnly": false, "type": "path"}, "services.sourcehut.settings.\"hub.sr.ht\".origin": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://hub.example.com\""}, "description": {"_type": "mdDoc", "text": "URL hub.sr.ht is being served at (protocol://domain)"}, "loc": ["services", "sourcehut", "settings", "hub.sr.ht", "origin"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"lists.sr.ht\".allow-new-lists": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Allow creation of new lists."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht", "allow-new-lists"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"lists.sr.ht\".connection-string": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"postgresql:///localhost?user=listssrht&host=/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "SQLAlchemy connection string for the database."}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht", "connection-string"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"lists.sr.ht\".debug-host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht", "debug-host"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"lists.sr.ht\".debug-port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht", "debug-port"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"lists.sr.ht\".migrate-on-upgrade": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic migrations on package upgrade."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht", "migrate-on-upgrade"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"lists.sr.ht\".notify-from": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"lists-notify@localhost.localdomain\""}, "description": {"_type": "mdDoc", "text": "Outgoing email for notifications generated by users."}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht", "notify-from"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"lists.sr.ht\".oauth-client-id": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "lists.sr.ht's OAuth client id for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht", "oauth-client-id"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"lists.sr.ht\".oauth-client-secret": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "lists.sr.ht's OAuth client secret for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht", "oauth-client-secret"], "readOnly": false, "type": "path"}, "services.sourcehut.settings.\"lists.sr.ht\".origin": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://lists.example.com\""}, "description": {"_type": "mdDoc", "text": "URL lists.sr.ht is being served at (protocol://domain)"}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht", "origin"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"lists.sr.ht\".posting-domain": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"lists.localhost.localdomain\""}, "description": {"_type": "mdDoc", "text": "Posting domain."}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht", "posting-domain"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"lists.sr.ht\".redis": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"redis+socket:///run/redis-sourcehut-listssrht/redis.sock?virtual_host=2\""}, "description": {"_type": "mdDoc", "text": "The Redis connection used for the Celery worker."}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht", "redis"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"lists.sr.ht\".webhooks": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"redis+socket:///run/redis-sourcehut-listssrht/redis.sock?virtual_host=1\""}, "description": {"_type": "mdDoc", "text": "The Redis connection used for the webhooks worker."}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht", "webhooks"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"lists.sr.ht::worker\".reject-mimetypes": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"text/html\"\n]"}, "description": {"_type": "mdDoc", "text": "Comma-delimited list of Content-Types to reject. Messages with Content-Types\nincluded in this list are rejected. Multipart messages are always supported,\nand each part is checked against this list.\n\nUses fnmatch for wildcard expansion.\n"}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht::worker", "reject-mimetypes"], "readOnly": false, "type": "list of string"}, "services.sourcehut.settings.\"lists.sr.ht::worker\".reject-url": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://man.sr.ht/lists.sr.ht/etiquette.md\""}, "description": {"_type": "mdDoc", "text": "Reject URL."}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht::worker", "reject-url"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"lists.sr.ht::worker\".sock": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"/tmp/lists.sr.ht-lmtp.sock\""}, "description": {"_type": "mdDoc", "text": "Path for the lmtp daemon's unix socket. Direct incoming mail to this socket.\nAlternatively, specify IP:PORT and an SMTP server will be run instead.\n"}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht::worker", "sock"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"lists.sr.ht::worker\".sock-group": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"postfix\""}, "description": {"_type": "mdDoc", "text": "The lmtp daemon will make the unix socket group-read/write\nfor users in this group.\n"}, "loc": ["services", "sourcehut", "settings", "lists.sr.ht::worker", "sock-group"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"man.sr.ht\".connection-string": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"postgresql:///localhost?user=mansrht&host=/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "SQLAlchemy connection string for the database."}, "loc": ["services", "sourcehut", "settings", "man.sr.ht", "connection-string"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"man.sr.ht\".debug-host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "man.sr.ht", "debug-host"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"man.sr.ht\".debug-port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "man.sr.ht", "debug-port"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"man.sr.ht\".migrate-on-upgrade": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic migrations on package upgrade."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "man.sr.ht", "migrate-on-upgrade"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"man.sr.ht\".oauth-client-id": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "man.sr.ht's OAuth client id for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "man.sr.ht", "oauth-client-id"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"man.sr.ht\".oauth-client-secret": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "man.sr.ht's OAuth client secret for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "man.sr.ht", "oauth-client-secret"], "readOnly": false, "type": "path"}, "services.sourcehut.settings.\"man.sr.ht\".origin": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://man.example.com\""}, "description": {"_type": "mdDoc", "text": "URL man.sr.ht is being served at (protocol://domain)"}, "loc": ["services", "sourcehut", "settings", "man.sr.ht", "origin"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"meta.sr.ht\".api-origin": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalMD", "text": "`\"http://${`[](#opt-services.sourcehut.listenAddress)`}:${toString (`[](#opt-services.sourcehut.meta.port)` + 100)}\"`"}, "description": {"_type": "mdDoc", "text": "Origin URL for API, 100 more than web."}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht", "api-origin"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"meta.sr.ht\".connection-string": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"postgresql:///localhost?user=metasrht&host=/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "SQLAlchemy connection string for the database."}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht", "connection-string"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"meta.sr.ht\".debug-host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht", "debug-host"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"meta.sr.ht\".debug-port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht", "debug-port"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"meta.sr.ht\".migrate-on-upgrade": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic migrations on package upgrade."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht", "migrate-on-upgrade"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"meta.sr.ht\".origin": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://meta.example.com\""}, "description": {"_type": "mdDoc", "text": "URL meta.sr.ht is being served at (protocol://domain)"}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht", "origin"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"meta.sr.ht\".webhooks": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"redis+socket:///run/redis-sourcehut-metasrht/redis.sock?virtual_host=1\""}, "description": {"_type": "mdDoc", "text": "The Redis connection used for the webhooks worker."}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht", "webhooks"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"meta.sr.ht\".welcome-emails": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sending stock sourcehut welcome emails after signup."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht", "welcome-emails"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"meta.sr.ht::aliases\"": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Aliases for the client IDs of commonly used OAuth clients."}, "example": {"_type": "literalExpression", "text": "{\n  \"git.sr.ht\" = 12345;\n}"}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht::aliases"], "readOnly": false, "type": "attribute set of signed integer"}, "services.sourcehut.settings.\"meta.sr.ht::api\".internal-ipnet": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.0/8\"\n  \"::1/128\"\n]"}, "description": {"_type": "mdDoc", "text": "Set of IP subnets which are permitted to utilize internal API\nauthentication. This should be limited to the subnets\nfrom which your *.sr.ht services are running.\nSee [](#opt-services.sourcehut.listenAddress).\n"}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht::api", "internal-ipnet"], "readOnly": false, "type": "list of string"}, "services.sourcehut.settings.\"meta.sr.ht::billing\".enabled": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the billing system."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht::billing", "enabled"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"meta.sr.ht::billing\".stripe-public-key": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Public key for Stripe. Get your keys at https://dashboard.stripe.com/account/apikeys"}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht::billing", "stripe-public-key"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"meta.sr.ht::billing\".stripe-secret-key": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "An absolute file path (which should be outside the Nix-store)\nto a secret key for Stripe. Get your keys at https://dashboard.stripe.com/account/apikeys\n"}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht::billing", "stripe-secret-key"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"meta.sr.ht::settings\".onboarding-redirect": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://meta.localhost.localdomain\""}, "description": {"_type": "mdDoc", "text": "Where to redirect new users upon registration."}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht::settings", "onboarding-redirect"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"meta.sr.ht::settings\".registration": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable public registration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht::settings", "registration"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"meta.sr.ht::settings\".user-invites": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "How many invites each user is issued upon registration\n(only applicable if open registration is disabled).\n"}, "loc": ["services", "sourcehut", "settings", "meta.sr.ht::settings", "user-invites"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.sourcehut.settings.\"pages.sr.ht\".connection-string": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"postgresql:///localhost?user=pagessrht&host=/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "SQLAlchemy connection string for the database."}, "loc": ["services", "sourcehut", "settings", "pages.sr.ht", "connection-string"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"pages.sr.ht\".debug-host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "pages.sr.ht", "debug-host"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"pages.sr.ht\".debug-port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "pages.sr.ht", "debug-port"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"pages.sr.ht\".gemini-certs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "An absolute file path (which should be outside the Nix-store)\nto Gemini certificates.\n"}, "loc": ["services", "sourcehut", "settings", "pages.sr.ht", "gemini-certs"], "readOnly": false, "type": "null or path"}, "services.sourcehut.settings.\"pages.sr.ht\".max-site-size": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "1024"}, "description": {"_type": "mdDoc", "text": "Maximum size of any given site (post-gunzip), in MiB."}, "loc": ["services", "sourcehut", "settings", "pages.sr.ht", "max-site-size"], "readOnly": false, "type": "signed integer"}, "services.sourcehut.settings.\"pages.sr.ht\".migrate-on-upgrade": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic migrations on package upgrade."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "pages.sr.ht", "migrate-on-upgrade"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"pages.sr.ht\".oauth-client-id": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "pages.sr.ht's OAuth client id for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "pages.sr.ht", "oauth-client-id"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"pages.sr.ht\".oauth-client-secret": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "pages.sr.ht's OAuth client secret for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "pages.sr.ht", "oauth-client-secret"], "readOnly": false, "type": "path"}, "services.sourcehut.settings.\"pages.sr.ht\".origin": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://pages.example.com\""}, "description": {"_type": "mdDoc", "text": "URL pages.sr.ht is being served at (protocol://domain)"}, "loc": ["services", "sourcehut", "settings", "pages.sr.ht", "origin"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"pages.sr.ht\".user-domain": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configures the user domain, if enabled.\nAll users are given \\<username\\>.this.domain.\n"}, "loc": ["services", "sourcehut", "settings", "pages.sr.ht", "user-domain"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"pages.sr.ht::api\".internal-ipnet": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"127.0.0.0/8\"\n  \"::1/128\"\n]"}, "description": {"_type": "mdDoc", "text": "Set of IP subnets which are permitted to utilize internal API\nauthentication. This should be limited to the subnets\nfrom which your *.sr.ht services are running.\nSee [](#opt-services.sourcehut.listenAddress).\n"}, "loc": ["services", "sourcehut", "settings", "pages.sr.ht::api", "internal-ipnet"], "readOnly": false, "type": "list of string"}, "services.sourcehut.settings.\"paste.sr.ht\".connection-string": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"postgresql:///localhost?user=pastesrht&host=/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "SQLAlchemy connection string for the database."}, "loc": ["services", "sourcehut", "settings", "paste.sr.ht", "connection-string"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"paste.sr.ht\".debug-host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "paste.sr.ht", "debug-host"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"paste.sr.ht\".debug-port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "paste.sr.ht", "debug-port"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"paste.sr.ht\".migrate-on-upgrade": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic migrations on package upgrade."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "paste.sr.ht", "migrate-on-upgrade"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"paste.sr.ht\".oauth-client-id": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "paste.sr.ht's OAuth client id for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "paste.sr.ht", "oauth-client-id"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"paste.sr.ht\".oauth-client-secret": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "paste.sr.ht's OAuth client secret for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "paste.sr.ht", "oauth-client-secret"], "readOnly": false, "type": "path"}, "services.sourcehut.settings.\"paste.sr.ht\".origin": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://paste.example.com\""}, "description": {"_type": "mdDoc", "text": "URL paste.sr.ht is being served at (protocol://domain)"}, "loc": ["services", "sourcehut", "settings", "paste.sr.ht", "origin"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"sr.ht\".environment": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"development\""}, "description": {"_type": "mdDoc", "text": "Values other than \"production\" adds a banner to each page."}, "loc": ["services", "sourcehut", "settings", "sr.ht", "environment"], "readOnly": false, "type": "one of \"development\", \"production\""}, "services.sourcehut.settings.\"sr.ht\".global-domain": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "Global domain name."}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "sourcehut", "settings", "sr.ht", "global-domain"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"sr.ht\".network-key": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "An absolute file path (which should be outside the Nix-store)\nto a secret key to encrypt internal messages with. Use `srht-keygen network` to\ngenerate this key. It must be consistent between all services and nodes.\n"}, "loc": ["services", "sourcehut", "settings", "sr.ht", "network-key"], "readOnly": false, "type": "path"}, "services.sourcehut.settings.\"sr.ht\".owner-email": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"contact@example.com\""}, "description": {"_type": "mdDoc", "text": "Owner's email."}, "loc": ["services", "sourcehut", "settings", "sr.ht", "owner-email"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"sr.ht\".owner-name": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"John Doe\""}, "description": {"_type": "mdDoc", "text": "Owner's name."}, "loc": ["services", "sourcehut", "settings", "sr.ht", "owner-name"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"sr.ht\".service-key": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "An absolute file path (which should be outside the Nix-store)\nto a key used for encrypting session cookies. Use `srht-keygen service` to\ngenerate the service key. This must be shared between each node of the same\nservice (e.g. git1.sr.ht and git2.sr.ht), but different services may use\ndifferent keys. If you configure all of your services with the same\nconfig.ini, you may use the same service-key for all of them.\n"}, "loc": ["services", "sourcehut", "settings", "sr.ht", "service-key"], "readOnly": false, "type": "path"}, "services.sourcehut.settings.\"sr.ht\".site-blurb": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"the hacker's forge\""}, "description": {"_type": "mdDoc", "text": "Blurb for your site."}, "loc": ["services", "sourcehut", "settings", "sr.ht", "site-blurb"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"sr.ht\".site-info": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://sourcehut.org\""}, "description": {"_type": "mdDoc", "text": "The top-level info page for your site."}, "loc": ["services", "sourcehut", "settings", "sr.ht", "site-info"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"sr.ht\".site-name": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"sourcehut\""}, "description": {"_type": "mdDoc", "text": "The name of your network of sr.ht-based sites."}, "loc": ["services", "sourcehut", "settings", "sr.ht", "site-name"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"sr.ht\".source-url": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://git.sr.ht/~sircmpwn/srht\""}, "description": {"_type": "mdDoc", "text": "The source code for your fork of sr.ht."}, "loc": ["services", "sourcehut", "settings", "sr.ht", "source-url"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"todo.sr.ht\".connection-string": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"postgresql:///localhost?user=todosrht&host=/run/postgresql\""}, "description": {"_type": "mdDoc", "text": "SQLAlchemy connection string for the database."}, "loc": ["services", "sourcehut", "settings", "todo.sr.ht", "connection-string"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"todo.sr.ht\".debug-host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "todo.sr.ht", "debug-host"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"todo.sr.ht\".debug-port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to bind the debug server to."}, "loc": ["services", "sourcehut", "settings", "todo.sr.ht", "debug-port"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.\"todo.sr.ht\".migrate-on-upgrade": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic migrations on package upgrade."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "settings", "todo.sr.ht", "migrate-on-upgrade"], "readOnly": false, "type": "boolean"}, "services.sourcehut.settings.\"todo.sr.ht\".notify-from": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"todo-notify@localhost.localdomain\""}, "description": {"_type": "mdDoc", "text": "Outgoing email for notifications generated by users."}, "loc": ["services", "sourcehut", "settings", "todo.sr.ht", "notify-from"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"todo.sr.ht\".oauth-client-id": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "todo.sr.ht's OAuth client id for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "todo.sr.ht", "oauth-client-id"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"todo.sr.ht\".oauth-client-secret": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "todo.sr.ht's OAuth client secret for meta.sr.ht."}, "loc": ["services", "sourcehut", "settings", "todo.sr.ht", "oauth-client-secret"], "readOnly": false, "type": "path"}, "services.sourcehut.settings.\"todo.sr.ht\".origin": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"https://todo.example.com\""}, "description": {"_type": "mdDoc", "text": "URL todo.sr.ht is being served at (protocol://domain)"}, "loc": ["services", "sourcehut", "settings", "todo.sr.ht", "origin"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"todo.sr.ht\".webhooks": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"redis+socket:///run/redis-sourcehut-todosrht/redis.sock?virtual_host=1\""}, "description": {"_type": "mdDoc", "text": "The Redis connection used for the webhooks worker."}, "loc": ["services", "sourcehut", "settings", "todo.sr.ht", "webhooks"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"todo.sr.ht::mail\".posting-domain": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"todo.localhost.localdomain\""}, "description": {"_type": "mdDoc", "text": "Posting domain."}, "loc": ["services", "sourcehut", "settings", "todo.sr.ht::mail", "posting-domain"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"todo.sr.ht::mail\".sock": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"/tmp/todo.sr.ht-lmtp.sock\""}, "description": {"_type": "mdDoc", "text": "Path for the lmtp daemon's unix socket. Direct incoming mail to this socket.\nAlternatively, specify IP:PORT and an SMTP server will be run instead.\n"}, "loc": ["services", "sourcehut", "settings", "todo.sr.ht::mail", "sock"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.\"todo.sr.ht::mail\".sock-group": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"postfix\""}, "description": {"_type": "mdDoc", "text": "The lmtp daemon will make the unix socket group-read/write\nfor users in this group.\n"}, "loc": ["services", "sourcehut", "settings", "todo.sr.ht::mail", "sock-group"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.mail.error-from": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address sending application exceptions"}, "loc": ["services", "sourcehut", "settings", "mail", "error-from"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.mail.error-to": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address receiving application exceptions"}, "loc": ["services", "sourcehut", "settings", "mail", "error-to"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.mail.pgp-key-id": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "OpenPGP key identifier."}, "loc": ["services", "sourcehut", "settings", "mail", "pgp-key-id"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.mail.pgp-privkey": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "An absolute file path (which should be outside the Nix-store)\nto an OpenPGP private key.\n\nYour PGP key information (DO NOT mix up pub and priv here)\nYou must remove the password from your secret key, if present.\nYou can do this with `gpg --edit-key [key-id]`,\nthen use the `passwd` command and do not enter a new password.\n"}, "loc": ["services", "sourcehut", "settings", "mail", "pgp-privkey"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.mail.pgp-pubkey": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "OpenPGP public key."}, "loc": ["services", "sourcehut", "settings", "mail", "pgp-pubkey"], "readOnly": false, "type": "path or string"}, "services.sourcehut.settings.mail.smtp-from": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "Outgoing SMTP FROM."}, "loc": ["services", "sourcehut", "settings", "mail", "smtp-from"], "readOnly": false, "type": "string"}, "services.sourcehut.settings.mail.smtp-host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Outgoing SMTP host."}, "loc": ["services", "sourcehut", "settings", "mail", "smtp-host"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.mail.smtp-password": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Outgoing SMTP password."}, "loc": ["services", "sourcehut", "settings", "mail", "smtp-password"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.mail.smtp-port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Outgoing SMTP port."}, "loc": ["services", "sourcehut", "settings", "mail", "smtp-port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sourcehut.settings.mail.smtp-user": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Outgoing SMTP user."}, "loc": ["services", "sourcehut", "settings", "mail", "smtp-user"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.objects.s3-access-key": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Access key to the S3-compatible object storage service"}, "loc": ["services", "sourcehut", "settings", "objects", "s3-access-key"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.objects.s3-secret-key": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "An absolute file path (which should be outside the Nix-store)\nto the secret key of the S3-compatible object storage service.\n"}, "loc": ["services", "sourcehut", "settings", "objects", "s3-secret-key"], "readOnly": false, "type": "null or path"}, "services.sourcehut.settings.objects.s3-upstream": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure the S3-compatible object storage service."}, "loc": ["services", "sourcehut", "settings", "objects", "s3-upstream"], "readOnly": false, "type": "null or string"}, "services.sourcehut.settings.webhooks.private-key": {"declarations": ["nixos/modules/services/misc/sourcehut"], "description": {"_type": "mdDoc", "text": "An absolute file path (which should be outside the Nix-store)\nto a base64-encoded Ed25519 key for signing webhook payloads.\nThis should be consistent for all *.sr.ht sites,\nas this key will be used to verify signatures\nfrom other sites in your network.\nUse the `srht-keygen webhook` command to generate a key.\n"}, "loc": ["services", "sourcehut", "settings", "webhooks", "private-key"], "readOnly": false, "type": "path"}, "services.sourcehut.todo.enable": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable todo service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sourcehut", "todo", "enable"], "readOnly": false, "type": "boolean"}, "services.sourcehut.todo.group": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"todosrht\""}, "description": {"_type": "mdDoc", "text": "Group for todo.sr.ht.\nMembership grants access to the Git/Mercurial repositories by default,\nbut not to the config.ini file (where secrets are).\n"}, "loc": ["services", "sourcehut", "todo", "group"], "readOnly": false, "type": "string"}, "services.sourcehut.todo.gunicorn.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--timeout 120\"\n  \"--workers 1\"\n  \"--log-level=info\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to Gunicorn."}, "loc": ["services", "sourcehut", "todo", "gunicorn", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.sourcehut.todo.port": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "5003"}, "description": {"_type": "mdDoc", "text": "Port on which the \"todo\" backend should listen.\n"}, "loc": ["services", "sourcehut", "todo", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sourcehut.todo.postgresql.database": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"todo.sr.ht\""}, "description": {"_type": "mdDoc", "text": "PostgreSQL database name for the todo.sr.ht service,\nused if [](#opt-services.sourcehut.postgresql.enable) is `true`.\n"}, "loc": ["services", "sourcehut", "todo", "postgresql", "database"], "readOnly": false, "type": "string"}, "services.sourcehut.todo.redis.host": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"unix:///run/redis-sourcehut-todosrht/redis.sock?db=0\""}, "description": {"_type": "mdDoc", "text": "The redis host URL. This is used for caching and temporary storage, and must\nbe shared between nodes (e.g. git1.sr.ht and git2.sr.ht), but need not be\nshared between services. It may be shared between services, however, with no\nill effect, if this better suits your infrastructure.\n"}, "example": {"_type": "literalExpression", "text": "\"redis://shared.wireguard:6379/0\""}, "loc": ["services", "sourcehut", "todo", "redis", "host"], "readOnly": false, "type": "string"}, "services.sourcehut.todo.user": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"todosrht\""}, "description": {"_type": "mdDoc", "text": "User for todo.sr.ht.\n"}, "loc": ["services", "sourcehut", "todo", "user"], "readOnly": false, "type": "string"}, "services.sourcehut.todo.webhooks.celeryConfig": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Content of the `celeryconfig.py` used by the Celery responsible for webhooks."}, "loc": ["services", "sourcehut", "todo", "webhooks", "celeryConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.sourcehut.todo.webhooks.extraArgs": {"declarations": ["nixos/modules/services/misc/sourcehut"], "default": {"_type": "literalExpression", "text": "[\n  \"--loglevel DEBUG\"\n  \"--pool eventlet\"\n  \"--without-heartbeat\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to the Celery responsible for webhooks."}, "loc": ["services", "sourcehut", "todo", "webhooks", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.spacecookie.address": {"declarations": ["nixos/modules/services/networking/spacecookie.nix"], "default": {"_type": "literalExpression", "text": "\"[::]\""}, "description": {"_type": "mdDoc", "text": "Address to listen on. Must be in the\n`ListenStream=` syntax of\n[systemd.socket(5)](https://www.freedesktop.org/software/systemd/man/systemd.socket.html).\n"}, "loc": ["services", "spacecookie", "address"], "readOnly": false, "type": "string"}, "services.spacecookie.enable": {"declarations": ["nixos/modules/services/networking/spacecookie.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable spacecookie."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "spacecookie", "enable"], "readOnly": false, "type": "boolean"}, "services.spacecookie.openFirewall": {"declarations": ["nixos/modules/services/networking/spacecookie.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the necessary port in the firewall for spacecookie.\n"}, "loc": ["services", "spacecookie", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.spacecookie.package": {"declarations": ["nixos/modules/services/networking/spacecookie.nix"], "default": {"_type": "literalExpression", "text": "pkgs.spacecookie"}, "description": {"_type": "mdDoc", "text": "The spacecookie derivation to use. This can be used to\noverride the used package or to use another version.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.haskellPackages.spacecookie"}, "loc": ["services", "spacecookie", "package"], "readOnly": false, "type": "package"}, "services.spacecookie.port": {"declarations": ["nixos/modules/services/networking/spacecookie.nix"], "default": {"_type": "literalExpression", "text": "70"}, "description": {"_type": "mdDoc", "text": "Port the gopher service should be exposed on.\n"}, "loc": ["services", "spacecookie", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.spacecookie.settings": {"declarations": ["nixos/modules/services/networking/spacecookie.nix"], "description": {"_type": "mdDoc", "text": "Settings for spacecookie. The settings set here are\ndirectly translated to the spacecookie JSON config\nfile. See\n[spacecookie.json(5)](https://sternenseemann.github.io/spacecookie/spacecookie.json.5.html)\nfor explanations of all options.\n"}, "loc": ["services", "spacecookie", "settings"], "readOnly": false, "type": "JSON value"}, "services.spacecookie.settings.hostname": {"declarations": ["nixos/modules/services/networking/spacecookie.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The hostname the service is reachable via. Clients\nwill use this hostname for further requests after\nloading the initial gopher menu.\n"}, "loc": ["services", "spacecookie", "settings", "hostname"], "readOnly": false, "type": "string"}, "services.spacecookie.settings.log.enable": {"declarations": ["nixos/modules/services/networking/spacecookie.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable logging for spacecookie."}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "spacecookie", "settings", "log", "enable"], "readOnly": false, "type": "boolean"}, "services.spacecookie.settings.log.hide-ips": {"declarations": ["nixos/modules/services/networking/spacecookie.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If enabled, spacecookie will hide personal\ninformation of users like IP addresses from\nlog output.\n"}, "loc": ["services", "spacecookie", "settings", "log", "hide-ips"], "readOnly": false, "type": "boolean"}, "services.spacecookie.settings.log.hide-time": {"declarations": ["nixos/modules/services/networking/spacecookie.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If enabled, spacecookie will not print timestamps\nat the beginning of every log line.\n"}, "loc": ["services", "spacecookie", "settings", "log", "hide-time"], "readOnly": false, "type": "boolean"}, "services.spacecookie.settings.log.level": {"declarations": ["nixos/modules/services/networking/spacecookie.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Log level for the spacecookie service.\n"}, "loc": ["services", "spacecookie", "settings", "log", "level"], "readOnly": false, "type": "one of \"info\", \"warn\", \"error\""}, "services.spacecookie.settings.root": {"declarations": ["nixos/modules/services/networking/spacecookie.nix"], "default": {"_type": "literalExpression", "text": "\"/srv/gopher\""}, "description": {"_type": "mdDoc", "text": "The directory spacecookie should serve via gopher.\nFiles in there need to be world-readable since\nthe spacecookie service file sets\n`DynamicUser=true`.\n"}, "loc": ["services", "spacecookie", "settings", "root"], "readOnly": false, "type": "path"}, "services.spamassassin.config": {"declarations": ["nixos/modules/services/mail/spamassassin.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The SpamAssassin local.cf config\n\nIf you are using this configuration:\n\n    add_header all Status _YESNO_, score=_SCORE_ required=_REQD_ tests=_TESTS_ autolearn=_AUTOLEARN_ version=_VERSION_\n\nThen you can Use this sieve filter:\n\n    require [\"fileinto\", \"reject\", \"envelope\"];\n\n    if header :contains \"X-Spam-Flag\" \"YES\" {\n      fileinto \"spam\";\n    }\n\nOr this procmail filter:\n\n    :0:\n    * ^X-Spam-Flag: YES\n    /var/vpopmail/domains/lastlog.de/js/.maildir/.spam/new\n\nTo filter your messages based on the additional mail headers added by spamassassin.\n"}, "example": {"_type": "literalExpression", "text": "''\n  #rewrite_header Subject [***** SPAM _SCORE_ *****]\n  required_score          5.0\n  use_bayes               1\n  bayes_auto_learn        1\n  add_header all Status _YESNO_, score=_SCORE_ required=_REQD_ tests=_TESTS_ autolearn=_AUTOLEARN_ version=_VERSION_\n''"}, "loc": ["services", "spamassassin", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.spamassassin.debug": {"declarations": ["nixos/modules/services/mail/spamassassin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the SpamAssassin daemon in debug mode"}, "loc": ["services", "spamassassin", "debug"], "readOnly": false, "type": "boolean"}, "services.spamassassin.enable": {"declarations": ["nixos/modules/services/mail/spamassassin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the SpamAssassin daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "spamassassin", "enable"], "readOnly": false, "type": "boolean"}, "services.spamassassin.initPreConf": {"declarations": ["nixos/modules/services/mail/spamassassin.nix"], "default": {"_type": "literalExpression", "text": "''\n  #\n  # to update this list, run this command in the rules directory:\n  # grep 'loadplugin.*Mail::SpamAssassin::Plugin::.*' -o -h * | sort | uniq\n  #\n  \n  #loadplugin Mail::SpamAssassin::Plugin::AccessDB\n  #loadplugin Mail::SpamAssassin::Plugin::AntiVirus\n  loadplugin Mail::SpamAssassin::Plugin::AskDNS\n  # loadplugin Mail::SpamAssassin::Plugin::ASN\n  loadplugin Mail::SpamAssassin::Plugin::AutoLearnThreshold\n  #loadplugin Mail::SpamAssassin::Plugin::AWL\n  loadplugin Mail::SpamAssassin::Plugin::Bayes\n  loadplugin Mail::SpamAssassin::Plugin::BodyEval\n  loadplugin Mail::SpamAssassin::Plugin::Check\n  #loadplugin Mail::SpamAssassin::Plugin::DCC\n  loadplugin Mail::SpamAssassin::Plugin::DKIM\n  loadplugin Mail::SpamAssassin::Plugin::DNSEval\n  loadplugin Mail::SpamAssassin::Plugin::FreeMail\n  loadplugin Mail::SpamAssassin::Plugin::Hashcash\n  loadplugin Mail::SpamAssassin::Plugin::HeaderEval\n  loadplugin Mail::SpamAssassin::Plugin::HTMLEval\n  loadplugin Mail::SpamAssassin::Plugin::HTTPSMismatch\n  loadplugin Mail::SpamAssassin::Plugin::ImageInfo\n  loadplugin Mail::SpamAssassin::Plugin::MIMEEval\n  loadplugin Mail::SpamAssassin::Plugin::MIMEHeader\n  # loadplugin Mail::SpamAssassin::Plugin::PDFInfo\n  #loadplugin Mail::SpamAssassin::Plugin::PhishTag\n  loadplugin Mail::SpamAssassin::Plugin::Pyzor\n  loadplugin Mail::SpamAssassin::Plugin::Razor2\n  # loadplugin Mail::SpamAssassin::Plugin::RelayCountry\n  loadplugin Mail::SpamAssassin::Plugin::RelayEval\n  loadplugin Mail::SpamAssassin::Plugin::ReplaceTags\n  # loadplugin Mail::SpamAssassin::Plugin::Rule2XSBody\n  # loadplugin Mail::SpamAssassin::Plugin::Shortcircuit\n  loadplugin Mail::SpamAssassin::Plugin::SpamCop\n  loadplugin Mail::SpamAssassin::Plugin::SPF\n  #loadplugin Mail::SpamAssassin::Plugin::TextCat\n  # loadplugin Mail::SpamAssassin::Plugin::TxRep\n  loadplugin Mail::SpamAssassin::Plugin::URIDetail\n  loadplugin Mail::SpamAssassin::Plugin::URIDNSBL\n  loadplugin Mail::SpamAssassin::Plugin::URIEval\n  # loadplugin Mail::SpamAssassin::Plugin::URILocalBL\n  loadplugin Mail::SpamAssassin::Plugin::VBounce\n  loadplugin Mail::SpamAssassin::Plugin::WhiteListSubject\n  loadplugin Mail::SpamAssassin::Plugin::WLBLEval\n''"}, "description": {"_type": "mdDoc", "text": "The SpamAssassin init.pre config."}, "loc": ["services", "spamassassin", "initPreConf"], "readOnly": false, "type": "string or path"}, "services.spark.confDir": {"declarations": ["nixos/modules/services/cluster/spark/default.nix"], "default": {"_type": "literalExpression", "text": "\"${package}/lib/${package.untarDir}/conf\""}, "description": {"_type": "mdDoc", "text": "Spark configuration directory. Spark will use the configuration files (spark-defaults.conf, spark-env.sh, log4j.properties, etc) from this directory."}, "loc": ["services", "spark", "confDir"], "readOnly": false, "type": "path"}, "services.spark.logDir": {"declarations": ["nixos/modules/services/cluster/spark/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/log/spark\""}, "description": {"_type": "mdDoc", "text": "Spark log directory."}, "loc": ["services", "spark", "logDir"], "readOnly": false, "type": "path"}, "services.spark.master.bind": {"declarations": ["nixos/modules/services/cluster/spark/default.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address the spark master binds to."}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "spark", "master", "bind"], "readOnly": false, "type": "string"}, "services.spark.master.enable": {"declarations": ["nixos/modules/services/cluster/spark/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Spark master service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "spark", "master", "enable"], "readOnly": false, "type": "boolean"}, "services.spark.master.extraEnvironment": {"declarations": ["nixos/modules/services/cluster/spark/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables to pass to spark master. See spark-standalone documentation."}, "example": {"_type": "literalExpression", "text": "{\n  SPARK_MASTER_OPTS = \"-Dspark.deploy.defaultCores=5\";\n  SPARK_MASTER_WEBUI_PORT = 8181;\n}"}, "loc": ["services", "spark", "master", "extraEnvironment"], "readOnly": false, "type": "attribute set of string"}, "services.spark.master.restartIfChanged": {"declarations": ["nixos/modules/services/cluster/spark/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Automatically restart master service on config change.\nThis can be set to false to defer restarts on clusters running critical applications.\nPlease consider the security implications of inadvertently running an older version,\nand the possibility of unexpected behavior caused by inconsistent versions across a cluster when disabling this option.\n"}, "loc": ["services", "spark", "master", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.spark.package": {"declarations": ["nixos/modules/services/cluster/spark/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.spark"}, "description": {"_type": "mdDoc", "text": "Spark package."}, "example": {"_type": "literalExpression", "text": "pkgs.spark.overrideAttrs (super: rec {\n          pname = \"spark\";\n          version = \"2.4.4\";\n\n          src = pkgs.fetchzip {\n            url    = \"mirror://apache/spark/\"${pname}-${version}/${pname}-${version}-bin-without-hadoop.tgz\";\n            sha256 = \"1a9w5k0207fysgpxx6db3a00fs5hdc2ncx99x4ccy2s0v5ndc66g\";\n          };\n        })"}, "loc": ["services", "spark", "package"], "readOnly": false, "type": "package"}, "services.spark.worker.enable": {"declarations": ["nixos/modules/services/cluster/spark/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Spark worker service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "spark", "worker", "enable"], "readOnly": false, "type": "boolean"}, "services.spark.worker.extraEnvironment": {"declarations": ["nixos/modules/services/cluster/spark/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables to pass to spark worker."}, "example": {"_type": "literalExpression", "text": "{\n  SPARK_WORKER_CORES = 5;\n  SPARK_WORKER_MEMORY = \"2g\";\n}"}, "loc": ["services", "spark", "worker", "extraEnvironment"], "readOnly": false, "type": "attribute set of string"}, "services.spark.worker.master": {"declarations": ["nixos/modules/services/cluster/spark/default.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:7077\""}, "description": {"_type": "mdDoc", "text": "Address of the spark master."}, "loc": ["services", "spark", "worker", "master"], "readOnly": false, "type": "string"}, "services.spark.worker.restartIfChanged": {"declarations": ["nixos/modules/services/cluster/spark/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Automatically restart worker service on config change.\nThis can be set to false to defer restarts on clusters running critical applications.\nPlease consider the security implications of inadvertently running an older version,\nand the possibility of unexpected behavior caused by inconsistent versions across a cluster when disabling this option.\n"}, "loc": ["services", "spark", "worker", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "services.spark.worker.workDir": {"declarations": ["nixos/modules/services/cluster/spark/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/spark\""}, "description": {"_type": "mdDoc", "text": "Spark worker work dir."}, "loc": ["services", "spark", "worker", "workDir"], "readOnly": false, "type": "path"}, "services.spice-vdagentd.enable": {"declarations": ["nixos/modules/services/misc/spice-vdagentd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Spice guest vdagent daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "spice-vdagentd", "enable"], "readOnly": false, "type": "boolean"}, "services.spice-webdavd.enable": {"declarations": ["nixos/modules/services/misc/spice-webdavd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the spice guest webdav proxy daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "spice-webdavd", "enable"], "readOnly": false, "type": "boolean"}, "services.spice-webdavd.package": {"declarations": ["nixos/modules/services/misc/spice-webdavd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.phodav"}, "description": {"_type": "mdDoc", "text": "spice-webdavd provider package to use."}, "loc": ["services", "spice-webdavd", "package"], "readOnly": false, "type": "package"}, "services.spiped.config": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for a secure pipe daemon. The daemon can be\nstarted, stopped, or examined using\n`systemctl`, under the name\n`spiped@foo`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  pipe1 =\n    { keyfile = \"/var/lib/spiped/pipe1.key\";\n      encrypt = true;\n      source  = \"localhost:6000\";\n      target  = \"endpoint.example.com:7000\";\n    };\n  pipe2 =\n    { keyfile = \"/var/lib/spiped/pipe2.key\";\n      decrypt = true;\n      source  = \"0.0.0.0:7000\";\n      target  = \"localhost:3000\";\n    };\n}\n"}, "loc": ["services", "spiped", "config"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.spiped.config.<name>.decrypt": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Take encrypted connections from the\n`source` socket and send unencrypted\nconnections to the `target` socket.\n"}, "loc": ["services", "spiped", "config", "<name>", "decrypt"], "readOnly": false, "type": "boolean"}, "services.spiped.config.<name>.disableKeepalives": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable transport layer keep-alives."}, "loc": ["services", "spiped", "config", "<name>", "disableKeepalives"], "readOnly": false, "type": "boolean"}, "services.spiped.config.<name>.disableReresolution": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable target address re-resolution."}, "loc": ["services", "spiped", "config", "<name>", "disableReresolution"], "readOnly": false, "type": "boolean"}, "services.spiped.config.<name>.encrypt": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Take unencrypted connections from the\n`source` socket and send encrypted\nconnections to the `target` socket.\n"}, "loc": ["services", "spiped", "config", "<name>", "encrypt"], "readOnly": false, "type": "boolean"}, "services.spiped.config.<name>.keyfile": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "description": {"_type": "mdDoc", "text": "Name of a file containing the spiped key. As the\ndaemon runs as the `spiped` user, the\nkey file must be somewhere owned by that user. By\ndefault, we recommend putting the keys for any spipe\nservices in `/var/lib/spiped`.\n"}, "loc": ["services", "spiped", "config", "<name>", "keyfile"], "readOnly": false, "type": "path"}, "services.spiped.config.<name>.maxConns": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "default": {"_type": "literalExpression", "text": "100"}, "description": {"_type": "mdDoc", "text": "Limit on the number of simultaneous connections allowed.\n"}, "loc": ["services", "spiped", "config", "<name>", "maxConns"], "readOnly": false, "type": "signed integer"}, "services.spiped.config.<name>.resolveRefresh": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "default": {"_type": "literalExpression", "text": "60"}, "description": {"_type": "mdDoc", "text": "Resolution refresh time for the target socket, in seconds.\n"}, "loc": ["services", "spiped", "config", "<name>", "resolveRefresh"], "readOnly": false, "type": "signed integer"}, "services.spiped.config.<name>.source": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "description": {"_type": "mdDoc", "text": "Address on which spiped should listen for incoming\nconnections.  Must be in one of the following formats:\n`/absolute/path/to/unix/socket`,\n`host.name:port`,\n`[ip.v4.ad.dr]:port` or\n`[ipv6::addr]:port` - note that\nhostnames are resolved when spiped is launched and are\nnot re-resolved later; thus if DNS entries change\nspiped will continue to connect to the expired\naddress.\n"}, "loc": ["services", "spiped", "config", "<name>", "source"], "readOnly": false, "type": "string"}, "services.spiped.config.<name>.target": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "description": {"_type": "mdDoc", "text": "Address to which spiped should connect."}, "loc": ["services", "spiped", "config", "<name>", "target"], "readOnly": false, "type": "string"}, "services.spiped.config.<name>.timeout": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Timeout, in seconds, after which an attempt to connect to\nthe target or a protocol handshake will be aborted (and the\nconnection dropped) if not completed\n"}, "loc": ["services", "spiped", "config", "<name>", "timeout"], "readOnly": false, "type": "signed integer"}, "services.spiped.config.<name>.waitForDNS": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Wait for DNS. Normally when `spiped` is\nlaunched it resolves addresses and binds to its source\nsocket before the parent process returns; with this option\nit will daemonize first and retry failed DNS lookups until\nthey succeed. This allows `spiped` to\nlaunch even if DNS isn't set up yet, but at the expense of\nlosing the guarantee that once `spiped` has\nfinished launching it will be ready to create pipes.\n"}, "loc": ["services", "spiped", "config", "<name>", "waitForDNS"], "readOnly": false, "type": "boolean"}, "services.spiped.config.<name>.weakHandshake": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use fast/weak handshaking: This reduces the CPU time spent\nin the initial connection setup, at the expense of losing\nperfect forward secrecy.\n"}, "loc": ["services", "spiped", "config", "<name>", "weakHandshake"], "readOnly": false, "type": "boolean"}, "services.spiped.enable": {"declarations": ["nixos/modules/services/networking/spiped.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the spiped service module."}, "loc": ["services", "spiped", "enable"], "readOnly": false, "type": "boolean"}, "services.spotifyd.config": {"declarations": ["nixos/modules/services/audio/spotifyd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "(Deprecated) Configuration for Spotifyd. For syntax and directives, see\n<https://github.com/Spotifyd/spotifyd#Configuration>.\n"}, "loc": ["services", "spotifyd", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.spotifyd.enable": {"declarations": ["nixos/modules/services/audio/spotifyd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable spotifyd, a Spotify playing daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "spotifyd", "enable"], "readOnly": false, "type": "boolean"}, "services.spotifyd.settings": {"declarations": ["nixos/modules/services/audio/spotifyd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for Spotifyd. For syntax and directives, see\n<https://github.com/Spotifyd/spotifyd#Configuration>.\n"}, "example": {"_type": "literalExpression", "text": "{\n  global = {\n    bitrate = 320;\n  };\n}"}, "loc": ["services", "spotifyd", "settings"], "readOnly": false, "type": "TOML value"}, "services.squeezelite.enable": {"declarations": ["nixos/modules/services/audio/squeezelite.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Squeezelite, a software Squeezebox emulator."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "squeezelite", "enable"], "readOnly": false, "type": "boolean"}, "services.squeezelite.extraArguments": {"declarations": ["nixos/modules/services/audio/squeezelite.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional command line arguments to pass to Squeezelite.\n"}, "loc": ["services", "squeezelite", "extraArguments"], "readOnly": false, "type": "string"}, "services.squeezelite.pulseAudio": {"declarations": ["nixos/modules/services/audio/squeezelite.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable pulseaudio support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "squeezelite", "pulseAudio"], "readOnly": false, "type": "boolean"}, "services.squid.configText": {"declarations": ["nixos/modules/services/networking/squid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Verbatim contents of squid.conf. If null (default), use the\nautogenerated file from NixOS instead.\n"}, "loc": ["services", "squid", "configText"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.squid.enable": {"declarations": ["nixos/modules/services/networking/squid.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run squid web proxy."}, "loc": ["services", "squid", "enable"], "readOnly": false, "type": "boolean"}, "services.squid.extraConfig": {"declarations": ["nixos/modules/services/networking/squid.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Squid configuration. Contents will be added\nverbatim to the configuration file.\n"}, "loc": ["services", "squid", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.squid.package": {"declarations": ["nixos/modules/services/networking/squid.nix"], "default": {"_type": "literalExpression", "text": "pkgs.squid"}, "description": {"_type": "mdDoc", "text": "Squid package to use."}, "loc": ["services", "squid", "package"], "readOnly": false, "type": "package"}, "services.squid.proxyAddress": {"declarations": ["nixos/modules/services/networking/squid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IP address on which squid will listen."}, "loc": ["services", "squid", "proxyAddress"], "readOnly": false, "type": "null or string"}, "services.squid.proxyPort": {"declarations": ["nixos/modules/services/networking/squid.nix"], "default": {"_type": "literalExpression", "text": "3128"}, "description": {"_type": "mdDoc", "text": "TCP port on which squid will listen."}, "loc": ["services", "squid", "proxyPort"], "readOnly": false, "type": "signed integer"}, "services.sshd.enable": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "description": {"_type": "mdDoc", "text": "Alias of {option}`services.openssh.enable`."}, "loc": ["services", "sshd", "enable"], "readOnly": false, "type": "boolean"}, "services.sshguard.attack_threshold": {"declarations": ["nixos/modules/services/security/sshguard.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "Block attackers when their cumulative attack score exceeds threshold. Most attacks have a score of 10.\n"}, "loc": ["services", "sshguard", "attack_threshold"], "readOnly": false, "type": "signed integer"}, "services.sshguard.blacklist_file": {"declarations": ["nixos/modules/services/security/sshguard.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/sshguard/blacklist.db\""}, "description": {"_type": "mdDoc", "text": "Blacklist an attacker when its score exceeds threshold. Blacklisted addresses are loaded from and added to blacklist-file.\n"}, "loc": ["services", "sshguard", "blacklist_file"], "readOnly": false, "type": "path"}, "services.sshguard.blacklist_threshold": {"declarations": ["nixos/modules/services/security/sshguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Blacklist an attacker when its score exceeds threshold. Blacklisted addresses are loaded from and added to blacklist-file.\n"}, "example": {"_type": "literalExpression", "text": "120"}, "loc": ["services", "sshguard", "blacklist_threshold"], "readOnly": false, "type": "null or signed integer"}, "services.sshguard.blocktime": {"declarations": ["nixos/modules/services/security/sshguard.nix"], "default": {"_type": "literalExpression", "text": "120"}, "description": {"_type": "mdDoc", "text": "Block attackers for initially blocktime seconds after exceeding threshold. Subsequent blocks increase by a factor of 1.5.\n\nsshguard unblocks attacks at random intervals, so actual block times will be longer.\n"}, "loc": ["services", "sshguard", "blocktime"], "readOnly": false, "type": "signed integer"}, "services.sshguard.detection_time": {"declarations": ["nixos/modules/services/security/sshguard.nix"], "default": {"_type": "literalExpression", "text": "1800"}, "description": {"_type": "mdDoc", "text": "Remember potential attackers for up to detection_time seconds before resetting their score.\n"}, "loc": ["services", "sshguard", "detection_time"], "readOnly": false, "type": "signed integer"}, "services.sshguard.enable": {"declarations": ["nixos/modules/services/security/sshguard.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the sshguard service."}, "loc": ["services", "sshguard", "enable"], "readOnly": false, "type": "boolean"}, "services.sshguard.services": {"declarations": ["nixos/modules/services/security/sshguard.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"sshd\"\n]"}, "description": {"_type": "mdDoc", "text": "Systemd services sshguard should receive logs of.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"sshd\"\n  \"exim\"\n]"}, "loc": ["services", "sshguard", "services"], "readOnly": false, "type": "list of string"}, "services.sshguard.whitelist": {"declarations": ["nixos/modules/services/security/sshguard.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Whitelist a list of addresses, hostnames, or address blocks.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"198.51.100.56\"\n  \"198.51.100.2\"\n]"}, "loc": ["services", "sshguard", "whitelist"], "readOnly": false, "type": "list of string"}, "services.sslh.appendConfig": {"declarations": ["nixos/modules/services/networking/sslh.nix"], "default": {"_type": "literalExpression", "text": "''\n  protocols:\n  (\n    { name: \"ssh\"; service: \"ssh\"; host: \"localhost\"; port: \"22\"; probe: \"builtin\"; },\n    { name: \"openvpn\"; host: \"localhost\"; port: \"1194\"; probe: \"builtin\"; },\n    { name: \"xmpp\"; host: \"localhost\"; port: \"5222\"; probe: \"builtin\"; },\n    { name: \"http\"; host: \"localhost\"; port: \"80\"; probe: \"builtin\"; },\n    { name: \"tls\"; host: \"localhost\"; port: \"443\"; probe: \"builtin\"; },\n    { name: \"anyprot\"; host: \"localhost\"; port: \"443\"; probe: \"builtin\"; }\n  );\n''"}, "description": {"_type": "mdDoc", "text": "Verbatim configuration file."}, "loc": ["services", "sslh", "appendConfig"], "readOnly": false, "type": "string"}, "services.sslh.enable": {"declarations": ["nixos/modules/services/networking/sslh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sslh."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sslh", "enable"], "readOnly": false, "type": "boolean"}, "services.sslh.listenAddresses": {"declarations": ["nixos/modules/services/networking/sslh.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0\"\n  \"[::]\"\n]"}, "description": {"_type": "mdDoc", "text": "Listening addresses or hostnames."}, "loc": ["services", "sslh", "listenAddresses"], "readOnly": false, "type": "(list of string) or string convertible to it"}, "services.sslh.port": {"declarations": ["nixos/modules/services/networking/sslh.nix"], "default": {"_type": "literalExpression", "text": "443"}, "description": {"_type": "mdDoc", "text": "Listening port."}, "loc": ["services", "sslh", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sslh.timeout": {"declarations": ["nixos/modules/services/networking/sslh.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Timeout in seconds."}, "loc": ["services", "sslh", "timeout"], "readOnly": false, "type": "signed integer"}, "services.sslh.transparent": {"declarations": ["nixos/modules/services/networking/sslh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Will the services behind sslh (Apache, sshd and so on) see the external IP and ports as if the external world connected directly to them"}, "loc": ["services", "sslh", "transparent"], "readOnly": false, "type": "boolean"}, "services.sslh.verbose": {"declarations": ["nixos/modules/services/networking/sslh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Verbose logs."}, "loc": ["services", "sslh", "verbose"], "readOnly": false, "type": "boolean"}, "services.sslmate-agent.enable": {"declarations": ["nixos/modules/services/security/sslmate-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sslmate-agent, a daemon for managing SSL/TLS certificates on a server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sslmate-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.ssm-agent.enable": {"declarations": ["nixos/modules/services/misc/ssm-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable AWS SSM agent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ssm-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.ssm-agent.package": {"declarations": ["nixos/modules/services/misc/ssm-agent.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ssm-agent.override { overrideEtc = false; }"}, "description": {"_type": "mdDoc", "text": "The SSM agent package to use"}, "loc": ["services", "ssm-agent", "package"], "readOnly": false, "type": "path"}, "services.sssd.config": {"declarations": ["nixos/modules/services/misc/sssd.nix"], "default": {"_type": "literalExpression", "text": "''\n  [sssd]\n  config_file_version = 2\n  services = nss, pam\n  domains = shadowutils\n  \n  [nss]\n  \n  [pam]\n  \n  [domain/shadowutils]\n  id_provider = proxy\n  proxy_lib_name = files\n  auth_provider = proxy\n  proxy_pam_target = sssd-shadowutils\n  proxy_fast_alias = True\n''"}, "description": {"_type": "mdDoc", "text": "Contents of {file}`sssd.conf`."}, "loc": ["services", "sssd", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.sssd.enable": {"declarations": ["nixos/modules/services/misc/sssd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the System Security Services Daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sssd", "enable"], "readOnly": false, "type": "boolean"}, "services.sssd.environmentFile": {"declarations": ["nixos/modules/services/misc/sssd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file as defined in {manpage}`systemd.exec(5)`.\n\nSecrets may be passed to the service without adding them to the world-readable\nNix store, by specifying placeholder variables as the option value in Nix and\nsetting these variables accordingly in the environment file.\n\n```\n  # snippet of sssd-related config\n  [domain/LDAP]\n  ldap_default_authtok = $SSSD_LDAP_DEFAULT_AUTHTOK\n```\n\n```\n  # contents of the environment file\n  SSSD_LDAP_DEFAULT_AUTHTOK=verysecretpassword\n```\n"}, "loc": ["services", "sssd", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.sssd.kcm": {"declarations": ["nixos/modules/services/misc/sssd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use SSS as a Kerberos Cache Manager (KCM).\nKerberos will be configured to cache credentials in SSS.\n"}, "loc": ["services", "sssd", "kcm"], "readOnly": false, "type": "boolean"}, "services.sssd.sshAuthorizedKeysIntegration": {"declarations": ["nixos/modules/services/misc/sssd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to make sshd look up authorized keys from SSS.\nFor this to work, the `ssh` SSS service must be enabled in the sssd configuration.\n"}, "loc": ["services", "sssd", "sshAuthorizedKeysIntegration"], "readOnly": false, "type": "boolean"}, "services.stargazer.certLifetime": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "How long certs generated by Stargazer should live for.\nCerts live forever by default.\n"}, "example": {"_type": "literalExpression", "text": "\"1y\""}, "loc": ["services", "stargazer", "certLifetime"], "readOnly": false, "type": "string"}, "services.stargazer.certOrg": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "\"stargazer\""}, "description": {"_type": "mdDoc", "text": "The name of the organization responsible for the X.509\ncertificate's /O name.\n"}, "loc": ["services", "stargazer", "certOrg"], "readOnly": false, "type": "string"}, "services.stargazer.connectionLogging": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether or not to log connections to stdout."}, "loc": ["services", "stargazer", "connectionLogging"], "readOnly": false, "type": "boolean"}, "services.stargazer.enable": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Stargazer Gemini server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "stargazer", "enable"], "readOnly": false, "type": "boolean"}, "services.stargazer.genCerts": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Set to false to disable automatic certificate generation.\nUse if you want to provide your own certs.\n"}, "loc": ["services", "stargazer", "genCerts"], "readOnly": false, "type": "boolean"}, "services.stargazer.group": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "\"stargazer\""}, "description": {"_type": "mdDoc", "text": "Group account under which stargazer runs."}, "loc": ["services", "stargazer", "group"], "readOnly": false, "type": "string"}, "services.stargazer.ipLog": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Log client IP addresses in the connection log."}, "loc": ["services", "stargazer", "ipLog"], "readOnly": false, "type": "boolean"}, "services.stargazer.ipLogPartial": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Log partial client IP addresses in the connection log."}, "loc": ["services", "stargazer", "ipLogPartial"], "readOnly": false, "type": "boolean"}, "services.stargazer.listen": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "[ \"0.0.0.0\" ] ++ lib.optional config.networking.enableIPv6 \"[::0]\""}, "description": {"_type": "mdDoc", "text": "Address and port to listen on.\n"}, "example": {"_type": "literalExpression", "text": "[ \"10.0.0.12\" \"[2002:a00:1::]\" ]"}, "loc": ["services", "stargazer", "listen"], "readOnly": false, "type": "list of string"}, "services.stargazer.regenCerts": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Set to false to turn off automatic regeneration of expired certificates.\nUse if you want to provide your own certs.\n"}, "loc": ["services", "stargazer", "regenCerts"], "readOnly": false, "type": "boolean"}, "services.stargazer.requestTimeout": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Number of seconds to wait for the client to send a complete\nrequest. Set to 0 to disable.\n"}, "loc": ["services", "stargazer", "requestTimeout"], "readOnly": false, "type": "signed integer"}, "services.stargazer.responseTimeout": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Number of seconds to wait for the client to send a complete\nrequest and for stargazer to finish sending the response.\nSet to 0 to disable.\n"}, "loc": ["services", "stargazer", "responseTimeout"], "readOnly": false, "type": "signed integer"}, "services.stargazer.routes": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Routes that Stargazer should server.\n\nExpressed as a list of attribute sets. Each set must have a key `route`\nthat becomes the section name for that route in the stargazer ini cofig.\nThe remaining keys and values become the parameters for that route.\n\n[Refer to upstream docs for other params](https://git.sr.ht/~zethra/stargazer/tree/main/item/doc/stargazer.ini.5.txt)\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    route = \"example.com\";\n    root = \"/srv/gemini/example.com\"\n  }\n  {\n    route = \"example.com:/man\";\n    root = \"/cgi-bin\";\n    cgi = true;\n  }\n  {\n    route = \"other.org~(.*)\";\n    redirect = \"gemini://example.com\";\n    rewrite = \"\\1\";\n  }\n]\n"}, "loc": ["services", "stargazer", "routes"], "readOnly": false, "type": "list of (attribute set of (INI atom (null, bool, int, float or string)))"}, "services.stargazer.routes.*.route": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "description": {"_type": "mdDoc", "text": "Route section name"}, "loc": ["services", "stargazer", "routes", "*", "route"], "readOnly": false, "type": "string"}, "services.stargazer.store": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "/var/lib/gemini/certs"}, "description": {"_type": "mdDoc", "text": "Path to the certificate store on disk. This should be a\npersistent directory writable by Stargazer.\n"}, "loc": ["services", "stargazer", "store"], "readOnly": false, "type": "path"}, "services.stargazer.user": {"declarations": ["nixos/modules/services/web-servers/stargazer.nix"], "default": {"_type": "literalExpression", "text": "\"stargazer\""}, "description": {"_type": "mdDoc", "text": "User account under which stargazer runs."}, "loc": ["services", "stargazer", "user"], "readOnly": false, "type": "string"}, "services.statsd.backends": {"declarations": ["nixos/modules/services/monitoring/statsd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of backends statsd will use for data persistence"}, "example": {"_type": "literalExpression", "text": "[\n  \"graphite\"\n  \"console\"\n  \"repeater\"\n  \"statsd-librato-backend\"\n  \"stackdriver-statsd-backend\"\n  \"statsd-influxdb-backend\"\n]"}, "loc": ["services", "statsd", "backends"], "readOnly": false, "type": "list of string"}, "services.statsd.enable": {"declarations": ["nixos/modules/services/monitoring/statsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable statsd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "statsd", "enable"], "readOnly": false, "type": "boolean"}, "services.statsd.extraConfig": {"declarations": ["nixos/modules/services/monitoring/statsd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options for statsd"}, "loc": ["services", "statsd", "extraConfig"], "readOnly": false, "type": "null or string"}, "services.statsd.graphiteHost": {"declarations": ["nixos/modules/services/monitoring/statsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hostname or IP of Graphite server"}, "loc": ["services", "statsd", "graphiteHost"], "readOnly": false, "type": "null or string"}, "services.statsd.graphitePort": {"declarations": ["nixos/modules/services/monitoring/statsd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port of Graphite server (i.e. carbon-cache)."}, "loc": ["services", "statsd", "graphitePort"], "readOnly": false, "type": "null or signed integer"}, "services.statsd.listenAddress": {"declarations": ["nixos/modules/services/monitoring/statsd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address that statsd listens on over UDP"}, "loc": ["services", "statsd", "listenAddress"], "readOnly": false, "type": "string"}, "services.statsd.mgmt_address": {"declarations": ["nixos/modules/services/monitoring/statsd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Address to run management TCP interface on"}, "loc": ["services", "statsd", "mgmt_address"], "readOnly": false, "type": "string"}, "services.statsd.mgmt_port": {"declarations": ["nixos/modules/services/monitoring/statsd.nix"], "default": {"_type": "literalExpression", "text": "8126"}, "description": {"_type": "mdDoc", "text": "Port to run the management TCP interface on"}, "loc": ["services", "statsd", "mgmt_port"], "readOnly": false, "type": "signed integer"}, "services.statsd.port": {"declarations": ["nixos/modules/services/monitoring/statsd.nix"], "default": {"_type": "literalExpression", "text": "8125"}, "description": {"_type": "mdDoc", "text": "Port that stats listens for messages on over UDP"}, "loc": ["services", "statsd", "port"], "readOnly": false, "type": "signed integer"}, "services.step-ca.address": {"declarations": ["nixos/modules/services/security/step-ca.nix"], "description": {"_type": "mdDoc", "text": "The address (without port) the certificate authority should listen at.\nThis combined with {option}`services.step-ca.port` overrides {option}`services.step-ca.settings.address`.\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "step-ca", "address"], "readOnly": false, "type": "string"}, "services.step-ca.enable": {"declarations": ["nixos/modules/services/security/step-ca.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the smallstep certificate authority server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "step-ca", "enable"], "readOnly": false, "type": "boolean"}, "services.step-ca.intermediatePasswordFile": {"declarations": ["nixos/modules/services/security/step-ca.nix"], "description": {"_type": "mdDoc", "text": "Path to the file containing the password for the intermediate\ncertificate private key.\n\n::: {.warning}\nMake sure to use a quoted absolute path instead of a path literal\nto prevent it from being copied to the globally readable Nix\nstore.\n:::\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/smallstep-password\""}, "loc": ["services", "step-ca", "intermediatePasswordFile"], "readOnly": false, "type": "path"}, "services.step-ca.openFirewall": {"declarations": ["nixos/modules/services/security/step-ca.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable opening the certificate authority server port."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "step-ca", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.step-ca.package": {"declarations": ["nixos/modules/services/security/step-ca.nix"], "default": {"_type": "literalExpression", "text": "pkgs.step-ca"}, "description": {"_type": "mdDoc", "text": "Which step-ca package to use."}, "loc": ["services", "step-ca", "package"], "readOnly": false, "type": "package"}, "services.step-ca.port": {"declarations": ["nixos/modules/services/security/step-ca.nix"], "description": {"_type": "mdDoc", "text": "The port the certificate authority should listen on.\nThis combined with {option}`services.step-ca.address` overrides {option}`services.step-ca.settings.address`.\n"}, "example": {"_type": "literalExpression", "text": "8443"}, "loc": ["services", "step-ca", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.step-ca.settings": {"declarations": ["nixos/modules/services/security/step-ca.nix"], "description": {"_type": "mdDoc", "text": "Settings that go into {file}`ca.json`. See\n[the step-ca manual](https://smallstep.com/docs/step-ca/configuration)\nfor more information. The easiest way to\nconfigure this module would be to run `step ca init`\nto generate {file}`ca.json` and then import it using\n`builtins.fromJSON`.\n[This article](https://smallstep.com/docs/step-cli/basic-crypto-operations#run-an-offline-x509-certificate-authority)\nmay also be useful if you want to customize certain aspects of\ncertificate generation for your CA.\nYou need to change the database storage path to {file}`/var/lib/step-ca/db`.\n\n::: {.warning}\nThe {option}`services.step-ca.settings.address` option\nwill be ignored and overwritten by\n{option}`services.step-ca.address` and\n{option}`services.step-ca.port`.\n:::\n"}, "loc": ["services", "step-ca", "settings"], "readOnly": false, "type": "attribute set of anything"}, "services.stratis.enable": {"declarations": ["nixos/modules/tasks/stratis.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Stratis Storage - Easy to use local storage management for Linux."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "stratis", "enable"], "readOnly": false, "type": "boolean"}, "services.strongswan-swanctl.enable": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable strongswan-swanctl service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "strongswan-swanctl", "enable"], "readOnly": false, "type": "boolean"}, "services.strongswan-swanctl.package": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "pkgs.strongswan"}, "description": {"_type": "mdDoc", "text": "The strongswan derivation to use.\n"}, "loc": ["services", "strongswan-swanctl", "package"], "readOnly": false, "type": "package"}, "services.strongswan-swanctl.strongswan.extraConfig": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Contents of the `strongswan.conf` file.\n"}, "loc": ["services", "strongswan-swanctl", "strongswan", "extraConfig"], "readOnly": false, "type": "string"}, "services.strongswan-swanctl.swanctl.authorities": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Section defining complementary attributes of certification authorities, each\nin its own subsection with an arbitrary yet unique name\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "authorities"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.authorities.<name>.cacert": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The certificates may use a relative path from the swanctl\n`x509ca` directory or an absolute path.\n\nConfigure one of {option}`cacert`,\n{option}`file`, or\n{option}`handle` per section.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "authorities", "<name>", "cacert"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.authorities.<name>.cert_uri_base": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Defines the base URI for the Hash and URL feature supported by\nIKEv2. Instead of exchanging complete certificates, IKEv2 allows one to\nsend an URI that resolves to the DER encoded certificate. The certificate\nURIs are built by appending the SHA1 hash of the DER encoded certificates\nto this base URI.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "authorities", "<name>", "cert_uri_base"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.authorities.<name>.crl_uris": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of CRL distribution points (ldap, http, or file URI).\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "authorities", "<name>", "crl_uris"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.authorities.<name>.file": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Absolute path to the certificate to load. Passed as-is to the daemon, so\nit must be readable by it.\n\nConfigure either this or {option}`handle`, but not both, in one section.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "authorities", "<name>", "file"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.authorities.<name>.handle": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hex-encoded CKA_ID or handle of the certificate on a token or TPM,\nrespectively.\n\nConfigure either this or {option}`file`, but not both, in one section.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "authorities", "<name>", "handle"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.authorities.<name>.module": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional PKCS#11 module name.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "authorities", "<name>", "module"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.authorities.<name>.ocsp_uris": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of OCSP URIs.\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "authorities", "<name>", "ocsp_uris"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.authorities.<name>.slot": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional slot number of the token that stores the certificate.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "authorities", "<name>", "slot"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Section defining IKE connection configurations, each in its own subsection\nwith an arbitrary yet unique name\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.connections.<name>.aggressive": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Enables Aggressive Mode instead of Main Mode with Identity\nProtection. Aggressive Mode is considered less secure, because the ID and\nHASH payloads are exchanged unprotected. This allows a passive attacker to\nsnoop peer identities, and even worse, start dictionary attacks on the\nPreshared Key.\n\n\nStrongSwan default: ````false````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "aggressive"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.childless": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use childless IKE_SA initiation (_allow_, _prefer_, _force_ or _never_).\n\nUse childless IKE_SA initiation (RFC 6023) for IKEv2, with the first\nCHILD_SA created with a separate CREATE_CHILD_SA exchange (e.g. to use an\nindependent DH exchange for all CHILD_SAs).  Acceptable values are `allow`\n(the default), `prefer`, `force` and `never`. If set to `allow`, responders\nwill accept childless IKE_SAs (as indicated via notify in the IKE_SA_INIT\nresponse) while initiators continue to create regular IKE_SAs with the first\nCHILD_SA created during IKE_AUTH, unless the IKE_SA is initiated explicitly\nwithout any children (which will fail if the responder does not support or\nhas disabled this extension). The effect of `prefer` is the same as `allow`\non responders, but as initiator a childless IKE_SA is initiated if the\nresponder supports it. If set to `force`, only childless initiation is\naccepted in either role.  Finally, setting the option to `never` disables\nsupport for childless IKE_SAs as responder.\n\n\nStrongSwan default: ````\"allow\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "childless"], "readOnly": false, "type": "null or one of \"allow\", \"prefer\", \"force\", \"never\""}, "services.strongswan-swanctl.swanctl.connections.<name>.children": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "CHILD_SA configuration sub-section. Each connection definition may have\none or more sections in its {option}`children` subsection. The\nsection name defines the name of the CHILD_SA configuration, which must be\nunique within the connection (denoted \\<child\\> below).\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ah_proposals": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "AH proposals to offer for the CHILD_SA. A proposal is a set of\nalgorithms. For AH, this includes an integrity algorithm and an optional\nDiffie-Hellman group. If a DH group is specified, CHILD_SA/Quick Mode\nrekeying and initial negotiation uses a separate Diffie-Hellman exchange\nusing the specified group (refer to esp_proposals for details).\n\nIn IKEv2, multiple algorithms of the same kind can be specified in a\nsingle proposal, from which one gets selected. In IKEv1, only one\nalgorithm per kind is allowed per proposal, more algorithms get\nimplicitly stripped. Use multiple proposals to offer different algorithms\ncombinations in IKEv1.\n\nAlgorithm keywords get separated using dashes. Multiple proposals may be\nspecified in a list. The special value `default` forms\na default proposal of supported algorithms considered safe, and is\nusually a good choice for interoperability. By default no AH proposals\nare included, instead ESP is proposed.\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "ah_proposals"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.close_action": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Action to perform after a CHILD_SA gets closed by the peer.\n\n- The default of `none` does not take any action,\n- `trap` installs a trap policy for the CHILD_SA.\n- `start` tries to re-create the CHILD_SA.\n\n{option}`close_action` does not provide any guarantee that the\nCHILD_SA is kept alive. It acts on explicit close messages only, but not\non negotiation failures. Use trap policies to reliably re-create failed\nCHILD_SAs.\n\n\nStrongSwan default: ````\"none\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "close_action"], "readOnly": false, "type": "null or one of \"none\", \"trap\", \"start\""}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_df": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to copy the DF bit to the outer IPv4 header in tunnel mode. This\neffectively disables Path MTU discovery (PMTUD). Controlling this\nbehavior is not supported by all kernel interfaces.\n\n\nStrongSwan default: ````true````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "copy_df"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_dscp": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to copy the DSCP (Differentiated Services Field Codepoint)\nheader field to/from the outer IP header in tunnel mode. The value\n`out` only copies the field from the inner to the outer\nheader, the value `in` does the opposite and only\ncopies the field from the outer to the inner header when decapsulating,\nthe value `yes` copies the field in both directions,\nand the value `no` disables copying the field\naltogether. Setting this to `yes` or\n`in` could allow an attacker to adversely affect other\ntraffic at the receiver, which is why the default is\n`out`. Controlling this behavior is not supported by\nall kernel interfaces.\n\n\nStrongSwan default: ````\"out\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "copy_dscp"], "readOnly": false, "type": "null or one of \"out\", \"in\", \"yes\", \"no\""}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_ecn": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to copy the ECN (Explicit Congestion Notification) header field\nto/from the outer IP header in tunnel mode. Controlling this behavior is\nnot supported by all kernel interfaces.\n\n\nStrongSwan default: ````true````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "copy_ecn"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.dpd_action": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Action to perform for this CHILD_SA on DPD timeout. The default clear\ncloses the CHILD_SA and does not take further action. trap installs a\ntrap policy, which will catch matching traffic and tries to re-negotiate\nthe tunnel on-demand. restart immediately tries to re-negotiate the\nCHILD_SA under a fresh IKE_SA.\n\n\nStrongSwan default: ````\"clear\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "dpd_action"], "readOnly": false, "type": "null or one of \"clear\", \"trap\", \"restart\""}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.esp_proposals": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ESP proposals to offer for the CHILD_SA. A proposal is a set of\nalgorithms. For ESP non-AEAD proposals, this includes an integrity\nalgorithm, an encryption algorithm, an optional Diffie-Hellman group and\nan optional Extended Sequence Number Mode indicator. For AEAD proposals,\na combined mode algorithm is used instead of the separate\nencryption/integrity algorithms.\n\nIf a DH group is specified, CHILD_SA/Quick Mode rekeying and initial\nnegotiation use a separate Diffie-Hellman exchange using the specified\ngroup. However, for IKEv2, the keys of the CHILD_SA created implicitly\nwith the IKE_SA will always be derived from the IKE_SA's key material. So\nany DH group specified here will only apply when the CHILD_SA is later\nrekeyed or is created with a separate CREATE_CHILD_SA exchange. A\nproposal mismatch might, therefore, not immediately be noticed when the\nSA is established, but may later cause rekeying to fail.\n\nExtended Sequence Number support may be indicated with the\n`esn` and `noesn` values, both may be\nincluded to indicate support for both modes. If omitted,\n`noesn` is assumed.\n\nIn IKEv2, multiple algorithms of the same kind can be specified in a\nsingle proposal, from which one gets selected. In IKEv1, only one\nalgorithm per kind is allowed per proposal, more algorithms get\nimplicitly stripped. Use multiple proposals to offer different algorithms\ncombinations in IKEv1.\n\nAlgorithm keywords get separated using dashes. Multiple proposals may be\nspecified as a list. The special value `default` forms\na default proposal of supported algorithms considered safe, and is\nusually a good choice for interoperability. If no algorithms are\nspecified for AH nor ESP, the default set of algorithms for ESP is\nincluded.\n\n\nStrongSwan default: ````[\"default\"]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "esp_proposals"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.hostaccess": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hostaccess variable to pass to `updown` script.\n\n\nStrongSwan default: ````false````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "hostaccess"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.hw_offload": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Enable hardware offload for this CHILD_SA, if supported by the IPsec\nimplementation. The values `crypto` or `packet` enforce crypto or full\npacket offloading and the installation will fail if the selected mode is not\nsupported by either kernel or device. On Linux, `packet` also offloads\npolicies, including trap policies. The value `auto` enables full packet\nor crypto offloading, if either is supported, but the installation does not\nfail otherwise.\n\n\nStrongSwan default: ````\"no\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "hw_offload"], "readOnly": false, "type": "null or one of \"yes\", \"no\", \"auto\", \"crypto\", \"packet\""}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_in": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "XFRM interface ID set on inbound policies/SA. This allows installing\nduplicate policies/SAs and associates them with an interface with the\nsame ID. The special value `%unique` sets a unique\ninterface ID on each CHILD_SA instance, beyond that the value\n`%unique-dir` assigns a different unique interface ID\nfor each CHILD_SA direction (in/out).\n\n\nStrongSwan default: ````\"0\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "if_id_in"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_out": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "XFRM interface ID set on outbound policies/SA. This allows installing\nduplicate policies/SAs and associates them with an interface with the\nsame ID. The special value `%unique` sets a unique\ninterface ID on each CHILD_SA instance, beyond that the value\n`%unique-dir` assigns a different unique interface ID\nfor each CHILD_SA direction (in/out).\n\nThe daemon will not install routes for CHILD_SAs that have this option set.\n\n\nStrongSwan default: ````\"0\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "if_id_out"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.inactivity": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Timeout before closing CHILD_SA after inactivity. If no traffic has been\nprocessed in either direction for the configured timeout, the CHILD_SA\ngets closed due to inactivity. The default value of 0 disables inactivity\nchecks.\n\n\nStrongSwan default: ````\"0s\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "inactivity"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.interface": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional interface name to restrict outbound IPsec policies.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "interface"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ipcomp": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Enable IPComp compression before encryption. If enabled, IKE tries to\nnegotiate IPComp compression to compress ESP payload data prior to\nencryption.\n\n\nStrongSwan default: ````false````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "ipcomp"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_bytes": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum bytes processed before CHILD_SA gets closed. Usually this hard\nvolume limit is never reached, because the CHILD_SA gets rekeyed\nbefore. If that fails for whatever reason, this limit closes the\nCHILD_SA.  The default is 10% more than {option}`rekey_bytes`.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "life_bytes"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_packets": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum number of packets processed before CHILD_SA gets closed. Usually\nthis hard packets limit is never reached, because the CHILD_SA gets\nrekeyed before. If that fails for whatever reason, this limit closes the\nCHILD_SA.\n\nThe default is 10% more than {option}`rekey_bytes`.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "life_packets"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.life_time": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum lifetime before CHILD_SA gets closed. Usually this hard lifetime\nis never reached, because the CHILD_SA gets rekeyed before. If that fails\nfor whatever reason, this limit closes the CHILD_SA.  The default is 10%\nmore than the {option}`rekey_time`.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "life_time"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.local_ts": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of local traffic selectors to include in CHILD_SA. Each selector is\na CIDR subnet definition, followed by an optional proto/port\nselector. The special value `dynamic` may be used\ninstead of a subnet definition, which gets replaced by the tunnel outer\naddress or the virtual IP, if negotiated. This is the default.\n\nA protocol/port selector is surrounded by opening and closing square\nbrackets. Between these brackets, a numeric or getservent(3) protocol\nname may be specified. After the optional protocol restriction, an\noptional port restriction may be specified, separated by a slash. The\nport restriction may be numeric, a getservent(3) service name, or the\nspecial value `opaque` for RFC 4301 OPAQUE\nselectors. Port ranges may be specified as well, none of the kernel\nbackends currently support port ranges, though.\n\nWhen IKEv1 is used only the first selector is interpreted, except if the\nCisco Unity extension plugin is used. This is due to a limitation of the\nIKEv1 protocol, which only allows a single pair of selectors per\nCHILD_SA. So to tunnel traffic matched by several pairs of selectors when\nusing IKEv1 several children (CHILD_SAs) have to be defined that cover\nthe selectors.  The IKE daemon uses traffic selector narrowing for IKEv1,\nthe same way it is standardized and implemented for IKEv2. However, this\nmay lead to problems with other implementations. To avoid that, configure\nidentical selectors in such scenarios.\n\n\nStrongSwan default: ````[\"dynamic\"]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "local_ts"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Netfilter mark and mask for input traffic. On Linux, Netfilter may\nrequire marks on each packet to match an SA/policy having that option\nset. This allows installing duplicate policies and enables Netfilter\nrules to select specific SAs/policies for incoming traffic. Note that\ninbound marks are only set on policies, by default, unless\n{option}`mark_in_sa` is enabled. The special value\n`%unique` sets a unique mark on each CHILD_SA instance,\nbeyond that the value `%unique-dir` assigns a different\nunique mark for each\n\nAn additional mask may be appended to the mark, separated by\n`/`. The default mask if omitted is\n`0xffffffff`.\n\n\nStrongSwan default: ````\"0/0x00000000\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "mark_in"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in_sa": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to set {option}`mark_in` on the inbound SA. By default,\nthe inbound mark is only set on the inbound policy. The tuple destination\naddress, protocol and SPI is unique and the mark is not required to find\nthe correct SA, allowing to mark traffic after decryption instead (where\nmore specific selectors may be used) to match different policies. Marking\npackets before decryption is still possible, even if no mark is set on\nthe SA.\n\n\nStrongSwan default: ````false````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "mark_in_sa"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_out": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Netfilter mark and mask for output traffic. On Linux, Netfilter may\nrequire marks on each packet to match a policy/SA having that option\nset. This allows installing duplicate policies and enables Netfilter\nrules to select specific policies/SAs for outgoing traffic. The special\nvalue `%unique` sets a unique mark on each CHILD_SA\ninstance, beyond that the value `%unique-dir` assigns a\ndifferent unique mark for each CHILD_SA direction (in/out).\n\nAn additional mask may be appended to the mark, separated by\n`/`. The default mask if omitted is\n`0xffffffff`.\n\n\nStrongSwan default: ````\"0/0x00000000\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "mark_out"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mode": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IPsec Mode to establish CHILD_SA with.\n\n- `tunnel` negotiates the CHILD_SA in IPsec Tunnel Mode,\n- whereas `transport` uses IPsec Transport Mode.\n- `transport_proxy` signifying the special Mobile IPv6\n  Transport Proxy Mode.\n- `beet` is the Bound End to End Tunnel mixture mode,\n  working with fixed inner addresses without the need to include them in\n  each packet.\n- Both `transport` and `beet` modes are\n  subject to mode negotiation; `tunnel` mode is\n  negotiated if the preferred mode is not available.\n- `pass` and `drop` are used to install\n  shunt policies which explicitly bypass the defined traffic from IPsec\n  processing or drop it, respectively.\n\n\nStrongSwan default: ````\"tunnel\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "mode"], "readOnly": false, "type": "null or one of \"tunnel\", \"transport\", \"transport_proxy\", \"beet\", \"pass\", \"drop\""}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.policies": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to install IPsec policies or not. Disabling this can be useful in\nsome scenarios e.g. MIPv6, where policies are not managed by the IKE\ndaemon. Since 5.3.3.\n\n\nStrongSwan default: ````true````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "policies"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.policies_fwd_out": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to install outbound FWD IPsec policies or not. Enabling this is\nrequired in case there is a drop policy that would match and block\nforwarded traffic for this CHILD_SA. Since 5.5.1.\n\n\nStrongSwan default: ````false````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "policies_fwd_out"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.priority": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional fixed priority for IPsec policies. This could be useful to\ninstall high-priority drop policies. The default of 0 uses dynamically\ncalculated priorities based on the size of the traffic selectors.\n\n\nStrongSwan default: ````0````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "priority"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_bytes": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Byte range from which to choose a random value to subtract from\n{option}`rekey_bytes`. The default is the difference between\n{option}`life_bytes` and {option}`rekey_bytes`.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "rand_bytes"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_packets": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Packet range from which to choose a random value to subtract from\n{option}`rekey_packets`. The default is the difference between\n{option}`life_packets` and {option}`rekey_packets`.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "rand_packets"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rand_time": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Time range from which to choose a random value to subtract from\n{option}`rekey_time`. The default is the difference between\n{option}`life_time` and {option}`rekey_time`.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "rand_time"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_bytes": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of bytes processed before initiating CHILD_SA rekeying. CHILD_SA\nrekeying refreshes key material, optionally using a Diffie-Hellman\nexchange if a group is specified in the proposal.\n\nTo avoid rekey collisions initiated by both ends simultaneously, a value\nin the range of {option}`rand_bytes` gets subtracted to form the\neffective soft volume limit.\n\nVolume based CHILD_SA rekeying is disabled by default.\n\n\nStrongSwan default: ````0````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "rekey_bytes"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_packets": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of packets processed before initiating CHILD_SA rekeying. CHILD_SA\nrekeying refreshes key material, optionally using a Diffie-Hellman\nexchange if a group is specified in the proposal.\n\nTo avoid rekey collisions initiated by both ends simultaneously, a value\nin the range of {option}`rand_packets` gets subtracted to form\nthe effective soft packet count limit.\n\nPacket count based CHILD_SA rekeying is disabled by default.\n\n\nStrongSwan default: ````0````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "rekey_packets"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.rekey_time": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Time to schedule CHILD_SA rekeying. CHILD_SA rekeying refreshes key\nmaterial, optionally using a Diffie-Hellman exchange if a group is\nspecified in the proposal.  To avoid rekey collisions initiated by both\nends simultaneously, a value in the range of {option}`rand_time`\ngets subtracted to form the effective soft lifetime.\n\nBy default CHILD_SA rekeying is scheduled every hour, minus\n{option}`rand_time`.\n\n\nStrongSwan default: ````\"1h\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "rekey_time"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.remote_ts": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of remote selectors to include in CHILD_SA. See\n{option}`local_ts` for a description of the selector syntax.\n\n\nStrongSwan default: ````[\"dynamic\"]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "remote_ts"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.replay_window": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IPsec replay window to configure for this CHILD_SA. Larger values than\nthe default of `32` are supported using the Netlink\nbackend only, a value of `0` disables IPsec replay\nprotection.\n\n\nStrongSwan default: ````32````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "replay_window"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.reqid": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Fixed reqid to use for this CHILD_SA. This might be helpful in some\nscenarios, but works only if each CHILD_SA configuration is instantiated\nnot more than once. The default of 0 uses dynamic reqids, allocated\nincrementally.\n\n\nStrongSwan default: ````0````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "reqid"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.set_mark_in": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Netfilter mark applied to packets after the inbound IPsec SA processed\nthem. This way it's not necessary to mark packets via Netfilter before\ndecryption or right afterwards to match policies or process them\ndifferently (e.g. via policy routing).\n\nAn additional mask may be appended to the mark, separated by\n`/`. The default mask if omitted is 0xffffffff. The\nspecial value `%same` uses the value (but not the mask)\nfrom {option}`mark_in` as mark value, which can be fixed,\n`%unique` or `%unique-dir`.\n\nSetting marks in XFRM input requires Linux 4.19 or higher.\n\n\nStrongSwan default: ````\"0/0x00000000\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "set_mark_in"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.set_mark_out": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Netfilter mark applied to packets after the outbound IPsec SA processed\nthem. This allows processing ESP packets differently than the original\ntraffic (e.g. via policy routing).\n\nAn additional mask may be appended to the mark, separated by\n`/`. The default mask if omitted is 0xffffffff. The\nspecial value `%same` uses the value (but not the mask)\nfrom {option}`mark_out` as mark value, which can be fixed,\n`%unique_` or `%unique-dir`.\n\nSetting marks in XFRM output is supported since Linux 4.14. Setting a\nmask requires at least Linux 4.19.\n\n\nStrongSwan default: ````\"0/0x00000000\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "set_mark_out"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.sha256_96": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HMAC-SHA-256 is used with 128-bit truncation with IPsec. For\ncompatibility with implementations that incorrectly use 96-bit truncation\nthis option may be enabled to configure the shorter truncation length in\nthe kernel. This is not negotiated, so this only works with peers that\nuse the incorrect truncation length (or have this option enabled).\n\n\nStrongSwan default: ````false````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "sha256_96"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.start_action": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Action to perform after loading the configuration.\n\n- The default of `none` loads the connection only, which\n  then can be manually initiated or used as a responder configuration.\n- The value `trap` installs a trap policy, which triggers\n  the tunnel as soon as matching traffic has been detected.\n- The value `start` initiates the connection actively.\n\nWhen unloading or replacing a CHILD_SA configuration having a\n{option}`start_action` different from `none`,\nthe inverse action is performed. Configurations with\n`start` get closed, while such with\n`trap` get uninstalled.\n\n\nStrongSwan default: ````\"none\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "start_action"], "readOnly": false, "type": "null or one of \"none\", \"trap\", \"start\""}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.tfc_padding": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Pads ESP packets with additional data to have a consistent ESP packet\nsize for improved Traffic Flow Confidentiality. The padding defines the\nminimum size of all ESP packets sent.  The default value of\n`0` disables TFC padding, the special value\n`mtu` adds TFC padding to create a packet size equal to\nthe Path Maximum Transfer Unit.\n\n\nStrongSwan default: ````0````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "tfc_padding"], "readOnly": false, "type": "null or signed integer or value \"mtu\" (singular enum)"}, "services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.updown": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Updown script to invoke on CHILD_SA up and down events.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "children", "<name>", "updown"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.dpd_delay": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Interval to check the liveness of a peer actively using IKEv2\nINFORMATIONAL exchanges or IKEv1 R_U_THERE messages. Active DPD checking\nis only enforced if no IKE or ESP/AH packet has been received for the\nconfigured DPD delay.\n\n\nStrongSwan default: ````\"0s\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "dpd_delay"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.dpd_timeout": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Charon by default uses the normal retransmission mechanism and timeouts to\ncheck the liveness of a peer, as all messages are used for liveness\nchecking. For compatibility reasons, with IKEv1 a custom interval may be\nspecified; this option has no effect on connections using IKEv2.\n\n\nStrongSwan default: ````\"0s\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "dpd_timeout"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.dscp": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Differentiated Services Field Codepoint to set on outgoing IKE packets for\nthis connection. The value is a six digit binary encoded string specifying\nthe Codepoint to set, as defined in RFC 2474.\n\n\nStrongSwan default: ````\"000000\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "dscp"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.encap": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "To enforce UDP encapsulation of ESP packets, the IKE daemon can fake the\nNAT detection payloads. This makes the peer believe that NAT takes place\non the path, forcing it to encapsulate ESP packets in UDP.\n\nUsually this is not required, but it can help to work around connectivity\nissues with too restrictive intermediary firewalls.\n\n\nStrongSwan default: ````false````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "encap"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.fragmentation": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use IKE fragmentation (proprietary IKEv1 extension or RFC 7383 IKEv2\nfragmentation). Acceptable values are `yes` (the default\nsince 5.5.1), `accept` (since versions:5.5.3),\n`force` and `no`.\n\n- If set to `yes`, and the peer\n  supports it, oversized IKE messages will be sent in fragments.\n- If set to\n  `accept`, support for fragmentation is announced to the peer but the daemon\n  does not send its own messages in fragments.\n- If set to `force` (only\n  supported for IKEv1) the initial IKE message will already be fragmented if\n  required.\n- Finally, setting the option to `no` will disable announcing\n  support for this feature.\n\nNote that fragmented IKE messages sent by a peer are always processed\nirrespective of the value of this option (even when set to no).\n\n\nStrongSwan default: ````\"yes\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "fragmentation"], "readOnly": false, "type": "null or one of \"yes\", \"accept\", \"force\", \"no\""}, "services.strongswan-swanctl.swanctl.connections.<name>.if_id_in": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "XFRM interface ID set on inbound policies/SA, can be overridden by child\nconfig, see there for details.\n\nThe special value `%unique` allocates a unique interface ID per IKE_SA,\nwhich is inherited by all its CHILD_SAs (unless overridden there), beyond\nthat the value `%unique-dir` assigns a different unique interface ID for\neach direction (in/out).\n\n\n\nStrongSwan default: ````\"0\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "if_id_in"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.if_id_out": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "XFRM interface ID set on outbound policies/SA, can be overridden by child\nconfig, see there for details.\n\nThe special value `%unique` allocates a unique interface ID per IKE_SA,\nwhich is inherited by all its CHILD_SAs (unless overridden there), beyond\nthat the value `%unique-dir` assigns a different unique interface ID for\neach direction (in/out).\n\n\nStrongSwan default: ````\"0\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "if_id_out"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.keyingtries": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of retransmission sequences to perform during initial\nconnect. Instead of giving up initiation after the first retransmission\nsequence with the default value of `1`, additional\nsequences may be started according to the configured value. A value of\n`0` initiates a new sequence until the connection\nestablishes or fails with a permanent error.\n\n\nStrongSwan default: ````1````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "keyingtries"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.local": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Section for a local authentication round. A local authentication round\ndefines the rules how authentication is performed for the local\npeer. Multiple rounds may be defined to use IKEv2 RFC 4739 Multiple\nAuthentication or IKEv1 XAuth.\n\nEach round is defined in a section having `local` as\nprefix, and an optional unique suffix. To define a single authentication\nround, the suffix may be omitted.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.aaa_id": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Server side EAP-Identity to expect in the EAP method. Some EAP methods,\nsuch as EAP-TLS, use an identity for the server to perform mutual\nauthentication. This identity may differ from the IKE identity,\nespecially when EAP authentication is delegated from the IKE responder\nto an AAA backend.\n\nFor EAP-(T)TLS, this defines the identity for which the server must\nprovide a certificate in the TLS exchange.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local", "<name>", "aaa_id"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Authentication to perform locally.\n\n- The default `pubkey` uses public key authentication\n  using a private key associated to a usable certificate.\n- `psk` uses pre-shared key authentication.\n- The IKEv1 specific `xauth` is used for XAuth or Hybrid\n  authentication,\n- while the IKEv2 specific `eap` keyword defines EAP\n  authentication.\n- For `xauth`, a specific backend name may be appended,\n  separated by a dash. The appropriate `xauth` backend is\n  selected to perform the XAuth exchange. For traditional XAuth, the\n  `xauth` method is usually defined in the second\n  authentication round following an initial `pubkey` (or\n  `psk`) round. Using `xauth` in the\n  first round performs Hybrid Mode client authentication.\n- For `eap`, a specific EAP method name may be appended, separated by a\n  dash. An EAP module implementing the appropriate method is selected to\n  perform the EAP conversation.\n- Since 5.4.0, if both peers support RFC 7427 (\"Signature Authentication\n  in IKEv2\") specific hash algorithms to be used during IKEv2\n  authentication may be configured. To do so use `ike:`\n  followed by a trust chain signature scheme constraint (see description\n  of the {option}`remote` section's {option}`auth`\n  keyword). For example, with `ike:pubkey-sha384-sha256`\n  a public key signature scheme with either SHA-384 or SHA-256 would get\n  used for authentication, in that order and depending on the hash\n  algorithms supported by the peer. If no specific hash algorithms are\n  configured, the default is to prefer an algorithm that matches or\n  exceeds the strength of the signature key. If no constraints with\n  `ike:` prefix are configured any signature scheme\n  constraint (without `ike:` prefix) will also apply to\n  IKEv2 authentication, unless this is disabled in\n  `strongswan.conf`. To use RSASSA-PSS signatures use\n  `rsa/pss` instead of `pubkey` or\n  `rsa` as in e.g.\n  `ike:rsa/pss-sha256`. If `pubkey` or\n  `rsa` constraints are configured RSASSA-PSS signatures\n  will only be used if enabled in `strongswan.conf`(5).\n\n\nStrongSwan default: ````\"pubkey\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local", "<name>", "auth"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Section for a certificate candidate to use for\nauthentication. Certificates in certs are transmitted as binary blobs,\nthese sections offer more flexibility.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local", "<name>", "cert"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.file": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Absolute path to the certificate to load. Passed as-is to the daemon, so\nit must be readable by it.\n\nConfigure either this or {option}`handle`, but not both, in one section.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local", "<name>", "cert", "<name>", "file"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.handle": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hex-encoded CKA_ID or handle of the certificate on a token or TPM,\nrespectively.\n\nConfigure either this or {option}`file`, but not both, in one section.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local", "<name>", "cert", "<name>", "handle"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.module": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional PKCS#11 module name.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local", "<name>", "cert", "<name>", "module"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.slot": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional slot number of the token that stores the certificate.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local", "<name>", "cert", "<name>", "slot"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.certs": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of certificate candidates to use for\nauthentication. The certificates may use a relative path from the\nswanctl `x509` directory or an absolute path.\n\nThe certificate used for authentication is selected based on the\nreceived certificate request payloads. If no appropriate CA can be\nlocated, the first certificate is used.\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local", "<name>", "certs"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.eap_id": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Client EAP-Identity to use in EAP-Identity exchange and the EAP method.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local", "<name>", "eap_id"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.id": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IKE identity to use for authentication round. When using certificate\nauthentication, the IKE identity must be contained in the certificate,\neither as subject or as subjectAltName.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local", "<name>", "id"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.pubkeys": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of raw public key candidates to use for\nauthentication. The public keys may use a relative path from the swanctl\n`pubkey` directory or an absolute path.\n\nEven though multiple local public keys could be defined in principle,\nonly the first public key in the list is used for authentication.\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local", "<name>", "pubkeys"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.round": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional numeric identifier by which authentication rounds are\nsorted. If not specified rounds are ordered by their position in the\nconfig file/vici message.\n\n\nStrongSwan default: ````0````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local", "<name>", "round"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.xauth_id": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Client XAuth username used in the XAuth exchange.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local", "<name>", "xauth_id"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.local_addrs": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Local address(es) to use for IKE communication. Takes\nsingle IPv4/IPv6 addresses, DNS names, CIDR subnets or IP address ranges.\n\nAs initiator, the first non-range/non-subnet is used to initiate the\nconnection from. As responder, the local destination address must match at\nleast to one of the specified addresses, subnets or ranges.\n\nIf FQDNs are assigned they are resolved every time a configuration lookup\nis done. If DNS resolution times out, the lookup is delayed for that time.\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local_addrs"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.local_port": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Local UDP port for IKE communication. By default the port of the socket\nbackend is used, which is usually `500`. If port\n`500` is used, automatic IKE port floating to port\n`4500` is used to work around NAT issues.\n\nUsing a non-default local IKE port requires support from the socket\nbackend in use (socket-dynamic).\n\n\nStrongSwan default: ````500````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "local_port"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.mediated_by": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the connection to mediate this connection through. If given,\nthe connection will be mediated through the named mediation\nconnection. The mediation connection must have mediation enabled.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "mediated_by"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.mediation": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether this connection is a mediation connection, that is, whether this\nconnection is used to mediate other connections using the IKEv2 Mediation\nExtension. Mediation connections create no CHILD_SA.\n\n\nStrongSwan default: ````false````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "mediation"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.mediation_peer": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Identity under which the peer is registered at the mediation server, that\nis, the IKE identity the other end of this connection uses as its local\nidentity on its connection to the mediation server. This is the identity\nwe request the mediation server to mediate us with. Only relevant on\nconnections that set mediated_by. If it is not given, the remote IKE\nidentity of the first authentication round of this connection will be\nused.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "mediation_peer"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.mobike": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Enables MOBIKE on IKEv2 connections. MOBIKE is enabled by default on IKEv2\nconnections, and allows mobility of clients and multi-homing on servers by\nmigrating active IPsec tunnels.\n\nUsually keeping MOBIKE enabled is unproblematic, as it is not used if the\npeer does not indicate support for it. However, due to the design of\nMOBIKE, IKEv2 always floats to port 4500 starting from the second\nexchange. Some implementations don't like this behavior, hence it can be\ndisabled.\n\n\nStrongSwan default: ````true````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "mobike"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.over_time": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hard IKE_SA lifetime if rekey/reauth does not complete, as time. To avoid\nhaving an IKE/ISAKMP kept alive if IKE reauthentication or rekeying fails\nperpetually, a maximum hard lifetime may be specified. If the IKE_SA fails\nto rekey or reauthenticate within the specified time, the IKE_SA gets\nclosed.\n\nIn contrast to CHILD_SA rekeying, over_time is relative in time to the\nrekey_time and reauth_time values, as it applies to both.\n\nThe default is 10% of the longer of {option}`rekey_time` and\n{option}`reauth_time`.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "over_time"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.pools": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of named IP pools to allocate virtual IP addresses\nand other configuration attributes from. Each name references a pool by\nname from either the pools section or an external pool.\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "pools"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.ppk_id": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "String identifying the Postquantum Preshared Key (PPK) to be used.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "ppk_id"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.ppk_required": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether a Postquantum Preshared Key (PPK) is required for this connection.\n\n\nStrongSwan default: ````false````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "ppk_required"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.proposals": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A proposal is a set of algorithms. For non-AEAD algorithms, this includes\nfor IKE an encryption algorithm, an integrity algorithm, a pseudo random\nfunction and a Diffie-Hellman group. For AEAD algorithms, instead of\nencryption and integrity algorithms, a combined algorithm is used.\n\nIn IKEv2, multiple algorithms of the same kind can be specified in a\nsingle proposal, from which one gets selected. In IKEv1, only one\nalgorithm per kind is allowed per proposal, more algorithms get implicitly\nstripped. Use multiple proposals to offer different algorithms\ncombinations in IKEv1.\n\nAlgorithm keywords get separated using dashes. Multiple proposals may be\nspecified in a list. The special value `default` forms a\ndefault proposal of supported algorithms considered safe, and is usually a\ngood choice for interoperability.\n\n\nStrongSwan default: ````[\"default\"]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "proposals"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.pull": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If the default of yes is used, Mode Config works in pull mode, where the\ninitiator actively requests a virtual IP. With no, push mode is used,\nwhere the responder pushes down a virtual IP to the initiating peer.\n\nPush mode is currently supported for IKEv1, but not in IKEv2. It is used\nby a few implementations only, pull mode is recommended.\n\n\nStrongSwan default: ````true````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "pull"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.rand_time": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Time range from which to choose a random value to subtract from\nrekey/reauth times. To avoid having both peers initiating the rekey/reauth\nprocedure simultaneously, a random time gets subtracted from the\nrekey/reauth times.\n\nThe default is equal to the configured {option}`over_time`.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "rand_time"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.reauth_time": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Time to schedule IKE reauthentication. IKE reauthentication recreates the\nIKE/ISAKMP SA from scratch and re-evaluates the credentials. In asymmetric\nconfigurations (with EAP or configuration payloads) it might not be\npossible to actively reauthenticate as responder. The IKEv2\nreauthentication lifetime negotiation can instruct the client to perform\nreauthentication.\n\nReauthentication is disabled by default. Enabling it usually may lead to\nsmall connection interruptions, as strongSwan uses a break-before-make\npolicy with IKEv2 to avoid any conflicts with associated tunnel resources.\n\n\nStrongSwan default: ````\"0s\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "reauth_time"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.rekey_time": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IKE rekeying refreshes key material using a Diffie-Hellman exchange, but\ndoes not re-check associated credentials. It is supported in IKEv2 only,\nIKEv1 performs a reauthentication procedure instead.\n\nWith the default value IKE rekeying is scheduled every 4 hours, minus the\nconfigured rand_time. If a reauth_time is configured, rekey_time defaults\nto zero, disabling rekeying; explicitly set both to enforce rekeying and\nreauthentication.\n\n\nStrongSwan default: ````\"4h\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "rekey_time"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Section for a remote authentication round. A remote authentication round\ndefines the constraints how the peers must authenticate to use this\nconnection. Multiple rounds may be defined to use IKEv2 RFC 4739 Multiple\nAuthentication or IKEv1 XAuth.\n\nEach round is defined in a section having `remote` as\nprefix, and an optional unique suffix. To define a single authentication\nround, the suffix may be omitted.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Authentication to expect from remote. See the {option}`local`\nsection's {option}`auth` keyword description about the details of\nsupported mechanisms.\n\nSince 5.4.0, to require a trustchain public key strength for the remote\nside, specify the key type followed by the minimum strength in bits (for\nexample `ecdsa-384` or\n`rsa-2048-ecdsa-256`). To limit the acceptable set of\nhashing algorithms for trustchain validation, append hash algorithms to\npubkey or a key strength definition (for example\n`pubkey-sha256-sha512`,\n`rsa-2048-sha256-sha384-sha512` or\n`rsa-2048-sha256-ecdsa-256-sha256-sha384`).\nUnless disabled in `strongswan.conf`, or explicit IKEv2\nsignature constraints are configured (refer to the description of the\n{option}`local` section's {option}`auth` keyword for\ndetails), such key types and hash algorithms are also applied as\nconstraints against IKEv2 signature authentication schemes used by the\nremote side. To require RSASSA-PSS signatures use\n`rsa/pss` instead of `pubkey` or\n`rsa` as in e.g. `rsa/pss-sha256`. If\n`pubkey` or `rsa` constraints are\nconfigured RSASSA-PSS signatures will only be accepted if enabled in\n`strongswan.conf`(5).\n\nTo specify trust chain constraints for EAP-(T)TLS, append a colon to the\nEAP method, followed by the key type/size and hash algorithm as\ndiscussed above (e.g. `eap-tls:ecdsa-384-sha384`).\n\n\nStrongSwan default: ````\"pubkey\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "auth"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.ca_id": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Identity in CA certificate to accept for authentication. The specified\nidentity must be contained in one (intermediate) CA of the remote peer\ntrustchain, either as subject or as subjectAltName. This has the same\neffect as specifying `cacerts` to force clients under\na CA to specific connections; it does not require the CA certificate\nto be available locally, and can be received from the peer during the\nIKE exchange.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "ca_id"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Section for a CA certificate to accept for authentication. Certificates\nin cacerts are transmitted as binary blobs, these sections offer more\nflexibility.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "cacert"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.file": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Absolute path to the certificate to load. Passed as-is to the daemon, so\nit must be readable by it.\n\nConfigure either this or {option}`handle`, but not both, in one section.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "cacert", "<name>", "file"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.handle": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hex-encoded CKA_ID or handle of the certificate on a token or TPM,\nrespectively.\n\nConfigure either this or {option}`file`, but not both, in one section.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "cacert", "<name>", "handle"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.module": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional PKCS#11 module name.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "cacert", "<name>", "module"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.slot": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional slot number of the token that stores the certificate.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "cacert", "<name>", "slot"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacerts": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of CA certificates to accept for\nauthentication. The certificates may use a relative path from the\nswanctl `x509ca` directory or an absolute path.\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "cacerts"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Section for a certificate candidate to use for\nauthentication. Certificates in certs are transmitted as binary blobs,\nthese sections offer more flexibility.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "cert"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.file": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Absolute path to the certificate to load. Passed as-is to the daemon, so\nit must be readable by it.\n\nConfigure either this or {option}`handle`, but not both, in one section.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "cert", "<name>", "file"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.handle": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hex-encoded CKA_ID or handle of the certificate on a token or TPM,\nrespectively.\n\nConfigure either this or {option}`file`, but not both, in one section.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "cert", "<name>", "handle"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.module": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional PKCS#11 module name.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "cert", "<name>", "module"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.slot": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional slot number of the token that stores the certificate.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "cert", "<name>", "slot"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert_policy": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of certificate policy OIDs the peer's certificate\nmust have. OIDs are specified using the numerical dotted representation.\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "cert_policy"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.certs": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of certificates to accept for authentication. The certificates may\nuse a relative path from the swanctl `x509` directory\nor an absolute path.\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "certs"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.eap_id": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Identity to use as peer identity during EAP authentication. If set to\n`%any` the EAP-Identity method will be used to ask the\nclient for an EAP identity.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "eap_id"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.groups": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Authorization group memberships to require. The peer\nmust prove membership to at least one of the specified groups. Group\nmembership can be certified by different means, for example by\nappropriate Attribute Certificates or by an AAA backend involved in the\nauthentication.\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "groups"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.id": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IKE identity to expect for authentication round. When using certificate\nauthentication, the IKE identity must be contained in the certificate,\neither as subject or as subjectAltName.\n\n\nStrongSwan default: ````\"%any\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "id"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.pubkeys": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of raw public keys to accept for\nauthentication. The public keys may use a relative path from the swanctl\n`pubkey` directory or an absolute path.\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "pubkeys"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.revocation": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Certificate revocation policy for CRL or OCSP revocation.\n\n- A `strict` revocation policy fails if no revocation information is\n  available, i.e. the certificate is not known to be unrevoked.\n- `ifuri` fails only if a CRL/OCSP URI is available, but certificate\n  revocation checking fails, i.e. there should be revocation information\n  available, but it could not be obtained.\n- The default revocation policy `relaxed` fails only if a certificate is\n  revoked, i.e. it is explicitly known that it is bad.\n\n\nStrongSwan default: ````\"relaxed\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "revocation"], "readOnly": false, "type": "null or one of \"strict\", \"ifuri\", \"relaxed\""}, "services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.round": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional numeric identifier by which authentication rounds are\nsorted. If not specified rounds are ordered by their position in the\nconfig file/vici message.\n\n\nStrongSwan default: ````0````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote", "<name>", "round"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote_addrs": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Remote address(es) to use for IKE communication. Takes\nsingle IPv4/IPv6 addresses, DNS names, CIDR subnets or IP address ranges.\n\nAs initiator, the first non-range/non-subnet is used to initiate the\nconnection to. As responder, the initiator source address must match at\nleast to one of the specified addresses, subnets or ranges.\n\nIf FQDNs are assigned they are resolved every time a configuration lookup\nis done. If DNS resolution times out, the lookup is delayed for that time.\nTo initiate a connection, at least one specific address or DNS name must\nbe specified.\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote_addrs"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.connections.<name>.remote_port": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Remote UDP port for IKE communication. If the default of port\n`500` is used, automatic IKE port floating to port\n`4500` is used to work around NAT issues.\n\n\nStrongSwan default: ````500````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "remote_port"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.send_cert": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Send certificate payloads when using certificate authentication.\n\n- With the default of `ifasked` the daemon sends\n  certificate payloads only if certificate requests have been received.\n- `never` disables sending of certificate payloads\n  altogether,\n- `always` causes certificate payloads to be sent\n  unconditionally whenever certificate authentication is used.\n\n\nStrongSwan default: ````\"ifasked\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "send_cert"], "readOnly": false, "type": "null or one of \"always\", \"never\", \"ifasked\""}, "services.strongswan-swanctl.swanctl.connections.<name>.send_certreq": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Send certificate request payloads to offer trusted root CA certificates to\nthe peer. Certificate requests help the peer to choose an appropriate\ncertificate/private key for authentication and are enabled by default.\nDisabling certificate requests can be useful if too many trusted root CA\ncertificates are installed, as each certificate request increases the size\nof the initial IKE packets.\n\n\nStrongSwan default: ````true````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "send_certreq"], "readOnly": false, "type": "null or boolean"}, "services.strongswan-swanctl.swanctl.connections.<name>.unique": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Connection uniqueness policy to enforce. To avoid multiple connections\nfrom the same user, a uniqueness policy can be enforced.\n\n- The value `never` does never enforce such a policy, even\n  if a peer included INITIAL_CONTACT notification messages,\n- whereas `no` replaces existing connections for the same\n  identity if a new one has the INITIAL_CONTACT notify.\n- `keep` rejects new connection attempts if the same user\n  already has an active connection,\n- `replace` deletes any existing connection if a new one\n  for the same user gets established.\n\nTo compare connections for uniqueness, the remote IKE identity is used. If\nEAP or XAuth authentication is involved, the EAP-Identity or XAuth\nusername is used to enforce the uniqueness policy instead.\n\nOn initiators this setting specifies whether an INITIAL_CONTACT notify is\nsent during IKE_AUTH if no existing connection is found with the remote\npeer (determined by the identities of the first authentication\nround). Unless set to `never` the client will send a notify.\n\n\nStrongSwan default: ````\"no\"````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "unique"], "readOnly": false, "type": "null or one of \"no\", \"never\", \"keep\", \"replace\""}, "services.strongswan-swanctl.swanctl.connections.<name>.version": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IKE major version to use for connection.\n\n- 1 uses IKEv1 aka ISAKMP,\n- 2 uses IKEv2.\n- A connection using the default of 0 accepts both IKEv1 and IKEv2 as\n  responder, and initiates the connection actively with IKEv2.\n\n\nStrongSwan default: ````0````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "version"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.connections.<name>.vips": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of virtual IPs to request in IKEv2 configuration payloads or IKEv1\nMode Config. The wildcard addresses `0.0.0.0` and\n`::` request an arbitrary address, specific addresses may\nbe defined. The responder may return a different address, though, or none\nat all.\n\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "connections", "<name>", "vips"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.pools": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Section defining named pools. Named pools may be referenced by connections\nwith the pools option to assign virtual IPs and other configuration\nattributes. Each pool must have a unique name (denoted \\<name\\> below).\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "pools"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.pools.<name>.addrs": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Subnet or range defining addresses allocated in pool. Accepts a single\nCIDR subnet defining the pool to allocate addresses from or an address\nrange (\\<from\\>-\\<to\\>). Pools must be unique and non-overlapping.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "pools", "<name>", "addrs"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.pools.<name>.dhcp": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address or CIDR subnets\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "pools", "<name>", "dhcp"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.pools.<name>.dns": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address or CIDR subnets\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "pools", "<name>", "dns"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.pools.<name>.nbns": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address or CIDR subnets\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "pools", "<name>", "nbns"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.pools.<name>.netmask": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address or CIDR subnets\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "pools", "<name>", "netmask"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.pools.<name>.server": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address or CIDR subnets\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "pools", "<name>", "server"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.pools.<name>.split_exclude": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address or CIDR subnets\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "pools", "<name>", "split_exclude"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.pools.<name>.split_include": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address or CIDR subnets\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "pools", "<name>", "split_include"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.pools.<name>.subnet": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address or CIDR subnets\n\nStrongSwan default: ````[]````\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "pools", "<name>", "subnet"], "readOnly": false, "type": "null or (list of string)"}, "services.strongswan-swanctl.swanctl.secrets.eap": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "EAP secret section for a specific secret. Each EAP secret is defined in a\nunique section having the `eap` prefix. EAP secrets are\nused for XAuth authentication as well.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "eap"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.secrets.eap.<name>.id": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Identity the EAP/XAuth secret belongs to. Multiple unique identities may\nbe specified, each having an `id` prefix, if a secret\nis shared between multiple users.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "eap", "<name>", "id"], "readOnly": false, "type": "attribute set of (null or string)"}, "services.strongswan-swanctl.swanctl.secrets.eap.<name>.secret": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Value of the EAP/XAuth secret. It may either be an ASCII string, a hex\nencoded string if it has a 0x prefix or a Base64 encoded string if it\nhas a 0s prefix in its value.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "eap", "<name>", "secret"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.ecdsa": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Private key decryption passphrase for a key in the\n`ecdsa` folder.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "ecdsa"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.file": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File name in the `ecdsa` folder for which this\npassphrase should be used.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "ecdsa", "<name>", "file"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.ecdsa.<name>.secret": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Value of decryption passphrase for ECDSA key.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "ecdsa", "<name>", "secret"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.ike": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "IKE preshared secret section for a specific secret. Each IKE PSK is\ndefined in a unique section having the `ike` prefix.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "ike"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.secrets.ike.<name>.id": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "IKE identity the IKE preshared secret belongs to. Multiple unique\nidentities may be specified, each having an `id`\nprefix, if a secret is shared between multiple peers.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "ike", "<name>", "id"], "readOnly": false, "type": "attribute set of (null or string)"}, "services.strongswan-swanctl.swanctl.secrets.ike.<name>.secret": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Value of the IKE preshared secret. It may either be an ASCII string, a\nhex encoded string if it has a 0x prefix or a Base64 encoded string if\nit has a 0s prefix in its value.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "ike", "<name>", "secret"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.ntlm": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "NTLM secret section for a specific secret. Each NTLM secret is defined in\na unique section having the `ntlm` prefix. NTLM secrets\nmay only be used for EAP-MSCHAPv2 authentication.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "ntlm"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.id": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Identity the NTLM secret belongs to. Multiple unique identities may be\nspecified, each having an id prefix, if a secret is shared between\nmultiple users.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "ntlm", "<name>", "id"], "readOnly": false, "type": "attribute set of (null or string)"}, "services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.secret": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Value of the NTLM secret, which is the NT Hash of the actual secret,\nthat is, MD4(UTF-16LE(secret)). The resulting 16-byte value may either\nbe given as a hex encoded string with a 0x prefix or as a Base64 encoded\nstring with a 0s prefix.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "ntlm", "<name>", "secret"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.pkcs12": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "PKCS#12 decryption passphrase for a container in the\n`pkcs12` folder.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "pkcs12"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.file": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File name in the `pkcs12` folder for which this\npassphrase should be used.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "pkcs12", "<name>", "file"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.pkcs12.<name>.secret": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Value of decryption passphrase for PKCS#12 container.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "pkcs12", "<name>", "secret"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.pkcs8": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Private key decryption passphrase for a key in the\n`pkcs8` folder.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "pkcs8"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.file": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File name in the `pkcs8` folder for which this\npassphrase should be used.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "pkcs8", "<name>", "file"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.pkcs8.<name>.secret": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Value of decryption passphrase for PKCS#8 key.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "pkcs8", "<name>", "secret"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.ppk": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Postquantum Preshared Key (PPK) section for a specific secret. Each PPK is\ndefined in a unique section having the `ppk` prefix.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "ppk"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.secrets.ppk.<name>.id": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "PPK identity the PPK belongs to. Multiple unique identities may be\nspecified, each having an `id` prefix, if a secret is\nshared between multiple peers.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "ppk", "<name>", "id"], "readOnly": false, "type": "attribute set of (null or string)"}, "services.strongswan-swanctl.swanctl.secrets.ppk.<name>.secret": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Value of the PPK. It may either be an ASCII string, a hex encoded string\nif it has a `0x` prefix or a Base64 encoded string if\nit has a `0s` prefix in its value. Should have at least\n256 bits of entropy for 128-bit security.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "ppk", "<name>", "secret"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.private": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Private key decryption passphrase for a key in the\n`private` folder.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "private"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.secrets.private.<name>.file": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File name in the private folder for which this passphrase should be used.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "private", "<name>", "file"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.private.<name>.secret": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Value of decryption passphrase for private key.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "private", "<name>", "secret"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.rsa": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Private key decryption passphrase for a key in the `rsa`\nfolder.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "rsa"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.secrets.rsa.<name>.file": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File name in the `rsa` folder for which this passphrase\nshould be used.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "rsa", "<name>", "file"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.rsa.<name>.secret": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Value of decryption passphrase for RSA key.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "rsa", "<name>", "secret"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.token": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition for a private key that's stored on a token/smartcard/TPM."}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "token"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.secrets.token.<name>.handle": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Hex-encoded CKA_ID or handle of the private key on the token or TPM,\nrespectively.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "token", "<name>", "handle"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.token.<name>.module": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional PKCS#11 module name to access the token.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "token", "<name>", "module"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.token.<name>.pin": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional PIN required to access the key on the token. If none is\nprovided the user is prompted during an interactive\n`--load-creds` call.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "token", "<name>", "pin"], "readOnly": false, "type": "null or string"}, "services.strongswan-swanctl.swanctl.secrets.token.<name>.slot": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional slot number to access the token.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "token", "<name>", "slot"], "readOnly": false, "type": "null or signed integer"}, "services.strongswan-swanctl.swanctl.secrets.xauth": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "EAP secret section for a specific secret. Each EAP secret is defined in a\nunique section having the `eap` prefix. EAP secrets are\nused for XAuth authentication as well.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "xauth"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Identity the EAP/XAuth secret belongs to. Multiple unique identities may\nbe specified, each having an `id` prefix, if a secret\nis shared between multiple users.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "xauth", "<name>", "id"], "readOnly": false, "type": "attribute set of (null or string)"}, "services.strongswan-swanctl.swanctl.secrets.xauth.<name>.secret": {"declarations": ["nixos/modules/services/networking/strongswan-swanctl/module.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Value of the EAP/XAuth secret. It may either be an ASCII string, a hex\nencoded string if it has a 0x prefix or a Base64 encoded string if it\nhas a 0s prefix in its value.\n"}, "loc": ["services", "strongswan-swanctl", "swanctl", "secrets", "xauth", "<name>", "secret"], "readOnly": false, "type": "null or string"}, "services.strongswan.ca": {"declarations": ["nixos/modules/services/networking/strongswan.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of CAs (certification authorities) and their options for\nthe \u2018ca xxx\u2019 sections of the {file}`ipsec.conf`\nfile.\n"}, "example": {"_type": "literalExpression", "text": "{\n  strongswan = {\n    auto = \"add\";\n    cacert = \"/run/keys/strongswanCert.pem\";\n    crluri = \"http://crl2.strongswan.org/strongswan.crl\";\n  };\n}"}, "loc": ["services", "strongswan", "ca"], "readOnly": false, "type": "attribute set of attribute set of string"}, "services.strongswan.connections": {"declarations": ["nixos/modules/services/networking/strongswan.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of connections and their options for the \u2018conn xxx\u2019\nsections of the {file}`ipsec.conf` file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"%default\" = {\n    keyexchange = \"ikev2\";\n    keyingtries = \"1\";\n  };\n  roadwarrior = {\n    auto       = \"add\";\n    leftcert   = \"/run/keys/moonCert.pem\";\n    leftid     = \"@moon.strongswan.org\";\n    leftsubnet = \"10.1.0.0/16\";\n    right      = \"%any\";\n  };\n}\n"}, "loc": ["services", "strongswan", "connections"], "readOnly": false, "type": "attribute set of attribute set of string"}, "services.strongswan.enable": {"declarations": ["nixos/modules/services/networking/strongswan.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable strongSwan."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "strongswan", "enable"], "readOnly": false, "type": "boolean"}, "services.strongswan.enabledPlugins": {"declarations": ["nixos/modules/services/networking/strongswan.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of additional plugins to enable if\n{option}`managePlugins` is true.\n"}, "loc": ["services", "strongswan", "enabledPlugins"], "readOnly": false, "type": "list of string"}, "services.strongswan.managePlugins": {"declarations": ["nixos/modules/services/networking/strongswan.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set to true, this option will disable automatic plugin loading and\nthen tell strongSwan to enable the plugins specified in the\n{option}`enabledPlugins` option.\n"}, "loc": ["services", "strongswan", "managePlugins"], "readOnly": false, "type": "boolean"}, "services.strongswan.secrets": {"declarations": ["nixos/modules/services/networking/strongswan.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of paths to IPSec secret files. These\nfiles will be included into the main ipsec.secrets file with\nthe `include` directive. It is safer if these\npaths are absolute.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/run/keys/ipsec-foo.secret\"\n]"}, "loc": ["services", "strongswan", "secrets"], "readOnly": false, "type": "list of string"}, "services.strongswan.setup": {"declarations": ["nixos/modules/services/networking/strongswan.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of options for the \u2018config setup\u2019 section of the\n{file}`ipsec.conf` file. Defines general\nconfiguration parameters.\n"}, "example": {"_type": "literalExpression", "text": "{\n  cachecrls = \"yes\";\n  strictcrlpolicy = \"yes\";\n}"}, "loc": ["services", "strongswan", "setup"], "readOnly": false, "type": "attribute set of string"}, "services.stubby.enable": {"declarations": ["nixos/modules/services/networking/stubby.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Stubby DNS resolver."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "stubby", "enable"], "readOnly": false, "type": "boolean"}, "services.stubby.logLevel": {"declarations": ["nixos/modules/services/networking/stubby.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log verbosity (syslog keyword or level)."}, "loc": ["services", "stubby", "logLevel"], "readOnly": false, "type": "null or one of \"alert\", \"crit\", \"debug\", \"emerg\", \"error\", \"info\", \"notice\", \"warning\", 1, 2, 7, 0, 3, 6, 5, 4"}, "services.stubby.settings": {"declarations": ["nixos/modules/services/networking/stubby.nix"], "description": {"_type": "mdDoc", "text": "Content of the Stubby configuration file. All Stubby settings may be set or queried\nhere. The default settings are available at\n`pkgs.stubby.passthru.settingsExample`. See\n<https://dnsprivacy.org/wiki/display/DP/Configuring+Stubby>.\nA list of the public recursive servers can be found here:\n<https://dnsprivacy.org/wiki/display/DP/DNS+Privacy+Test+Servers>.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.stubby.passthru.settingsExample // {\n  upstream_recursive_servers = [{\n    address_data = \"158.64.1.29\";\n    tls_auth_name = \"kaitain.restena.lu\";\n    tls_pubkey_pinset = [{\n      digest = \"sha256\";\n      value = \"7ftvIkA+UeN/ktVkovd/7rPZ6mbkhVI7/8HnFJIiLa4=\";\n    }];\n  }];\n};\n"}, "loc": ["services", "stubby", "settings"], "readOnly": false, "type": "attribute set of (YAML value)"}, "services.stunnel.clients": {"declarations": ["nixos/modules/services/networking/stunnel.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Define the client configurations.\n\nBy default, verifyChain and OCSPaia are enabled and a CAFile is provided from pkgs.cacert.\n\nSee \"SERVICE-LEVEL OPTIONS\" in {manpage}`stunnel(8)`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  foobar = {\n    accept = \"0.0.0.0:8080\";\n    connect = \"nixos.org:443\";\n    verifyChain = false;\n  };\n}"}, "loc": ["services", "stunnel", "clients"], "readOnly": false, "type": "attribute set of attribute set of (null or boolean or signed integer or string)"}, "services.stunnel.enable": {"declarations": ["nixos/modules/services/networking/stunnel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the stunnel TLS tunneling service."}, "loc": ["services", "stunnel", "enable"], "readOnly": false, "type": "boolean"}, "services.stunnel.enableInsecureSSLv3": {"declarations": ["nixos/modules/services/networking/stunnel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable support for the insecure SSLv3 protocol."}, "loc": ["services", "stunnel", "enableInsecureSSLv3"], "readOnly": false, "type": "boolean"}, "services.stunnel.fipsMode": {"declarations": ["nixos/modules/services/networking/stunnel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable FIPS 140-2 mode required for compliance."}, "loc": ["services", "stunnel", "fipsMode"], "readOnly": false, "type": "boolean"}, "services.stunnel.group": {"declarations": ["nixos/modules/services/networking/stunnel.nix"], "default": {"_type": "literalExpression", "text": "\"nogroup\""}, "description": {"_type": "mdDoc", "text": "The group under which stunnel runs."}, "loc": ["services", "stunnel", "group"], "readOnly": false, "type": "null or string"}, "services.stunnel.logLevel": {"declarations": ["nixos/modules/services/networking/stunnel.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Verbosity of stunnel output."}, "loc": ["services", "stunnel", "logLevel"], "readOnly": false, "type": "one of \"emerg\", \"alert\", \"crit\", \"err\", \"warning\", \"notice\", \"info\", \"debug\""}, "services.stunnel.servers": {"declarations": ["nixos/modules/services/networking/stunnel.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Define the server configurations.\n\nSee \"SERVICE-LEVEL OPTIONS\" in {manpage}`stunnel(8)`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  fancyWebserver = {\n    accept = 443;\n    cert = \"/path/to/pem/file\";\n    connect = 8080;\n  };\n}"}, "loc": ["services", "stunnel", "servers"], "readOnly": false, "type": "attribute set of attribute set of (null or boolean or signed integer or string)"}, "services.stunnel.user": {"declarations": ["nixos/modules/services/networking/stunnel.nix"], "default": {"_type": "literalExpression", "text": "\"nobody\""}, "description": {"_type": "mdDoc", "text": "The user under which stunnel runs."}, "loc": ["services", "stunnel", "user"], "readOnly": false, "type": "null or string"}, "services.subsonic.contextPath": {"declarations": ["nixos/modules/services/misc/subsonic.nix"], "default": {"_type": "literalExpression", "text": "\"/\""}, "description": {"_type": "mdDoc", "text": "The context path, i.e., the last part of the Subsonic\nURL. Typically '/' or '/subsonic'. Default '/'\n"}, "loc": ["services", "subsonic", "contextPath"], "readOnly": false, "type": "path"}, "services.subsonic.defaultMusicFolder": {"declarations": ["nixos/modules/services/misc/subsonic.nix"], "default": {"_type": "literalExpression", "text": "\"/var/music\""}, "description": {"_type": "mdDoc", "text": "Configure Subsonic to use this folder for music.  This option\nonly has effect the first time Subsonic is started.\n"}, "loc": ["services", "subsonic", "defaultMusicFolder"], "readOnly": false, "type": "path"}, "services.subsonic.defaultPlaylistFolder": {"declarations": ["nixos/modules/services/misc/subsonic.nix"], "default": {"_type": "literalExpression", "text": "\"/var/playlists\""}, "description": {"_type": "mdDoc", "text": "Configure Subsonic to use this folder for playlists.  This option\nonly has effect the first time Subsonic is started.\n"}, "loc": ["services", "subsonic", "defaultPlaylistFolder"], "readOnly": false, "type": "path"}, "services.subsonic.defaultPodcastFolder": {"declarations": ["nixos/modules/services/misc/subsonic.nix"], "default": {"_type": "literalExpression", "text": "\"/var/music/Podcast\""}, "description": {"_type": "mdDoc", "text": "Configure Subsonic to use this folder for Podcasts.  This option\nonly has effect the first time Subsonic is started.\n"}, "loc": ["services", "subsonic", "defaultPodcastFolder"], "readOnly": false, "type": "path"}, "services.subsonic.enable": {"declarations": ["nixos/modules/services/misc/subsonic.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Subsonic daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "subsonic", "enable"], "readOnly": false, "type": "boolean"}, "services.subsonic.home": {"declarations": ["nixos/modules/services/misc/subsonic.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/subsonic\""}, "description": {"_type": "mdDoc", "text": "The directory where Subsonic will create files.\nMake sure it is writable.\n"}, "loc": ["services", "subsonic", "home"], "readOnly": false, "type": "path"}, "services.subsonic.httpsPort": {"declarations": ["nixos/modules/services/misc/subsonic.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "The port on which Subsonic will listen for\nincoming HTTPS traffic. Set to 0 to disable.\n"}, "loc": ["services", "subsonic", "httpsPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.subsonic.listenAddress": {"declarations": ["nixos/modules/services/misc/subsonic.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "The host name or IP address on which to bind Subsonic.\nOnly relevant if you have multiple network interfaces and want\nto make Subsonic available on only one of them. The default value\nwill bind Subsonic to all available network interfaces.\n"}, "loc": ["services", "subsonic", "listenAddress"], "readOnly": false, "type": "string"}, "services.subsonic.maxMemory": {"declarations": ["nixos/modules/services/misc/subsonic.nix"], "default": {"_type": "literalExpression", "text": "100"}, "description": {"_type": "mdDoc", "text": "The memory limit (max Java heap size) in megabytes.\nDefault: 100\n"}, "loc": ["services", "subsonic", "maxMemory"], "readOnly": false, "type": "signed integer"}, "services.subsonic.port": {"declarations": ["nixos/modules/services/misc/subsonic.nix"], "default": {"_type": "literalExpression", "text": "4040"}, "description": {"_type": "mdDoc", "text": "The port on which Subsonic will listen for\nincoming HTTP traffic. Set to 0 to disable.\n"}, "loc": ["services", "subsonic", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.subsonic.transcoders": {"declarations": ["nixos/modules/services/misc/subsonic.nix"], "default": {"_type": "literalExpression", "text": "[ \"${pkgs.ffmpeg.bin}/bin/ffmpeg\" ]"}, "description": {"_type": "mdDoc", "text": "List of paths to transcoder executables that should be accessible\nfrom Subsonic. Symlinks will be created to each executable inside\n${config.services.subsonic.home}/transcoders.\n"}, "loc": ["services", "subsonic", "transcoders"], "readOnly": false, "type": "list of path"}, "services.sundtek.enable": {"declarations": ["nixos/modules/services/misc/sundtek.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Sundtek driver."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sundtek", "enable"], "readOnly": false, "type": "boolean"}, "services.supergfxd.enable": {"declarations": ["nixos/modules/services/hardware/supergfxd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Enable the supergfxd service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "supergfxd", "enable"], "readOnly": false, "type": "boolean"}, "services.supergfxd.settings": {"declarations": ["nixos/modules/services/hardware/supergfxd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The content of /etc/supergfxd.conf.\nSee https://gitlab.com/asus-linux/supergfxctl/#config-options-etcsupergfxdconf.\n"}, "loc": ["services", "supergfxd", "settings"], "readOnly": false, "type": "null or JSON value"}, "services.supybot.configFile": {"declarations": ["nixos/modules/services/networking/supybot.nix"], "description": {"_type": "mdDoc", "text": "Path to initial supybot config file. This can be generated by\nrunning supybot-wizard.\n\nNote: all paths should include the full path to the stateDir\ndirectory (backup conf data logs logs/plugins plugins tmp web).\n"}, "loc": ["services", "supybot", "configFile"], "readOnly": false, "type": "path"}, "services.supybot.enable": {"declarations": ["nixos/modules/services/networking/supybot.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Supybot, an IRC bot (also known as Limnoria)."}, "loc": ["services", "supybot", "enable"], "readOnly": false, "type": "boolean"}, "services.supybot.extraPackages": {"declarations": ["nixos/modules/services/networking/supybot.nix"], "default": {"_type": "literalExpression", "text": "p: []"}, "description": {"_type": "mdDoc", "text": "Extra Python packages available to supybot plugins. The\nvalue must be a function which receives the attrset defined\nin {var}`python3Packages` as the sole argument.\n"}, "example": {"_type": "literalExpression", "text": "p: [ p.lxml p.requests ]"}, "loc": ["services", "supybot", "extraPackages"], "readOnly": false, "type": "function that evaluates to a(n) list of package"}, "services.supybot.plugins": {"declarations": ["nixos/modules/services/networking/supybot.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute set of additional plugins that will be symlinked to the\n{file}`plugin` subdirectory.\n\nPlease note that you still need to add the plugins to the config\nfile (or with `!load`) using their attribute name.\n"}, "example": {"_type": "literalExpression", "text": "let\n  plugins = pkgs.fetchzip {\n    url = \"https://github.com/ProgVal/Supybot-plugins/archive/57c2450c.zip\";\n    sha256 = \"077snf84ibnva3sbpzdfpfma6hcdw7dflwnhg6pw7mgnf0nd84qd\";\n  };\nin\n{\n  Wikipedia = \"${plugins}/Wikipedia\";\n  Decide = ./supy-decide;\n}\n"}, "loc": ["services", "supybot", "plugins"], "readOnly": false, "type": "attribute set of path"}, "services.supybot.stateDir": {"declarations": ["nixos/modules/services/networking/supybot.nix"], "default": {"_type": "literalExpression", "text": "/var/lib/supybot"}, "description": {"_type": "mdDoc", "text": "The root directory, logs and plugins are stored here"}, "loc": ["services", "supybot", "stateDir"], "readOnly": false, "type": "path"}, "services.surrealdb.dbPath": {"declarations": ["nixos/modules/services/databases/surrealdb.nix"], "default": {"_type": "literalExpression", "text": "\"file:///var/lib/surrealdb/\""}, "description": {"_type": "mdDoc", "text": "The path that surrealdb will write data to. Use null for in-memory.\nCan be one of \"memory\", \"file://:path\", \"tikv://:addr\".\n"}, "example": {"_type": "literalExpression", "text": "\"memory\""}, "loc": ["services", "surrealdb", "dbPath"], "readOnly": false, "type": "string"}, "services.surrealdb.enable": {"declarations": ["nixos/modules/services/databases/surrealdb.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable A scalable, distributed, collaborative, document-graph database, for the realtime web ."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "surrealdb", "enable"], "readOnly": false, "type": "boolean"}, "services.surrealdb.host": {"declarations": ["nixos/modules/services/databases/surrealdb.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The host that surrealdb will connect to.\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "surrealdb", "host"], "readOnly": false, "type": "string"}, "services.surrealdb.package": {"declarations": ["nixos/modules/services/databases/surrealdb.nix"], "default": {"_type": "literalExpression", "text": "pkgs.surrealdb"}, "description": {"_type": "mdDoc", "text": "Which surrealdb derivation to use.\n"}, "loc": ["services", "surrealdb", "package"], "readOnly": false, "type": "package"}, "services.surrealdb.passwordPath": {"declarations": ["nixos/modules/services/databases/surrealdb.nix"], "description": {"_type": "mdDoc", "text": "Path to read the password from.\n"}, "loc": ["services", "surrealdb", "passwordPath"], "readOnly": false, "type": "path"}, "services.surrealdb.port": {"declarations": ["nixos/modules/services/databases/surrealdb.nix"], "default": {"_type": "literalExpression", "text": "8000"}, "description": {"_type": "mdDoc", "text": "The port that surrealdb will connect to.\n"}, "example": {"_type": "literalExpression", "text": "8000"}, "loc": ["services", "surrealdb", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.surrealdb.userNamePath": {"declarations": ["nixos/modules/services/databases/surrealdb.nix"], "description": {"_type": "mdDoc", "text": "Path to read the username from.\n"}, "loc": ["services", "surrealdb", "userNamePath"], "readOnly": false, "type": "path"}, "services.svnserve.enable": {"declarations": ["nixos/modules/services/misc/svnserve.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable svnserve to serve Subversion repositories through the SVN protocol."}, "loc": ["services", "svnserve", "enable"], "readOnly": false, "type": "boolean"}, "services.svnserve.svnBaseDir": {"declarations": ["nixos/modules/services/misc/svnserve.nix"], "default": {"_type": "literalExpression", "text": "\"/repos\""}, "description": {"_type": "mdDoc", "text": "Base directory from which Subversion repositories are accessed."}, "loc": ["services", "svnserve", "svnBaseDir"], "readOnly": false, "type": "string"}, "services.switcherooControl.enable": {"declarations": ["nixos/modules/hardware/video/switcheroo-control.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable switcheroo-control, a D-Bus service to check the availability of dual-GPU."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "switcherooControl", "enable"], "readOnly": false, "type": "boolean"}, "services.sympa.database.createLocally": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to create a local database automatically."}, "loc": ["services", "sympa", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.sympa.database.host": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Database host address.\n\nFor MySQL, use `localhost` to connect using Unix domain socket.\n\nFor PostgreSQL, use path to directory (e.g. {file}`/run/postgresql`)\nto connect using Unix domain socket located in this directory.\n\nUse `null` to fall back on Sympa default, or when using\n{option}`services.sympa.database.createLocally`.\n"}, "loc": ["services", "sympa", "database", "host"], "readOnly": false, "type": "null or string"}, "services.sympa.database.name": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "if database.type == \"SQLite\" then \"/var/lib/sympa/sympa.sqlite\" else \"sympa\""}, "description": {"_type": "mdDoc", "text": "Database name. When using SQLite this must be an absolute\npath to the database file.\n"}, "loc": ["services", "sympa", "database", "name"], "readOnly": false, "type": "string"}, "services.sympa.database.passwordFile": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password for {option}`services.sympa.database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/sympa-dbpassword\""}, "loc": ["services", "sympa", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.sympa.database.port": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Database port. Use `null` for default port."}, "loc": ["services", "sympa", "database", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.sympa.database.type": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "\"SQLite\""}, "description": {"_type": "mdDoc", "text": "Database engine to use."}, "example": {"_type": "literalExpression", "text": "\"MySQL\""}, "loc": ["services", "sympa", "database", "type"], "readOnly": false, "type": "one of \"SQLite\", \"PostgreSQL\", \"MySQL\""}, "services.sympa.database.user": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "\"sympa\""}, "description": {"_type": "mdDoc", "text": "Database user. The system user name is used as a default."}, "loc": ["services", "sympa", "database", "user"], "readOnly": false, "type": "null or string"}, "services.sympa.domains": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "description": {"_type": "mdDoc", "text": "Email domains handled by this instance. There have\nto be MX records for keys of this attribute set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"lists.example.org\" = {\n    webHost = \"lists.example.org\";\n    webLocation = \"/\";\n  };\n  \"sympa.example.com\" = {\n    webHost = \"example.com\";\n    webLocation = \"/sympa\";\n  };\n}\n"}, "loc": ["services", "sympa", "domains"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.sympa.domains.<name>.settings": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The {file}`robot.conf` configuration file as key value set.\nSee <https://sympa-community.github.io/gpldoc/man/sympa.conf.5.html>\nfor list of configuration parameters.\n"}, "example": {"_type": "literalExpression", "text": "{\n  default_max_list_members = 3;\n}"}, "loc": ["services", "sympa", "domains", "<name>", "settings"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.sympa.domains.<name>.webHost": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Domain part of the web interface URL (no web interface for this domain if `null`).\nDNS record of type A (or AAAA or CNAME) has to exist with this value.\n"}, "example": {"_type": "literalExpression", "text": "\"archive.example.org\""}, "loc": ["services", "sympa", "domains", "<name>", "webHost"], "readOnly": false, "type": "null or string"}, "services.sympa.domains.<name>.webLocation": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "\"/\""}, "description": {"_type": "mdDoc", "text": "URL path part of the web interface."}, "example": {"_type": "literalExpression", "text": "\"/sympa\""}, "loc": ["services", "sympa", "domains", "<name>", "webLocation"], "readOnly": false, "type": "string"}, "services.sympa.enable": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Sympa mailing list manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sympa", "enable"], "readOnly": false, "type": "boolean"}, "services.sympa.lang": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "\"en_US\""}, "description": {"_type": "mdDoc", "text": "Default Sympa language.\nSee <https://github.com/sympa-community/sympa/tree/sympa-6.2/po/sympa>\nfor available options.\n"}, "example": {"_type": "literalExpression", "text": "\"cs\""}, "loc": ["services", "sympa", "lang"], "readOnly": false, "type": "string"}, "services.sympa.listMasters": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "description": {"_type": "mdDoc", "text": "The list of the email addresses of the listmasters\n(users authorized to perform global server commands).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"postmaster@sympa.example.org\"\n]"}, "loc": ["services", "sympa", "listMasters"], "readOnly": false, "type": "list of string"}, "services.sympa.mainDomain": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Main domain to be used in {file}`sympa.conf`.\nIf `null`, one of the {option}`services.sympa.domains` is chosen for you.\n"}, "example": {"_type": "literalExpression", "text": "\"lists.example.org\""}, "loc": ["services", "sympa", "mainDomain"], "readOnly": false, "type": "null or string"}, "services.sympa.mta.type": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "\"postfix\""}, "description": {"_type": "mdDoc", "text": "Mail transfer agent (MTA) integration. Use `none` if you want to configure it yourself.\n\nThe `postfix` integration sets up local Postfix instance that will pass incoming\nmessages from configured domains to Sympa. You still need to configure at least outgoing message\nhandling using e.g. {option}`services.postfix.relayHost`.\n"}, "loc": ["services", "sympa", "mta", "type"], "readOnly": false, "type": "one of \"postfix\", \"none\""}, "services.sympa.settings": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The {file}`sympa.conf` configuration file as key value set.\nSee <https://sympa-community.github.io/gpldoc/man/sympa.conf.5.html>\nfor list of configuration parameters.\n"}, "example": {"_type": "literalExpression", "text": "{\n  default_home = \"lists\";\n  viewlogs_page_size = 50;\n}\n"}, "loc": ["services", "sympa", "settings"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.sympa.settingsFile": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Set of files to be linked in {file}`/var/lib/sympa`."}, "example": {"_type": "literalExpression", "text": "{\n  \"list_data/lists.example.org/help\" = {\n    text = \"subject This list provides help to users\";\n  };\n}\n"}, "loc": ["services", "sympa", "settingsFile"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.sympa.settingsFile.<name>.enable": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether this file should be generated. This option allows specific files to be disabled."}, "loc": ["services", "sympa", "settingsFile", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.sympa.settingsFile.<name>.source": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "description": {"_type": "mdDoc", "text": "Path of the source file."}, "loc": ["services", "sympa", "settingsFile", "<name>", "source"], "readOnly": false, "type": "path"}, "services.sympa.settingsFile.<name>.text": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Text of the file."}, "loc": ["services", "sympa", "settingsFile", "<name>", "text"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.sympa.web.enable": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable Sympa web interface."}, "loc": ["services", "sympa", "web", "enable"], "readOnly": false, "type": "boolean"}, "services.sympa.web.fcgiProcs": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Number of FastCGI processes to fork."}, "loc": ["services", "sympa", "web", "fcgiProcs"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.sympa.web.https": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to use HTTPS. When nginx integration is enabled, this option forces SSL and enables ACME.\nPlease note that Sympa web interface always uses https links even when this option is disabled.\n"}, "loc": ["services", "sympa", "web", "https"], "readOnly": false, "type": "boolean"}, "services.sympa.web.server": {"declarations": ["nixos/modules/services/mail/sympa.nix"], "default": {"_type": "literalExpression", "text": "\"nginx\""}, "description": {"_type": "mdDoc", "text": "The webserver used for the Sympa web interface. Set it to `none` if you want to configure it yourself.\nFurther nginx configuration can be done by adapting\n{option}`services.nginx.virtualHosts.\u00abname\u00bb`.\n"}, "loc": ["services", "sympa", "web", "server"], "readOnly": false, "type": "one of \"nginx\", \"none\""}, "services.syncoid.commands": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Syncoid commands to run."}, "example": {"_type": "literalExpression", "text": "{\n  \"pool/test\".target = \"root@target:pool/test\";\n}\n"}, "loc": ["services", "syncoid", "commands"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.syncoid.commands.<name>.extraArgs": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra syncoid arguments for this command."}, "example": {"_type": "literalExpression", "text": "[\n  \"--sshport 2222\"\n]"}, "loc": ["services", "syncoid", "commands", "<name>", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.syncoid.commands.<name>.localSourceAllow": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "description": {"_type": "mdDoc", "text": "Permissions granted for the {option}`services.syncoid.user` user\nfor local source datasets. See\n<https://openzfs.github.io/openzfs-docs/man/8/zfs-allow.8.html>\nfor available permissions.\nDefaults to {option}`services.syncoid.localSourceAllow` option.\n"}, "loc": ["services", "syncoid", "commands", "<name>", "localSourceAllow"], "readOnly": false, "type": "list of string"}, "services.syncoid.commands.<name>.localTargetAllow": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "description": {"_type": "mdDoc", "text": "Permissions granted for the {option}`services.syncoid.user` user\nfor local target datasets. See\n<https://openzfs.github.io/openzfs-docs/man/8/zfs-allow.8.html>\nfor available permissions.\nMake sure to include the `change-key` permission if you send raw encrypted datasets,\nthe `compression` permission if you send raw compressed datasets, and so on.\nFor remote target datasets you'll have to set your remote user permissions by yourself.\n"}, "loc": ["services", "syncoid", "commands", "<name>", "localTargetAllow"], "readOnly": false, "type": "list of string"}, "services.syncoid.commands.<name>.recursive": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the transfer of child datasets."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "syncoid", "commands", "<name>", "recursive"], "readOnly": false, "type": "boolean"}, "services.syncoid.commands.<name>.recvOptions": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Advanced options to pass to zfs recv. Options are specified\nwithout their leading dashes and separated by spaces.\n"}, "example": {"_type": "literalExpression", "text": "\"ux recordsize o compression=lz4\""}, "loc": ["services", "syncoid", "commands", "<name>", "recvOptions"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.syncoid.commands.<name>.sendOptions": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Advanced options to pass to zfs send. Options are specified\nwithout their leading dashes and separated by spaces.\n"}, "example": {"_type": "literalExpression", "text": "\"Lc e\""}, "loc": ["services", "syncoid", "commands", "<name>", "sendOptions"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.syncoid.commands.<name>.service": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Systemd configuration specific to this syncoid service.\n"}, "loc": ["services", "syncoid", "commands", "<name>", "service"], "readOnly": false, "type": "attribute set"}, "services.syncoid.commands.<name>.source": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "description": {"_type": "mdDoc", "text": "Source ZFS dataset. Can be either local or remote. Defaults to\nthe attribute name.\n"}, "example": {"_type": "literalExpression", "text": "\"pool/dataset\""}, "loc": ["services", "syncoid", "commands", "<name>", "source"], "readOnly": false, "type": "string"}, "services.syncoid.commands.<name>.sshKey": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "description": {"_type": "mdDoc", "text": "SSH private key file to use to login to the remote system.\nDefaults to {option}`services.syncoid.sshKey` option.\n"}, "loc": ["services", "syncoid", "commands", "<name>", "sshKey"], "readOnly": false, "type": "null or path"}, "services.syncoid.commands.<name>.target": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "description": {"_type": "mdDoc", "text": "Target ZFS dataset. Can be either local\n(\u00abpool/dataset\u00bb) or remote\n(\u00abuser@server:pool/dataset\u00bb).\n"}, "example": {"_type": "literalExpression", "text": "\"user@server:pool/dataset\""}, "loc": ["services", "syncoid", "commands", "<name>", "target"], "readOnly": false, "type": "string"}, "services.syncoid.commands.<name>.useCommonArgs": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to add the configured common arguments to this command.\n"}, "loc": ["services", "syncoid", "commands", "<name>", "useCommonArgs"], "readOnly": false, "type": "boolean"}, "services.syncoid.commonArgs": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Arguments to add to every syncoid command, unless disabled for that\ncommand. See\n<https://github.com/jimsalterjrs/sanoid/#syncoid-command-line-options>\nfor available options.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--no-sync-snap\"\n]"}, "loc": ["services", "syncoid", "commonArgs"], "readOnly": false, "type": "list of string"}, "services.syncoid.enable": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Syncoid ZFS synchronization service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "syncoid", "enable"], "readOnly": false, "type": "boolean"}, "services.syncoid.group": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "\"syncoid\""}, "description": {"_type": "mdDoc", "text": "The group for the service."}, "example": {"_type": "literalExpression", "text": "\"backup\""}, "loc": ["services", "syncoid", "group"], "readOnly": false, "type": "string"}, "services.syncoid.interval": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "\"hourly\""}, "description": {"_type": "mdDoc", "text": "Run syncoid at this interval. The default is to run hourly.\n\nThe format is described in\n{manpage}`systemd.time(7)`.\n"}, "example": {"_type": "literalExpression", "text": "\"*-*-* *:15:00\""}, "loc": ["services", "syncoid", "interval"], "readOnly": false, "type": "string"}, "services.syncoid.localSourceAllow": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"bookmark\"\n  \"hold\"\n  \"send\"\n  \"snapshot\"\n  \"destroy\"\n]"}, "description": {"_type": "mdDoc", "text": "Permissions granted for the {option}`services.syncoid.user` user\nfor local source datasets. See\n<https://openzfs.github.io/openzfs-docs/man/8/zfs-allow.8.html>\nfor available permissions.\n"}, "loc": ["services", "syncoid", "localSourceAllow"], "readOnly": false, "type": "list of string"}, "services.syncoid.localTargetAllow": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"change-key\"\n  \"compression\"\n  \"create\"\n  \"mount\"\n  \"mountpoint\"\n  \"receive\"\n  \"rollback\"\n]"}, "description": {"_type": "mdDoc", "text": "Permissions granted for the {option}`services.syncoid.user` user\nfor local target datasets. See\n<https://openzfs.github.io/openzfs-docs/man/8/zfs-allow.8.html>\nfor available permissions.\nMake sure to include the `change-key` permission if you send raw encrypted datasets,\nthe `compression` permission if you send raw compressed datasets, and so on.\nFor remote target datasets you'll have to set your remote user permissions by yourself.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"create\"\n  \"mount\"\n  \"receive\"\n  \"rollback\"\n]"}, "loc": ["services", "syncoid", "localTargetAllow"], "readOnly": false, "type": "list of string"}, "services.syncoid.package": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "pkgs.sanoid"}, "description": {"_type": "mdDoc", "text": "The sanoid package to use."}, "loc": ["services", "syncoid", "package"], "readOnly": false, "type": "package"}, "services.syncoid.service": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Systemd configuration common to all syncoid services.\n"}, "loc": ["services", "syncoid", "service"], "readOnly": false, "type": "attribute set"}, "services.syncoid.sshKey": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SSH private key file to use to login to the remote system. Can be\noverridden in individual commands.\n"}, "loc": ["services", "syncoid", "sshKey"], "readOnly": false, "type": "null or path"}, "services.syncoid.user": {"declarations": ["nixos/modules/services/backup/syncoid.nix"], "default": {"_type": "literalExpression", "text": "\"syncoid\""}, "description": {"_type": "mdDoc", "text": "The user for the service. ZFS privilege delegation will be\nautomatically configured for any local pools used by syncoid if this\noption is set to a user other than root. The user will be given the\n\"hold\" and \"send\" privileges on any pool that has datasets being sent\nand the \"create\", \"mount\", \"receive\", and \"rollback\" privileges on\nany pool that has datasets being received.\n"}, "example": {"_type": "literalExpression", "text": "\"backup\""}, "loc": ["services", "syncoid", "user"], "readOnly": false, "type": "string"}, "services.syncplay.certDir": {"declarations": ["nixos/modules/services/networking/syncplay.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS certificates directory to use for encryption. See\n<https://github.com/Syncplay/syncplay/wiki/TLS-support>.\n"}, "loc": ["services", "syncplay", "certDir"], "readOnly": false, "type": "null or path"}, "services.syncplay.enable": {"declarations": ["nixos/modules/services/networking/syncplay.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, start the Syncplay server."}, "loc": ["services", "syncplay", "enable"], "readOnly": false, "type": "boolean"}, "services.syncplay.extraArgs": {"declarations": ["nixos/modules/services/networking/syncplay.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional arguments to be passed to the service.\n"}, "loc": ["services", "syncplay", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.syncplay.group": {"declarations": ["nixos/modules/services/networking/syncplay.nix"], "default": {"_type": "literalExpression", "text": "\"nogroup\""}, "description": {"_type": "mdDoc", "text": "Group to use when running Syncplay.\n"}, "loc": ["services", "syncplay", "group"], "readOnly": false, "type": "string"}, "services.syncplay.passwordFile": {"declarations": ["nixos/modules/services/networking/syncplay.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the file that contains the server password. If\n`null`, the server doesn't require a password.\n"}, "loc": ["services", "syncplay", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.syncplay.port": {"declarations": ["nixos/modules/services/networking/syncplay.nix"], "default": {"_type": "literalExpression", "text": "8999"}, "description": {"_type": "mdDoc", "text": "TCP port to bind to.\n"}, "loc": ["services", "syncplay", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.syncplay.salt": {"declarations": ["nixos/modules/services/networking/syncplay.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Salt to allow room operator passwords generated by this server\ninstance to still work when the server is restarted.  The salt will be\nreadable in the nix store and the processlist.  If this is not\nintended use `saltFile` instead.  Mutually exclusive with\n<option>services.syncplay.saltFile</option>.\n"}, "loc": ["services", "syncplay", "salt"], "readOnly": false, "type": "null or string"}, "services.syncplay.saltFile": {"declarations": ["nixos/modules/services/networking/syncplay.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the file that contains the server salt.  This allows room\noperator passwords generated by this server instance to still work\nwhen the server is restarted.  `null`, the server doesn't load the\nsalt from a file.  Mutually exclusive with\n<option>services.syncplay.salt</option>.\n"}, "loc": ["services", "syncplay", "saltFile"], "readOnly": false, "type": "null or path"}, "services.syncplay.user": {"declarations": ["nixos/modules/services/networking/syncplay.nix"], "default": {"_type": "literalExpression", "text": "\"nobody\""}, "description": {"_type": "mdDoc", "text": "User to use when running Syncplay.\n"}, "loc": ["services", "syncplay", "user"], "readOnly": false, "type": "string"}, "services.syncthing.all_proxy": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Overwrites the all_proxy environment variable for the Syncthing process to\nthe given value. This is normally used to let Syncthing connect\nthrough a SOCKS5 proxy server.\nSee <https://docs.syncthing.net/users/proxying.html>.\n"}, "example": {"_type": "literalExpression", "text": "\"socks5://address.com:1234\""}, "loc": ["services", "syncthing", "all_proxy"], "readOnly": false, "type": "null or string"}, "services.syncthing.cert": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the `cert.pem` file, which will be copied into Syncthing's\n[configDir](#opt-services.syncthing.configDir).\n"}, "loc": ["services", "syncthing", "cert"], "readOnly": false, "type": "null or string"}, "services.syncthing.configDir": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalMD", "text": "* if `stateVersion >= 19.03`:\n\n      config.services.syncthing.dataDir + \"/.config/syncthing\"\n* otherwise:\n\n      config.services.syncthing.dataDir\n"}, "description": {"_type": "mdDoc", "text": "The path where the settings and keys will exist.\n"}, "loc": ["services", "syncthing", "configDir"], "readOnly": false, "type": "path"}, "services.syncthing.dataDir": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/syncthing\""}, "description": {"_type": "mdDoc", "text": "The path where synchronised directories will exist.\n"}, "example": {"_type": "literalExpression", "text": "\"/home/yourUser\""}, "loc": ["services", "syncthing", "dataDir"], "readOnly": false, "type": "path"}, "services.syncthing.devices": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Peers/devices which Syncthing should communicate with.\n\nNote that you can still add devices manually, but those changes\nwill be reverted on restart if [overrideDevices](#opt-services.syncthing.overrideDevices)\nis enabled.\n"}, "example": {"_type": "literalExpression", "text": "{\n  bigbox = {\n    addresses = [\n      \"tcp://192.168.0.10:51820\"\n    ];\n    id = \"7CFNTQM-IMTJBHJ-3UWRDIU-ZGQJFR6-VCXZ3NB-XUH3KZO-N52ITXR-LAIYUAU\";\n  };\n}"}, "loc": ["services", "syncthing", "devices"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.syncthing.devices.<name>.addresses": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The addresses used to connect to the device.\nIf this is left empty, dynamic configuration is attempted.\n"}, "loc": ["services", "syncthing", "devices", "<name>", "addresses"], "readOnly": false, "type": "list of string"}, "services.syncthing.devices.<name>.autoAcceptFolders": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically create or share folders that this device advertises at the default path.\nSee <https://docs.syncthing.net/users/config.html?highlight=autoaccept#config-file-format>.\n"}, "loc": ["services", "syncthing", "devices", "<name>", "autoAcceptFolders"], "readOnly": false, "type": "boolean"}, "services.syncthing.devices.<name>.id": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "description": {"_type": "mdDoc", "text": "The device ID. See <https://docs.syncthing.net/dev/device-ids.html>.\n"}, "loc": ["services", "syncthing", "devices", "<name>", "id"], "readOnly": false, "type": "string"}, "services.syncthing.devices.<name>.introducer": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the device should act as an introducer and be allowed\nto add folders on this computer.\nSee <https://docs.syncthing.net/users/introducer.html>.\n"}, "loc": ["services", "syncthing", "devices", "<name>", "introducer"], "readOnly": false, "type": "boolean"}, "services.syncthing.devices.<name>.name": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The name of the device.\n"}, "loc": ["services", "syncthing", "devices", "<name>", "name"], "readOnly": false, "type": "string"}, "services.syncthing.enable": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Syncthing, a self-hosted open-source alternative to Dropbox and Bittorrent Sync."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "syncthing", "enable"], "readOnly": false, "type": "boolean"}, "services.syncthing.extraFlags": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags passed to the syncthing command in the service definition.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--reset-deltas\"\n]"}, "loc": ["services", "syncthing", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.syncthing.extraOptions": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration options for Syncthing.\nSee <https://docs.syncthing.net/users/config.html>.\nNote that this attribute set does not exactly match the documented\nxml format. Instead, this is the format of the json rest api. There\nare slight differences. For example, this xml:\n```xml\n<options>\n  <listenAddress>default</listenAddress>\n  <minHomeDiskFree unit=\"%\">1</minHomeDiskFree>\n</options>\n```\ncorresponds to the json:\n```json\n{\n  options: {\n    listenAddresses = [\n      \"default\"\n    ];\n    minHomeDiskFree = {\n      unit = \"%\";\n      value = 1;\n    };\n  };\n}\n```\n"}, "example": {"_type": "literalExpression", "text": "{\n  gui = {\n    theme = \"black\";\n  };\n  options = {\n    localAnnounceEnabled = false;\n  };\n}"}, "loc": ["services", "syncthing", "extraOptions"], "readOnly": false, "type": "JSON value"}, "services.syncthing.folders": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Folders which should be shared by Syncthing.\n\nNote that you can still add folders manually, but those changes\nwill be reverted on restart if [overrideFolders](#opt-services.syncthing.overrideFolders)\nis enabled.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"/home/user/sync\" = {\n    id = \"syncme\";\n    devices = [ \"bigbox\" ];\n  };\n}\n"}, "loc": ["services", "syncthing", "folders"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.syncthing.folders.<name>.devices": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The devices this folder should be shared with. Each device must\nbe defined in the [devices](#opt-services.syncthing.devices) option.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "devices"], "readOnly": false, "type": "list of string"}, "services.syncthing.folders.<name>.enable": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to share this folder.\nThis option is useful when you want to define all folders\nin one place, but not every machine should share all folders.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.syncthing.folders.<name>.id": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The ID of the folder. Must be the same on all devices.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "id"], "readOnly": false, "type": "string"}, "services.syncthing.folders.<name>.ignoreDelete": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to skip deleting files that are deleted by peers.\nSee <https://docs.syncthing.net/advanced/folder-ignoredelete.html>.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "ignoreDelete"], "readOnly": false, "type": "boolean"}, "services.syncthing.folders.<name>.ignorePerms": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to ignore permission changes.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "ignorePerms"], "readOnly": false, "type": "boolean"}, "services.syncthing.folders.<name>.label": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The label of the folder.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "label"], "readOnly": false, "type": "string"}, "services.syncthing.folders.<name>.path": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The path to the folder which should be shared.\nOnly absolute paths (starting with `/`) and paths relative to\nthe [user](#opt-services.syncthing.user)'s home directory\n(starting with `~/`) are allowed.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "path"], "readOnly": false, "type": "string starting with / or ~/"}, "services.syncthing.folders.<name>.rescanInterval": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "3600"}, "description": {"_type": "mdDoc", "text": "How often the folder should be rescanned for changes.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "rescanInterval"], "readOnly": false, "type": "signed integer"}, "services.syncthing.folders.<name>.type": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "\"sendreceive\""}, "description": {"_type": "mdDoc", "text": "Whether to only send changes for this folder, only receive them\nor both. `receiveencrypted` can be used for untrusted devices. See\n<https://docs.syncthing.net/users/untrusted.html> for reference.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "type"], "readOnly": false, "type": "one of \"sendreceive\", \"sendonly\", \"receiveonly\", \"receiveencrypted\""}, "services.syncthing.folders.<name>.versioning": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How to keep changed/deleted files with Syncthing.\nThere are 4 different types of versioning with different parameters.\nSee <https://docs.syncthing.net/users/versioning.html>.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    versioning = {\n      type = \"simple\";\n      params.keep = \"10\";\n    };\n  }\n  {\n    versioning = {\n      type = \"trashcan\";\n      params.cleanoutDays = \"1000\";\n    };\n  }\n  {\n    versioning = {\n      type = \"staggered\";\n      fsPath = \"/syncthing/backup\";\n      params = {\n        cleanInterval = \"3600\";\n        maxAge = \"31536000\";\n      };\n    };\n  }\n  {\n    versioning = {\n      type = \"external\";\n      params.versionsPath = pkgs.writers.writeBash \"backup\" ''\n        folderpath=\"$1\"\n        filepath=\"$2\"\n        rm -rf \"$folderpath/$filepath\"\n      '';\n    };\n  }\n]\n"}, "loc": ["services", "syncthing", "folders", "<name>", "versioning"], "readOnly": false, "type": "null or (submodule)"}, "services.syncthing.folders.<name>.versioning.fsPath": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Path to the versioning folder.\nSee <https://docs.syncthing.net/users/versioning.html>.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "versioning", "fsPath"], "readOnly": false, "type": "string or path"}, "services.syncthing.folders.<name>.versioning.params": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "description": {"_type": "mdDoc", "text": "The parameters for versioning. Structure depends on\n[versioning.type](#opt-services.syncthing.folders._name_.versioning.type).\nSee <https://docs.syncthing.net/users/versioning.html>.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "versioning", "params"], "readOnly": false, "type": "attribute set of (string or path)"}, "services.syncthing.folders.<name>.versioning.type": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "description": {"_type": "mdDoc", "text": "The type of versioning.\nSee <https://docs.syncthing.net/users/versioning.html>.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "versioning", "type"], "readOnly": false, "type": "one of \"external\", \"simple\", \"staggered\", \"trashcan\""}, "services.syncthing.folders.<name>.watch": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the folder should be watched for changes by inotify.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "watch"], "readOnly": false, "type": "boolean"}, "services.syncthing.folders.<name>.watchDelay": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "The delay after an inotify event is triggered.\n"}, "loc": ["services", "syncthing", "folders", "<name>", "watchDelay"], "readOnly": false, "type": "signed integer"}, "services.syncthing.group": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "\"syncthing\""}, "description": {"_type": "mdDoc", "text": "The group to run Syncthing under.\nBy default, a group named `syncthing` will be created.\n"}, "example": {"_type": "literalExpression", "text": "\"yourGroup\""}, "loc": ["services", "syncthing", "group"], "readOnly": false, "type": "string"}, "services.syncthing.guiAddress": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:8384\""}, "description": {"_type": "mdDoc", "text": "The address to serve the web interface at.\n"}, "loc": ["services", "syncthing", "guiAddress"], "readOnly": false, "type": "string"}, "services.syncthing.key": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the `key.pem` file, which will be copied into Syncthing's\n[configDir](#opt-services.syncthing.configDir).\n"}, "loc": ["services", "syncthing", "key"], "readOnly": false, "type": "null or string"}, "services.syncthing.openDefaultPorts": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the default ports in the firewall: TCP/UDP 22000 for transfers\nand UDP 21027 for discovery.\n\nIf multiple users are running Syncthing on this machine, you will need\nto manually open a set of ports for each instance and leave this disabled.\nAlternatively, if you are running only a single instance on this machine\nusing the default ports, enable this.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "syncthing", "openDefaultPorts"], "readOnly": false, "type": "boolean"}, "services.syncthing.overrideDevices": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to delete the devices which are not configured via the\n[devices](#opt-services.syncthing.devices) option.\nIf set to `false`, devices added via the web\ninterface will persist and will have to be deleted manually.\n"}, "loc": ["services", "syncthing", "overrideDevices"], "readOnly": false, "type": "boolean"}, "services.syncthing.overrideFolders": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to delete the folders which are not configured via the\n[folders](#opt-services.syncthing.folders) option.\nIf set to `false`, folders added via the web\ninterface will persist and will have to be deleted manually.\n"}, "loc": ["services", "syncthing", "overrideFolders"], "readOnly": false, "type": "boolean"}, "services.syncthing.package": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "pkgs.syncthing"}, "description": {"_type": "mdDoc", "text": "The Syncthing package to use.\n"}, "loc": ["services", "syncthing", "package"], "readOnly": false, "type": "package"}, "services.syncthing.relay.enable": {"declarations": ["nixos/modules/services/networking/syncthing-relay.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Syncthing relay service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "syncthing", "relay", "enable"], "readOnly": false, "type": "boolean"}, "services.syncthing.relay.extraOptions": {"declarations": ["nixos/modules/services/networking/syncthing-relay.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line arguments to pass to strelaysrv.\n"}, "loc": ["services", "syncthing", "relay", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.syncthing.relay.globalRateBps": {"declarations": ["nixos/modules/services/networking/syncthing-relay.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Global bandwidth rate limit in bytes per second.\n"}, "loc": ["services", "syncthing", "relay", "globalRateBps"], "readOnly": false, "type": "null or positive integer, meaning >0"}, "services.syncthing.relay.listenAddress": {"declarations": ["nixos/modules/services/networking/syncthing-relay.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Address to listen on for relay traffic.\n"}, "example": {"_type": "literalExpression", "text": "\"1.2.3.4\""}, "loc": ["services", "syncthing", "relay", "listenAddress"], "readOnly": false, "type": "string"}, "services.syncthing.relay.perSessionRateBps": {"declarations": ["nixos/modules/services/networking/syncthing-relay.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Per session bandwidth rate limit in bytes per second.\n"}, "loc": ["services", "syncthing", "relay", "perSessionRateBps"], "readOnly": false, "type": "null or positive integer, meaning >0"}, "services.syncthing.relay.pools": {"declarations": ["nixos/modules/services/networking/syncthing-relay.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Relay pools to join. If null, uses the default global pool.\n"}, "loc": ["services", "syncthing", "relay", "pools"], "readOnly": false, "type": "null or (list of string)"}, "services.syncthing.relay.port": {"declarations": ["nixos/modules/services/networking/syncthing-relay.nix"], "default": {"_type": "literalExpression", "text": "22067"}, "description": {"_type": "mdDoc", "text": "Port to listen on for relay traffic. This port should be added to\n`networking.firewall.allowedTCPPorts`.\n"}, "loc": ["services", "syncthing", "relay", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.syncthing.relay.providedBy": {"declarations": ["nixos/modules/services/networking/syncthing-relay.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Human-readable description of the provider of the relay (you).\n"}, "loc": ["services", "syncthing", "relay", "providedBy"], "readOnly": false, "type": "string"}, "services.syncthing.relay.statusListenAddress": {"declarations": ["nixos/modules/services/networking/syncthing-relay.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Address to listen on for serving the relay status API.\n"}, "example": {"_type": "literalExpression", "text": "\"1.2.3.4\""}, "loc": ["services", "syncthing", "relay", "statusListenAddress"], "readOnly": false, "type": "string"}, "services.syncthing.relay.statusPort": {"declarations": ["nixos/modules/services/networking/syncthing-relay.nix"], "default": {"_type": "literalExpression", "text": "22070"}, "description": {"_type": "mdDoc", "text": "Port to listen on for serving the relay status API. This port should be\nadded to `networking.firewall.allowedTCPPorts`.\n"}, "loc": ["services", "syncthing", "relay", "statusPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.syncthing.systemService": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to auto-launch Syncthing as a system service.\n"}, "loc": ["services", "syncthing", "systemService"], "readOnly": false, "type": "boolean"}, "services.syncthing.user": {"declarations": ["nixos/modules/services/networking/syncthing.nix"], "default": {"_type": "literalExpression", "text": "\"syncthing\""}, "description": {"_type": "mdDoc", "text": "The user to run Syncthing as.\nBy default, a user named `syncthing` will be created whose home\ndirectory is [dataDir](#opt-services.syncthing.dataDir).\n"}, "example": {"_type": "literalExpression", "text": "\"yourUser\""}, "loc": ["services", "syncthing", "user"], "readOnly": false, "type": "string"}, "services.synergy.client.autoStart": {"declarations": ["nixos/modules/services/misc/synergy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the Synergy client should be started automatically."}, "loc": ["services", "synergy", "client", "autoStart"], "readOnly": false, "type": "boolean"}, "services.synergy.client.enable": {"declarations": ["nixos/modules/services/misc/synergy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Synergy client (receive keyboard and mouse events from a Synergy server)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "synergy", "client", "enable"], "readOnly": false, "type": "boolean"}, "services.synergy.client.screenName": {"declarations": ["nixos/modules/services/misc/synergy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Use the given name instead of the hostname to identify\nourselves to the server.\n"}, "loc": ["services", "synergy", "client", "screenName"], "readOnly": false, "type": "string"}, "services.synergy.client.serverAddress": {"declarations": ["nixos/modules/services/misc/synergy.nix"], "description": {"_type": "mdDoc", "text": "The server address is of the form: [hostname][:port].  The\nhostname must be the address or hostname of the server.  The\nport overrides the default port, 24800.\n"}, "loc": ["services", "synergy", "client", "serverAddress"], "readOnly": false, "type": "string"}, "services.synergy.server.address": {"declarations": ["nixos/modules/services/misc/synergy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Address on which to listen for clients."}, "loc": ["services", "synergy", "server", "address"], "readOnly": false, "type": "string"}, "services.synergy.server.autoStart": {"declarations": ["nixos/modules/services/misc/synergy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the Synergy server should be started automatically."}, "loc": ["services", "synergy", "server", "autoStart"], "readOnly": false, "type": "boolean"}, "services.synergy.server.configFile": {"declarations": ["nixos/modules/services/misc/synergy.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/synergy-server.conf\""}, "description": {"_type": "mdDoc", "text": "The Synergy server configuration file."}, "loc": ["services", "synergy", "server", "configFile"], "readOnly": false, "type": "path"}, "services.synergy.server.enable": {"declarations": ["nixos/modules/services/misc/synergy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Synergy server (send keyboard and mouse events)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "synergy", "server", "enable"], "readOnly": false, "type": "boolean"}, "services.synergy.server.screenName": {"declarations": ["nixos/modules/services/misc/synergy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Use the given name instead of the hostname to identify\nthis screen in the configuration.\n"}, "loc": ["services", "synergy", "server", "screenName"], "readOnly": false, "type": "string"}, "services.synergy.server.tls.cert": {"declarations": ["nixos/modules/services/misc/synergy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The TLS certificate to use for encryption."}, "example": {"_type": "literalExpression", "text": "\"~/.synergy/SSL/Synergy.pem\""}, "loc": ["services", "synergy", "server", "tls", "cert"], "readOnly": false, "type": "null or string"}, "services.synergy.server.tls.enable": {"declarations": ["nixos/modules/services/misc/synergy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether TLS encryption should be used.\n\nUsing this requires a TLS certificate that can be\ngenerated by starting the Synergy GUI once and entering\na valid product key.\n"}, "loc": ["services", "synergy", "server", "tls", "enable"], "readOnly": false, "type": "boolean"}, "services.syslog-ng.configHeader": {"declarations": ["nixos/modules/services/logging/syslog-ng.nix"], "default": {"_type": "literalExpression", "text": "''\n  @version: 3.6\n  @include \"scl.conf\"\n''"}, "description": {"_type": "mdDoc", "text": "The very first lines of the configuration file. Should usually contain\nthe syslog-ng version header.\n"}, "loc": ["services", "syslog-ng", "configHeader"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.syslog-ng.enable": {"declarations": ["nixos/modules/services/logging/syslog-ng.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the syslog-ng daemon.\n"}, "loc": ["services", "syslog-ng", "enable"], "readOnly": false, "type": "boolean"}, "services.syslog-ng.extraConfig": {"declarations": ["nixos/modules/services/logging/syslog-ng.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration added to the end of `syslog-ng.conf`.\n"}, "loc": ["services", "syslog-ng", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.syslog-ng.extraModulePaths": {"declarations": ["nixos/modules/services/logging/syslog-ng.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of paths that should be included in syslog-ng's\n`--module-path` option. They should usually\nend in `/lib/syslog-ng`\n"}, "loc": ["services", "syslog-ng", "extraModulePaths"], "readOnly": false, "type": "list of string"}, "services.syslog-ng.package": {"declarations": ["nixos/modules/services/logging/syslog-ng.nix"], "default": {"_type": "literalExpression", "text": "pkgs.syslogng"}, "description": {"_type": "mdDoc", "text": "The package providing syslog-ng binaries.\n"}, "loc": ["services", "syslog-ng", "package"], "readOnly": false, "type": "package"}, "services.syslogd.defaultConfig": {"declarations": ["nixos/modules/services/logging/syslogd.nix"], "default": {"_type": "literalExpression", "text": "''\n  # Send emergency messages to all users.\n  *.emerg                       *\n  \n  # \"local1\" is used for dhcpd messages.\n  local1.*                     -/var/log/dhcpd\n  \n  mail.*                       -/var/log/mail\n  \n  *.=warning;*.=err            -/var/log/warn\n  *.crit                        /var/log/warn\n  \n  *.*;mail.none;local1.none    -/var/log/messages\n''"}, "description": {"_type": "mdDoc", "text": "The default {file}`syslog.conf` file configures a\nfairly standard setup of log files, which can be extended by\nmeans of {var}`extraConfig`.\n"}, "loc": ["services", "syslogd", "defaultConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.syslogd.enable": {"declarations": ["nixos/modules/services/logging/syslogd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable syslogd.  Note that systemd also logs\nsyslog messages, so you normally don't need to run syslogd.\n"}, "loc": ["services", "syslogd", "enable"], "readOnly": false, "type": "boolean"}, "services.syslogd.enableNetworkInput": {"declarations": ["nixos/modules/services/logging/syslogd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Accept logging through UDP. Option -r of syslogd(8).\n"}, "loc": ["services", "syslogd", "enableNetworkInput"], "readOnly": false, "type": "boolean"}, "services.syslogd.extraConfig": {"declarations": ["nixos/modules/services/logging/syslogd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional text appended to {file}`syslog.conf`,\ni.e. the contents of {var}`defaultConfig`.\n"}, "example": {"_type": "literalExpression", "text": "\"news.* -/var/log/news\""}, "loc": ["services", "syslogd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.syslogd.extraParams": {"declarations": ["nixos/modules/services/logging/syslogd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional parameters passed to {command}`syslogd`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-m 0\"\n]"}, "loc": ["services", "syslogd", "extraParams"], "readOnly": false, "type": "list of string"}, "services.syslogd.tty": {"declarations": ["nixos/modules/services/logging/syslogd.nix"], "default": {"_type": "literalExpression", "text": "\"tty10\""}, "description": {"_type": "mdDoc", "text": "The tty device on which syslogd will print important log\nmessages. Leave this option blank to disable tty logging.\n"}, "loc": ["services", "syslogd", "tty"], "readOnly": false, "type": "string"}, "services.sysprof.enable": {"declarations": ["nixos/modules/services/misc/sysprof.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sysprof profiling daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sysprof", "enable"], "readOnly": false, "type": "boolean"}, "services.sysstat.collect-args": {"declarations": ["nixos/modules/services/monitoring/sysstat.nix"], "default": {"_type": "literalExpression", "text": "\"1 1\""}, "description": {"_type": "mdDoc", "text": "Arguments to pass sa1 when collecting statistics\n"}, "loc": ["services", "sysstat", "collect-args"], "readOnly": false, "type": "string"}, "services.sysstat.collect-frequency": {"declarations": ["nixos/modules/services/monitoring/sysstat.nix"], "default": {"_type": "literalExpression", "text": "\"*:00/10\""}, "description": {"_type": "mdDoc", "text": "OnCalendar specification for sysstat-collect\n"}, "loc": ["services", "sysstat", "collect-frequency"], "readOnly": false, "type": "string"}, "services.sysstat.enable": {"declarations": ["nixos/modules/services/monitoring/sysstat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sar system activity collection."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "sysstat", "enable"], "readOnly": false, "type": "boolean"}, "services.system-config-printer.enable": {"declarations": ["nixos/modules/services/desktops/system-config-printer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable system-config-printer, a service for CUPS administration used by printing interfaces."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "system-config-printer", "enable"], "readOnly": false, "type": "boolean"}, "services.system76-scheduler.assignments": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Process profile assignments."}, "example": {"_type": "literalExpression", "text": "{\n  nix-builds = {\n    nice = 15;\n    class = \"batch\";\n    ioClass = \"idle\";\n    matchers = [\n      \"nix-daemon\"\n    ];\n  };\n}\n"}, "loc": ["services", "system76-scheduler", "assignments"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.system76-scheduler.assignments.<name>.class": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CPU scheduler class."}, "example": {"_type": "literalExpression", "text": "\"batch\""}, "loc": ["services", "system76-scheduler", "assignments", "<name>", "class"], "readOnly": false, "type": "null or one of \"idle\", \"batch\", \"other\", \"rr\", \"fifo\""}, "services.system76-scheduler.assignments.<name>.ioClass": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IO scheduler class."}, "example": {"_type": "literalExpression", "text": "\"best-effort\""}, "loc": ["services", "system76-scheduler", "assignments", "<name>", "ioClass"], "readOnly": false, "type": "null or one of \"idle\", \"best-effort\", \"realtime\""}, "services.system76-scheduler.assignments.<name>.ioPrio": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IO scheduler priority."}, "example": {"_type": "literalExpression", "text": "4"}, "loc": ["services", "system76-scheduler", "assignments", "<name>", "ioPrio"], "readOnly": false, "type": "null or integer between 0 and 7 (both inclusive)"}, "services.system76-scheduler.assignments.<name>.matchers": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Process matchers."}, "example": {"_type": "literalExpression", "text": "[\n  \"include cgroup=\\\"/user.slice/*.service\\\" parent=\\\"systemd\\\"\"\n  \"emacs\"\n]\n"}, "loc": ["services", "system76-scheduler", "assignments", "<name>", "matchers"], "readOnly": false, "type": "null or (list of string)"}, "services.system76-scheduler.assignments.<name>.nice": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Niceness."}, "loc": ["services", "system76-scheduler", "assignments", "<name>", "nice"], "readOnly": false, "type": "null or integer between -20 and 19 (both inclusive)"}, "services.system76-scheduler.assignments.<name>.prio": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CPU scheduler priority."}, "example": {"_type": "literalExpression", "text": "49"}, "loc": ["services", "system76-scheduler", "assignments", "<name>", "prio"], "readOnly": false, "type": "null or integer between 1 and 99 (both inclusive)"}, "services.system76-scheduler.enable": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable system76-scheduler."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "system76-scheduler", "enable"], "readOnly": false, "type": "boolean"}, "services.system76-scheduler.exceptions": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Processes that are left alone."}, "example": {"_type": "literalExpression", "text": "[\n  \"include descends=\\\"schedtool\\\"\"\n  \"schedtool\"\n]\n"}, "loc": ["services", "system76-scheduler", "exceptions"], "readOnly": false, "type": "list of string"}, "services.system76-scheduler.package": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "config.boot.kernelPackages.system76-scheduler"}, "description": {"_type": "mdDoc", "text": "Which System76-Scheduler package to use."}, "loc": ["services", "system76-scheduler", "package"], "readOnly": false, "type": "package"}, "services.system76-scheduler.settings.cfsProfiles.default.bandwidth-size": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "`sched_cfs_bandwidth_slice_us`."}, "loc": ["services", "system76-scheduler", "settings", "cfsProfiles", "default", "bandwidth-size"], "readOnly": false, "type": "signed integer"}, "services.system76-scheduler.settings.cfsProfiles.default.latency": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "6"}, "description": {"_type": "mdDoc", "text": "`sched_latency_ns`."}, "loc": ["services", "system76-scheduler", "settings", "cfsProfiles", "default", "latency"], "readOnly": false, "type": "signed integer"}, "services.system76-scheduler.settings.cfsProfiles.default.nr-latency": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "8"}, "description": {"_type": "mdDoc", "text": "`sched_nr_latency`."}, "loc": ["services", "system76-scheduler", "settings", "cfsProfiles", "default", "nr-latency"], "readOnly": false, "type": "signed integer"}, "services.system76-scheduler.settings.cfsProfiles.default.preempt": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "\"voluntary\""}, "description": {"_type": "mdDoc", "text": "Preemption mode."}, "loc": ["services", "system76-scheduler", "settings", "cfsProfiles", "default", "preempt"], "readOnly": false, "type": "one of \"none\", \"voluntary\", \"full\""}, "services.system76-scheduler.settings.cfsProfiles.default.wakeup-granularity": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "1.0"}, "description": {"_type": "mdDoc", "text": "`sched_wakeup_granularity_ns`."}, "loc": ["services", "system76-scheduler", "settings", "cfsProfiles", "default", "wakeup-granularity"], "readOnly": false, "type": "floating point number"}, "services.system76-scheduler.settings.cfsProfiles.enable": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Tweak CFS latency parameters when going on/off battery"}, "loc": ["services", "system76-scheduler", "settings", "cfsProfiles", "enable"], "readOnly": false, "type": "boolean"}, "services.system76-scheduler.settings.cfsProfiles.responsive.bandwidth-size": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "`sched_cfs_bandwidth_slice_us`."}, "loc": ["services", "system76-scheduler", "settings", "cfsProfiles", "responsive", "bandwidth-size"], "readOnly": false, "type": "signed integer"}, "services.system76-scheduler.settings.cfsProfiles.responsive.latency": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "4"}, "description": {"_type": "mdDoc", "text": "`sched_latency_ns`."}, "loc": ["services", "system76-scheduler", "settings", "cfsProfiles", "responsive", "latency"], "readOnly": false, "type": "signed integer"}, "services.system76-scheduler.settings.cfsProfiles.responsive.nr-latency": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "`sched_nr_latency`."}, "loc": ["services", "system76-scheduler", "settings", "cfsProfiles", "responsive", "nr-latency"], "readOnly": false, "type": "signed integer"}, "services.system76-scheduler.settings.cfsProfiles.responsive.preempt": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "\"full\""}, "description": {"_type": "mdDoc", "text": "Preemption mode."}, "loc": ["services", "system76-scheduler", "settings", "cfsProfiles", "responsive", "preempt"], "readOnly": false, "type": "one of \"none\", \"voluntary\", \"full\""}, "services.system76-scheduler.settings.cfsProfiles.responsive.wakeup-granularity": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "0.5"}, "description": {"_type": "mdDoc", "text": "`sched_wakeup_granularity_ns`."}, "loc": ["services", "system76-scheduler", "settings", "cfsProfiles", "responsive", "wakeup-granularity"], "readOnly": false, "type": "floating point number"}, "services.system76-scheduler.settings.processScheduler.enable": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Tweak scheduling of individual processes in real time."}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "enable"], "readOnly": false, "type": "boolean"}, "services.system76-scheduler.settings.processScheduler.foregroundBoost.background.class": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CPU scheduler class."}, "example": {"_type": "literalExpression", "text": "\"batch\""}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "foregroundBoost", "background", "class"], "readOnly": false, "type": "null or one of \"idle\", \"batch\", \"other\", \"rr\", \"fifo\""}, "services.system76-scheduler.settings.processScheduler.foregroundBoost.background.ioClass": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "\"idle\""}, "description": {"_type": "mdDoc", "text": "IO scheduler class."}, "example": {"_type": "literalExpression", "text": "\"best-effort\""}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "foregroundBoost", "background", "ioClass"], "readOnly": false, "type": "null or one of \"idle\", \"best-effort\", \"realtime\""}, "services.system76-scheduler.settings.processScheduler.foregroundBoost.background.ioPrio": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IO scheduler priority."}, "example": {"_type": "literalExpression", "text": "4"}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "foregroundBoost", "background", "ioPrio"], "readOnly": false, "type": "null or integer between 0 and 7 (both inclusive)"}, "services.system76-scheduler.settings.processScheduler.foregroundBoost.background.matchers": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Process matchers."}, "example": {"_type": "literalExpression", "text": "[\n  \"include cgroup=\\\"/user.slice/*.service\\\" parent=\\\"systemd\\\"\"\n  \"emacs\"\n]\n"}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "foregroundBoost", "background", "matchers"], "readOnly": false, "type": "null or (list of string)"}, "services.system76-scheduler.settings.processScheduler.foregroundBoost.background.nice": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "6"}, "description": {"_type": "mdDoc", "text": "Niceness."}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "foregroundBoost", "background", "nice"], "readOnly": false, "type": "null or integer between -20 and 19 (both inclusive)"}, "services.system76-scheduler.settings.processScheduler.foregroundBoost.background.prio": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CPU scheduler priority."}, "example": {"_type": "literalExpression", "text": "49"}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "foregroundBoost", "background", "prio"], "readOnly": false, "type": "null or integer between 1 and 99 (both inclusive)"}, "services.system76-scheduler.settings.processScheduler.foregroundBoost.enable": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Boost foreground process priorities.\n\n(And de-boost background ones).  Note that this option needs cooperation\nfrom the desktop environment to work.  On Gnome the client side is\nimplemented by the \"System76 Scheduler\" shell extension.\n"}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "foregroundBoost", "enable"], "readOnly": false, "type": "boolean"}, "services.system76-scheduler.settings.processScheduler.foregroundBoost.foreground.class": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CPU scheduler class."}, "example": {"_type": "literalExpression", "text": "\"batch\""}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "foregroundBoost", "foreground", "class"], "readOnly": false, "type": "null or one of \"idle\", \"batch\", \"other\", \"rr\", \"fifo\""}, "services.system76-scheduler.settings.processScheduler.foregroundBoost.foreground.ioClass": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "\"best-effort\""}, "description": {"_type": "mdDoc", "text": "IO scheduler class."}, "example": {"_type": "literalExpression", "text": "\"best-effort\""}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "foregroundBoost", "foreground", "ioClass"], "readOnly": false, "type": "null or one of \"idle\", \"best-effort\", \"realtime\""}, "services.system76-scheduler.settings.processScheduler.foregroundBoost.foreground.ioPrio": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "IO scheduler priority."}, "example": {"_type": "literalExpression", "text": "4"}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "foregroundBoost", "foreground", "ioPrio"], "readOnly": false, "type": "null or integer between 0 and 7 (both inclusive)"}, "services.system76-scheduler.settings.processScheduler.foregroundBoost.foreground.matchers": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Process matchers."}, "example": {"_type": "literalExpression", "text": "[\n  \"include cgroup=\\\"/user.slice/*.service\\\" parent=\\\"systemd\\\"\"\n  \"emacs\"\n]\n"}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "foregroundBoost", "foreground", "matchers"], "readOnly": false, "type": "null or (list of string)"}, "services.system76-scheduler.settings.processScheduler.foregroundBoost.foreground.nice": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Niceness."}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "foregroundBoost", "foreground", "nice"], "readOnly": false, "type": "null or integer between -20 and 19 (both inclusive)"}, "services.system76-scheduler.settings.processScheduler.foregroundBoost.foreground.prio": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CPU scheduler priority."}, "example": {"_type": "literalExpression", "text": "49"}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "foregroundBoost", "foreground", "prio"], "readOnly": false, "type": "null or integer between 1 and 99 (both inclusive)"}, "services.system76-scheduler.settings.processScheduler.pipewireBoost.enable": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Boost Pipewire client priorities."}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "pipewireBoost", "enable"], "readOnly": false, "type": "boolean"}, "services.system76-scheduler.settings.processScheduler.pipewireBoost.profile.class": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CPU scheduler class."}, "example": {"_type": "literalExpression", "text": "\"batch\""}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "pipewireBoost", "profile", "class"], "readOnly": false, "type": "null or one of \"idle\", \"batch\", \"other\", \"rr\", \"fifo\""}, "services.system76-scheduler.settings.processScheduler.pipewireBoost.profile.ioClass": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "\"best-effort\""}, "description": {"_type": "mdDoc", "text": "IO scheduler class."}, "example": {"_type": "literalExpression", "text": "\"best-effort\""}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "pipewireBoost", "profile", "ioClass"], "readOnly": false, "type": "null or one of \"idle\", \"best-effort\", \"realtime\""}, "services.system76-scheduler.settings.processScheduler.pipewireBoost.profile.ioPrio": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "IO scheduler priority."}, "example": {"_type": "literalExpression", "text": "4"}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "pipewireBoost", "profile", "ioPrio"], "readOnly": false, "type": "null or integer between 0 and 7 (both inclusive)"}, "services.system76-scheduler.settings.processScheduler.pipewireBoost.profile.matchers": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Process matchers."}, "example": {"_type": "literalExpression", "text": "[\n  \"include cgroup=\\\"/user.slice/*.service\\\" parent=\\\"systemd\\\"\"\n  \"emacs\"\n]\n"}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "pipewireBoost", "profile", "matchers"], "readOnly": false, "type": "null or (list of string)"}, "services.system76-scheduler.settings.processScheduler.pipewireBoost.profile.nice": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "-6"}, "description": {"_type": "mdDoc", "text": "Niceness."}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "pipewireBoost", "profile", "nice"], "readOnly": false, "type": "null or integer between -20 and 19 (both inclusive)"}, "services.system76-scheduler.settings.processScheduler.pipewireBoost.profile.prio": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "CPU scheduler priority."}, "example": {"_type": "literalExpression", "text": "49"}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "pipewireBoost", "profile", "prio"], "readOnly": false, "type": "null or integer between 1 and 99 (both inclusive)"}, "services.system76-scheduler.settings.processScheduler.refreshInterval": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "60"}, "description": {"_type": "mdDoc", "text": "Process list poll interval, in seconds"}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "refreshInterval"], "readOnly": false, "type": "signed integer"}, "services.system76-scheduler.settings.processScheduler.useExecsnoop": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Use execsnoop (otherwise poll the precess list periodically)."}, "loc": ["services", "system76-scheduler", "settings", "processScheduler", "useExecsnoop"], "readOnly": false, "type": "boolean"}, "services.system76-scheduler.useStockConfig": {"declarations": ["nixos/modules/services/desktops/system76-scheduler.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Use the (reasonable and featureful) stock configuration.\n\nWhen this option is `true`, `services.system76-scheduler.settings`\nare ignored.\n"}, "loc": ["services", "system76-scheduler", "useStockConfig"], "readOnly": false, "type": "boolean"}, "services.systembus-notify.enable": {"declarations": ["nixos/modules/services/system/systembus-notify.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable System bus notification support\n\nWARNING: enabling this option (while convenient) should *not* be done on a\nmachine where you do not trust the other users as it allows any other\nlocal user to DoS your session by spamming notifications.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "systembus-notify", "enable"], "readOnly": false, "type": "boolean"}, "services.tahoe.introducers": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The Tahoe introducers.\n"}, "loc": ["services", "tahoe", "introducers"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.tahoe.introducers.<name>.nickname": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "description": {"_type": "mdDoc", "text": "The nickname of this Tahoe introducer.\n"}, "loc": ["services", "tahoe", "introducers", "<name>", "nickname"], "readOnly": false, "type": "string"}, "services.tahoe.introducers.<name>.package": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "pkgs.tahoelafs"}, "description": {"_type": "mdDoc", "text": "The package to use for the Tahoe LAFS daemon.\n"}, "loc": ["services", "tahoe", "introducers", "<name>", "package"], "readOnly": false, "type": "package"}, "services.tahoe.introducers.<name>.tub.location": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The external location that the introducer should listen on.\n\nIf specified, the port should be included.\n"}, "loc": ["services", "tahoe", "introducers", "<name>", "tub", "location"], "readOnly": false, "type": "null or string"}, "services.tahoe.introducers.<name>.tub.port": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "3458"}, "description": {"_type": "mdDoc", "text": "The port on which the introducer will listen.\n"}, "loc": ["services", "tahoe", "introducers", "<name>", "tub", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tahoe.nodes": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The Tahoe nodes.\n"}, "loc": ["services", "tahoe", "nodes"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.tahoe.nodes.<name>.client.helper": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The furl for a Tahoe helper node.\n\nLike all furls, keep this safe and don't share it.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "client", "helper"], "readOnly": false, "type": "null or string"}, "services.tahoe.nodes.<name>.client.introducer": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The furl for a Tahoe introducer node.\n\nLike all furls, keep this safe and don't share it.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "client", "introducer"], "readOnly": false, "type": "null or string"}, "services.tahoe.nodes.<name>.client.shares.happy": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "7"}, "description": {"_type": "mdDoc", "text": "The number of distinct storage nodes required to store\na file.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "client", "shares", "happy"], "readOnly": false, "type": "signed integer"}, "services.tahoe.nodes.<name>.client.shares.needed": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "The number of shares required to reconstitute a file.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "client", "shares", "needed"], "readOnly": false, "type": "signed integer"}, "services.tahoe.nodes.<name>.client.shares.total": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "The number of shares required to store a file.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "client", "shares", "total"], "readOnly": false, "type": "signed integer"}, "services.tahoe.nodes.<name>.helper.enable": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable helper service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tahoe", "nodes", "<name>", "helper", "enable"], "readOnly": false, "type": "boolean"}, "services.tahoe.nodes.<name>.nickname": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "description": {"_type": "mdDoc", "text": "The nickname of this Tahoe node.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "nickname"], "readOnly": false, "type": "string"}, "services.tahoe.nodes.<name>.package": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "pkgs.tahoelafs"}, "description": {"_type": "mdDoc", "text": "The package to use for the Tahoe LAFS daemon.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "package"], "readOnly": false, "type": "package"}, "services.tahoe.nodes.<name>.sftpd.accounts.file": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the accounts file.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "sftpd", "accounts", "file"], "readOnly": false, "type": "null or path"}, "services.tahoe.nodes.<name>.sftpd.accounts.url": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "URL of the accounts server.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "sftpd", "accounts", "url"], "readOnly": false, "type": "null or string"}, "services.tahoe.nodes.<name>.sftpd.enable": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SFTP service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tahoe", "nodes", "<name>", "sftpd", "enable"], "readOnly": false, "type": "boolean"}, "services.tahoe.nodes.<name>.sftpd.hostPrivateKeyFile": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the SSH host private key.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "sftpd", "hostPrivateKeyFile"], "readOnly": false, "type": "null or path"}, "services.tahoe.nodes.<name>.sftpd.hostPublicKeyFile": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the SSH host public key.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "sftpd", "hostPublicKeyFile"], "readOnly": false, "type": "null or path"}, "services.tahoe.nodes.<name>.sftpd.port": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port on which the SFTP server will listen.\n\nThis is the correct setting to tweak if you want Tahoe's SFTP\ndaemon to listen on a different port.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "sftpd", "port"], "readOnly": false, "type": "null or signed integer"}, "services.tahoe.nodes.<name>.storage.enable": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable storage service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tahoe", "nodes", "<name>", "storage", "enable"], "readOnly": false, "type": "boolean"}, "services.tahoe.nodes.<name>.storage.reservedSpace": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "\"1G\""}, "description": {"_type": "mdDoc", "text": "The amount of filesystem space to not use for storage.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "storage", "reservedSpace"], "readOnly": false, "type": "string"}, "services.tahoe.nodes.<name>.tub.location": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The external location that the node should listen on.\n\nThis is the setting to tweak if there are multiple interfaces\nand you want to alter which interface Tahoe is advertising.\n\nIf specified, the port should be included.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "tub", "location"], "readOnly": false, "type": "null or string"}, "services.tahoe.nodes.<name>.tub.port": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "3457"}, "description": {"_type": "mdDoc", "text": "The port on which the tub will listen.\n\nThis is the correct setting to tweak if you want Tahoe's storage\nsystem to listen on a different port.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "tub", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tahoe.nodes.<name>.web.port": {"declarations": ["nixos/modules/services/network-filesystems/tahoe.nix"], "default": {"_type": "literalExpression", "text": "3456"}, "description": {"_type": "mdDoc", "text": "The port on which the Web server will listen.\n\nThis is the correct setting to tweak if you want Tahoe's WUI to\nlisten on a different port.\n"}, "loc": ["services", "tahoe", "nodes", "<name>", "web", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tailscale.enable": {"declarations": ["nixos/modules/services/networking/tailscale.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Tailscale client daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tailscale", "enable"], "readOnly": false, "type": "boolean"}, "services.tailscale.interfaceName": {"declarations": ["nixos/modules/services/networking/tailscale.nix"], "default": {"_type": "literalExpression", "text": "\"tailscale0\""}, "description": {"_type": "mdDoc", "text": "The interface name for tunnel traffic. Use \"userspace-networking\" (beta) to not use TUN."}, "loc": ["services", "tailscale", "interfaceName"], "readOnly": false, "type": "string"}, "services.tailscale.package": {"declarations": ["nixos/modules/services/networking/tailscale.nix"], "default": {"_type": "literalExpression", "text": "pkgs.tailscale"}, "description": {"_type": "mdDoc", "text": "The package to use for tailscale"}, "loc": ["services", "tailscale", "package"], "readOnly": false, "type": "package"}, "services.tailscale.permitCertUid": {"declarations": ["nixos/modules/services/networking/tailscale.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Username or user ID of the user allowed to to fetch Tailscale TLS certificates for the node."}, "loc": ["services", "tailscale", "permitCertUid"], "readOnly": false, "type": "null or non-empty string"}, "services.tailscale.port": {"declarations": ["nixos/modules/services/networking/tailscale.nix"], "default": {"_type": "literalExpression", "text": "41641"}, "description": {"_type": "mdDoc", "text": "The port to listen on for tunnel traffic (0=autoselect)."}, "loc": ["services", "tailscale", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tailscale.useRoutingFeatures": {"declarations": ["nixos/modules/services/networking/tailscale.nix"], "default": {"_type": "literalExpression", "text": "\"none\""}, "description": {"_type": "mdDoc", "text": "Enables settings required for Tailscale's routing features like subnet routers and exit nodes.\n\nTo use these these features, you will still need to call `sudo tailscale up` with the relevant flags like `--advertise-exit-node` and `--exit-node`.\n\nWhen set to `client` or `both`, reverse path filtering will be set to loose instead of strict.\nWhen set to `server` or `both`, IP forwarding will be enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"server\""}, "loc": ["services", "tailscale", "useRoutingFeatures"], "readOnly": false, "type": "one of \"none\", \"client\", \"server\", \"both\""}, "services.tandoor-recipes.address": {"declarations": ["nixos/modules/services/misc/tandoor-recipes.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Web interface address."}, "loc": ["services", "tandoor-recipes", "address"], "readOnly": false, "type": "string"}, "services.tandoor-recipes.enable": {"declarations": ["nixos/modules/services/misc/tandoor-recipes.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Tandoor Recipes.\n\nWhen started, the Tandoor Recipes database is automatically created if\nit doesn't exist and updated if the package has changed. Both tasks are\nachieved by running a Django migration.\n\nA script to manage the instance (by wrapping Django's manage.py) is linked to\n`/var/lib/tandoor-recipes/tandoor-recipes-manage`.\n"}, "loc": ["services", "tandoor-recipes", "enable"], "readOnly": false, "type": "boolean"}, "services.tandoor-recipes.extraConfig": {"declarations": ["nixos/modules/services/misc/tandoor-recipes.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra tandoor recipes config options.\n\nSee [the example dot-env file](https://raw.githubusercontent.com/vabene1111/recipes/master/.env.template)\nfor available options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ENABLE_SIGNUP = \"1\";\n}"}, "loc": ["services", "tandoor-recipes", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.tandoor-recipes.package": {"declarations": ["nixos/modules/services/misc/tandoor-recipes.nix"], "default": {"_type": "literalExpression", "text": "pkgs.tandoor-recipes"}, "description": {"_type": "mdDoc", "text": "The Tandoor Recipes package to use."}, "loc": ["services", "tandoor-recipes", "package"], "readOnly": false, "type": "package"}, "services.tandoor-recipes.port": {"declarations": ["nixos/modules/services/misc/tandoor-recipes.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "Web interface port."}, "loc": ["services", "tandoor-recipes", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.target.config": {"declarations": ["nixos/modules/services/networking/iscsi/target.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Content of /etc/target/saveconfig.json\nThis file is normally read and written by targetcli\n"}, "loc": ["services", "target", "config"], "readOnly": false, "type": "attribute set"}, "services.target.enable": {"declarations": ["nixos/modules/services/networking/iscsi/target.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the kernel's LIO iscsi target."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "target", "enable"], "readOnly": false, "type": "boolean"}, "services.tarsnap.archives": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Tarsnap archive configurations. Each attribute names an archive\nto be created at a given time interval, according to the options\nassociated with it. When uploading to the tarsnap server,\narchive names are suffixed by a 1 second resolution timestamp,\nwith the format `%Y%m%d%H%M%S`.\n\nFor each member of the set is created a timer which triggers the\ninstanced `tarsnap-archive-name` service unit. You may use\n{command}`systemctl start tarsnap-archive-name` to\nmanually trigger creation of `archive-name` at\nany time.\n"}, "example": {"_type": "literalExpression", "text": "{\n  nixos =\n    { directories = [ \"/home\" \"/root/ssl\" ];\n    };\n\n  gamedata =\n    { directories = [ \"/var/lib/minecraft\" ];\n      period      = \"*:30\";\n    };\n}\n"}, "loc": ["services", "tarsnap", "archives"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.tarsnap.archives.<name>.aggressiveNetworking": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Upload data over multiple TCP connections, potentially\nincreasing tarsnap's bandwidth utilisation at the cost\nof slowing down all other network traffic. Not\nrecommended unless TCP congestion is the dominant\nlimiting factor.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "aggressiveNetworking"], "readOnly": false, "type": "boolean"}, "services.tarsnap.archives.<name>.cachedir": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "\"/var/cache/tarsnap/${utils.escapeSystemdPath config.services.tarsnap.archives.<name>.keyfile}\"\n"}, "description": {"_type": "mdDoc", "text": "The cache allows tarsnap to identify previously stored data\nblocks, reducing archival time and bandwidth usage.\n\nShould the cache become desynchronized or corrupted, tarsnap\nwill refuse to run until you manually rebuild the cache with\n{command}`tarsnap --fsck`.\n\nSet to `null` to disable caching.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "cachedir"], "readOnly": false, "type": "null or path"}, "services.tarsnap.archives.<name>.checkpointBytes": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "\"1GB\""}, "description": {"_type": "mdDoc", "text": "Create a checkpoint every `checkpointBytes`\nof uploaded data (optionally specified using an SI prefix).\n\n1GB is the minimum value. A higher value is recommended,\nas checkpointing is expensive.\n\nSet to `null` to disable checkpointing.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "checkpointBytes"], "readOnly": false, "type": "null or string"}, "services.tarsnap.archives.<name>.directories": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of filesystem paths to archive."}, "loc": ["services", "tarsnap", "archives", "<name>", "directories"], "readOnly": false, "type": "list of path"}, "services.tarsnap.archives.<name>.excludes": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Exclude files and directories matching these patterns.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "excludes"], "readOnly": false, "type": "list of string"}, "services.tarsnap.archives.<name>.explicitSymlinks": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to follow symlinks specified as archives.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "explicitSymlinks"], "readOnly": false, "type": "boolean"}, "services.tarsnap.archives.<name>.followSymlinks": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to follow all symlinks in archive trees.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "followSymlinks"], "readOnly": false, "type": "boolean"}, "services.tarsnap.archives.<name>.includes": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Include only files and directories matching these\npatterns (the empty list includes everything).\n\nExclusions have precedence over inclusions.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "includes"], "readOnly": false, "type": "list of string"}, "services.tarsnap.archives.<name>.keyfile": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "config.services.tarsnap.keyfile"}, "description": {"_type": "mdDoc", "text": "Set a specific keyfile for this archive. This defaults to\n`\"/root/tarsnap.key\"` if left unspecified.\n\nUse this option if you want to run multiple backups\nconcurrently - each archive must have a unique key. You can\ngenerate a write-only key derived from your master key (which\nis recommended) using `tarsnap-keymgmt(1)`.\n\nNote: every archive must have an individual master key. You\nmust generate multiple keys with\n`tarsnap-keygen(1)`, and then generate write\nonly keys from those.\n\nThe keyfile name should be given as a string and not a path, to\navoid the key being copied into the Nix store.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "keyfile"], "readOnly": false, "type": "string"}, "services.tarsnap.archives.<name>.lowmem": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Reduce memory consumption by not caching small files.\nPossibly beneficial if the average file size is smaller\nthan 1 MB and the number of files is lower than the\ntotal amount of RAM in KB.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "lowmem"], "readOnly": false, "type": "boolean"}, "services.tarsnap.archives.<name>.maxbw": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Abort archival if upstream bandwidth usage in bytes\nexceeds this threshold.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "maxbw"], "readOnly": false, "type": "null or signed integer"}, "services.tarsnap.archives.<name>.maxbwRateDown": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Download bandwidth rate limit in bytes.\n"}, "example": {"_type": "literalExpression", "text": "50 * 1000"}, "loc": ["services", "tarsnap", "archives", "<name>", "maxbwRateDown"], "readOnly": false, "type": "null or signed integer"}, "services.tarsnap.archives.<name>.maxbwRateUp": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Upload bandwidth rate limit in bytes.\n"}, "example": {"_type": "literalExpression", "text": "25 * 1000"}, "loc": ["services", "tarsnap", "archives", "<name>", "maxbwRateUp"], "readOnly": false, "type": "null or signed integer"}, "services.tarsnap.archives.<name>.nodump": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Exclude files with the `nodump` flag.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "nodump"], "readOnly": false, "type": "boolean"}, "services.tarsnap.archives.<name>.period": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "\"01:15\""}, "description": {"_type": "mdDoc", "text": "Create archive at this interval.\n\nThe format is described in\n{manpage}`systemd.time(7)`.\n"}, "example": {"_type": "literalExpression", "text": "\"hourly\""}, "loc": ["services", "tarsnap", "archives", "<name>", "period"], "readOnly": false, "type": "string"}, "services.tarsnap.archives.<name>.printStats": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Print global archive statistics upon completion.\nThe output is available via\n{command}`systemctl status tarsnap-archive-name`.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "printStats"], "readOnly": false, "type": "boolean"}, "services.tarsnap.archives.<name>.verbose": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to produce verbose logging output.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "verbose"], "readOnly": false, "type": "boolean"}, "services.tarsnap.archives.<name>.verylowmem": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Reduce memory consumption by a factor of 2 beyond what\n`lowmem` does, at the cost of significantly\nslowing down the archiving process.\n"}, "loc": ["services", "tarsnap", "archives", "<name>", "verylowmem"], "readOnly": false, "type": "boolean"}, "services.tarsnap.enable": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable periodic tarsnap backups."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tarsnap", "enable"], "readOnly": false, "type": "boolean"}, "services.tarsnap.keyfile": {"declarations": ["nixos/modules/services/backup/tarsnap.nix"], "default": {"_type": "literalExpression", "text": "\"/root/tarsnap.key\""}, "description": {"_type": "mdDoc", "text": "The keyfile which associates this machine with your tarsnap\naccount.\nCreate the keyfile with {command}`tarsnap-keygen`.\n\nNote that each individual archive (specified below) may also have its\nown individual keyfile specified. Tarsnap does not allow multiple\nconcurrent backups with the same cache directory and key (starting a\nnew backup will cause another one to fail). If you have multiple\narchives specified, you should either spread out your backups to be\nfar apart, or specify a separate key for each archive. By default\nevery archive defaults to using\n`\"/root/tarsnap.key\"`.\n\nIt's recommended for backups that you generate a key for every archive\nusing `tarsnap-keygen(1)`, and then generate a\nwrite-only tarsnap key using `tarsnap-keymgmt(1)`,\nand keep your master key(s) for a particular machine off-site.\n\nThe keyfile name should be given as a string and not a path, to\navoid the key being copied into the Nix store.\n"}, "loc": ["services", "tarsnap", "keyfile"], "readOnly": false, "type": "string"}, "services.taskserver.allowedClientIDs": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of regular expressions that are matched against the reported\nclient id (such as `task 2.3.0`).\n\nThe values `all` or `none` have\nspecial meaning. Overridden by any entry in the option\n{option}`services.taskserver.disallowedClientIDs`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"[Tt]ask [2-9]+\"\n]"}, "loc": ["services", "taskserver", "allowedClientIDs"], "readOnly": false, "type": "string or list of string"}, "services.taskserver.ciphers": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of GnuTLS ciphers to use. See the GnuTLS documentation about\npriority strings at <https://gnutls.org/manual/html_node/Priority-Strings.html> for full details.\n"}, "example": {"_type": "literalExpression", "text": "\"NORMAL:-VERS-SSL3.0\""}, "loc": ["services", "taskserver", "ciphers"], "readOnly": false, "type": "null or strings concatenated with \":\""}, "services.taskserver.config": {"declarations": ["nixos/modules/services/misc/taskserver"], "description": {"_type": "mdDoc", "text": "Configuration options to pass to Taskserver.\n\nThe options here are the same as described in\n{manpage}`taskdrc(5)`, but with one difference:\n\nThe `server` option is\n`server.listen` here, because the\n`server` option would collide with other options\nlike `server.cert` and we would run in a type error\n(attribute set versus string).\n\nNix types like integers or booleans are automatically converted to\nthe right values Taskserver would expect.\n"}, "example": {"_type": "literalExpression", "text": "{\n  client = {\n    cert = \"/tmp/debugging.cert\";\n  };\n}"}, "loc": ["services", "taskserver", "config"], "readOnly": false, "type": "attribute set"}, "services.taskserver.confirmation": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Determines whether certain commands are confirmed.\n"}, "loc": ["services", "taskserver", "confirmation"], "readOnly": false, "type": "boolean"}, "services.taskserver.dataDir": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "\"/var/lib/taskserver\""}, "description": {"_type": "mdDoc", "text": "Data directory for Taskserver."}, "loc": ["services", "taskserver", "dataDir"], "readOnly": false, "type": "path"}, "services.taskserver.debug": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Logs debugging information.\n"}, "loc": ["services", "taskserver", "debug"], "readOnly": false, "type": "boolean"}, "services.taskserver.disallowedClientIDs": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of regular expressions that are matched against the reported\nclient id (such as `task 2.3.0`).\n\nThe values `all` or `none` have\nspecial meaning. Any entry here overrides those in\n{option}`services.taskserver.allowedClientIDs`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"[Tt]ask [2-9]+\"\n]"}, "loc": ["services", "taskserver", "disallowedClientIDs"], "readOnly": false, "type": "string or list of string"}, "services.taskserver.enable": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Taskwarrior server.\n\nMore instructions about NixOS in conjunction with Taskserver can be\nfound [in the NixOS manual](https://nixos.org/manual/nixos/stable/index.html#module-services-taskserver).\n"}, "loc": ["services", "taskserver", "enable"], "readOnly": false, "type": "boolean"}, "services.taskserver.extensions": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Fully qualified path of the Taskserver extension scripts.\nCurrently there are none.\n"}, "loc": ["services", "taskserver", "extensions"], "readOnly": false, "type": "null or path"}, "services.taskserver.fqdn": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The fully qualified domain name of this server, which is also used\nas the common name in the certificates.\n"}, "loc": ["services", "taskserver", "fqdn"], "readOnly": false, "type": "string"}, "services.taskserver.group": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "\"taskd\""}, "description": {"_type": "mdDoc", "text": "Group for Taskserver."}, "loc": ["services", "taskserver", "group"], "readOnly": false, "type": "string"}, "services.taskserver.ipLog": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Logs the IP addresses of incoming requests.\n"}, "loc": ["services", "taskserver", "ipLog"], "readOnly": false, "type": "boolean"}, "services.taskserver.listenHost": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The address (IPv4, IPv6 or DNS) to listen on.\n"}, "example": {"_type": "literalExpression", "text": "\"::\""}, "loc": ["services", "taskserver", "listenHost"], "readOnly": false, "type": "string"}, "services.taskserver.listenPort": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "53589"}, "description": {"_type": "mdDoc", "text": "Port number of the Taskserver.\n"}, "loc": ["services", "taskserver", "listenPort"], "readOnly": false, "type": "signed integer"}, "services.taskserver.openFirewall": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the firewall for the specified Taskserver port.\n"}, "loc": ["services", "taskserver", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.taskserver.organisations": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "An attribute set where the keys name the organisation and the values\nare a set of lists of {option}`users` and\n{option}`groups`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  myShinyOrganisation = {\n    groups = [\n      \"staff\"\n      \"outsiders\"\n    ];\n    users = [\n      \"alice\"\n      \"bob\"\n    ];\n  };\n  yetAnotherOrganisation = {\n    users = [\n      \"foo\"\n      \"bar\"\n    ];\n  };\n}"}, "loc": ["services", "taskserver", "organisations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.taskserver.organisations.<name>.groups": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of group names that belong to the organization.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"workers\"\n  \"slackers\"\n]"}, "loc": ["services", "taskserver", "organisations", "<name>", "groups"], "readOnly": false, "type": "list of string"}, "services.taskserver.organisations.<name>.users": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of user names that belong to the organization.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"alice\"\n  \"bob\"\n]"}, "loc": ["services", "taskserver", "organisations", "<name>", "users"], "readOnly": false, "type": "list of string"}, "services.taskserver.pki.auto.bits": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "4096"}, "description": {"_type": "mdDoc", "text": "The bit size for generated keys.\n\n::: {.note}\nThis option is for the automatically handled CA and will be ignored if any\nof the {option}`services.taskserver.pki.manual.*` options are set.\n:::\n"}, "example": {"_type": "literalExpression", "text": "2048"}, "loc": ["services", "taskserver", "pki", "auto", "bits"], "readOnly": false, "type": "signed integer"}, "services.taskserver.pki.auto.expiration.ca": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The expiration time of the CA certificate in days or `null` for no\nexpiration time.\n\n\n::: {.note}\nThis option is for the automatically handled CA and will be ignored if any\nof the {option}`services.taskserver.pki.manual.*` options are set.\n:::\n"}, "example": {"_type": "literalExpression", "text": "365"}, "loc": ["services", "taskserver", "pki", "auto", "expiration", "ca"], "readOnly": false, "type": "null or signed integer"}, "services.taskserver.pki.auto.expiration.client": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The expiration time of client certificates in days or `null` for no\nexpiration time.\n\n\n::: {.note}\nThis option is for the automatically handled CA and will be ignored if any\nof the {option}`services.taskserver.pki.manual.*` options are set.\n:::\n"}, "example": {"_type": "literalExpression", "text": "365"}, "loc": ["services", "taskserver", "pki", "auto", "expiration", "client"], "readOnly": false, "type": "null or signed integer"}, "services.taskserver.pki.auto.expiration.crl": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The expiration time of the certificate revocation list (CRL) in days or `null` for no\nexpiration time.\n\n\n::: {.note}\nThis option is for the automatically handled CA and will be ignored if any\nof the {option}`services.taskserver.pki.manual.*` options are set.\n:::\n"}, "example": {"_type": "literalExpression", "text": "365"}, "loc": ["services", "taskserver", "pki", "auto", "expiration", "crl"], "readOnly": false, "type": "null or signed integer"}, "services.taskserver.pki.auto.expiration.server": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The expiration time of the server certificate in days or `null` for no\nexpiration time.\n\n\n::: {.note}\nThis option is for the automatically handled CA and will be ignored if any\nof the {option}`services.taskserver.pki.manual.*` options are set.\n:::\n"}, "example": {"_type": "literalExpression", "text": "365"}, "loc": ["services", "taskserver", "pki", "auto", "expiration", "server"], "readOnly": false, "type": "null or signed integer"}, "services.taskserver.pki.manual.ca.cert": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Fully qualified path to the CA certificate.\n\n\n::: {.note}\nSetting this option will prevent automatic CA creation and handling.\n:::\n"}, "loc": ["services", "taskserver", "pki", "manual", "ca", "cert"], "readOnly": false, "type": "null or path"}, "services.taskserver.pki.manual.server.cert": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Fully qualified path to the server certificate.\n\n\n::: {.note}\nSetting this option will prevent automatic CA creation and handling.\n:::\n"}, "loc": ["services", "taskserver", "pki", "manual", "server", "cert"], "readOnly": false, "type": "null or path"}, "services.taskserver.pki.manual.server.crl": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Fully qualified path to the server certificate revocation list.\n\n\n::: {.note}\nSetting this option will prevent automatic CA creation and handling.\n:::\n"}, "loc": ["services", "taskserver", "pki", "manual", "server", "crl"], "readOnly": false, "type": "null or path"}, "services.taskserver.pki.manual.server.key": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Fully qualified path to the server key.\n\n\n::: {.note}\nSetting this option will prevent automatic CA creation and handling.\n:::\n"}, "loc": ["services", "taskserver", "pki", "manual", "server", "key"], "readOnly": false, "type": "null or path"}, "services.taskserver.queueSize": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Size of the connection backlog, see {manpage}`listen(2)`.\n"}, "loc": ["services", "taskserver", "queueSize"], "readOnly": false, "type": "signed integer"}, "services.taskserver.requestLimit": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "1048576"}, "description": {"_type": "mdDoc", "text": "Size limit of incoming requests, in bytes.\n"}, "loc": ["services", "taskserver", "requestLimit"], "readOnly": false, "type": "signed integer"}, "services.taskserver.trust": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "\"strict\""}, "description": {"_type": "mdDoc", "text": "Determines how client certificates are validated.\n\nThe value `allow all` performs no client\ncertificate validation. This is not recommended. The value\n`strict` causes the client certificate to be\nvalidated against a CA.\n"}, "loc": ["services", "taskserver", "trust"], "readOnly": false, "type": "one of \"allow all\", \"strict\""}, "services.taskserver.user": {"declarations": ["nixos/modules/services/misc/taskserver"], "default": {"_type": "literalExpression", "text": "\"taskd\""}, "description": {"_type": "mdDoc", "text": "User for Taskserver."}, "loc": ["services", "taskserver", "user"], "readOnly": false, "type": "string"}, "services.tautulli.configFile": {"declarations": ["nixos/modules/services/misc/tautulli.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/plexpy/config.ini\""}, "description": {"_type": "mdDoc", "text": "The location of Tautulli's config file."}, "loc": ["services", "tautulli", "configFile"], "readOnly": false, "type": "string"}, "services.tautulli.dataDir": {"declarations": ["nixos/modules/services/misc/tautulli.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/plexpy\""}, "description": {"_type": "mdDoc", "text": "The directory where Tautulli stores its data files."}, "loc": ["services", "tautulli", "dataDir"], "readOnly": false, "type": "string"}, "services.tautulli.enable": {"declarations": ["nixos/modules/services/misc/tautulli.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Tautulli Plex Monitor."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tautulli", "enable"], "readOnly": false, "type": "boolean"}, "services.tautulli.group": {"declarations": ["nixos/modules/services/misc/tautulli.nix"], "default": {"_type": "literalExpression", "text": "\"nogroup\""}, "description": {"_type": "mdDoc", "text": "Group under which Tautulli runs."}, "loc": ["services", "tautulli", "group"], "readOnly": false, "type": "string"}, "services.tautulli.openFirewall": {"declarations": ["nixos/modules/services/misc/tautulli.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for Tautulli."}, "loc": ["services", "tautulli", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.tautulli.package": {"declarations": ["nixos/modules/services/misc/tautulli.nix"], "default": {"_type": "literalExpression", "text": "pkgs.tautulli"}, "description": {"_type": "mdDoc", "text": "The Tautulli package to use.\n"}, "loc": ["services", "tautulli", "package"], "readOnly": false, "type": "package"}, "services.tautulli.port": {"declarations": ["nixos/modules/services/misc/tautulli.nix"], "default": {"_type": "literalExpression", "text": "8181"}, "description": {"_type": "mdDoc", "text": "TCP port where Tautulli listens."}, "loc": ["services", "tautulli", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tautulli.user": {"declarations": ["nixos/modules/services/misc/tautulli.nix"], "default": {"_type": "literalExpression", "text": "\"plexpy\""}, "description": {"_type": "mdDoc", "text": "User account under which Tautulli runs."}, "loc": ["services", "tautulli", "user"], "readOnly": false, "type": "string"}, "services.tayga.dataDir": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/tayga\""}, "description": {"_type": "mdDoc", "text": "Directory for persistent data"}, "loc": ["services", "tayga", "dataDir"], "readOnly": false, "type": "path"}, "services.tayga.enable": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Tayga."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tayga", "enable"], "readOnly": false, "type": "boolean"}, "services.tayga.ipv4": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "description": {"_type": "mdDoc", "text": "IPv4-specific configuration."}, "example": {"_type": "literalExpression", "text": "{\n  address = \"192.0.2.0\";\n  router = {\n    address = \"192.0.2.1\";\n  };\n  pool = {\n    address = \"192.0.2.1\";\n    prefixLength = 24;\n  };\n}\n"}, "loc": ["services", "tayga", "ipv4"], "readOnly": false, "type": "submodule"}, "services.tayga.ipv4.address": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The source IPv4 address of the TAYGA server."}, "loc": ["services", "tayga", "ipv4", "address"], "readOnly": false, "type": "null or string"}, "services.tayga.ipv4.pool": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "description": {"_type": "mdDoc", "text": "The pool of IPv4 addresses which are used for translation."}, "loc": ["services", "tayga", "ipv4", "pool"], "readOnly": false, "type": "null or (submodule)"}, "services.tayga.ipv4.pool.address": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "description": {"_type": "mdDoc", "text": "IPv4 address."}, "loc": ["services", "tayga", "ipv4", "pool", "address"], "readOnly": false, "type": "string"}, "services.tayga.ipv4.pool.prefixLength": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "description": {"_type": "mdDoc", "text": "Subnet mask of the interface, specified as the number of\nbits in the prefix (\"24\").\n"}, "loc": ["services", "tayga", "ipv4", "pool", "prefixLength"], "readOnly": false, "type": "signed integer"}, "services.tayga.ipv4.router.address": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "description": {"_type": "mdDoc", "text": "The IPv4 address of the router."}, "loc": ["services", "tayga", "ipv4", "router", "address"], "readOnly": false, "type": "string"}, "services.tayga.ipv6": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "description": {"_type": "mdDoc", "text": "IPv6-specific configuration."}, "example": {"_type": "literalExpression", "text": "{\n  address = \"2001:db8::1\";\n  router = {\n    address = \"64:ff9b::1\";\n  };\n  pool = {\n    address = \"64:ff9b::\";\n    prefixLength = 96;\n  };\n}\n"}, "loc": ["services", "tayga", "ipv6"], "readOnly": false, "type": "submodule"}, "services.tayga.ipv6.address": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The source IPv6 address of the TAYGA server."}, "loc": ["services", "tayga", "ipv6", "address"], "readOnly": false, "type": "null or string"}, "services.tayga.ipv6.pool": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "description": {"_type": "mdDoc", "text": "The pool of IPv6 addresses which are used for translation."}, "loc": ["services", "tayga", "ipv6", "pool"], "readOnly": false, "type": "null or (submodule)"}, "services.tayga.ipv6.pool.address": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "description": {"_type": "mdDoc", "text": "IPv6 address."}, "loc": ["services", "tayga", "ipv6", "pool", "address"], "readOnly": false, "type": "string"}, "services.tayga.ipv6.pool.prefixLength": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "description": {"_type": "mdDoc", "text": "Subnet mask of the interface, specified as the number of\nbits in the prefix (\"64\").\n"}, "loc": ["services", "tayga", "ipv6", "pool", "prefixLength"], "readOnly": false, "type": "signed integer"}, "services.tayga.ipv6.router.address": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "description": {"_type": "mdDoc", "text": "The IPv6 address of the router."}, "loc": ["services", "tayga", "ipv6", "router", "address"], "readOnly": false, "type": "string"}, "services.tayga.package": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "default": {"_type": "literalMD", "text": "pkgs.tayga"}, "description": {"_type": "mdDoc", "text": "This option specifies the TAYGA package to use."}, "loc": ["services", "tayga", "package"], "readOnly": false, "type": "package"}, "services.tayga.tunDevice": {"declarations": ["nixos/modules/services/networking/tayga.nix"], "default": {"_type": "literalExpression", "text": "\"nat64\""}, "description": {"_type": "mdDoc", "text": "Name of the nat64 tun device"}, "loc": ["services", "tayga", "tunDevice"], "readOnly": false, "type": "string"}, "services.tcsd.conformanceCred": {"declarations": ["nixos/modules/services/hardware/tcsd.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.tcsd.stateDir}/conformance.cert\""}, "description": {"_type": "mdDoc", "text": "Path to the conformance credential for your TPM.\nSee also the platformCred option"}, "loc": ["services", "tcsd", "conformanceCred"], "readOnly": false, "type": "path"}, "services.tcsd.enable": {"declarations": ["nixos/modules/services/hardware/tcsd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable tcsd, a Trusted Computing management service\nthat provides TCG Software Stack (TSS).  The tcsd daemon is\nthe only portal to the Trusted Platform Module (TPM), a hardware\nchip on the motherboard.\n"}, "loc": ["services", "tcsd", "enable"], "readOnly": false, "type": "boolean"}, "services.tcsd.endorsementCred": {"declarations": ["nixos/modules/services/hardware/tcsd.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.tcsd.stateDir}/endorsement.cert\""}, "description": {"_type": "mdDoc", "text": "Path to the endorsement credential for your TPM.\nSee also the platformCred option"}, "loc": ["services", "tcsd", "endorsementCred"], "readOnly": false, "type": "path"}, "services.tcsd.firmwarePCRs": {"declarations": ["nixos/modules/services/hardware/tcsd.nix"], "default": {"_type": "literalExpression", "text": "\"0,1,2,3,4,5,6,7\""}, "description": {"_type": "mdDoc", "text": "PCR indices used in the TPM for firmware measurements."}, "loc": ["services", "tcsd", "firmwarePCRs"], "readOnly": false, "type": "string"}, "services.tcsd.group": {"declarations": ["nixos/modules/services/hardware/tcsd.nix"], "default": {"_type": "literalExpression", "text": "\"tss\""}, "description": {"_type": "mdDoc", "text": "Group account under which tcsd runs."}, "loc": ["services", "tcsd", "group"], "readOnly": false, "type": "string"}, "services.tcsd.kernelPCRs": {"declarations": ["nixos/modules/services/hardware/tcsd.nix"], "default": {"_type": "literalExpression", "text": "\"8,9,10,11,12\""}, "description": {"_type": "mdDoc", "text": "PCR indices used in the TPM for kernel measurements."}, "loc": ["services", "tcsd", "kernelPCRs"], "readOnly": false, "type": "string"}, "services.tcsd.platformCred": {"declarations": ["nixos/modules/services/hardware/tcsd.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.tcsd.stateDir}/platform.cert\""}, "description": {"_type": "mdDoc", "text": "Path to the platform credential for your TPM. Your TPM\nmanufacturer may have provided you with a set of credentials\n(certificates) that should be used when creating identities\nusing your TPM. When a user of your TPM makes an identity,\nthis credential will be encrypted as part of that process.\nSee the 1.1b TPM Main specification section 9.3 for information\non this process. "}, "loc": ["services", "tcsd", "platformCred"], "readOnly": false, "type": "path"}, "services.tcsd.stateDir": {"declarations": ["nixos/modules/services/hardware/tcsd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/tpm\""}, "description": {"_type": "mdDoc", "text": "The location of the system persistent storage file.\nThe system persistent storage file holds keys and data across\nrestarts of the TCSD and system reboots.\n"}, "loc": ["services", "tcsd", "stateDir"], "readOnly": false, "type": "path"}, "services.tcsd.user": {"declarations": ["nixos/modules/services/hardware/tcsd.nix"], "default": {"_type": "literalExpression", "text": "\"tss\""}, "description": {"_type": "mdDoc", "text": "User account under which tcsd runs."}, "loc": ["services", "tcsd", "user"], "readOnly": false, "type": "string"}, "services.teamspeak3.dataDir": {"declarations": ["nixos/modules/services/networking/teamspeak3.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/teamspeak3-server\""}, "description": {"_type": "mdDoc", "text": "Directory to store TS3 database and other state/data files.\n"}, "loc": ["services", "teamspeak3", "dataDir"], "readOnly": false, "type": "path"}, "services.teamspeak3.defaultVoicePort": {"declarations": ["nixos/modules/services/networking/teamspeak3.nix"], "default": {"_type": "literalExpression", "text": "9987"}, "description": {"_type": "mdDoc", "text": "Default UDP port for clients to connect to virtual servers - used for first virtual server, subsequent ones will open on incrementing port numbers by default.\n"}, "loc": ["services", "teamspeak3", "defaultVoicePort"], "readOnly": false, "type": "signed integer"}, "services.teamspeak3.enable": {"declarations": ["nixos/modules/services/networking/teamspeak3.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the Teamspeak3 voice communication server daemon.\n"}, "loc": ["services", "teamspeak3", "enable"], "readOnly": false, "type": "boolean"}, "services.teamspeak3.fileTransferIP": {"declarations": ["nixos/modules/services/networking/teamspeak3.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IP on which the server instance will listen for incoming file transfer connections. Defaults to any IP.\n"}, "example": {"_type": "literalExpression", "text": "\"[::]\""}, "loc": ["services", "teamspeak3", "fileTransferIP"], "readOnly": false, "type": "null or string"}, "services.teamspeak3.fileTransferPort": {"declarations": ["nixos/modules/services/networking/teamspeak3.nix"], "default": {"_type": "literalExpression", "text": "30033"}, "description": {"_type": "mdDoc", "text": "TCP port opened for file transfers.\n"}, "loc": ["services", "teamspeak3", "fileTransferPort"], "readOnly": false, "type": "signed integer"}, "services.teamspeak3.logPath": {"declarations": ["nixos/modules/services/networking/teamspeak3.nix"], "default": {"_type": "literalExpression", "text": "\"/var/log/teamspeak3-server/\""}, "description": {"_type": "mdDoc", "text": "Directory to store log files in.\n"}, "loc": ["services", "teamspeak3", "logPath"], "readOnly": false, "type": "path"}, "services.teamspeak3.openFirewall": {"declarations": ["nixos/modules/services/networking/teamspeak3.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the TeamSpeak3 server."}, "loc": ["services", "teamspeak3", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.teamspeak3.openFirewallServerQuery": {"declarations": ["nixos/modules/services/networking/teamspeak3.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the TeamSpeak3 serverquery (administration) system. Requires openFirewall."}, "loc": ["services", "teamspeak3", "openFirewallServerQuery"], "readOnly": false, "type": "boolean"}, "services.teamspeak3.queryIP": {"declarations": ["nixos/modules/services/networking/teamspeak3.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IP on which the server instance will listen for incoming ServerQuery connections. Defaults to any IP.\n"}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "teamspeak3", "queryIP"], "readOnly": false, "type": "null or string"}, "services.teamspeak3.queryPort": {"declarations": ["nixos/modules/services/networking/teamspeak3.nix"], "default": {"_type": "literalExpression", "text": "10011"}, "description": {"_type": "mdDoc", "text": "TCP port opened for ServerQuery connections.\n"}, "loc": ["services", "teamspeak3", "queryPort"], "readOnly": false, "type": "signed integer"}, "services.teamspeak3.voiceIP": {"declarations": ["nixos/modules/services/networking/teamspeak3.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IP on which the server instance will listen for incoming voice connections. Defaults to any IP.\n"}, "example": {"_type": "literalExpression", "text": "\"[::]\""}, "loc": ["services", "teamspeak3", "voiceIP"], "readOnly": false, "type": "null or string"}, "services.teamviewer.enable": {"declarations": ["nixos/modules/services/monitoring/teamviewer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable TeamViewer daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "teamviewer", "enable"], "readOnly": false, "type": "boolean"}, "services.tedicross.config": {"declarations": ["nixos/modules/services/networking/tedicross.nix"], "description": {"_type": "mdDoc", "text": "{file}`settings.yaml` configuration as a Nix attribute set.\nSecret tokens should be specified using {option}`environmentFile`\ninstead of this world-readable file.\n"}, "example": {"_type": "literalExpression", "text": "{\n  telegram = {\n    useFirstNameInsteadOfUsername = false;\n    colonAfterSenderName = false;\n    skipOldMessages = true;\n    sendEmojiWithStickers = true;\n  };\n  discord = {\n    useNickname = false;\n    skipOldMessages = true;\n    displayTelegramReplies = \"embed\";\n    replyLength = 100;\n  };\n  bridges = [\n    {\n      name = \"Default bridge\";\n      direction = \"both\";\n      telegram = {\n        chatId = -123456789;\n        relayJoinMessages = true;\n        relayLeaveMessages = true;\n        sendUsernames = true;\n        ignoreCommands = true;\n      };\n      discord = {\n        serverId = \"DISCORD_SERVER_ID\";\n        channelId = \"DISCORD_CHANNEL_ID\";\n        relayJoinMessages = true;\n        relayLeaveMessages = true;\n        sendUsernames = true;\n        crossDeleteOnTelegram = true;\n      };\n    }\n  ];\n\n  debug = false;\n}\n"}, "loc": ["services", "tedicross", "config"], "readOnly": false, "type": "attribute set"}, "services.tedicross.enable": {"declarations": ["nixos/modules/services/networking/tedicross.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the TediCross Telegram-Discord bridge service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tedicross", "enable"], "readOnly": false, "type": "boolean"}, "services.tedicross.environmentFile": {"declarations": ["nixos/modules/services/networking/tedicross.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing environment variables to be passed to the TediCross service,\nin which secret tokens can be specified securely using the\n`TELEGRAM_BOT_TOKEN` and `DISCORD_BOT_TOKEN`\nkeys.\n"}, "loc": ["services", "tedicross", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.teeworlds.enable": {"declarations": ["nixos/modules/services/games/teeworlds.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Teeworlds Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "teeworlds", "enable"], "readOnly": false, "type": "boolean"}, "services.teeworlds.extraOptions": {"declarations": ["nixos/modules/services/games/teeworlds.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra configuration lines for the {file}`teeworlds.cfg`. See [Teeworlds Documentation](https://www.teeworlds.com/?page=docs&wiki=server_settings).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"sv_map dm1\"\n  \"sv_gametype dm\"\n]"}, "loc": ["services", "teeworlds", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.teeworlds.motd": {"declarations": ["nixos/modules/services/games/teeworlds.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the server message of the day text.\n"}, "loc": ["services", "teeworlds", "motd"], "readOnly": false, "type": "null or string"}, "services.teeworlds.name": {"declarations": ["nixos/modules/services/games/teeworlds.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the server. Defaults to 'unnamed server'.\n"}, "loc": ["services", "teeworlds", "name"], "readOnly": false, "type": "null or string"}, "services.teeworlds.openPorts": {"declarations": ["nixos/modules/services/games/teeworlds.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open firewall ports for Teeworlds"}, "loc": ["services", "teeworlds", "openPorts"], "readOnly": false, "type": "boolean"}, "services.teeworlds.password": {"declarations": ["nixos/modules/services/games/teeworlds.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password to connect to the server.\n"}, "loc": ["services", "teeworlds", "password"], "readOnly": false, "type": "null or string"}, "services.teeworlds.port": {"declarations": ["nixos/modules/services/games/teeworlds.nix"], "default": {"_type": "literalExpression", "text": "8303"}, "description": {"_type": "mdDoc", "text": "Port the server will listen on.\n"}, "loc": ["services", "teeworlds", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.teeworlds.rconPassword": {"declarations": ["nixos/modules/services/games/teeworlds.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Password to access the remote console. If not set, a randomly generated one is displayed in the server log.\n"}, "loc": ["services", "teeworlds", "rconPassword"], "readOnly": false, "type": "null or string"}, "services.teeworlds.register": {"declarations": ["nixos/modules/services/games/teeworlds.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the server registers as public server in the global server list. This is disabled by default because of privacy.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "teeworlds", "register"], "readOnly": false, "type": "boolean"}, "services.telegraf.enable": {"declarations": ["nixos/modules/services/monitoring/telegraf.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable telegraf server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "telegraf", "enable"], "readOnly": false, "type": "boolean"}, "services.telegraf.environmentFiles": {"declarations": ["nixos/modules/services/monitoring/telegraf.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "File to load as environment file. Environment variables from this file\nwill be interpolated into the config file using envsubst with this\nsyntax: `$ENVIRONMENT` or `${VARIABLE}`.\nThis is useful to avoid putting secrets into the nix store.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/run/keys/telegraf.env\"\n]"}, "loc": ["services", "telegraf", "environmentFiles"], "readOnly": false, "type": "list of path"}, "services.telegraf.extraConfig": {"declarations": ["nixos/modules/services/monitoring/telegraf.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration options for telegraf"}, "example": {"_type": "literalExpression", "text": "{\n  inputs = {\n    statsd = {\n      delete_timings = true;\n      service_address = \":8125\";\n    };\n  };\n  outputs = {\n    influxdb = {\n      database = \"telegraf\";\n      urls = [\n        \"http://localhost:8086\"\n      ];\n    };\n  };\n}"}, "loc": ["services", "telegraf", "extraConfig"], "readOnly": false, "type": "TOML value"}, "services.telegraf.package": {"declarations": ["nixos/modules/services/monitoring/telegraf.nix"], "default": {"_type": "literalExpression", "text": "pkgs.telegraf"}, "description": {"_type": "mdDoc", "text": "Which telegraf derivation to use"}, "loc": ["services", "telegraf", "package"], "readOnly": false, "type": "package"}, "services.telepathy.enable": {"declarations": ["nixos/modules/services/desktops/telepathy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Telepathy service, a communications framework\nthat enables real-time communication via pluggable protocol backends.\n"}, "loc": ["services", "telepathy", "enable"], "readOnly": false, "type": "boolean"}, "services.teleport.diag.addr": {"declarations": ["nixos/modules/services/networking/teleport.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Metrics and diagnostics address."}, "loc": ["services", "teleport", "diag", "addr"], "readOnly": false, "type": "string"}, "services.teleport.diag.enable": {"declarations": ["nixos/modules/services/networking/teleport.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable endpoints for monitoring purposes.\n\nSee <https://goteleport.com/docs/setup/admin/troubleshooting/#troubleshooting/>\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "teleport", "diag", "enable"], "readOnly": false, "type": "boolean"}, "services.teleport.diag.port": {"declarations": ["nixos/modules/services/networking/teleport.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Metrics and diagnostics port."}, "loc": ["services", "teleport", "diag", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.teleport.enable": {"declarations": ["nixos/modules/services/networking/teleport.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Teleport service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "teleport", "enable"], "readOnly": false, "type": "boolean"}, "services.teleport.insecure.enable": {"declarations": ["nixos/modules/services/networking/teleport.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable starting teleport in insecure mode.\n\nThis is dangerous!\nSensitive information will be logged to console and certificates will not be verified.\nProceed with caution!\n\nTeleport starts with disabled certificate validation on Proxy Service, validation still occurs on Auth Service\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "teleport", "insecure", "enable"], "readOnly": false, "type": "boolean"}, "services.teleport.package": {"declarations": ["nixos/modules/services/networking/teleport.nix"], "default": {"_type": "literalMD", "text": "pkgs.teleport"}, "description": {"_type": "mdDoc", "text": "The teleport package to use"}, "example": {"_type": "literalMD", "text": "pkgs.teleport_11"}, "loc": ["services", "teleport", "package"], "readOnly": false, "type": "package"}, "services.teleport.settings": {"declarations": ["nixos/modules/services/networking/teleport.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Contents of the `teleport.yaml` config file.\nThe `--config` arguments will only be passed if this set is not empty.\n\nSee <https://goteleport.com/docs/setup/reference/config/>.\n"}, "example": {"_type": "literalExpression", "text": "{\n  teleport = {\n    nodename = \"client\";\n    advertise_ip = \"192.168.1.2\";\n    auth_token = \"60bdc117-8ff4-478d-95e4-9914597847eb\";\n    auth_servers = [ \"192.168.1.1:3025\" ];\n    log.severity = \"DEBUG\";\n  };\n  ssh_service = {\n    enabled = true;\n    labels = {\n      role = \"client\";\n    };\n  };\n  proxy_service.enabled = false;\n  auth_service.enabled = false;\n}\n"}, "loc": ["services", "teleport", "settings"], "readOnly": false, "type": "YAML value"}, "services.tempo.configFile": {"declarations": ["nixos/modules/services/tracing/tempo.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify a path to a configuration file that Tempo should use.\n"}, "loc": ["services", "tempo", "configFile"], "readOnly": false, "type": "null or path"}, "services.tempo.enable": {"declarations": ["nixos/modules/services/tracing/tempo.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Grafana Tempo."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tempo", "enable"], "readOnly": false, "type": "boolean"}, "services.tempo.settings": {"declarations": ["nixos/modules/services/tracing/tempo.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specify the configuration for Tempo in Nix.\n\nSee https://grafana.com/docs/tempo/latest/configuration/ for available options.\n"}, "loc": ["services", "tempo", "settings"], "readOnly": false, "type": "YAML value"}, "services.terraria.autoCreatedWorldSize": {"declarations": ["nixos/modules/services/games/terraria.nix"], "default": {"_type": "literalExpression", "text": "\"medium\""}, "description": {"_type": "mdDoc", "text": "Specifies the size of the auto-created world if `worldPath` does not\npoint to an existing world.\n"}, "loc": ["services", "terraria", "autoCreatedWorldSize"], "readOnly": false, "type": "one of \"small\", \"medium\", \"large\""}, "services.terraria.banListPath": {"declarations": ["nixos/modules/services/games/terraria.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the ban list.\n"}, "loc": ["services", "terraria", "banListPath"], "readOnly": false, "type": "null or path"}, "services.terraria.dataDir": {"declarations": ["nixos/modules/services/games/terraria.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/terraria\""}, "description": {"_type": "mdDoc", "text": "Path to variable state data directory for terraria."}, "example": {"_type": "literalExpression", "text": "\"/srv/terraria\""}, "loc": ["services", "terraria", "dataDir"], "readOnly": false, "type": "string"}, "services.terraria.enable": {"declarations": ["nixos/modules/services/games/terraria.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, starts a Terraria server. The server can be connected to via `tmux -S ${config.services.terraria.dataDir}/terraria.sock attach`\nfor administration by users who are a part of the `terraria` group (use `C-b d` shortcut to detach again).\n"}, "loc": ["services", "terraria", "enable"], "readOnly": false, "type": "boolean"}, "services.terraria.maxPlayers": {"declarations": ["nixos/modules/services/games/terraria.nix"], "default": {"_type": "literalExpression", "text": "255"}, "description": {"_type": "mdDoc", "text": "Sets the max number of players (between 1 and 255).\n"}, "loc": ["services", "terraria", "maxPlayers"], "readOnly": false, "type": "8 bit unsigned integer; between 0 and 255 (both inclusive)"}, "services.terraria.messageOfTheDay": {"declarations": ["nixos/modules/services/games/terraria.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the server message of the day text.\n"}, "loc": ["services", "terraria", "messageOfTheDay"], "readOnly": false, "type": "null or string"}, "services.terraria.noUPnP": {"declarations": ["nixos/modules/services/games/terraria.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disables automatic Universal Plug and Play."}, "loc": ["services", "terraria", "noUPnP"], "readOnly": false, "type": "boolean"}, "services.terraria.openFirewall": {"declarations": ["nixos/modules/services/games/terraria.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open ports in the firewall"}, "loc": ["services", "terraria", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.terraria.password": {"declarations": ["nixos/modules/services/games/terraria.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the server password. Leave `null` for no password.\n"}, "loc": ["services", "terraria", "password"], "readOnly": false, "type": "null or string"}, "services.terraria.port": {"declarations": ["nixos/modules/services/games/terraria.nix"], "default": {"_type": "literalExpression", "text": "7777"}, "description": {"_type": "mdDoc", "text": "Specifies the port to listen on.\n"}, "loc": ["services", "terraria", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.terraria.secure": {"declarations": ["nixos/modules/services/games/terraria.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Adds additional cheat protection to the server."}, "loc": ["services", "terraria", "secure"], "readOnly": false, "type": "boolean"}, "services.terraria.worldPath": {"declarations": ["nixos/modules/services/games/terraria.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the world file (`.wld`) which should be loaded.\nIf no world exists at this path, one will be created with the size\nspecified by `autoCreatedWorldSize`.\n"}, "loc": ["services", "terraria", "worldPath"], "readOnly": false, "type": "null or path"}, "services.tetrd.enable": {"declarations": ["nixos/modules/services/networking/tetrd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable tetrd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tetrd", "enable"], "readOnly": false, "type": "boolean"}, "services.tftpd.enable": {"declarations": ["nixos/modules/services/networking/tftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable tftpd, a Trivial File Transfer Protocol server.\nThe server will be run as an xinetd service.\n"}, "loc": ["services", "tftpd", "enable"], "readOnly": false, "type": "boolean"}, "services.tftpd.path": {"declarations": ["nixos/modules/services/networking/tftpd.nix"], "default": {"_type": "literalExpression", "text": "\"/srv/tftp\""}, "description": {"_type": "mdDoc", "text": "Where the tftp server files are stored.\n"}, "loc": ["services", "tftpd", "path"], "readOnly": false, "type": "path"}, "services.thanos.compact.arguments": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalMD", "text": "calculated from `config.services.thanos.compact`\n"}, "description": {"_type": "mdDoc", "text": "Arguments to the `thanos compact` command.\n\nDefaults to a list of arguments formed by converting the structured\noptions of {option}`services.thanos.compact` to a list of arguments.\n\nOverriding this option will cause none of the structured options to have\nany effect. So only set this if you know what you're doing!\n"}, "loc": ["services", "thanos", "compact", "arguments"], "readOnly": false, "type": "list of string"}, "services.thanos.compact.block-sync-concurrency": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of goroutines to use when syncing block metadata from object storage.\n\nDefaults to `20` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "compact", "block-sync-concurrency"], "readOnly": false, "type": "null or signed integer"}, "services.thanos.compact.compact.concurrency": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of goroutines to use when compacting groups.\n\nDefaults to `1` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "compact", "compact", "concurrency"], "readOnly": false, "type": "null or signed integer"}, "services.thanos.compact.consistency-delay": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Minimum age of fresh (non-compacted) blocks before they are being\nprocessed. Malformed blocks older than the maximum of consistency-delay\nand 30m0s will be removed.\n\nDefaults to `30m` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "compact", "consistency-delay"], "readOnly": false, "type": "null or string"}, "services.thanos.compact.downsampling.disable": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disables downsampling.\n\nThis is not recommended as querying long time ranges without\nnon-downsampled data is not efficient and useful e.g it is not possible\nto render all samples for a human eye anyway\n"}, "loc": ["services", "thanos", "compact", "downsampling", "disable"], "readOnly": false, "type": "boolean"}, "services.thanos.compact.enable": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Thanos compactor which continuously compacts blocks in an object store bucket."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "thanos", "compact", "enable"], "readOnly": false, "type": "boolean"}, "services.thanos.compact.http-address": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Listen `host:port` for HTTP endpoints.\n\nDefaults to `0.0.0.0:10902` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "compact", "http-address"], "readOnly": false, "type": "null or string"}, "services.thanos.compact.log.format": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log format to use.\n"}, "loc": ["services", "thanos", "compact", "log", "format"], "readOnly": false, "type": "null or string"}, "services.thanos.compact.log.level": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log filtering level.\n\nDefaults to `info` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "compact", "log", "level"], "readOnly": false, "type": "null or one of \"debug\", \"info\", \"warn\", \"error\", \"fatal\""}, "services.thanos.compact.objstore.config": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Object store configuration.\n\nWhen not `null` the attribute set gets converted to\na YAML file and stored in the Nix store. The option\n{option}`objstore.config-file` will default to its path.\n\nIf {option}`objstore.config-file` is set this option has no effect.\n\nSee format details: <https://thanos.io/storage.md/#configuration>\n"}, "loc": ["services", "thanos", "compact", "objstore", "config"], "readOnly": false, "type": "null or (attribute set)"}, "services.thanos.compact.objstore.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "if config.services.thanos.<cmd>.objstore.config == null then null\nelse toString (toYAML \"objstore.yaml\" config.services.thanos.<cmd>.objstore.config);\n"}, "description": {"_type": "mdDoc", "text": "Path to YAML file that contains object store configuration.\n\nSee format details: <https://thanos.io/storage.md/#configuration>\n"}, "loc": ["services", "thanos", "compact", "objstore", "config-file"], "readOnly": false, "type": "null or string"}, "services.thanos.compact.retention.resolution-1h": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How long to retain samples of resolution 2 (1 hour) in bucket.\n\n`0d` - disables this retention\n\nDefaults to `0d` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "compact", "retention", "resolution-1h"], "readOnly": false, "type": "null or string"}, "services.thanos.compact.retention.resolution-5m": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How long to retain samples of resolution 1 (5 minutes) in bucket.\n\n`0d` - disables this retention\n\nDefaults to `0d` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "compact", "retention", "resolution-5m"], "readOnly": false, "type": "null or string"}, "services.thanos.compact.retention.resolution-raw": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How long to retain raw samples in bucket.\n\n`0d` - disables this retention\n\nDefaults to `0d` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "compact", "retention", "resolution-raw"], "readOnly": false, "type": "null or string"}, "services.thanos.compact.startAt": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "When this option is set to a `systemd.time`\nspecification the Thanos compactor will run at the specified period.\n\nWhen this option is `null` the Thanos compactor service\nwill run continuously. So it will not exit after all compactions have\nbeen processed but wait for new work.\n"}, "loc": ["services", "thanos", "compact", "startAt"], "readOnly": false, "type": "null or string"}, "services.thanos.compact.stateDir": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "\"thanos-compact\""}, "description": {"_type": "mdDoc", "text": "Data directory relative to `/var/lib`\nin which to cache blocks and process compactions.\n"}, "loc": ["services", "thanos", "compact", "stateDir"], "readOnly": false, "type": "string"}, "services.thanos.compact.tracing.config": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Tracing configuration.\n\nWhen not `null` the attribute set gets converted to\na YAML file and stored in the Nix store. The option\n{option}`tracing.config-file` will default to its path.\n\nIf {option}`tracing.config-file` is set this option has no effect.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "compact", "tracing", "config"], "readOnly": false, "type": "null or (attribute set)"}, "services.thanos.compact.tracing.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "if config.services.thanos.<cmd>.tracing.config == null then null\nelse toString (toYAML \"tracing.yaml\" config.services.thanos.<cmd>.tracing.config);\n"}, "description": {"_type": "mdDoc", "text": "Path to YAML file that contains tracing configuration.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "compact", "tracing", "config-file"], "readOnly": false, "type": "null or string"}, "services.thanos.downsample.arguments": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalMD", "text": "calculated from `config.services.thanos.downsample`\n"}, "description": {"_type": "mdDoc", "text": "Arguments to the `thanos downsample` command.\n\nDefaults to a list of arguments formed by converting the structured\noptions of {option}`services.thanos.downsample` to a list of arguments.\n\nOverriding this option will cause none of the structured options to have\nany effect. So only set this if you know what you're doing!\n"}, "loc": ["services", "thanos", "downsample", "arguments"], "readOnly": false, "type": "list of string"}, "services.thanos.downsample.enable": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Thanos downsampler which continuously downsamples blocks in an object store bucket."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "thanos", "downsample", "enable"], "readOnly": false, "type": "boolean"}, "services.thanos.downsample.log.format": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log format to use.\n"}, "loc": ["services", "thanos", "downsample", "log", "format"], "readOnly": false, "type": "null or string"}, "services.thanos.downsample.log.level": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log filtering level.\n\nDefaults to `info` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "downsample", "log", "level"], "readOnly": false, "type": "null or one of \"debug\", \"info\", \"warn\", \"error\", \"fatal\""}, "services.thanos.downsample.objstore.config": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Object store configuration.\n\nWhen not `null` the attribute set gets converted to\na YAML file and stored in the Nix store. The option\n{option}`objstore.config-file` will default to its path.\n\nIf {option}`objstore.config-file` is set this option has no effect.\n\nSee format details: <https://thanos.io/storage.md/#configuration>\n"}, "loc": ["services", "thanos", "downsample", "objstore", "config"], "readOnly": false, "type": "null or (attribute set)"}, "services.thanos.downsample.objstore.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "if config.services.thanos.<cmd>.objstore.config == null then null\nelse toString (toYAML \"objstore.yaml\" config.services.thanos.<cmd>.objstore.config);\n"}, "description": {"_type": "mdDoc", "text": "Path to YAML file that contains object store configuration.\n\nSee format details: <https://thanos.io/storage.md/#configuration>\n"}, "loc": ["services", "thanos", "downsample", "objstore", "config-file"], "readOnly": false, "type": "null or string"}, "services.thanos.downsample.stateDir": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "\"thanos-downsample\""}, "description": {"_type": "mdDoc", "text": "Data directory relative to `/var/lib`\nin which to cache blocks and process downsamplings.\n"}, "loc": ["services", "thanos", "downsample", "stateDir"], "readOnly": false, "type": "string"}, "services.thanos.downsample.tracing.config": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Tracing configuration.\n\nWhen not `null` the attribute set gets converted to\na YAML file and stored in the Nix store. The option\n{option}`tracing.config-file` will default to its path.\n\nIf {option}`tracing.config-file` is set this option has no effect.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "downsample", "tracing", "config"], "readOnly": false, "type": "null or (attribute set)"}, "services.thanos.downsample.tracing.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "if config.services.thanos.<cmd>.tracing.config == null then null\nelse toString (toYAML \"tracing.yaml\" config.services.thanos.<cmd>.tracing.config);\n"}, "description": {"_type": "mdDoc", "text": "Path to YAML file that contains tracing configuration.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "downsample", "tracing", "config-file"], "readOnly": false, "type": "null or string"}, "services.thanos.package": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "pkgs.thanos"}, "description": {"_type": "mdDoc", "text": "The thanos package that should be used.\n"}, "loc": ["services", "thanos", "package"], "readOnly": false, "type": "package"}, "services.thanos.query.arguments": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalMD", "text": "calculated from `config.services.thanos.query`\n"}, "description": {"_type": "mdDoc", "text": "Arguments to the `thanos query` command.\n\nDefaults to a list of arguments formed by converting the structured\noptions of {option}`services.thanos.query` to a list of arguments.\n\nOverriding this option will cause none of the structured options to have\nany effect. So only set this if you know what you're doing!\n"}, "loc": ["services", "thanos", "query", "arguments"], "readOnly": false, "type": "list of string"}, "services.thanos.query.enable": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Thanos query node exposing PromQL enabled Query API with data retrieved from multiple store nodes."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "thanos", "query", "enable"], "readOnly": false, "type": "boolean"}, "services.thanos.query.grpc-address": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Listen `ip:port` address for gRPC endpoints (StoreAPI).\n\nMake sure this address is routable from other components.\n\nDefaults to `0.0.0.0:10901` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "query", "grpc-address"], "readOnly": false, "type": "null or string"}, "services.thanos.query.grpc-client-server-name": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Server name to verify the hostname on the returned gRPC certificates.\nSee <https://tools.ietf.org/html/rfc4366#section-3.1>\n"}, "loc": ["services", "thanos", "query", "grpc-client-server-name"], "readOnly": false, "type": "null or string"}, "services.thanos.query.grpc-client-tls-ca": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS CA Certificates to use to verify gRPC servers\n"}, "loc": ["services", "thanos", "query", "grpc-client-tls-ca"], "readOnly": false, "type": "null or string"}, "services.thanos.query.grpc-client-tls-cert": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS Certificates to use to identify this client to the server\n"}, "loc": ["services", "thanos", "query", "grpc-client-tls-cert"], "readOnly": false, "type": "null or string"}, "services.thanos.query.grpc-client-tls-key": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS Key for the client's certificate\n"}, "loc": ["services", "thanos", "query", "grpc-client-tls-key"], "readOnly": false, "type": "null or string"}, "services.thanos.query.grpc-client-tls-secure": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use TLS when talking to the gRPC server\n"}, "loc": ["services", "thanos", "query", "grpc-client-tls-secure"], "readOnly": false, "type": "boolean"}, "services.thanos.query.grpc-server-tls-cert": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS Certificate for gRPC server, leave blank to disable TLS\n"}, "loc": ["services", "thanos", "query", "grpc-server-tls-cert"], "readOnly": false, "type": "null or string"}, "services.thanos.query.grpc-server-tls-client-ca": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS CA to verify clients against.\n\nIf no client CA is specified, there is no client verification on server side.\n(tls.NoClientCert)\n"}, "loc": ["services", "thanos", "query", "grpc-server-tls-client-ca"], "readOnly": false, "type": "null or string"}, "services.thanos.query.grpc-server-tls-key": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS Key for the gRPC server, leave blank to disable TLS\n"}, "loc": ["services", "thanos", "query", "grpc-server-tls-key"], "readOnly": false, "type": "null or string"}, "services.thanos.query.http-address": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Listen `host:port` for HTTP endpoints.\n\nDefaults to `0.0.0.0:10902` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "query", "http-address"], "readOnly": false, "type": "null or string"}, "services.thanos.query.log.format": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log format to use.\n"}, "loc": ["services", "thanos", "query", "log", "format"], "readOnly": false, "type": "null or string"}, "services.thanos.query.log.level": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log filtering level.\n\nDefaults to `info` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "query", "log", "level"], "readOnly": false, "type": "null or one of \"debug\", \"info\", \"warn\", \"error\", \"fatal\""}, "services.thanos.query.query.auto-downsampling": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable automatic adjustment (step / 5) to what source of data should\nbe used in store gateways if no\n`max_source_resolution` param is specified.\n"}, "loc": ["services", "thanos", "query", "query", "auto-downsampling"], "readOnly": false, "type": "boolean"}, "services.thanos.query.query.default-evaluation-interval": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set default evaluation interval for sub queries.\n\nDefaults to `1m` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "query", "query", "default-evaluation-interval"], "readOnly": false, "type": "null or string"}, "services.thanos.query.query.max-concurrent": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum number of queries processed concurrently by query node.\n\nDefaults to `20` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "query", "query", "max-concurrent"], "readOnly": false, "type": "null or signed integer"}, "services.thanos.query.query.partial-response": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable partial response for queries if no\n`partial_response` param is specified.\n"}, "loc": ["services", "thanos", "query", "query", "partial-response"], "readOnly": false, "type": "boolean"}, "services.thanos.query.query.replica-label": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Label to treat as a replica indicator along which data is\ndeduplicated.\n\nStill you will be able to query without deduplication using\n`dedup=false` parameter.\n"}, "loc": ["services", "thanos", "query", "query", "replica-label"], "readOnly": false, "type": "null or string"}, "services.thanos.query.query.timeout": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum time to process query by query node.\n\nDefaults to `2m` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "query", "query", "timeout"], "readOnly": false, "type": "null or string"}, "services.thanos.query.selector-labels": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Query selector labels that will be exposed in info endpoint.\n"}, "loc": ["services", "thanos", "query", "selector-labels"], "readOnly": false, "type": "attribute set of string"}, "services.thanos.query.store.addresses": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Addresses of statically configured store API servers.\n\nThe scheme may be prefixed with `dns+` or\n`dnssrv+` to detect store API servers through\nrespective DNS lookups.\n"}, "loc": ["services", "thanos", "query", "store", "addresses"], "readOnly": false, "type": "list of string"}, "services.thanos.query.store.response-timeout": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If a Store doesn't send any data in this specified duration then a\nStore will be ignored and partial data will be returned if it's\nenabled. `0` disables timeout.\n\nDefaults to `0ms` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "query", "store", "response-timeout"], "readOnly": false, "type": "null or string"}, "services.thanos.query.store.sd-dns-interval": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Interval between DNS resolutions.\n\nDefaults to `30s` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "query", "store", "sd-dns-interval"], "readOnly": false, "type": "null or string"}, "services.thanos.query.store.sd-files": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Path to files that contain addresses of store API servers. The path\ncan be a glob pattern.\n"}, "loc": ["services", "thanos", "query", "store", "sd-files"], "readOnly": false, "type": "list of string"}, "services.thanos.query.store.sd-interval": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refresh interval to re-read file SD files. It is used as a resync fallback.\n\nDefaults to `5m` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "query", "store", "sd-interval"], "readOnly": false, "type": "null or string"}, "services.thanos.query.store.unhealthy-timeout": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Timeout before an unhealthy store is cleaned from the store UI page.\n\nDefaults to `5m` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "query", "store", "unhealthy-timeout"], "readOnly": false, "type": "null or string"}, "services.thanos.query.tracing.config": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Tracing configuration.\n\nWhen not `null` the attribute set gets converted to\na YAML file and stored in the Nix store. The option\n{option}`tracing.config-file` will default to its path.\n\nIf {option}`tracing.config-file` is set this option has no effect.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "query", "tracing", "config"], "readOnly": false, "type": "null or (attribute set)"}, "services.thanos.query.tracing.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "if config.services.thanos.<cmd>.tracing.config == null then null\nelse toString (toYAML \"tracing.yaml\" config.services.thanos.<cmd>.tracing.config);\n"}, "description": {"_type": "mdDoc", "text": "Path to YAML file that contains tracing configuration.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "query", "tracing", "config-file"], "readOnly": false, "type": "null or string"}, "services.thanos.query.web.external-prefix": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Static prefix for all HTML links and redirect URLs in the UI query web\ninterface.\n\nActual endpoints are still served on / or the\n{option}`web.route-prefix`. This allows thanos UI to be served\nbehind a reverse proxy that strips a URL sub-path.\n"}, "loc": ["services", "thanos", "query", "web", "external-prefix"], "readOnly": false, "type": "null or string"}, "services.thanos.query.web.prefix-header": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of HTTP request header used for dynamic prefixing of UI links and\nredirects.\n\nThis option is ignored if the option\n`web.external-prefix` is set.\n\nSecurity risk: enable this option only if a reverse proxy in front of\nthanos is resetting the header.\n\nThe setting `web.prefix-header=\"X-Forwarded-Prefix\"`\ncan be useful, for example, if Thanos UI is served via Traefik reverse\nproxy with `PathPrefixStrip` option enabled, which\nsends the stripped prefix value in `X-Forwarded-Prefix`\nheader. This allows thanos UI to be served on a sub-path.\n"}, "loc": ["services", "thanos", "query", "web", "prefix-header"], "readOnly": false, "type": "null or string"}, "services.thanos.query.web.route-prefix": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Prefix for API and UI endpoints.\n\nThis allows thanos UI to be served on a sub-path. This option is\nanalogous to {option}`web.route-prefix` of Promethus.\n"}, "loc": ["services", "thanos", "query", "web", "route-prefix"], "readOnly": false, "type": "null or string"}, "services.thanos.receive.arguments": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalMD", "text": "calculated from `config.services.thanos.receive`\n"}, "description": {"_type": "mdDoc", "text": "Arguments to the `thanos receive` command.\n\nDefaults to a list of arguments formed by converting the structured\noptions of {option}`services.thanos.receive` to a list of arguments.\n\nOverriding this option will cause none of the structured options to have\nany effect. So only set this if you know what you're doing!\n"}, "loc": ["services", "thanos", "receive", "arguments"], "readOnly": false, "type": "list of string"}, "services.thanos.receive.enable": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Thanos receiver which accept Prometheus remote write API requests and write to local tsdb (EXPERIMENTAL, this may change drastically without notice)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "thanos", "receive", "enable"], "readOnly": false, "type": "boolean"}, "services.thanos.receive.grpc-address": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Listen `ip:port` address for gRPC endpoints (StoreAPI).\n\nMake sure this address is routable from other components.\n\nDefaults to `0.0.0.0:10901` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "receive", "grpc-address"], "readOnly": false, "type": "null or string"}, "services.thanos.receive.grpc-server-tls-cert": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS Certificate for gRPC server, leave blank to disable TLS\n"}, "loc": ["services", "thanos", "receive", "grpc-server-tls-cert"], "readOnly": false, "type": "null or string"}, "services.thanos.receive.grpc-server-tls-client-ca": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS CA to verify clients against.\n\nIf no client CA is specified, there is no client verification on server side.\n(tls.NoClientCert)\n"}, "loc": ["services", "thanos", "receive", "grpc-server-tls-client-ca"], "readOnly": false, "type": "null or string"}, "services.thanos.receive.grpc-server-tls-key": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS Key for the gRPC server, leave blank to disable TLS\n"}, "loc": ["services", "thanos", "receive", "grpc-server-tls-key"], "readOnly": false, "type": "null or string"}, "services.thanos.receive.http-address": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Listen `host:port` for HTTP endpoints.\n\nDefaults to `0.0.0.0:10902` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "receive", "http-address"], "readOnly": false, "type": "null or string"}, "services.thanos.receive.labels": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "External labels to announce.\n\nThis flag will be removed in the future when handling multiple tsdb\ninstances is added.\n"}, "loc": ["services", "thanos", "receive", "labels"], "readOnly": false, "type": "attribute set of string"}, "services.thanos.receive.log.format": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log format to use.\n"}, "loc": ["services", "thanos", "receive", "log", "format"], "readOnly": false, "type": "null or string"}, "services.thanos.receive.log.level": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log filtering level.\n\nDefaults to `info` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "receive", "log", "level"], "readOnly": false, "type": "null or one of \"debug\", \"info\", \"warn\", \"error\", \"fatal\""}, "services.thanos.receive.objstore.config": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Object store configuration.\n\nWhen not `null` the attribute set gets converted to\na YAML file and stored in the Nix store. The option\n{option}`objstore.config-file` will default to its path.\n\nIf {option}`objstore.config-file` is set this option has no effect.\n\nSee format details: <https://thanos.io/storage.md/#configuration>\n"}, "loc": ["services", "thanos", "receive", "objstore", "config"], "readOnly": false, "type": "null or (attribute set)"}, "services.thanos.receive.objstore.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "if config.services.thanos.<cmd>.objstore.config == null then null\nelse toString (toYAML \"objstore.yaml\" config.services.thanos.<cmd>.objstore.config);\n"}, "description": {"_type": "mdDoc", "text": "Path to YAML file that contains object store configuration.\n\nSee format details: <https://thanos.io/storage.md/#configuration>\n"}, "loc": ["services", "thanos", "receive", "objstore", "config-file"], "readOnly": false, "type": "null or string"}, "services.thanos.receive.remote-write.address": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address to listen on for remote write requests.\n\nDefaults to `0.0.0.0:19291` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "receive", "remote-write", "address"], "readOnly": false, "type": "null or string"}, "services.thanos.receive.stateDir": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "\"thanos-receive\""}, "description": {"_type": "mdDoc", "text": "Data directory relative to `/var/lib` of TSDB.\n"}, "loc": ["services", "thanos", "receive", "stateDir"], "readOnly": false, "type": "string"}, "services.thanos.receive.tracing.config": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Tracing configuration.\n\nWhen not `null` the attribute set gets converted to\na YAML file and stored in the Nix store. The option\n{option}`tracing.config-file` will default to its path.\n\nIf {option}`tracing.config-file` is set this option has no effect.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "receive", "tracing", "config"], "readOnly": false, "type": "null or (attribute set)"}, "services.thanos.receive.tracing.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "if config.services.thanos.<cmd>.tracing.config == null then null\nelse toString (toYAML \"tracing.yaml\" config.services.thanos.<cmd>.tracing.config);\n"}, "description": {"_type": "mdDoc", "text": "Path to YAML file that contains tracing configuration.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "receive", "tracing", "config-file"], "readOnly": false, "type": "null or string"}, "services.thanos.receive.tsdb.retention": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "How long to retain raw samples on local storage.\n\n`0d` - disables this retention\n\nDefaults to `15d` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "receive", "tsdb", "retention"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.alert.label-drop": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Labels by name to drop before sending to alertmanager.\n\nThis allows alert to be deduplicated on replica label.\n\nSimilar Prometheus alert relabelling\n"}, "loc": ["services", "thanos", "rule", "alert", "label-drop"], "readOnly": false, "type": "list of string"}, "services.thanos.rule.alert.query-url": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The external Thanos Query URL that would be set in all alerts 'Source' field.\n"}, "loc": ["services", "thanos", "rule", "alert", "query-url"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.alertmanagers.send-timeout": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Timeout for sending alerts to alertmanager.\n\nDefaults to `10s` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "rule", "alertmanagers", "send-timeout"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.alertmanagers.urls": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Alertmanager replica URLs to push firing alerts.\n\nRuler claims success if push to at least one alertmanager from\ndiscovered succeeds. The scheme may be prefixed with\n`dns+` or `dnssrv+` to detect\nAlertmanager IPs through respective DNS lookups. The port defaults to\n`9093` or the SRV record's value. The URL path is\nused as a prefix for the regular Alertmanager API path.\n"}, "loc": ["services", "thanos", "rule", "alertmanagers", "urls"], "readOnly": false, "type": "list of string"}, "services.thanos.rule.arguments": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalMD", "text": "calculated from `config.services.thanos.rule`\n"}, "description": {"_type": "mdDoc", "text": "Arguments to the `thanos rule` command.\n\nDefaults to a list of arguments formed by converting the structured\noptions of {option}`services.thanos.rule` to a list of arguments.\n\nOverriding this option will cause none of the structured options to have\nany effect. So only set this if you know what you're doing!\n"}, "loc": ["services", "thanos", "rule", "arguments"], "readOnly": false, "type": "list of string"}, "services.thanos.rule.enable": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Thanos ruler service which evaluates Prometheus rules against given Query nodes, exposing Store API and storing old blocks in bucket."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "thanos", "rule", "enable"], "readOnly": false, "type": "boolean"}, "services.thanos.rule.eval-interval": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The default evaluation interval to use.\n\nDefaults to `30s` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "rule", "eval-interval"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.grpc-address": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Listen `ip:port` address for gRPC endpoints (StoreAPI).\n\nMake sure this address is routable from other components.\n\nDefaults to `0.0.0.0:10901` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "rule", "grpc-address"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.grpc-server-tls-cert": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS Certificate for gRPC server, leave blank to disable TLS\n"}, "loc": ["services", "thanos", "rule", "grpc-server-tls-cert"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.grpc-server-tls-client-ca": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS CA to verify clients against.\n\nIf no client CA is specified, there is no client verification on server side.\n(tls.NoClientCert)\n"}, "loc": ["services", "thanos", "rule", "grpc-server-tls-client-ca"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.grpc-server-tls-key": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS Key for the gRPC server, leave blank to disable TLS\n"}, "loc": ["services", "thanos", "rule", "grpc-server-tls-key"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.http-address": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Listen `host:port` for HTTP endpoints.\n\nDefaults to `0.0.0.0:10902` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "rule", "http-address"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.labels": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Labels to be applied to all generated metrics.\n\nSimilar to external labels for Prometheus,\nused to identify ruler and its blocks as unique source.\n"}, "loc": ["services", "thanos", "rule", "labels"], "readOnly": false, "type": "attribute set of string"}, "services.thanos.rule.log.format": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log format to use.\n"}, "loc": ["services", "thanos", "rule", "log", "format"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.log.level": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log filtering level.\n\nDefaults to `info` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "rule", "log", "level"], "readOnly": false, "type": "null or one of \"debug\", \"info\", \"warn\", \"error\", \"fatal\""}, "services.thanos.rule.objstore.config": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Object store configuration.\n\nWhen not `null` the attribute set gets converted to\na YAML file and stored in the Nix store. The option\n{option}`objstore.config-file` will default to its path.\n\nIf {option}`objstore.config-file` is set this option has no effect.\n\nSee format details: <https://thanos.io/storage.md/#configuration>\n"}, "loc": ["services", "thanos", "rule", "objstore", "config"], "readOnly": false, "type": "null or (attribute set)"}, "services.thanos.rule.objstore.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "if config.services.thanos.<cmd>.objstore.config == null then null\nelse toString (toYAML \"objstore.yaml\" config.services.thanos.<cmd>.objstore.config);\n"}, "description": {"_type": "mdDoc", "text": "Path to YAML file that contains object store configuration.\n\nSee format details: <https://thanos.io/storage.md/#configuration>\n"}, "loc": ["services", "thanos", "rule", "objstore", "config-file"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.query.addresses": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Addresses of statically configured query API servers.\n\nThe scheme may be prefixed with `dns+` or\n`dnssrv+` to detect query API servers through\nrespective DNS lookups.\n"}, "loc": ["services", "thanos", "rule", "query", "addresses"], "readOnly": false, "type": "list of string"}, "services.thanos.rule.query.sd-dns-interval": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Interval between DNS resolutions.\n\nDefaults to `30s` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "rule", "query", "sd-dns-interval"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.query.sd-files": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Path to file that contain addresses of query peers.\nThe path can be a glob pattern.\n"}, "loc": ["services", "thanos", "rule", "query", "sd-files"], "readOnly": false, "type": "list of string"}, "services.thanos.rule.query.sd-interval": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Refresh interval to re-read file SD files. (used as a fallback)\n\nDefaults to `5m` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "rule", "query", "sd-interval"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.rule-files": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Rule files that should be used by rule manager. Can be in glob format.\n"}, "loc": ["services", "thanos", "rule", "rule-files"], "readOnly": false, "type": "list of string"}, "services.thanos.rule.stateDir": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "\"thanos-rule\""}, "description": {"_type": "mdDoc", "text": "Data directory relative to `/var/lib`.\n"}, "loc": ["services", "thanos", "rule", "stateDir"], "readOnly": false, "type": "string"}, "services.thanos.rule.tracing.config": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Tracing configuration.\n\nWhen not `null` the attribute set gets converted to\na YAML file and stored in the Nix store. The option\n{option}`tracing.config-file` will default to its path.\n\nIf {option}`tracing.config-file` is set this option has no effect.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "rule", "tracing", "config"], "readOnly": false, "type": "null or (attribute set)"}, "services.thanos.rule.tracing.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "if config.services.thanos.<cmd>.tracing.config == null then null\nelse toString (toYAML \"tracing.yaml\" config.services.thanos.<cmd>.tracing.config);\n"}, "description": {"_type": "mdDoc", "text": "Path to YAML file that contains tracing configuration.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "rule", "tracing", "config-file"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.tsdb.block-duration": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Block duration for TSDB block.\n\nDefaults to `2h` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "rule", "tsdb", "block-duration"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.tsdb.retention": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Block retention time on local disk.\n\nDefaults to `48h` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "rule", "tsdb", "retention"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.web.external-prefix": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Static prefix for all HTML links and redirect URLs in the UI query web\ninterface.\n\nActual endpoints are still served on / or the\n{option}`web.route-prefix`. This allows thanos UI to be served\nbehind a reverse proxy that strips a URL sub-path.\n"}, "loc": ["services", "thanos", "rule", "web", "external-prefix"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.web.prefix-header": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of HTTP request header used for dynamic prefixing of UI links and\nredirects.\n\nThis option is ignored if the option\n{option}`web.external-prefix` is set.\n\nSecurity risk: enable this option only if a reverse proxy in front of\nthanos is resetting the header.\n\nThe header `X-Forwarded-Prefix` can be useful, for\nexample, if Thanos UI is served via Traefik reverse proxy with\n`PathPrefixStrip` option enabled, which sends the\nstripped prefix value in `X-Forwarded-Prefix`\nheader. This allows thanos UI to be served on a sub-path.\n"}, "loc": ["services", "thanos", "rule", "web", "prefix-header"], "readOnly": false, "type": "null or string"}, "services.thanos.rule.web.route-prefix": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Prefix for API and UI endpoints.\n\nThis allows thanos UI to be served on a sub-path.\n\nThis option is analogous to `--web.route-prefix` of Promethus.\n"}, "loc": ["services", "thanos", "rule", "web", "route-prefix"], "readOnly": false, "type": "null or string"}, "services.thanos.sidecar.arguments": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalMD", "text": "calculated from `config.services.thanos.sidecar`\n"}, "description": {"_type": "mdDoc", "text": "Arguments to the `thanos sidecar` command.\n\nDefaults to a list of arguments formed by converting the structured\noptions of {option}`services.thanos.sidecar` to a list of arguments.\n\nOverriding this option will cause none of the structured options to have\nany effect. So only set this if you know what you're doing!\n"}, "loc": ["services", "thanos", "sidecar", "arguments"], "readOnly": false, "type": "list of string"}, "services.thanos.sidecar.enable": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Thanos sidecar for Prometheus server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "thanos", "sidecar", "enable"], "readOnly": false, "type": "boolean"}, "services.thanos.sidecar.grpc-address": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Listen `ip:port` address for gRPC endpoints (StoreAPI).\n\nMake sure this address is routable from other components.\n\nDefaults to `0.0.0.0:10901` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "sidecar", "grpc-address"], "readOnly": false, "type": "null or string"}, "services.thanos.sidecar.grpc-server-tls-cert": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS Certificate for gRPC server, leave blank to disable TLS\n"}, "loc": ["services", "thanos", "sidecar", "grpc-server-tls-cert"], "readOnly": false, "type": "null or string"}, "services.thanos.sidecar.grpc-server-tls-client-ca": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS CA to verify clients against.\n\nIf no client CA is specified, there is no client verification on server side.\n(tls.NoClientCert)\n"}, "loc": ["services", "thanos", "sidecar", "grpc-server-tls-client-ca"], "readOnly": false, "type": "null or string"}, "services.thanos.sidecar.grpc-server-tls-key": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS Key for the gRPC server, leave blank to disable TLS\n"}, "loc": ["services", "thanos", "sidecar", "grpc-server-tls-key"], "readOnly": false, "type": "null or string"}, "services.thanos.sidecar.http-address": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Listen `host:port` for HTTP endpoints.\n\nDefaults to `0.0.0.0:10902` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "sidecar", "http-address"], "readOnly": false, "type": "null or string"}, "services.thanos.sidecar.log.format": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log format to use.\n"}, "loc": ["services", "thanos", "sidecar", "log", "format"], "readOnly": false, "type": "null or string"}, "services.thanos.sidecar.log.level": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log filtering level.\n\nDefaults to `info` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "sidecar", "log", "level"], "readOnly": false, "type": "null or one of \"debug\", \"info\", \"warn\", \"error\", \"fatal\""}, "services.thanos.sidecar.objstore.config": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Object store configuration.\n\nWhen not `null` the attribute set gets converted to\na YAML file and stored in the Nix store. The option\n{option}`objstore.config-file` will default to its path.\n\nIf {option}`objstore.config-file` is set this option has no effect.\n\nSee format details: <https://thanos.io/storage.md/#configuration>\n"}, "loc": ["services", "thanos", "sidecar", "objstore", "config"], "readOnly": false, "type": "null or (attribute set)"}, "services.thanos.sidecar.objstore.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "if config.services.thanos.<cmd>.objstore.config == null then null\nelse toString (toYAML \"objstore.yaml\" config.services.thanos.<cmd>.objstore.config);\n"}, "description": {"_type": "mdDoc", "text": "Path to YAML file that contains object store configuration.\n\nSee format details: <https://thanos.io/storage.md/#configuration>\n"}, "loc": ["services", "thanos", "sidecar", "objstore", "config-file"], "readOnly": false, "type": "null or string"}, "services.thanos.sidecar.prometheus.url": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "URL at which to reach Prometheus's API.\n\nFor better performance use local network.\n\nDefaults to `http://localhost:9090` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "sidecar", "prometheus", "url"], "readOnly": false, "type": "null or string"}, "services.thanos.sidecar.reloader.config-envsubst-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Output file for environment variable substituted config file.\n"}, "loc": ["services", "thanos", "sidecar", "reloader", "config-envsubst-file"], "readOnly": false, "type": "null or string"}, "services.thanos.sidecar.reloader.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Config file watched by the reloader.\n"}, "loc": ["services", "thanos", "sidecar", "reloader", "config-file"], "readOnly": false, "type": "null or string"}, "services.thanos.sidecar.reloader.rule-dirs": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Rule directories for the reloader to refresh.\n"}, "loc": ["services", "thanos", "sidecar", "reloader", "rule-dirs"], "readOnly": false, "type": "list of string"}, "services.thanos.sidecar.tracing.config": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Tracing configuration.\n\nWhen not `null` the attribute set gets converted to\na YAML file and stored in the Nix store. The option\n{option}`tracing.config-file` will default to its path.\n\nIf {option}`tracing.config-file` is set this option has no effect.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "sidecar", "tracing", "config"], "readOnly": false, "type": "null or (attribute set)"}, "services.thanos.sidecar.tracing.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "if config.services.thanos.<cmd>.tracing.config == null then null\nelse toString (toYAML \"tracing.yaml\" config.services.thanos.<cmd>.tracing.config);\n"}, "description": {"_type": "mdDoc", "text": "Path to YAML file that contains tracing configuration.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "sidecar", "tracing", "config-file"], "readOnly": false, "type": "null or string"}, "services.thanos.sidecar.tsdb.path": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/${config.services.prometheus.stateDir}/data\""}, "description": {"_type": "mdDoc", "text": "Data directory of TSDB.\n"}, "loc": ["services", "thanos", "sidecar", "tsdb", "path"], "readOnly": false, "type": "string"}, "services.thanos.store.arguments": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalMD", "text": "calculated from `config.services.thanos.store`\n"}, "description": {"_type": "mdDoc", "text": "Arguments to the `thanos store` command.\n\nDefaults to a list of arguments formed by converting the structured\noptions of {option}`services.thanos.store` to a list of arguments.\n\nOverriding this option will cause none of the structured options to have\nany effect. So only set this if you know what you're doing!\n"}, "loc": ["services", "thanos", "store", "arguments"], "readOnly": false, "type": "list of string"}, "services.thanos.store.block-sync-concurrency": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Number of goroutines to use when syncing blocks from object storage.\n\nDefaults to `20` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "store", "block-sync-concurrency"], "readOnly": false, "type": "null or signed integer"}, "services.thanos.store.chunk-pool-size": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum size of concurrently allocatable bytes for chunks.\n\nDefaults to `2GB` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "store", "chunk-pool-size"], "readOnly": false, "type": "null or string"}, "services.thanos.store.enable": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Thanos store node giving access to blocks in a bucket provider.."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "thanos", "store", "enable"], "readOnly": false, "type": "boolean"}, "services.thanos.store.grpc-address": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Listen `ip:port` address for gRPC endpoints (StoreAPI).\n\nMake sure this address is routable from other components.\n\nDefaults to `0.0.0.0:10901` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "store", "grpc-address"], "readOnly": false, "type": "null or string"}, "services.thanos.store.grpc-server-tls-cert": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS Certificate for gRPC server, leave blank to disable TLS\n"}, "loc": ["services", "thanos", "store", "grpc-server-tls-cert"], "readOnly": false, "type": "null or string"}, "services.thanos.store.grpc-server-tls-client-ca": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS CA to verify clients against.\n\nIf no client CA is specified, there is no client verification on server side.\n(tls.NoClientCert)\n"}, "loc": ["services", "thanos", "store", "grpc-server-tls-client-ca"], "readOnly": false, "type": "null or string"}, "services.thanos.store.grpc-server-tls-key": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS Key for the gRPC server, leave blank to disable TLS\n"}, "loc": ["services", "thanos", "store", "grpc-server-tls-key"], "readOnly": false, "type": "null or string"}, "services.thanos.store.http-address": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Listen `host:port` for HTTP endpoints.\n\nDefaults to `0.0.0.0:10902` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "store", "http-address"], "readOnly": false, "type": "null or string"}, "services.thanos.store.index-cache-size": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum size of items held in the index cache.\n\nDefaults to `250MB` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "store", "index-cache-size"], "readOnly": false, "type": "null or string"}, "services.thanos.store.log.format": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log format to use.\n"}, "loc": ["services", "thanos", "store", "log", "format"], "readOnly": false, "type": "null or string"}, "services.thanos.store.log.level": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Log filtering level.\n\nDefaults to `info` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "store", "log", "level"], "readOnly": false, "type": "null or one of \"debug\", \"info\", \"warn\", \"error\", \"fatal\""}, "services.thanos.store.max-time": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "End of time range limit to serve.\n\nThanos Store serves only blocks, which happened earlier than this\nvalue. Option can be a constant time in RFC3339 format or time duration\nrelative to current time, such as -1d or 2h45m. Valid duration units are\nms, s, m, h, d, w, y.\n\nDefaults to `9999-12-31T23:59:59Z` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "store", "max-time"], "readOnly": false, "type": "null or string"}, "services.thanos.store.min-time": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Start of time range limit to serve.\n\nThanos Store serves only metrics, which happened later than this\nvalue. Option can be a constant time in RFC3339 format or time duration\nrelative to current time, such as -1d or 2h45m. Valid duration units are\nms, s, m, h, d, w, y.\n\nDefaults to `0000-01-01T00:00:00Z` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "store", "min-time"], "readOnly": false, "type": "null or string"}, "services.thanos.store.objstore.config": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Object store configuration.\n\nWhen not `null` the attribute set gets converted to\na YAML file and stored in the Nix store. The option\n{option}`objstore.config-file` will default to its path.\n\nIf {option}`objstore.config-file` is set this option has no effect.\n\nSee format details: <https://thanos.io/storage.md/#configuration>\n"}, "loc": ["services", "thanos", "store", "objstore", "config"], "readOnly": false, "type": "null or (attribute set)"}, "services.thanos.store.objstore.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "if config.services.thanos.<cmd>.objstore.config == null then null\nelse toString (toYAML \"objstore.yaml\" config.services.thanos.<cmd>.objstore.config);\n"}, "description": {"_type": "mdDoc", "text": "Path to YAML file that contains object store configuration.\n\nSee format details: <https://thanos.io/storage.md/#configuration>\n"}, "loc": ["services", "thanos", "store", "objstore", "config-file"], "readOnly": false, "type": "null or string"}, "services.thanos.store.stateDir": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "\"thanos-store\""}, "description": {"_type": "mdDoc", "text": "Data directory relative to `/var/lib`\nin which to cache remote blocks.\n"}, "loc": ["services", "thanos", "store", "stateDir"], "readOnly": false, "type": "string"}, "services.thanos.store.store.grpc.series-max-concurrency": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum number of concurrent Series calls.\n\nDefaults to `20` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "store", "store", "grpc", "series-max-concurrency"], "readOnly": false, "type": "null or signed integer"}, "services.thanos.store.store.grpc.series-sample-limit": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum amount of samples returned via a single Series call.\n\n`0` means no limit.\n\nNOTE: for efficiency we take 120 as the number of samples in chunk (it\ncannot be bigger than that), so the actual number of samples might be\nlower, even though the maximum could be hit.\n\nDefaults to `0` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "store", "store", "grpc", "series-sample-limit"], "readOnly": false, "type": "null or signed integer"}, "services.thanos.store.sync-block-duration": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Repeat interval for syncing the blocks between local and remote view.\n\nDefaults to `3m` in Thanos\nwhen set to `null`.\n"}, "loc": ["services", "thanos", "store", "sync-block-duration"], "readOnly": false, "type": "null or string"}, "services.thanos.store.tracing.config": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Tracing configuration.\n\nWhen not `null` the attribute set gets converted to\na YAML file and stored in the Nix store. The option\n{option}`tracing.config-file` will default to its path.\n\nIf {option}`tracing.config-file` is set this option has no effect.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "store", "tracing", "config"], "readOnly": false, "type": "null or (attribute set)"}, "services.thanos.store.tracing.config-file": {"declarations": ["nixos/modules/services/monitoring/thanos.nix"], "default": {"_type": "literalExpression", "text": "if config.services.thanos.<cmd>.tracing.config == null then null\nelse toString (toYAML \"tracing.yaml\" config.services.thanos.<cmd>.tracing.config);\n"}, "description": {"_type": "mdDoc", "text": "Path to YAML file that contains tracing configuration.\n\nSee format details: <https://thanos.io/tracing.md/#configuration>\n"}, "loc": ["services", "thanos", "store", "tracing", "config-file"], "readOnly": false, "type": "null or string"}, "services.thelounge.enable": {"declarations": ["nixos/modules/services/networking/thelounge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable The Lounge web IRC client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "thelounge", "enable"], "readOnly": false, "type": "boolean"}, "services.thelounge.extraConfig": {"declarations": ["nixos/modules/services/networking/thelounge.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The Lounge's {file}`config.js` contents as attribute set (will be\nconverted to JSON to generate the configuration file).\n\nThe options defined here will be merged to the default configuration file.\nNote: In case of duplicate configuration, options from {option}`extraConfig` have priority.\n\nDocumentation: <https://thelounge.chat/docs/server/configuration>\n"}, "example": {"_type": "literalExpression", "text": "{\n        reverseProxy = true;\n        defaults = {\n          name = \"Your Network\";\n          host = \"localhost\";\n          port = 6697;\n        };\n      }"}, "loc": ["services", "thelounge", "extraConfig"], "readOnly": false, "type": "attribute set"}, "services.thelounge.plugins": {"declarations": ["nixos/modules/services/networking/thelounge.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The Lounge plugins to install. Plugins can be found in\n`pkgs.theLoungePlugins.plugins` and `pkgs.theLoungePlugins.themes`.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.theLoungePlugins.themes.solarized ]"}, "loc": ["services", "thelounge", "plugins"], "readOnly": false, "type": "list of package"}, "services.thelounge.port": {"declarations": ["nixos/modules/services/networking/thelounge.nix"], "default": {"_type": "literalExpression", "text": "9000"}, "description": {"_type": "mdDoc", "text": "TCP port to listen on for http connections."}, "loc": ["services", "thelounge", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.thelounge.public": {"declarations": ["nixos/modules/services/networking/thelounge.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Make your The Lounge instance public.\nSetting this to `false` will require you to configure user\naccounts by using the ({command}`thelounge`) command or by adding\nentries in {file}`/var/lib/thelounge/users`. You might need to restart\nThe Lounge after making changes to the state directory.\n"}, "loc": ["services", "thelounge", "public"], "readOnly": false, "type": "boolean"}, "services.thermald.configFile": {"declarations": ["nixos/modules/services/hardware/thermald.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "the thermald manual configuration file."}, "loc": ["services", "thermald", "configFile"], "readOnly": false, "type": "null or path"}, "services.thermald.debug": {"declarations": ["nixos/modules/services/hardware/thermald.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable debug logging.\n"}, "loc": ["services", "thermald", "debug"], "readOnly": false, "type": "boolean"}, "services.thermald.enable": {"declarations": ["nixos/modules/services/hardware/thermald.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable thermald, the temperature management daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "thermald", "enable"], "readOnly": false, "type": "boolean"}, "services.thermald.package": {"declarations": ["nixos/modules/services/hardware/thermald.nix"], "default": {"_type": "literalExpression", "text": "pkgs.thermald"}, "description": {"_type": "mdDoc", "text": "Which thermald package to use."}, "loc": ["services", "thermald", "package"], "readOnly": false, "type": "package"}, "services.thinkfan.enable": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable thinkfan, a fan control program.\n\n::: {.note}\nThis module targets IBM/Lenovo thinkpads by default, for\nother hardware you will have configure it more carefully.\n:::\n"}, "loc": ["services", "thinkfan", "enable"], "readOnly": false, "relatedPackages": "- [`pkgs.thinkfan`](\n    https://search.nixos.org/packages?show=thinkfan&sort=relevance&query=thinkfan\n  )\n", "type": "boolean"}, "services.thinkfan.extraArgs": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of extra command line arguments to pass to thinkfan.\nCheck the thinkfan(1) manpage for available arguments.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-b\"\n  \"0\"\n]"}, "loc": ["services", "thinkfan", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.thinkfan.fans": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "default": {"_type": "literalExpression", "text": "[\n  {\n    query = \"/proc/acpi/ibm/fan\";\n    type = \"tpacpi\";\n  }\n]"}, "description": {"_type": "mdDoc", "text": "List of fans thinkfan will control.\n\n::: {.note}\nThis section slightly departs from the thinkfan.conf syntax.\nThe type and path must be specified like this:\n```\n  type = \"tpacpi\";\n  query = \"/proc/acpi/ibm/fan\";\n```\ninstead of a single declaration like:\n```\n  - tpacpi: /proc/acpi/ibm/fan\n```\n:::\n\n"}, "loc": ["services", "thinkfan", "fans"], "readOnly": false, "type": "list of (attribute set of (YAML value))"}, "services.thinkfan.fans.*.indices": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A list of fans to pick in case multiple fans match the query.\n\n::: {.note}\nIndices start from 0.\n:::\n"}, "loc": ["services", "thinkfan", "fans", "*", "indices"], "readOnly": false, "type": "null or (list of unsigned integer, meaning >=0)"}, "services.thinkfan.fans.*.query": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "description": {"_type": "mdDoc", "text": "The query string used to match one or more fans: can be\na fullpath to the temperature file (single fan) or a fullpath\nto a driver directory (multiple fans).\n\n::: {.note}\nWhen multiple fans match, the query can be restricted using the\n{option}`name` or {option}`indices` options.\n:::\n"}, "loc": ["services", "thinkfan", "fans", "*", "query"], "readOnly": false, "type": "string"}, "services.thinkfan.fans.*.type": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "description": {"_type": "mdDoc", "text": "The fan type, can be\n`hwmon` for standard fans,\n\n`atasmart` to read the temperature via\nS.M.A.R.T (requires smartSupport to be enabled),\n\n`tpacpi` for the legacy thinkpac_acpi driver, or\n\n`nvml` for the (proprietary) nVidia driver.\n"}, "loc": ["services", "thinkfan", "fans", "*", "type"], "readOnly": false, "type": "one of \"hwmon\", \"atasmart\", \"tpacpi\", \"nvml\""}, "services.thinkfan.levels": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "default": {"_type": "literalExpression", "text": "[\n  [\n    0\n    0\n    55\n  ]\n  [\n    1\n    48\n    60\n  ]\n  [\n    2\n    50\n    61\n  ]\n  [\n    3\n    52\n    63\n  ]\n  [\n    6\n    56\n    65\n  ]\n  [\n    7\n    60\n    85\n  ]\n  [\n    \"level auto\"\n    80\n    32767\n  ]\n]"}, "description": {"_type": "mdDoc", "text": "[LEVEL LOW HIGH]\n\nLEVEL is the fan level to use: it can be an integer (0-7 with thinkpad_acpi),\n\"level auto\" (to keep the default firmware behavior), \"level full-speed\" or\n\"level disengaged\" (to run the fan as fast as possible).\nLOW is the temperature at which to step down to the previous level.\nHIGH is the temperature at which to step up to the next level.\nAll numbers are integers.\n"}, "loc": ["services", "thinkfan", "levels"], "readOnly": false, "type": "list of (tuple of (unsigned integer, meaning >=0 or one of \"level auto\", \"level full-speed\", \"level disengaged\") (unsigned integer, meaning >=0) (unsigned integer, meaning >=0))"}, "services.thinkfan.sensors": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "default": {"_type": "literalExpression", "text": "[\n  {\n    query = \"/proc/acpi/ibm/thermal\";\n    type = \"tpacpi\";\n  }\n]"}, "description": {"_type": "mdDoc", "text": "List of temperature sensors thinkfan will monitor.\n\n::: {.note}\nThis section slightly departs from the thinkfan.conf syntax.\nThe type and path must be specified like this:\n```\n  type = \"tpacpi\";\n  query = \"/proc/acpi/ibm/thermal\";\n```\ninstead of a single declaration like:\n```\n  - tpacpi: /proc/acpi/ibm/thermal\n```\n:::\n\n"}, "loc": ["services", "thinkfan", "sensors"], "readOnly": false, "type": "list of (attribute set of (YAML value))"}, "services.thinkfan.sensors.*.correction": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A list of values to be added to the temperature of each sensor,\ncan be used to equalize small discrepancies in temperature ratings.\n"}, "loc": ["services", "thinkfan", "sensors", "*", "correction"], "readOnly": false, "type": "null or (list of signed integer)"}, "services.thinkfan.sensors.*.indices": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A list of sensors to pick in case multiple sensors match the query.\n\n::: {.note}\nIndices start from 0.\n:::\n"}, "loc": ["services", "thinkfan", "sensors", "*", "indices"], "readOnly": false, "type": "null or (list of unsigned integer, meaning >=0)"}, "services.thinkfan.sensors.*.query": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "description": {"_type": "mdDoc", "text": "The query string used to match one or more sensors: can be\na fullpath to the temperature file (single sensor) or a fullpath\nto a driver directory (multiple sensors).\n\n::: {.note}\nWhen multiple sensors match, the query can be restricted using the\n{option}`name` or {option}`indices` options.\n:::\n"}, "loc": ["services", "thinkfan", "sensors", "*", "query"], "readOnly": false, "type": "string"}, "services.thinkfan.sensors.*.type": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "description": {"_type": "mdDoc", "text": "The sensor type, can be\n`hwmon` for standard sensors,\n\n`atasmart` to read the temperature via\nS.M.A.R.T (requires smartSupport to be enabled),\n\n`tpacpi` for the legacy thinkpac_acpi driver, or\n\n`nvml` for the (proprietary) nVidia driver.\n"}, "loc": ["services", "thinkfan", "sensors", "*", "type"], "readOnly": false, "type": "one of \"hwmon\", \"atasmart\", \"tpacpi\", \"nvml\""}, "services.thinkfan.settings": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Thinkfan settings. Use this option to configure thinkfan\nsettings not exposed in a NixOS option or to bypass one.\nBefore changing this, read the `thinkfan.conf(5)`\nmanpage and take a look at the example config file at\n<https://github.com/vmatare/thinkfan/blob/master/examples/thinkfan.yaml>\n"}, "loc": ["services", "thinkfan", "settings"], "readOnly": false, "type": "attribute set of (YAML value)"}, "services.thinkfan.smartSupport": {"declarations": ["nixos/modules/services/hardware/thinkfan.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to build thinkfan with S.M.A.R.T. support to read temperatures\ndirectly from hard disks.\n"}, "loc": ["services", "thinkfan", "smartSupport"], "readOnly": false, "type": "boolean"}, "services.throttled.enable": {"declarations": ["nixos/modules/services/hardware/throttled.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable fix for Intel CPU throttling."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "throttled", "enable"], "readOnly": false, "type": "boolean"}, "services.throttled.extraConfig": {"declarations": ["nixos/modules/services/hardware/throttled.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Alternative configuration"}, "loc": ["services", "throttled", "extraConfig"], "readOnly": false, "type": "string"}, "services.tiddlywiki.enable": {"declarations": ["nixos/modules/services/misc/tiddlywiki.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable TiddlyWiki nodejs server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tiddlywiki", "enable"], "readOnly": false, "type": "boolean"}, "services.tiddlywiki.listenOptions": {"declarations": ["nixos/modules/services/misc/tiddlywiki.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Parameters passed to `--listen` command.\nRefer to <https://tiddlywiki.com/#WebServer>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  credentials = \"../credentials.csv\";\n  port = 3456;\n  readers = \"(authenticated)\";\n}"}, "loc": ["services", "tiddlywiki", "listenOptions"], "readOnly": false, "type": "attribute set"}, "services.timesyncd.enable": {"declarations": ["nixos/modules/system/boot/timesyncd.nix"], "default": {"_type": "literalExpression", "text": "!config.boot.isContainer"}, "description": {"_type": "mdDoc", "text": "Enables the systemd NTP client daemon.\n"}, "loc": ["services", "timesyncd", "enable"], "readOnly": false, "type": "boolean"}, "services.timesyncd.extraConfig": {"declarations": ["nixos/modules/system/boot/timesyncd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config options for systemd-timesyncd. See\n[\ntimesyncd.conf(5)](https://www.freedesktop.org/software/systemd/man/timesyncd.conf.html) for available options.\n"}, "example": {"_type": "literalExpression", "text": "''\n  PollIntervalMaxSec=180\n''"}, "loc": ["services", "timesyncd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.timesyncd.servers": {"declarations": ["nixos/modules/system/boot/timesyncd.nix"], "default": {"_type": "literalExpression", "text": "config.networking.timeServers"}, "description": {"_type": "mdDoc", "text": "The set of NTP servers from which to synchronise.\n"}, "loc": ["services", "timesyncd", "servers"], "readOnly": false, "type": "list of string"}, "services.tinc.networks": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Defines the tinc networks which will be started.\nEach network invokes a different daemon.\n"}, "loc": ["services", "tinc", "networks"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.tinc.networks.<name>.bindToAddress": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The ip address to bind to (both listen on and send packets from).\n"}, "loc": ["services", "tinc", "networks", "<name>", "bindToAddress"], "readOnly": false, "type": "null or string"}, "services.tinc.networks.<name>.chroot": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Change process root directory to the directory where the config file is located (/etc/tinc/netname/), for added security.\nThe chroot is performed after all the initialization is done, after writing pid files and opening network sockets.\n\nNote that this currently breaks dns resolution and tinc can't run scripts anymore (such as tinc-down or host-up), unless it is setup to be runnable inside chroot environment.\n"}, "loc": ["services", "tinc", "networks", "<name>", "chroot"], "readOnly": false, "type": "boolean"}, "services.tinc.networks.<name>.debugLevel": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "The amount of debugging information to add to the log. 0 means little\nlogging while 5 is the most logging. {command}`man tincd` for\nmore details.\n"}, "loc": ["services", "tinc", "networks", "<name>", "debugLevel"], "readOnly": false, "type": "signed integer"}, "services.tinc.networks.<name>.ed25519PrivateKeyFile": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path of the private ed25519 keyfile.\n"}, "loc": ["services", "tinc", "networks", "<name>", "ed25519PrivateKeyFile"], "readOnly": false, "type": "null or path"}, "services.tinc.networks.<name>.extraConfig": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to add to the tinc service configuration file.\n\nNote that using the declarative {option}`service.tinc.networks.<name>.settings`\noption is preferred.\n"}, "loc": ["services", "tinc", "networks", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.tinc.networks.<name>.hostSettings": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The name of the host in the network as well as the configuration for that host.\nThis name should only contain alphanumerics and underscores.\n"}, "example": {"_type": "literalExpression", "text": "{\n  host1 = {\n    addresses = [\n      { address = \"192.168.1.42\"; }\n      { address = \"192.168.1.42\"; port = 1655; }\n    ];\n    subnets = [ { address = \"10.0.0.42\"; } ];\n    rsaPublicKey = \"...\";\n    settings = {\n      Ed25519PublicKey = \"...\";\n    };\n  };\n  host2 = {\n    subnets = [ { address = \"10.0.1.0\"; prefixLength = 24; weight = 2; } ];\n    rsaPublicKey = \"...\";\n    settings = {\n      Compression = 10;\n    };\n  };\n}\n"}, "loc": ["services", "tinc", "networks", "<name>", "hostSettings"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.tinc.networks.<name>.hostSettings.<name>.addresses": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The external address where the host can be reached. This will set this\nhost's {option}`settings.Address` option.\n\nThis variable is only required if you want to connect to this host.\n"}, "loc": ["services", "tinc", "networks", "<name>", "hostSettings", "<name>", "addresses"], "readOnly": false, "type": "list of (submodule)"}, "services.tinc.networks.<name>.hostSettings.<name>.addresses.*.address": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "description": {"_type": "mdDoc", "text": "The external IP address or hostname where the host can be reached."}, "loc": ["services", "tinc", "networks", "<name>", "hostSettings", "<name>", "addresses", "*", "address"], "readOnly": false, "type": "string"}, "services.tinc.networks.<name>.hostSettings.<name>.addresses.*.port": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The port where the host can be reached.\n\nIf no port is specified, the default Port is used.\n"}, "loc": ["services", "tinc", "networks", "<name>", "hostSettings", "<name>", "addresses", "*", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tinc.networks.<name>.hostSettings.<name>.rsaPublicKey": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Legacy RSA public key of the host in PEM format, including start and\nend markers.\n\nThis will be appended as-is in the host's configuration file.\n\nThe ed25519 public key can be specified using the\n{option}`settings.Ed25519PublicKey` option instead.\n"}, "loc": ["services", "tinc", "networks", "<name>", "hostSettings", "<name>", "rsaPublicKey"], "readOnly": false, "type": "string"}, "services.tinc.networks.<name>.hostSettings.<name>.settings": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for this host.\n\nSee <https://tinc-vpn.org/documentation-1.1/Host-configuration-variables.html>\nfor supported values.\n"}, "loc": ["services", "tinc", "networks", "<name>", "hostSettings", "<name>", "settings"], "readOnly": false, "type": "attribute set of (boolean or string or signed integer or list of (boolean or string or signed integer))"}, "services.tinc.networks.<name>.hostSettings.<name>.subnets": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The subnets which this tinc daemon will serve. This will set this\nhost's {option}`settings.Subnet` option.\n\nTinc tries to look up which other daemon it should send a packet to by\nsearching the appropriate subnet. If the packet matches a subnet, it\nwill be sent to the daemon who has this subnet in his host\nconfiguration file.\n"}, "loc": ["services", "tinc", "networks", "<name>", "hostSettings", "<name>", "subnets"], "readOnly": false, "type": "list of (submodule)"}, "services.tinc.networks.<name>.hostSettings.<name>.subnets.*.address": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "description": {"_type": "mdDoc", "text": "The subnet of this host.\n\nSubnets can either be single MAC, IPv4 or IPv6 addresses, in which case\na subnet consisting of only that single address is assumed, or they can\nbe a IPv4 or IPv6 network address with a prefix length.\n\nIPv4 subnets are notated like 192.168.1.0/24, IPv6 subnets are notated\nlike fec0:0:0:1::/64. MAC addresses are notated like 0:1a:2b:3c:4d:5e.\n\nNote that subnets like 192.168.1.1/24 are invalid.\n"}, "loc": ["services", "tinc", "networks", "<name>", "hostSettings", "<name>", "subnets", "*", "address"], "readOnly": false, "type": "string"}, "services.tinc.networks.<name>.hostSettings.<name>.subnets.*.prefixLength": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The prefix length of the subnet.\n\nIf null, a subnet consisting of only that single address is assumed.\n\nThis conforms to standard CIDR notation as described in RFC1519.\n"}, "loc": ["services", "tinc", "networks", "<name>", "hostSettings", "<name>", "subnets", "*", "prefixLength"], "readOnly": false, "type": "null or signed integer"}, "services.tinc.networks.<name>.hostSettings.<name>.subnets.*.weight": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Indicates the priority over identical Subnets owned by different nodes.\n\nLower values indicate higher priority. Packets will be sent to the\nnode with the highest priority, unless that node is not reachable, in\nwhich case the node with the next highest priority will be tried, and\nso on.\n"}, "loc": ["services", "tinc", "networks", "<name>", "hostSettings", "<name>", "subnets", "*", "weight"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.tinc.networks.<name>.hosts": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The name of the host in the network as well as the configuration for that host.\nThis name should only contain alphanumerics and underscores.\n\nNote that using the declarative {option}`service.tinc.networks.<name>.hostSettings`\noption is preferred.\n"}, "loc": ["services", "tinc", "networks", "<name>", "hosts"], "readOnly": false, "type": "attribute set of strings concatenated with \"\\n\""}, "services.tinc.networks.<name>.interfaceType": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "\"tun\""}, "description": {"_type": "mdDoc", "text": "The type of virtual interface used for the network connection.\n"}, "loc": ["services", "tinc", "networks", "<name>", "interfaceType"], "readOnly": false, "type": "one of \"tun\", \"tap\""}, "services.tinc.networks.<name>.listenAddress": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The ip address to listen on for incoming connections.\n"}, "loc": ["services", "tinc", "networks", "<name>", "listenAddress"], "readOnly": false, "type": "null or string"}, "services.tinc.networks.<name>.name": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the node which is used as an identifier when communicating\nwith the remote nodes in the mesh. If null then the hostname of the system\nis used to derive a name (note that tinc may replace non-alphanumeric characters in\nhostnames by underscores).\n"}, "loc": ["services", "tinc", "networks", "<name>", "name"], "readOnly": false, "type": "null or string"}, "services.tinc.networks.<name>.package": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "pkgs.tinc_pre"}, "description": {"_type": "mdDoc", "text": "The package to use for the tinc daemon's binary.\n"}, "loc": ["services", "tinc", "networks", "<name>", "package"], "readOnly": false, "type": "package"}, "services.tinc.networks.<name>.rsaPrivateKeyFile": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path of the private RSA keyfile.\n"}, "loc": ["services", "tinc", "networks", "<name>", "rsaPrivateKeyFile"], "readOnly": false, "type": "null or path"}, "services.tinc.networks.<name>.settings": {"declarations": ["nixos/modules/services/networking/tinc.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration of the Tinc daemon for this network.\n\nSee <https://tinc-vpn.org/documentation-1.1/Main-configuration-variables.html>\nfor supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Interface = \"custom.interface\";\n  DirectOnly = true;\n  Mode = \"switch\";\n}\n"}, "loc": ["services", "tinc", "networks", "<name>", "settings"], "readOnly": false, "type": "attribute set of (boolean or string or signed integer or list of (boolean or string or signed integer))"}, "services.tinydns.data": {"declarations": ["nixos/modules/services/networking/tinydns.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The DNS data to serve, in the format described by tinydns-data(8)"}, "loc": ["services", "tinydns", "data"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.tinydns.enable": {"declarations": ["nixos/modules/services/networking/tinydns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the tinydns dns server"}, "loc": ["services", "tinydns", "enable"], "readOnly": false, "type": "boolean"}, "services.tinydns.ip": {"declarations": ["nixos/modules/services/networking/tinydns.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IP address on which to listen for connections"}, "loc": ["services", "tinydns", "ip"], "readOnly": false, "type": "string"}, "services.tlp.enable": {"declarations": ["nixos/modules/services/hardware/tlp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the TLP power management daemon."}, "loc": ["services", "tlp", "enable"], "readOnly": false, "type": "boolean"}, "services.tlp.extraConfig": {"declarations": ["nixos/modules/services/hardware/tlp.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim additional configuration variables for TLP.\nDEPRECATED: use services.tlp.settings instead.\n"}, "loc": ["services", "tlp", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.tlp.settings": {"declarations": ["nixos/modules/services/hardware/tlp.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Options passed to TLP. See https://linrunner.de/tlp for all supported options..\n"}, "example": {"_type": "literalExpression", "text": "{\n  SATA_LINKPWR_ON_BAT = \"med_power_with_dipm\";\n  USB_BLACKLIST_PHONE = 1;\n}"}, "loc": ["services", "tlp", "settings"], "readOnly": false, "type": "attribute set of (boolean or signed integer or floating point number or string or list of string)"}, "services.tmate-ssh-server.advertisedPort": {"declarations": ["nixos/modules/services/networking/tmate-ssh-server.nix"], "description": {"_type": "mdDoc", "text": "External port advertised to clients"}, "loc": ["services", "tmate-ssh-server", "advertisedPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tmate-ssh-server.enable": {"declarations": ["nixos/modules/services/networking/tmate-ssh-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable tmate ssh server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tmate-ssh-server", "enable"], "readOnly": false, "type": "boolean"}, "services.tmate-ssh-server.host": {"declarations": ["nixos/modules/services/networking/tmate-ssh-server.nix"], "default": {"_type": "literalExpression", "text": "config.networking.domain or config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "External host name"}, "loc": ["services", "tmate-ssh-server", "host"], "readOnly": false, "type": "string"}, "services.tmate-ssh-server.keysDir": {"declarations": ["nixos/modules/services/networking/tmate-ssh-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Directory containing ssh keys, defaulting to auto-generation"}, "loc": ["services", "tmate-ssh-server", "keysDir"], "readOnly": false, "type": "null or string"}, "services.tmate-ssh-server.openFirewall": {"declarations": ["nixos/modules/services/networking/tmate-ssh-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to automatically open the specified ports in the firewall."}, "loc": ["services", "tmate-ssh-server", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.tmate-ssh-server.package": {"declarations": ["nixos/modules/services/networking/tmate-ssh-server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.tmate-ssh-server"}, "description": {"_type": "mdDoc", "text": "The package containing tmate-ssh-server"}, "loc": ["services", "tmate-ssh-server", "package"], "readOnly": false, "type": "package"}, "services.tmate-ssh-server.port": {"declarations": ["nixos/modules/services/networking/tmate-ssh-server.nix"], "default": {"_type": "literalExpression", "text": "2222"}, "description": {"_type": "mdDoc", "text": "Listen port for the ssh server"}, "loc": ["services", "tmate-ssh-server", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tomcat.axis2.enable": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable an Apache Axis2 container"}, "loc": ["services", "tomcat", "axis2", "enable"], "readOnly": false, "type": "boolean"}, "services.tomcat.axis2.services": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List containing AAR files or directories with AAR files which are web services to be deployed on Axis2"}, "loc": ["services", "tomcat", "axis2", "services"], "readOnly": false, "type": "list of string"}, "services.tomcat.baseDir": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "\"/var/tomcat\""}, "description": {"_type": "mdDoc", "text": "Location where Tomcat stores configuration files, web applications\nand logfiles. Note that it is partially cleared on each service startup\nif `purifyOnStart` is enabled.\n"}, "loc": ["services", "tomcat", "baseDir"], "readOnly": false, "type": "path"}, "services.tomcat.catalinaOpts": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Parameters to pass to the Java Virtual Machine which spawns the Catalina servlet container"}, "loc": ["services", "tomcat", "catalinaOpts"], "readOnly": false, "type": "(list of string) or string"}, "services.tomcat.commonLibs": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List containing JAR files or directories with JAR files which are libraries shared by the web applications and the servlet container"}, "loc": ["services", "tomcat", "commonLibs"], "readOnly": false, "type": "list of string"}, "services.tomcat.enable": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Apache Tomcat."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tomcat", "enable"], "readOnly": false, "type": "boolean"}, "services.tomcat.extraConfigFiles": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra configuration files to pull into the tomcat conf directory"}, "loc": ["services", "tomcat", "extraConfigFiles"], "readOnly": false, "type": "list of path"}, "services.tomcat.extraEnvironment": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Environment Variables to pass to the tomcat service"}, "example": {"_type": "literalExpression", "text": "[\n  \"ENVIRONMENT=production\"\n]"}, "loc": ["services", "tomcat", "extraEnvironment"], "readOnly": false, "type": "list of string"}, "services.tomcat.extraGroups": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Defines extra groups to which the tomcat user belongs."}, "example": {"_type": "literalExpression", "text": "[\n  \"users\"\n]"}, "loc": ["services", "tomcat", "extraGroups"], "readOnly": false, "type": "list of string"}, "services.tomcat.group": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "\"tomcat\""}, "description": {"_type": "mdDoc", "text": "Group account under which Apache Tomcat runs."}, "loc": ["services", "tomcat", "group"], "readOnly": false, "type": "string"}, "services.tomcat.javaOpts": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Parameters to pass to the Java Virtual Machine which spawns Apache Tomcat"}, "loc": ["services", "tomcat", "javaOpts"], "readOnly": false, "type": "(list of string) or string"}, "services.tomcat.jdk": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "pkgs.jdk"}, "description": {"_type": "mdDoc", "text": "Which JDK to use."}, "loc": ["services", "tomcat", "jdk"], "readOnly": false, "type": "package"}, "services.tomcat.logDirs": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Directories to create in baseDir/logs/"}, "loc": ["services", "tomcat", "logDirs"], "readOnly": false, "type": "list of path"}, "services.tomcat.logPerVirtualHost": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable logging per virtual host."}, "loc": ["services", "tomcat", "logPerVirtualHost"], "readOnly": false, "type": "boolean"}, "services.tomcat.package": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "pkgs.tomcat9"}, "description": {"_type": "mdDoc", "text": "Which tomcat package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.tomcat9"}, "loc": ["services", "tomcat", "package"], "readOnly": false, "type": "package"}, "services.tomcat.purifyOnStart": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "On startup, the `baseDir` directory is populated with various files,\nsubdirectories and symlinks. If this option is enabled, these items\n(except for the `logs` and `work` subdirectories) are first removed.\nThis prevents interference from remainders of an old configuration\n(libraries, webapps, etc.), so it's recommended to enable this option.\n"}, "loc": ["services", "tomcat", "purifyOnStart"], "readOnly": false, "type": "boolean"}, "services.tomcat.serverXml": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Verbatim server.xml configuration.\nThis is mutually exclusive with the virtualHosts options.\n"}, "loc": ["services", "tomcat", "serverXml"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.tomcat.sharedLibs": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List containing JAR files or directories with JAR files which are libraries shared by the web applications"}, "loc": ["services", "tomcat", "sharedLibs"], "readOnly": false, "type": "list of string"}, "services.tomcat.user": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "\"tomcat\""}, "description": {"_type": "mdDoc", "text": "User account under which Apache Tomcat runs."}, "loc": ["services", "tomcat", "user"], "readOnly": false, "type": "string"}, "services.tomcat.virtualHosts": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List consisting of a virtual host name and a list of web applications to deploy on each virtual host"}, "loc": ["services", "tomcat", "virtualHosts"], "readOnly": false, "type": "list of (submodule)"}, "services.tomcat.virtualHosts.*.aliases": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "aliases of the virtualhost"}, "loc": ["services", "tomcat", "virtualHosts", "*", "aliases"], "readOnly": false, "type": "list of string"}, "services.tomcat.virtualHosts.*.name": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "description": {"_type": "mdDoc", "text": "name of the virtualhost"}, "loc": ["services", "tomcat", "virtualHosts", "*", "name"], "readOnly": false, "type": "string"}, "services.tomcat.virtualHosts.*.webapps": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List containing web application WAR files and/or directories containing\nweb applications and configuration files for the virtual host.\n"}, "loc": ["services", "tomcat", "virtualHosts", "*", "webapps"], "readOnly": false, "type": "list of path"}, "services.tomcat.webapps": {"declarations": ["nixos/modules/services/web-servers/tomcat.nix"], "default": {"_type": "literalExpression", "text": "[ config.services.tomcat.package.webapps ]"}, "description": {"_type": "mdDoc", "text": "List containing WAR files or directories with WAR files which are web applications to be deployed on Tomcat"}, "loc": ["services", "tomcat", "webapps"], "readOnly": false, "type": "list of path"}, "services.tor.client.dns.enable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable DNS resolver."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tor", "client", "dns", "enable"], "readOnly": false, "type": "boolean"}, "services.tor.client.enable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the routing of application connections.\n          You might want to disable this if you plan running a dedicated Tor relay."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tor", "client", "enable"], "readOnly": false, "type": "boolean"}, "services.tor.client.onionServices": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServiceDir).\n"}, "example": {"_type": "literalExpression", "text": "{\n  xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx = {\n    clientAuthorizations = [\n      \"/run/keys/tor/alice.prv.x25519\"\n    ];\n  };\n}"}, "loc": ["services", "tor", "client", "onionServices"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.tor.client.onionServices.<name>.clientAuthorizations": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Clients' authorizations for a v3 onion service,\nas a list of files containing each one private key, in the format:\n```\ndescriptor:x25519:<base32-private-key>\n```\nSee [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#_client_authorization).\n\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/run/keys/tor/alice.prv.x25519\"\n]"}, "loc": ["services", "tor", "client", "onionServices", "<name>", "clientAuthorizations"], "readOnly": false, "type": "list of path"}, "services.tor.client.socksListenAddress": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "{\n  IsolateDestAddr = true;\n  addr = \"127.0.0.1\";\n  port = 9050;\n}"}, "description": {"_type": "mdDoc", "text": "Bind to this address to listen for connections from\nSocks-speaking applications.\n"}, "example": {"_type": "literalExpression", "text": "{\n  IsolateDestAddr = true;\n  addr = \"192.168.0.1\";\n  port = 9090;\n}"}, "loc": ["services", "tor", "client", "socksListenAddress"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive) or (submodule)"}, "services.tor.client.transparentProxy.enable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable transparent proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tor", "client", "transparentProxy", "enable"], "readOnly": false, "type": "boolean"}, "services.tor.controlSocket.enable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable control socket,\n        created in `/run/tor/control`."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tor", "controlSocket", "enable"], "readOnly": false, "type": "boolean"}, "services.tor.enable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Tor daemon.\n        By default, the daemon is run without\n        relay, exit, bridge or client connectivity."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tor", "enable"], "readOnly": false, "type": "boolean"}, "services.tor.enableGeoIP": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable use of GeoIP databases.\n        Disabling this will disable by-country statistics for bridges and relays\n        and some client and third-party software functionality."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tor", "enableGeoIP"], "readOnly": false, "type": "boolean"}, "services.tor.openFirewall": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable opening of the relay port(s) in the firewall."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tor", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.tor.package": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "pkgs.tor"}, "description": {"_type": "mdDoc", "text": "Tor package to use."}, "loc": ["services", "tor", "package"], "readOnly": false, "type": "package"}, "services.tor.relay.enable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable relaying of Tor traffic for others.\n\nSee <https://www.torproject.org/docs/tor-doc-relay>\nfor details.\n\nSetting this to true requires setting\n{option}`services.tor.relay.role`\nand\n{option}`services.tor.settings.ORPort`\noptions.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tor", "relay", "enable"], "readOnly": false, "type": "boolean"}, "services.tor.relay.onionServices": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServiceDir).\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"example.org/www\" = {\n    authorizedClients = [\n      \"descriptor:x25519:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\"\n    ];\n    map = [\n      80\n    ];\n  };\n}"}, "loc": ["services", "tor", "relay", "onionServices"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.tor.relay.onionServices.<name>.authorizeClient": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServiceAuthorizeClient).\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "authorizeClient"], "readOnly": false, "type": "null or (submodule)"}, "services.tor.relay.onionServices.<name>.authorizeClient.authType": {"declarations": ["nixos/modules/services/security/tor.nix"], "description": {"_type": "mdDoc", "text": "Either `\"basic\"` for a general-purpose authorization protocol\nor `\"stealth\"` for a less scalable protocol\nthat also hides service activity from unauthorized clients.\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "authorizeClient", "authType"], "readOnly": false, "type": "one of \"basic\", \"stealth\""}, "services.tor.relay.onionServices.<name>.authorizeClient.clientNames": {"declarations": ["nixos/modules/services/security/tor.nix"], "description": {"_type": "mdDoc", "text": "Only clients that are listed here are authorized to access the hidden service.\nGenerated authorization data can be found in {file}`/var/lib/tor/onion/$name/hostname`.\nClients need to put this authorization data in their configuration file using\n[](#opt-services.tor.settings.HidServAuth).\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "authorizeClient", "clientNames"], "readOnly": false, "type": "non-empty (list of string matching the pattern [A-Za-z0-9+-_]+)"}, "services.tor.relay.onionServices.<name>.authorizedClients": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Authorized clients for a v3 onion service,\nas a list of public key, in the format:\n```\ndescriptor:x25519:<base32-public-key>\n```\nSee [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#_client_authorization).\n\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"descriptor:x25519:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\"\n]"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "authorizedClients"], "readOnly": false, "type": "list of string"}, "services.tor.relay.onionServices.<name>.map": {"declarations": ["nixos/modules/services/security/tor.nix"], "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServicePort).\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "map"], "readOnly": false, "type": "list of (16 bit unsigned integer; between 0 and 65535 (both inclusive) or (submodule))"}, "services.tor.relay.onionServices.<name>.path": {"declarations": ["nixos/modules/services/security/tor.nix"], "description": {"_type": "mdDoc", "text": "Path where to store the data files of the hidden service.\nIf the {option}`secretKey` is null\nthis defaults to `/var/lib/tor/onion/$onion`,\notherwise to `/run/tor/onion/$onion`.\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "path"], "readOnly": false, "type": "path"}, "services.tor.relay.onionServices.<name>.secretKey": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Secret key of the onion service.\nIf null, Tor reuses any preexisting secret key (in {option}`path`)\nor generates a new one.\nThe associated public key and hostname are deterministically regenerated\nfrom this file if they do not exist.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/tor/onion/expyuzz4wqqyqhjn/hs_ed25519_secret_key\""}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "secretKey"], "readOnly": false, "type": "null or path"}, "services.tor.relay.onionServices.<name>.settings": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings of the onion service.\nSee [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#_hidden_service_options).\n\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "settings"], "readOnly": false, "type": "settings option"}, "services.tor.relay.onionServices.<name>.settings.HiddenServiceAllowUnknownPorts": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServiceAllowUnknownPorts).\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "settings", "HiddenServiceAllowUnknownPorts"], "readOnly": false, "type": "null or boolean"}, "services.tor.relay.onionServices.<name>.settings.HiddenServiceDirGroupReadable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServiceDirGroupReadable).\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "settings", "HiddenServiceDirGroupReadable"], "readOnly": false, "type": "null or boolean"}, "services.tor.relay.onionServices.<name>.settings.HiddenServiceExportCircuitID": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServiceExportCircuitID).\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "settings", "HiddenServiceExportCircuitID"], "readOnly": false, "type": "null or value \"haproxy\" (singular enum)"}, "services.tor.relay.onionServices.<name>.settings.HiddenServiceMaxStreams": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServiceMaxStreams).\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "settings", "HiddenServiceMaxStreams"], "readOnly": false, "type": "null or integer between 0 and 65535 (both inclusive)"}, "services.tor.relay.onionServices.<name>.settings.HiddenServiceMaxStreamsCloseCircuit": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServiceMaxStreamsCloseCircuit).\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "settings", "HiddenServiceMaxStreamsCloseCircuit"], "readOnly": false, "type": "null or boolean"}, "services.tor.relay.onionServices.<name>.settings.HiddenServiceNumIntroductionPoints": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServiceNumIntroductionPoints).\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "settings", "HiddenServiceNumIntroductionPoints"], "readOnly": false, "type": "null or integer between 0 and 20 (both inclusive)"}, "services.tor.relay.onionServices.<name>.settings.HiddenServiceSingleHopMode": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServiceSingleHopMode).\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "settings", "HiddenServiceSingleHopMode"], "readOnly": false, "type": "null or boolean"}, "services.tor.relay.onionServices.<name>.settings.RendPostPeriod": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#RendPostPeriod).\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "settings", "RendPostPeriod"], "readOnly": false, "type": "null or string"}, "services.tor.relay.onionServices.<name>.version": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServiceVersion).\n"}, "loc": ["services", "tor", "relay", "onionServices", "<name>", "version"], "readOnly": false, "type": "null or one of 2, 3"}, "services.tor.relay.role": {"declarations": ["nixos/modules/services/security/tor.nix"], "description": {"_type": "mdDoc", "text": "Your role in Tor network. There're several options:\n\n- `exit`:\n  An exit relay. This allows Tor users to access regular\n  Internet services through your public IP.\n\n  You can specify which services Tor users may access via\n  your exit relay using {option}`settings.ExitPolicy` option.\n\n- `relay`:\n  Regular relay. This allows Tor users to relay onion\n  traffic to other Tor nodes, but not to public\n  Internet.\n\n  See\n  <https://www.torproject.org/docs/tor-doc-relay.html.en>\n  for more info.\n\n- `bridge`:\n  Regular bridge. Works like a regular relay, but\n  doesn't list you in the public relay directory and\n  hides your Tor node behind obfs4proxy.\n\n  Using this option will make Tor advertise your bridge\n  to users through various mechanisms like\n  <https://bridges.torproject.org/>, though.\n\n  See <https://www.torproject.org/docs/bridges.html.en>\n  for more info.\n\n- `private-bridge`:\n  Private bridge. Works like regular bridge, but does\n  not advertise your node in any way.\n\n  Using this role means that you won't contribute to Tor\n  network in any way unless you advertise your node\n  yourself in some way.\n\n  Use this if you want to run a private bridge, for\n  example because you'll give out your bridge addr\n  manually to your friends.\n\n  Switching to this role after measurable time in\n  \"bridge\" role is pretty useless as some Tor users\n  would have learned about your node already. In the\n  latter case you can still change\n  {option}`port` option.\n\n  See <https://www.torproject.org/docs/bridges.html.en>\n  for more info.\n\n::: {.important}\nRunning an exit relay may expose you to abuse\ncomplaints. See\n<https://www.torproject.org/faq.html.en#ExitPolicies>\nfor more info.\n:::\n\n::: {.important}\nNote that some misconfigured and/or disrespectful\ntowards privacy sites will block you even if your\nrelay is not an exit relay. That is, just being listed\nin a public relay directory can have unwanted\nconsequences.\n\nWhich means you might not want to use\nthis role if you browse public Internet from the same\nnetwork as your relay, unless you want to write\ne-mails to those sites (you should!).\n:::\n\n::: {.important}\nWARNING: THE FOLLOWING PARAGRAPH IS NOT LEGAL ADVICE.\nConsult with your lawyer when in doubt.\n\nThe `bridge` role should be safe to use in most situations\n(unless the act of forwarding traffic for others is\na punishable offence under your local laws, which\nwould be pretty insane as it would make ISP illegal).\n:::\n"}, "loc": ["services", "tor", "relay", "role"], "readOnly": false, "type": "one of \"exit\", \"relay\", \"bridge\", \"private-bridge\""}, "services.tor.settings": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en)\nfor documentation.\n"}, "loc": ["services", "tor", "settings"], "readOnly": false, "type": "settings option"}, "services.tor.settings.AccountingMax": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#AccountingMax).\n"}, "loc": ["services", "tor", "settings", "AccountingMax"], "readOnly": false, "type": "null or signed integer or string"}, "services.tor.settings.AccountingStart": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#AccountingStart).\n"}, "loc": ["services", "tor", "settings", "AccountingStart"], "readOnly": false, "type": "null or string"}, "services.tor.settings.Address": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#Address).\n"}, "loc": ["services", "tor", "settings", "Address"], "readOnly": false, "type": "null or string"}, "services.tor.settings.AssumeReachable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#AssumeReachable).\n"}, "loc": ["services", "tor", "settings", "AssumeReachable"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.AuthDirHasIPv6Connectivity": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#AuthDirHasIPv6Connectivity).\n"}, "loc": ["services", "tor", "settings", "AuthDirHasIPv6Connectivity"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.AuthDirListBadExits": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#AuthDirListBadExits).\n"}, "loc": ["services", "tor", "settings", "AuthDirListBadExits"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.AuthDirPinKeys": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#AuthDirPinKeys).\n"}, "loc": ["services", "tor", "settings", "AuthDirPinKeys"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.AuthDirSharedRandomness": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#AuthDirSharedRandomness).\n"}, "loc": ["services", "tor", "settings", "AuthDirSharedRandomness"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.AuthDirTestEd25519LinkKeys": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#AuthDirTestEd25519LinkKeys).\n"}, "loc": ["services", "tor", "settings", "AuthDirTestEd25519LinkKeys"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.AuthoritativeDirectory": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#AuthoritativeDirectory).\n"}, "loc": ["services", "tor", "settings", "AuthoritativeDirectory"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.AutomapHostsOnResolve": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#AutomapHostsOnResolve).\n"}, "loc": ["services", "tor", "settings", "AutomapHostsOnResolve"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.AutomapHostsSuffixes": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[\n  \".onion\"\n  \".exit\"\n]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#AutomapHostsSuffixes).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \".onion\"\n]"}, "loc": ["services", "tor", "settings", "AutomapHostsSuffixes"], "readOnly": false, "type": "list of string"}, "services.tor.settings.BandwidthBurst": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#BandwidthBurst).\n"}, "loc": ["services", "tor", "settings", "BandwidthBurst"], "readOnly": false, "type": "null or signed integer or string"}, "services.tor.settings.BandwidthRate": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#BandwidthRate).\n"}, "loc": ["services", "tor", "settings", "BandwidthRate"], "readOnly": false, "type": "null or signed integer or string"}, "services.tor.settings.BridgeAuthoritativeDir": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#BridgeAuthoritativeDir).\n"}, "loc": ["services", "tor", "settings", "BridgeAuthoritativeDir"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.BridgeRecordUsageByCountry": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#BridgeRecordUsageByCountry).\n"}, "loc": ["services", "tor", "settings", "BridgeRecordUsageByCountry"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.BridgeRelay": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#BridgeRelay).\n"}, "loc": ["services", "tor", "settings", "BridgeRelay"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.CacheDirectory": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#CacheDirectory).\n"}, "loc": ["services", "tor", "settings", "CacheDirectory"], "readOnly": false, "type": "null or path"}, "services.tor.settings.CacheDirectoryGroupReadable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#CacheDirectoryGroupReadable).\n"}, "loc": ["services", "tor", "settings", "CacheDirectoryGroupReadable"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.CellStatistics": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#CellStatistics).\n"}, "loc": ["services", "tor", "settings", "CellStatistics"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ClientAutoIPv6ORPort": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ClientAutoIPv6ORPort).\n"}, "loc": ["services", "tor", "settings", "ClientAutoIPv6ORPort"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ClientDNSRejectInternalAddresses": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ClientDNSRejectInternalAddresses).\n"}, "loc": ["services", "tor", "settings", "ClientDNSRejectInternalAddresses"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ClientOnionAuthDir": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ClientOnionAuthDir).\n"}, "loc": ["services", "tor", "settings", "ClientOnionAuthDir"], "readOnly": false, "type": "null or path"}, "services.tor.settings.ClientPreferIPv6DirPort": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ClientPreferIPv6DirPort).\n"}, "loc": ["services", "tor", "settings", "ClientPreferIPv6DirPort"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ClientPreferIPv6ORPort": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ClientPreferIPv6ORPort).\n"}, "loc": ["services", "tor", "settings", "ClientPreferIPv6ORPort"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ClientRejectInternalAddresses": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ClientRejectInternalAddresses).\n"}, "loc": ["services", "tor", "settings", "ClientRejectInternalAddresses"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ClientUseIPv4": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ClientUseIPv4).\n"}, "loc": ["services", "tor", "settings", "ClientUseIPv4"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ClientUseIPv6": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ClientUseIPv6).\n"}, "loc": ["services", "tor", "settings", "ClientUseIPv6"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ConnDirectionStatistics": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ConnDirectionStatistics).\n"}, "loc": ["services", "tor", "settings", "ConnDirectionStatistics"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ConstrainedSockets": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ConstrainedSockets).\n"}, "loc": ["services", "tor", "settings", "ConstrainedSockets"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ContactInfo": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ContactInfo).\n"}, "loc": ["services", "tor", "settings", "ContactInfo"], "readOnly": false, "type": "null or string"}, "services.tor.settings.ControlPort": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ControlPort).\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    port = 9051;\n  }\n]"}, "loc": ["services", "tor", "settings", "ControlPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or list of (16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or (submodule))"}, "services.tor.settings.ControlPortFileGroupReadable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ControlPortFileGroupReadable).\n"}, "loc": ["services", "tor", "settings", "ControlPortFileGroupReadable"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ControlPortWriteToFile": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ControlPortWriteToFile).\n"}, "loc": ["services", "tor", "settings", "ControlPortWriteToFile"], "readOnly": false, "type": "null or path"}, "services.tor.settings.ControlSocket": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ControlSocket).\n"}, "loc": ["services", "tor", "settings", "ControlSocket"], "readOnly": false, "type": "null or path"}, "services.tor.settings.ControlSocketsGroupWritable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ControlSocketsGroupWritable).\n"}, "loc": ["services", "tor", "settings", "ControlSocketsGroupWritable"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.CookieAuthFile": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#CookieAuthFile).\n"}, "loc": ["services", "tor", "settings", "CookieAuthFile"], "readOnly": false, "type": "null or path"}, "services.tor.settings.CookieAuthFileGroupReadable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#CookieAuthFileGroupReadable).\n"}, "loc": ["services", "tor", "settings", "CookieAuthFileGroupReadable"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.CookieAuthentication": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#CookieAuthentication).\n"}, "loc": ["services", "tor", "settings", "CookieAuthentication"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DNSPort": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DNSPort).\n"}, "loc": ["services", "tor", "settings", "DNSPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or (submodule) or list of (16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or (submodule))"}, "services.tor.settings.DataDirectory": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/tor\""}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DataDirectory).\n"}, "loc": ["services", "tor", "settings", "DataDirectory"], "readOnly": false, "type": "null or path"}, "services.tor.settings.DataDirectoryGroupReadable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DataDirectoryGroupReadable).\n"}, "loc": ["services", "tor", "settings", "DataDirectoryGroupReadable"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DirAllowPrivateAddresses": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DirAllowPrivateAddresses).\n"}, "loc": ["services", "tor", "settings", "DirAllowPrivateAddresses"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DirCache": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DirCache).\n"}, "loc": ["services", "tor", "settings", "DirCache"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DirPolicy": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DirPolicy).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"accept *:*\"\n]"}, "loc": ["services", "tor", "settings", "DirPolicy"], "readOnly": false, "type": "list of string"}, "services.tor.settings.DirPort": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DirPort).\n"}, "example": {"_type": "literalExpression", "text": "443"}, "loc": ["services", "tor", "settings", "DirPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or list of (16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or (submodule))"}, "services.tor.settings.DirPortFrontPage": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DirPortFrontPage).\n"}, "loc": ["services", "tor", "settings", "DirPortFrontPage"], "readOnly": false, "type": "null or path"}, "services.tor.settings.DirReqStatistics": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DirReqStatistics).\n"}, "loc": ["services", "tor", "settings", "DirReqStatistics"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DisableAllSwap": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DisableAllSwap).\n"}, "loc": ["services", "tor", "settings", "DisableAllSwap"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DisableDebuggerAttachment": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DisableDebuggerAttachment).\n"}, "loc": ["services", "tor", "settings", "DisableDebuggerAttachment"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DisableNetwork": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DisableNetwork).\n"}, "loc": ["services", "tor", "settings", "DisableNetwork"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DisableOOSCheck": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DisableOOSCheck).\n"}, "loc": ["services", "tor", "settings", "DisableOOSCheck"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DoSCircuitCreationEnabled": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DoSCircuitCreationEnabled).\n"}, "loc": ["services", "tor", "settings", "DoSCircuitCreationEnabled"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DoSConnectionEnabled": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DoSConnectionEnabled).\n"}, "loc": ["services", "tor", "settings", "DoSConnectionEnabled"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DoSRefuseSingleHopClientRendezvous": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DoSRefuseSingleHopClientRendezvous).\n"}, "loc": ["services", "tor", "settings", "DoSRefuseSingleHopClientRendezvous"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DormantCanceledByStartup": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DormantCanceledByStartup).\n"}, "loc": ["services", "tor", "settings", "DormantCanceledByStartup"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DormantOnFirstStartup": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DormantOnFirstStartup).\n"}, "loc": ["services", "tor", "settings", "DormantOnFirstStartup"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DormantTimeoutDisabledByIdleStreams": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DormantTimeoutDisabledByIdleStreams).\n"}, "loc": ["services", "tor", "settings", "DormantTimeoutDisabledByIdleStreams"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.DownloadExtraInfo": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#DownloadExtraInfo).\n"}, "loc": ["services", "tor", "settings", "DownloadExtraInfo"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.EnforceDistinctSubnets": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#EnforceDistinctSubnets).\n"}, "loc": ["services", "tor", "settings", "EnforceDistinctSubnets"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.EntryStatistics": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#EntryStatistics).\n"}, "loc": ["services", "tor", "settings", "EntryStatistics"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ExitPolicy": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"reject *:*\"\n]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ExitPolicy).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"accept *:*\"\n]"}, "loc": ["services", "tor", "settings", "ExitPolicy"], "readOnly": false, "type": "list of string"}, "services.tor.settings.ExitPolicyRejectLocalInterfaces": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ExitPolicyRejectLocalInterfaces).\n"}, "loc": ["services", "tor", "settings", "ExitPolicyRejectLocalInterfaces"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ExitPolicyRejectPrivate": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ExitPolicyRejectPrivate).\n"}, "loc": ["services", "tor", "settings", "ExitPolicyRejectPrivate"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ExitPortStatistics": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ExitPortStatistics).\n"}, "loc": ["services", "tor", "settings", "ExitPortStatistics"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ExitRelay": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ExitRelay).\n"}, "loc": ["services", "tor", "settings", "ExitRelay"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ExtORPort": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ExtORPort).\n"}, "loc": ["services", "tor", "settings", "ExtORPort"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or (submodule)"}, "services.tor.settings.ExtORPortCookieAuthFile": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ExtORPortCookieAuthFile).\n"}, "loc": ["services", "tor", "settings", "ExtORPortCookieAuthFile"], "readOnly": false, "type": "null or path"}, "services.tor.settings.ExtORPortCookieAuthFileGroupReadable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ExtORPortCookieAuthFileGroupReadable).\n"}, "loc": ["services", "tor", "settings", "ExtORPortCookieAuthFileGroupReadable"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ExtendAllowPrivateAddresses": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ExtendAllowPrivateAddresses).\n"}, "loc": ["services", "tor", "settings", "ExtendAllowPrivateAddresses"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ExtraInfoStatistics": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ExtraInfoStatistics).\n"}, "loc": ["services", "tor", "settings", "ExtraInfoStatistics"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.FascistFirewall": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#FascistFirewall).\n"}, "loc": ["services", "tor", "settings", "FascistFirewall"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.FetchDirInfoEarly": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#FetchDirInfoEarly).\n"}, "loc": ["services", "tor", "settings", "FetchDirInfoEarly"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.FetchDirInfoExtraEarly": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#FetchDirInfoExtraEarly).\n"}, "loc": ["services", "tor", "settings", "FetchDirInfoExtraEarly"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.FetchHidServDescriptors": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#FetchHidServDescriptors).\n"}, "loc": ["services", "tor", "settings", "FetchHidServDescriptors"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.FetchServerDescriptors": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#FetchServerDescriptors).\n"}, "loc": ["services", "tor", "settings", "FetchServerDescriptors"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.FetchUselessDescriptors": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#FetchUselessDescriptors).\n"}, "loc": ["services", "tor", "settings", "FetchUselessDescriptors"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.GeoIPFile": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#GeoIPFile).\n"}, "loc": ["services", "tor", "settings", "GeoIPFile"], "readOnly": false, "type": "null or path"}, "services.tor.settings.GeoIPv6File": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#GeoIPv6File).\n"}, "loc": ["services", "tor", "settings", "GeoIPv6File"], "readOnly": false, "type": "null or path"}, "services.tor.settings.GuardfractionFile": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#GuardfractionFile).\n"}, "loc": ["services", "tor", "settings", "GuardfractionFile"], "readOnly": false, "type": "null or path"}, "services.tor.settings.HSLayer2Nodes": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HSLayer2Nodes).\n"}, "loc": ["services", "tor", "settings", "HSLayer2Nodes"], "readOnly": false, "type": "list of string"}, "services.tor.settings.HSLayer3Nodes": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HSLayer3Nodes).\n"}, "loc": ["services", "tor", "settings", "HSLayer3Nodes"], "readOnly": false, "type": "list of string"}, "services.tor.settings.HTTPTunnelPort": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HTTPTunnelPort).\n"}, "loc": ["services", "tor", "settings", "HTTPTunnelPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or (submodule) or list of (16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or (submodule))"}, "services.tor.settings.HidServAuth": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HidServAuth).\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    auth = \"xxxxxxxxxxxxxxxxxxxxxx\";\n    onion = \"xxxxxxxxxxxxxxxx.onion\";\n  }\n]"}, "loc": ["services", "tor", "settings", "HidServAuth"], "readOnly": false, "type": "list of (submodule)"}, "services.tor.settings.HidServAuth.*.auth": {"declarations": ["nixos/modules/services/security/tor.nix"], "description": {"_type": "mdDoc", "text": "Authentication cookie."}, "loc": ["services", "tor", "settings", "HidServAuth", "*", "auth"], "readOnly": false, "type": "string matching the pattern [A-Za-z0-9+/]{22}"}, "services.tor.settings.HidServAuth.*.onion": {"declarations": ["nixos/modules/services/security/tor.nix"], "description": {"_type": "mdDoc", "text": "Onion address."}, "example": {"_type": "literalExpression", "text": "\"xxxxxxxxxxxxxxxx.onion\""}, "loc": ["services", "tor", "settings", "HidServAuth", "*", "onion"], "readOnly": false, "type": "string matching the pattern [a-z2-7]{16}\\.onion"}, "services.tor.settings.HiddenServiceNonAnonymousMode": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServiceNonAnonymousMode).\n"}, "loc": ["services", "tor", "settings", "HiddenServiceNonAnonymousMode"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.HiddenServiceStatistics": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#HiddenServiceStatistics).\n"}, "loc": ["services", "tor", "settings", "HiddenServiceStatistics"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.IPv6Exit": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#IPv6Exit).\n"}, "loc": ["services", "tor", "settings", "IPv6Exit"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.KeyDirectory": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#KeyDirectory).\n"}, "loc": ["services", "tor", "settings", "KeyDirectory"], "readOnly": false, "type": "null or path"}, "services.tor.settings.KeyDirectoryGroupReadable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#KeyDirectoryGroupReadable).\n"}, "loc": ["services", "tor", "settings", "KeyDirectoryGroupReadable"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.LogMessageDomains": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#LogMessageDomains).\n"}, "loc": ["services", "tor", "settings", "LogMessageDomains"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.LongLivedPorts": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#LongLivedPorts).\n"}, "loc": ["services", "tor", "settings", "LongLivedPorts"], "readOnly": false, "type": "list of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tor.settings.MainloopStats": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#MainloopStats).\n"}, "loc": ["services", "tor", "settings", "MainloopStats"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.MaxAdvertisedBandwidth": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#MaxAdvertisedBandwidth).\n"}, "loc": ["services", "tor", "settings", "MaxAdvertisedBandwidth"], "readOnly": false, "type": "null or signed integer or string"}, "services.tor.settings.MaxCircuitDirtiness": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#MaxCircuitDirtiness).\n"}, "loc": ["services", "tor", "settings", "MaxCircuitDirtiness"], "readOnly": false, "type": "null or signed integer"}, "services.tor.settings.MaxClientCircuitsPending": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#MaxClientCircuitsPending).\n"}, "loc": ["services", "tor", "settings", "MaxClientCircuitsPending"], "readOnly": false, "type": "null or signed integer"}, "services.tor.settings.NATDPort": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#NATDPort).\n"}, "loc": ["services", "tor", "settings", "NATDPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or (submodule) or list of (16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or (submodule))"}, "services.tor.settings.NewCircuitPeriod": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#NewCircuitPeriod).\n"}, "loc": ["services", "tor", "settings", "NewCircuitPeriod"], "readOnly": false, "type": "null or signed integer"}, "services.tor.settings.Nickname": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#Nickname).\n"}, "loc": ["services", "tor", "settings", "Nickname"], "readOnly": false, "type": "null or string"}, "services.tor.settings.ORPort": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ORPort).\n"}, "example": {"_type": "literalExpression", "text": "443"}, "loc": ["services", "tor", "settings", "ORPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or list of (16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or (submodule))"}, "services.tor.settings.OfflineMasterKey": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#OfflineMasterKey).\n"}, "loc": ["services", "tor", "settings", "OfflineMasterKey"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.OptimisticData": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#OptimisticData).\n"}, "loc": ["services", "tor", "settings", "OptimisticData"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.PaddingStatistics": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#PaddingStatistics).\n"}, "loc": ["services", "tor", "settings", "PaddingStatistics"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.PerConnBWBurst": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#PerConnBWBurst).\n"}, "loc": ["services", "tor", "settings", "PerConnBWBurst"], "readOnly": false, "type": "null or signed integer or string"}, "services.tor.settings.PerConnBWRate": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#PerConnBWRate).\n"}, "loc": ["services", "tor", "settings", "PerConnBWRate"], "readOnly": false, "type": "null or signed integer or string"}, "services.tor.settings.PidFile": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#PidFile).\n"}, "loc": ["services", "tor", "settings", "PidFile"], "readOnly": false, "type": "null or path"}, "services.tor.settings.ProtocolWarnings": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ProtocolWarnings).\n"}, "loc": ["services", "tor", "settings", "ProtocolWarnings"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.PublishHidServDescriptors": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#PublishHidServDescriptors).\n"}, "loc": ["services", "tor", "settings", "PublishHidServDescriptors"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.PublishServerDescriptor": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#PublishServerDescriptor).\n"}, "loc": ["services", "tor", "settings", "PublishServerDescriptor"], "readOnly": false, "type": "null or one of false, true, 0, 1, \"0\", \"1\", \"v3\", \"bridge\""}, "services.tor.settings.ReachableAddresses": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ReachableAddresses).\n"}, "loc": ["services", "tor", "settings", "ReachableAddresses"], "readOnly": false, "type": "list of string"}, "services.tor.settings.ReachableDirAddresses": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ReachableDirAddresses).\n"}, "loc": ["services", "tor", "settings", "ReachableDirAddresses"], "readOnly": false, "type": "list of string"}, "services.tor.settings.ReachableORAddresses": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ReachableORAddresses).\n"}, "loc": ["services", "tor", "settings", "ReachableORAddresses"], "readOnly": false, "type": "list of string"}, "services.tor.settings.ReducedExitPolicy": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ReducedExitPolicy).\n"}, "loc": ["services", "tor", "settings", "ReducedExitPolicy"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.RefuseUnknownExits": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#RefuseUnknownExits).\n"}, "loc": ["services", "tor", "settings", "RefuseUnknownExits"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.RejectPlaintextPorts": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#RejectPlaintextPorts).\n"}, "loc": ["services", "tor", "settings", "RejectPlaintextPorts"], "readOnly": false, "type": "list of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tor.settings.RelayBandwidthBurst": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#RelayBandwidthBurst).\n"}, "loc": ["services", "tor", "settings", "RelayBandwidthBurst"], "readOnly": false, "type": "null or signed integer or string"}, "services.tor.settings.RelayBandwidthRate": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#RelayBandwidthRate).\n"}, "loc": ["services", "tor", "settings", "RelayBandwidthRate"], "readOnly": false, "type": "null or signed integer or string"}, "services.tor.settings.SOCKSPort": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "if config.services.tor.settings.HiddenServiceNonAnonymousMode == true\nthen [ { port = 0; } ]\nelse [ ]\n"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#SOCKSPort).\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    port = 9090;\n  }\n]"}, "loc": ["services", "tor", "settings", "SOCKSPort"], "readOnly": false, "type": "list of (16 bit unsigned integer; between 0 and 65535 (both inclusive) or (submodule))"}, "services.tor.settings.Sandbox": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#Sandbox).\n"}, "loc": ["services", "tor", "settings", "Sandbox"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ServerDNSAllowBrokenConfig": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ServerDNSAllowBrokenConfig).\n"}, "loc": ["services", "tor", "settings", "ServerDNSAllowBrokenConfig"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ServerDNSAllowNonRFC953Hostnames": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ServerDNSAllowNonRFC953Hostnames).\n"}, "loc": ["services", "tor", "settings", "ServerDNSAllowNonRFC953Hostnames"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ServerDNSDetectHijacking": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ServerDNSDetectHijacking).\n"}, "loc": ["services", "tor", "settings", "ServerDNSDetectHijacking"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ServerDNSRandomizeCase": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ServerDNSRandomizeCase).\n"}, "loc": ["services", "tor", "settings", "ServerDNSRandomizeCase"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ServerDNSResolvConfFile": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ServerDNSResolvConfFile).\n"}, "loc": ["services", "tor", "settings", "ServerDNSResolvConfFile"], "readOnly": false, "type": "null or path"}, "services.tor.settings.ServerDNSSearchDomains": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ServerDNSSearchDomains).\n"}, "loc": ["services", "tor", "settings", "ServerDNSSearchDomains"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.ServerTransportPlugin": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ServerTransportPlugin).\n"}, "loc": ["services", "tor", "settings", "ServerTransportPlugin"], "readOnly": false, "type": "null or (submodule)"}, "services.tor.settings.ServerTransportPlugin.exec": {"declarations": ["nixos/modules/services/security/tor.nix"], "description": {"_type": "mdDoc", "text": "Command of pluggable transport."}, "loc": ["services", "tor", "settings", "ServerTransportPlugin", "exec"], "readOnly": false, "type": "string"}, "services.tor.settings.ServerTransportPlugin.transports": {"declarations": ["nixos/modules/services/security/tor.nix"], "description": {"_type": "mdDoc", "text": "List of pluggable transports."}, "example": {"_type": "literalExpression", "text": "[\n  \"obfs2\"\n  \"obfs3\"\n  \"obfs4\"\n  \"scramblesuit\"\n]"}, "loc": ["services", "tor", "settings", "ServerTransportPlugin", "transports"], "readOnly": false, "type": "list of string"}, "services.tor.settings.ShutdownWaitLength": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#ShutdownWaitLength).\n"}, "loc": ["services", "tor", "settings", "ShutdownWaitLength"], "readOnly": false, "type": "signed integer"}, "services.tor.settings.SocksPolicy": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#SocksPolicy).\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"accept *:*\"\n]"}, "loc": ["services", "tor", "settings", "SocksPolicy"], "readOnly": false, "type": "list of string"}, "services.tor.settings.TestingTorNetwork": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#TestingTorNetwork).\n"}, "loc": ["services", "tor", "settings", "TestingTorNetwork"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.TransPort": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#TransPort).\n"}, "loc": ["services", "tor", "settings", "TransPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or (submodule) or list of (16 bit unsigned integer; between 0 and 65535 (both inclusive) or value \"auto\" (singular enum) or (submodule))"}, "services.tor.settings.TransProxyType": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#TransProxyType).\n"}, "loc": ["services", "tor", "settings", "TransProxyType"], "readOnly": false, "type": "null or one of \"default\", \"TPROXY\", \"ipfw\", \"pf-divert\""}, "services.tor.settings.UnixSocksGroupWritable": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#UnixSocksGroupWritable).\n"}, "loc": ["services", "tor", "settings", "UnixSocksGroupWritable"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.UseDefaultFallbackDirs": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#UseDefaultFallbackDirs).\n"}, "loc": ["services", "tor", "settings", "UseDefaultFallbackDirs"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.UseMicrodescriptors": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#UseMicrodescriptors).\n"}, "loc": ["services", "tor", "settings", "UseMicrodescriptors"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.V3AuthUseLegacyKey": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#V3AuthUseLegacyKey).\n"}, "loc": ["services", "tor", "settings", "V3AuthUseLegacyKey"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.V3AuthoritativeDirectory": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#V3AuthoritativeDirectory).\n"}, "loc": ["services", "tor", "settings", "V3AuthoritativeDirectory"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.VersioningAuthoritativeDirectory": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#VersioningAuthoritativeDirectory).\n"}, "loc": ["services", "tor", "settings", "VersioningAuthoritativeDirectory"], "readOnly": false, "type": "null or boolean"}, "services.tor.settings.VirtualAddrNetworkIPv4": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#VirtualAddrNetworkIPv4).\n"}, "loc": ["services", "tor", "settings", "VirtualAddrNetworkIPv4"], "readOnly": false, "type": "null or string"}, "services.tor.settings.VirtualAddrNetworkIPv6": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#VirtualAddrNetworkIPv6).\n"}, "loc": ["services", "tor", "settings", "VirtualAddrNetworkIPv6"], "readOnly": false, "type": "null or string"}, "services.tor.settings.WarnPlaintextPorts": {"declarations": ["nixos/modules/services/security/tor.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See [torrc manual](https://2019.www.torproject.org/docs/tor-manual.html.en#WarnPlaintextPorts).\n"}, "loc": ["services", "tor", "settings", "WarnPlaintextPorts"], "readOnly": false, "type": "list of 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tor.torsocks.allowInbound": {"declarations": ["nixos/modules/services/security/torsocks.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set Torsocks to accept inbound connections. If set to\n`true`, listen() and accept() will be\nallowed to be used with non localhost address.\n"}, "loc": ["services", "tor", "torsocks", "allowInbound"], "readOnly": false, "type": "boolean"}, "services.tor.torsocks.enable": {"declarations": ["nixos/modules/services/security/torsocks.nix"], "default": {"_type": "literalExpression", "text": "config.services.tor.enable && config.services.tor.client.enable"}, "description": {"_type": "mdDoc", "text": "Whether to build `/etc/tor/torsocks.conf`\ncontaining the specified global torsocks configuration.\n"}, "loc": ["services", "tor", "torsocks", "enable"], "readOnly": false, "type": "boolean"}, "services.tor.torsocks.fasterServer": {"declarations": ["nixos/modules/services/security/torsocks.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:9063\""}, "description": {"_type": "mdDoc", "text": "IP/Port of the Tor SOCKS server for torsocks-faster wrapper suitable for HTTP.\nCurrently, hostnames are NOT supported by torsocks.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.0.20:1234\""}, "loc": ["services", "tor", "torsocks", "fasterServer"], "readOnly": false, "type": "string"}, "services.tor.torsocks.onionAddrRange": {"declarations": ["nixos/modules/services/security/torsocks.nix"], "default": {"_type": "literalExpression", "text": "\"127.42.42.0/24\""}, "description": {"_type": "mdDoc", "text": "Tor hidden sites do not have real IP addresses. This\nspecifies what range of IP addresses will be handed to the\napplication as \"cookies\" for .onion names.  Of course, you\nshould pick a block of addresses which you aren't going to\never need to actually connect to. This is similar to the\nMapAddress feature of the main tor daemon.\n"}, "loc": ["services", "tor", "torsocks", "onionAddrRange"], "readOnly": false, "type": "string"}, "services.tor.torsocks.server": {"declarations": ["nixos/modules/services/security/torsocks.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:9050\""}, "description": {"_type": "mdDoc", "text": "IP/Port of the Tor SOCKS server. Currently, hostnames are\nNOT supported by torsocks.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.0.20:1234\""}, "loc": ["services", "tor", "torsocks", "server"], "readOnly": false, "type": "string"}, "services.tor.torsocks.socks5Password": {"declarations": ["nixos/modules/services/security/torsocks.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SOCKS5 password. The `TORSOCKS_PASSWORD`\nenvironment variable overrides this option if it is set.\n"}, "example": {"_type": "literalExpression", "text": "\"sekret\""}, "loc": ["services", "tor", "torsocks", "socks5Password"], "readOnly": false, "type": "null or string"}, "services.tor.torsocks.socks5Username": {"declarations": ["nixos/modules/services/security/torsocks.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SOCKS5 username. The `TORSOCKS_USERNAME`\nenvironment variable overrides this option if it is set.\n"}, "example": {"_type": "literalExpression", "text": "\"bob\""}, "loc": ["services", "tor", "torsocks", "socks5Username"], "readOnly": false, "type": "null or string"}, "services.tor.tsocks.config": {"declarations": ["nixos/modules/services/security/torify.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration. Contents will be added verbatim to TSocks\nconfiguration file.\n"}, "loc": ["services", "tor", "tsocks", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.tor.tsocks.enable": {"declarations": ["nixos/modules/services/security/torify.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to build tsocks wrapper script to relay application traffic via Tor.\n\n::: {.important}\nYou shouldn't use this unless you know what you're\ndoing because your installation of Tor already comes with\nits own superior (doesn't leak DNS queries)\n`torsocks` wrapper which does pretty much\nexactly the same thing as this.\n:::\n"}, "loc": ["services", "tor", "tsocks", "enable"], "readOnly": false, "type": "boolean"}, "services.tor.tsocks.server": {"declarations": ["nixos/modules/services/security/torify.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:9050\""}, "description": {"_type": "mdDoc", "text": "IP address of TOR client to use.\n"}, "example": {"_type": "literalExpression", "text": "\"192.168.0.20\""}, "loc": ["services", "tor", "tsocks", "server"], "readOnly": false, "type": "string"}, "services.torque.mom.enable": {"declarations": ["nixos/modules/services/computing/torque/mom.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable torque computing node."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "torque", "mom", "enable"], "readOnly": false, "type": "boolean"}, "services.torque.mom.serverNode": {"declarations": ["nixos/modules/services/computing/torque/mom.nix"], "description": {"_type": "mdDoc", "text": "Hostname running pbs server."}, "loc": ["services", "torque", "mom", "serverNode"], "readOnly": false, "type": "string"}, "services.torque.server.enable": {"declarations": ["nixos/modules/services/computing/torque/server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable torque server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "torque", "server", "enable"], "readOnly": false, "type": "boolean"}, "services.touchegg.enable": {"declarations": ["nixos/modules/services/x11/touchegg.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable touchegg, a multi-touch gesture recognizer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "touchegg", "enable"], "readOnly": false, "type": "boolean"}, "services.touchegg.package": {"declarations": ["nixos/modules/services/x11/touchegg.nix"], "default": {"_type": "literalExpression", "text": "pkgs.touchegg"}, "description": {"_type": "mdDoc", "text": "touchegg derivation to use."}, "loc": ["services", "touchegg", "package"], "readOnly": false, "type": "package"}, "services.tox-node.enable": {"declarations": ["nixos/modules/services/networking/tox-node.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Tox Node service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tox-node", "enable"], "readOnly": false, "type": "boolean"}, "services.tox-node.keysFile": {"declarations": ["nixos/modules/services/networking/tox-node.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/tox-node/keys\""}, "description": {"_type": "mdDoc", "text": "Path to the file where DHT keys are stored."}, "loc": ["services", "tox-node", "keysFile"], "readOnly": false, "type": "string"}, "services.tox-node.lanDiscovery": {"declarations": ["nixos/modules/services/networking/tox-node.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable local network discovery."}, "loc": ["services", "tox-node", "lanDiscovery"], "readOnly": false, "type": "boolean"}, "services.tox-node.logType": {"declarations": ["nixos/modules/services/networking/tox-node.nix"], "default": {"_type": "literalExpression", "text": "\"Stderr\""}, "description": {"_type": "mdDoc", "text": "Logging implementation."}, "loc": ["services", "tox-node", "logType"], "readOnly": false, "type": "one of \"Stderr\", \"Stdout\", \"Syslog\", \"None\""}, "services.tox-node.motd": {"declarations": ["nixos/modules/services/networking/tox-node.nix"], "default": {"_type": "literalExpression", "text": "\"Hi from tox-rs! I'm up {{uptime}}. TCP: incoming {{tcp_packets_in}}, outgoing {{tcp_packets_out}}, UDP: incoming {{udp_packets_in}}, outgoing {{udp_packets_out}}\""}, "description": {"_type": "mdDoc", "text": "Message of the day"}, "loc": ["services", "tox-node", "motd"], "readOnly": false, "type": "string"}, "services.tox-node.tcpAddresses": {"declarations": ["nixos/modules/services/networking/tox-node.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0:33445\"\n]"}, "description": {"_type": "mdDoc", "text": "TCP addresses to run TCP relay."}, "loc": ["services", "tox-node", "tcpAddresses"], "readOnly": false, "type": "list of string"}, "services.tox-node.tcpConnectionLimit": {"declarations": ["nixos/modules/services/networking/tox-node.nix"], "default": {"_type": "literalExpression", "text": "8192"}, "description": {"_type": "mdDoc", "text": "Maximum number of active TCP connections relay can hold"}, "loc": ["services", "tox-node", "tcpConnectionLimit"], "readOnly": false, "type": "signed integer"}, "services.tox-node.threads": {"declarations": ["nixos/modules/services/networking/tox-node.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Number of threads for execution"}, "loc": ["services", "tox-node", "threads"], "readOnly": false, "type": "signed integer"}, "services.tox-node.udpAddress": {"declarations": ["nixos/modules/services/networking/tox-node.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0:33445\""}, "description": {"_type": "mdDoc", "text": "UDP address to run DHT node."}, "loc": ["services", "tox-node", "udpAddress"], "readOnly": false, "type": "string"}, "services.toxBootstrapd.enable": {"declarations": ["nixos/modules/services/networking/tox-bootstrapd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Tox DHT bootstrap daemon.\n"}, "loc": ["services", "toxBootstrapd", "enable"], "readOnly": false, "type": "boolean"}, "services.toxBootstrapd.extraConfig": {"declarations": ["nixos/modules/services/networking/tox-bootstrapd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration for bootstrap daemon.\nSee <https://github.com/irungentoo/toxcore/blob/master/other/bootstrap_daemon/tox-bootstrapd.conf>\nand <http://wiki.tox.im/Nodes>.\n"}, "loc": ["services", "toxBootstrapd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.toxBootstrapd.keysFile": {"declarations": ["nixos/modules/services/networking/tox-bootstrapd.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/tox-bootstrapd/keys\""}, "description": {"_type": "mdDoc", "text": "Node key file."}, "loc": ["services", "toxBootstrapd", "keysFile"], "readOnly": false, "type": "string"}, "services.toxBootstrapd.port": {"declarations": ["nixos/modules/services/networking/tox-bootstrapd.nix"], "default": {"_type": "literalExpression", "text": "33445"}, "description": {"_type": "mdDoc", "text": "Listening port (UDP)."}, "loc": ["services", "toxBootstrapd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.toxvpn.auto_add_peers": {"declarations": ["nixos/modules/services/networking/toxvpn.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "peers to automatically connect to on startup"}, "example": {"_type": "literalExpression", "text": "[\n  \"toxid1\"\n  \"toxid2\"\n]"}, "loc": ["services", "toxvpn", "auto_add_peers"], "readOnly": false, "type": "list of string"}, "services.toxvpn.enable": {"declarations": ["nixos/modules/services/networking/toxvpn.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable toxvpn running on startup."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "toxvpn", "enable"], "readOnly": false, "type": "boolean"}, "services.toxvpn.localip": {"declarations": ["nixos/modules/services/networking/toxvpn.nix"], "default": {"_type": "literalExpression", "text": "\"10.123.123.1\""}, "description": {"_type": "mdDoc", "text": "your ip on the vpn"}, "loc": ["services", "toxvpn", "localip"], "readOnly": false, "type": "string"}, "services.toxvpn.port": {"declarations": ["nixos/modules/services/networking/toxvpn.nix"], "default": {"_type": "literalExpression", "text": "33445"}, "description": {"_type": "mdDoc", "text": "udp port for toxcore, port-forward to help with connectivity if you run many nodes behind one NAT"}, "loc": ["services", "toxvpn", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tp-auto-kbbl.arguments": {"declarations": ["nixos/modules/services/misc/tp-auto-kbbl.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of arguments appended to `./tp-auto-kbbl --device [device] [arguments]`\n"}, "loc": ["services", "tp-auto-kbbl", "arguments"], "readOnly": false, "type": "list of string"}, "services.tp-auto-kbbl.device": {"declarations": ["nixos/modules/services/misc/tp-auto-kbbl.nix"], "default": {"_type": "literalExpression", "text": "\"/dev/input/event0\""}, "description": {"_type": "mdDoc", "text": "Device watched for activities."}, "loc": ["services", "tp-auto-kbbl", "device"], "readOnly": false, "type": "string"}, "services.tp-auto-kbbl.enable": {"declarations": ["nixos/modules/services/misc/tp-auto-kbbl.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Auto toggle keyboard back-lighting on Thinkpads (and maybe other laptops) for Linux."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tp-auto-kbbl", "enable"], "readOnly": false, "type": "boolean"}, "services.tp-auto-kbbl.package": {"declarations": ["nixos/modules/services/misc/tp-auto-kbbl.nix"], "default": {"_type": "literalExpression", "text": "pkgs.tp-auto-kbbl"}, "description": {"_type": "mdDoc", "text": "Package providing {command}`tp-auto-kbbl`."}, "loc": ["services", "tp-auto-kbbl", "package"], "readOnly": false, "type": "package"}, "services.traefik.dataDir": {"declarations": ["nixos/modules/services/web-servers/traefik.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/traefik\""}, "description": {"_type": "mdDoc", "text": "Location for any persistent data traefik creates, ie. acme\n"}, "loc": ["services", "traefik", "dataDir"], "readOnly": false, "type": "path"}, "services.traefik.dynamicConfigFile": {"declarations": ["nixos/modules/services/web-servers/traefik.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to traefik's dynamic configuration to use.\n(Using that option has precedence over `dynamicConfigOptions`)\n"}, "example": {"_type": "literalExpression", "text": "/path/to/dynamic_config.toml"}, "loc": ["services", "traefik", "dynamicConfigFile"], "readOnly": false, "type": "null or path"}, "services.traefik.dynamicConfigOptions": {"declarations": ["nixos/modules/services/web-servers/traefik.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Dynamic configuration for Traefik.\n"}, "example": {"_type": "literalExpression", "text": "{\n  http = {\n    routers = {\n      router1 = {\n        rule = \"Host(`localhost`)\";\n        service = \"service1\";\n      };\n    };\n    services = {\n      service1 = {\n        loadBalancer = {\n          servers = [\n            {\n              url = \"http://localhost:8080\";\n            }\n          ];\n        };\n      };\n    };\n  };\n}"}, "loc": ["services", "traefik", "dynamicConfigOptions"], "readOnly": false, "type": "JSON value"}, "services.traefik.enable": {"declarations": ["nixos/modules/services/web-servers/traefik.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Traefik web server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "traefik", "enable"], "readOnly": false, "type": "boolean"}, "services.traefik.group": {"declarations": ["nixos/modules/services/web-servers/traefik.nix"], "default": {"_type": "literalExpression", "text": "\"traefik\""}, "description": {"_type": "mdDoc", "text": "Set the group that traefik runs under.\nFor the docker backend this needs to be set to `docker` instead.\n"}, "example": {"_type": "literalExpression", "text": "\"docker\""}, "loc": ["services", "traefik", "group"], "readOnly": false, "type": "string"}, "services.traefik.package": {"declarations": ["nixos/modules/services/web-servers/traefik.nix"], "default": {"_type": "literalExpression", "text": "pkgs.traefik"}, "description": {"_type": "mdDoc", "text": "Traefik package to use."}, "loc": ["services", "traefik", "package"], "readOnly": false, "type": "package"}, "services.traefik.staticConfigFile": {"declarations": ["nixos/modules/services/web-servers/traefik.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to traefik's static configuration to use.\n(Using that option has precedence over `staticConfigOptions` and `dynamicConfigOptions`)\n"}, "example": {"_type": "literalExpression", "text": "/path/to/static_config.toml"}, "loc": ["services", "traefik", "staticConfigFile"], "readOnly": false, "type": "null or path"}, "services.traefik.staticConfigOptions": {"declarations": ["nixos/modules/services/web-servers/traefik.nix"], "default": {"_type": "literalExpression", "text": "{\n  entryPoints = {\n    http = {\n      address = \":80\";\n    };\n  };\n}"}, "description": {"_type": "mdDoc", "text": "Static configuration for Traefik.\n"}, "example": {"_type": "literalExpression", "text": "{\n  api = { };\n  entryPoints = {\n    http = {\n      address = \":80\";\n    };\n    web = {\n      address = \":8080\";\n    };\n  };\n}"}, "loc": ["services", "traefik", "staticConfigOptions"], "readOnly": false, "type": "JSON value"}, "services.trafficserver.cache": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Caching rules that overrule the origin's caching policy.\n\nConsult the [upstream\ndocumentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/cache.config.en.html) for more details.\n"}, "example": {"_type": "literalExpression", "text": "\"dest_domain=example.com suffix=js action=never-cache\""}, "loc": ["services", "trafficserver", "cache"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.trafficserver.enable": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Apache Traffic Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "trafficserver", "enable"], "readOnly": false, "type": "boolean"}, "services.trafficserver.hosting": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Partition the cache according to origin server or domain\n\nConsult the [\nupstream documentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/hosting.config.en.html) for more details.\n"}, "example": {"_type": "literalExpression", "text": "\"domain=example.com volume=1\""}, "loc": ["services", "trafficserver", "hosting"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.trafficserver.ipAllow": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalMD", "text": "upstream defaults"}, "description": {"_type": "mdDoc", "text": "Control client access to Traffic Server and Traffic Server connections\nto upstream servers.\n\nConsult the [upstream\ndocumentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/ip_allow.yaml.en.html) for more details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ip_allow = [{\n    apply = \"in\";\n    ip_addrs = \"127.0.0.1\";\n    action = \"allow\";\n    methods = \"ALL\";\n  }];\n}\n"}, "loc": ["services", "trafficserver", "ipAllow"], "readOnly": false, "type": "null or YAML value"}, "services.trafficserver.logging": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalMD", "text": "upstream defaults"}, "description": {"_type": "mdDoc", "text": "Configure logs.\n\nConsult the [upstream\ndocumentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/logging.yaml.en.html) for more details.\n"}, "example": {"_type": "literalExpression", "text": "{ }"}, "loc": ["services", "trafficserver", "logging"], "readOnly": false, "type": "null or YAML value"}, "services.trafficserver.parent": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Identify the parent proxies used in an cache hierarchy.\n\nConsult the [upstream\ndocumentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/parent.config.en.html) for more details.\n"}, "example": {"_type": "literalExpression", "text": "''\n  dest_domain=. method=get parent=\"p1.example:8080; p2.example:8080\" round_robin=true\n''"}, "loc": ["services", "trafficserver", "parent"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.trafficserver.plugins": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Controls run-time loadable plugins available to Traffic Server, as\nwell as their configuration.\n\nConsult the [upstream\ndocumentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/plugin.config.en.html) for more details.\n"}, "loc": ["services", "trafficserver", "plugins"], "readOnly": false, "type": "list of (submodule)"}, "services.trafficserver.plugins.*.arg": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "arguments to pass to the plugin"}, "example": {"_type": "literalExpression", "text": "\"--header=ATS-My-Debug\""}, "loc": ["services", "trafficserver", "plugins", "*", "arg"], "readOnly": false, "type": "string"}, "services.trafficserver.plugins.*.path": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "description": {"_type": "mdDoc", "text": "Path to plugin. The path can either be absolute, or relative to\nthe plugin directory.\n"}, "example": {"_type": "literalExpression", "text": "\"xdebug.so\""}, "loc": ["services", "trafficserver", "plugins", "*", "path"], "readOnly": false, "type": "string"}, "services.trafficserver.records": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "List of configurable variables used by Traffic Server.\n\nConsult the [\nupstream documentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/records.config.en.html) for more details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  proxy = {\n    config = {\n      proxy_name = \"my_server\";\n    };\n  };\n}"}, "loc": ["services", "trafficserver", "records"], "readOnly": false, "type": "Traffic Server records value"}, "services.trafficserver.remap": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "URL remapping rules used by Traffic Server.\n\nConsult the [\nupstream documentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/remap.config.en.html) for more details.\n"}, "example": {"_type": "literalExpression", "text": "\"map http://from.example http://origin.example\""}, "loc": ["services", "trafficserver", "remap"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.trafficserver.sni": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configure aspects of TLS connection handling for both inbound and\noutbound connections.\n\nConsult the [upstream\ndocumentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/sni.yaml.en.html) for more details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  sni = [{\n    fqdn = \"no-http2.example.com\";\n    https = \"off\";\n  }];\n}\n"}, "loc": ["services", "trafficserver", "sni"], "readOnly": false, "type": "null or YAML value"}, "services.trafficserver.splitDns": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Specify the DNS server that Traffic Server should use under specific\nconditions.\n\nConsult the [\nupstream documentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/splitdns.config.en.html) for more details.\n"}, "example": {"_type": "literalExpression", "text": "''\n  dest_domain=internal.corp.example named=\"255.255.255.255:212 255.255.255.254\" def_domain=corp.example search_list=\"corp.example corp1.example\"\n  dest_domain=!internal.corp.example named=255.255.255.253\n''"}, "loc": ["services", "trafficserver", "splitDns"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.trafficserver.sslMulticert": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configure SSL server certificates to terminate the SSL sessions.\n\nConsult the [\nupstream documentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/ssl_multicert.config.en.html) for more details.\n"}, "example": {"_type": "literalExpression", "text": "\"dest_ip=* ssl_cert_name=default.pem\""}, "loc": ["services", "trafficserver", "sslMulticert"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.trafficserver.storage": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/cache/trafficserver 256M\""}, "description": {"_type": "mdDoc", "text": "List all the storage that make up the Traffic Server cache.\n\nConsult the [\nupstream documentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/storage.config.en.html) for more details.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/disk/by-id/XXXXX volume=1\""}, "loc": ["services", "trafficserver", "storage"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.trafficserver.strategies": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the next hop proxies used in an cache hierarchy and the\nalgorithms used to select the next proxy.\n\nConsult the [\nupstream documentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/strategies.yaml.en.html) for more details.\n"}, "loc": ["services", "trafficserver", "strategies"], "readOnly": false, "type": "null or YAML value"}, "services.trafficserver.volume": {"declarations": ["nixos/modules/services/web-servers/trafficserver/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Manage cache space more efficiently and restrict disk usage by\ncreating cache volumes of different sizes.\n\nConsult the [\nupstream documentation](https://docs.trafficserver.apache.org/en/latest/admin-guide/files/volume.config.en.html) for more details.\n"}, "example": {"_type": "literalExpression", "text": "\"volume=1 scheme=http size=20%\""}, "loc": ["services", "trafficserver", "volume"], "readOnly": false, "type": "null or YAML value"}, "services.transmission.credentialsFile": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "\"/dev/null\""}, "description": {"_type": "mdDoc", "text": "Path to a JSON file to be merged with the settings.\nUseful to merge a file which is better kept out of the Nix store\nto set secret config parameters like `rpc-password`.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/secrets/transmission/settings.json\""}, "loc": ["services", "transmission", "credentialsFile"], "readOnly": false, "type": "path"}, "services.transmission.downloadDirPermissions": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If not `null`, is used as the permissions\nset by `systemd.activationScripts.transmission-daemon`\non the directories [](#opt-services.transmission.settings.download-dir),\n[](#opt-services.transmission.settings.incomplete-dir).\nand [](#opt-services.transmission.settings.watch-dir).\nNote that you may also want to change\n[](#opt-services.transmission.settings.umask).\n"}, "example": {"_type": "literalExpression", "text": "\"770\""}, "loc": ["services", "transmission", "downloadDirPermissions"], "readOnly": false, "type": "null or string"}, "services.transmission.enable": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the headless Transmission BitTorrent daemon.\n\nTransmission daemon can be controlled via the RPC interface using\ntransmission-remote, the WebUI (http://127.0.0.1:9091/ by default),\nor other clients like stig or tremc.\n\nTorrents are downloaded to [](#opt-services.transmission.home)/Downloads by default and are\naccessible to users in the \"transmission\" group.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "transmission", "enable"], "readOnly": false, "type": "boolean"}, "services.transmission.extraFlags": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags passed to the transmission command in the service definition.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--log-debug\"\n]"}, "loc": ["services", "transmission", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.transmission.group": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "\"transmission\""}, "description": {"_type": "mdDoc", "text": "Group account under which Transmission runs."}, "loc": ["services", "transmission", "group"], "readOnly": false, "type": "string"}, "services.transmission.home": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/transmission\""}, "description": {"_type": "mdDoc", "text": "The directory where Transmission will create `.config/transmission-daemon`.\nas well as `Downloads/` unless\n[](#opt-services.transmission.settings.download-dir) is changed,\nand `.incomplete/` unless\n[](#opt-services.transmission.settings.incomplete-dir) is changed.\n"}, "loc": ["services", "transmission", "home"], "readOnly": false, "type": "path"}, "services.transmission.openFirewall": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "description": {"_type": "mdDoc", "text": "Alias of {option}`services.transmission.openPeerPorts`."}, "loc": ["services", "transmission", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.transmission.openPeerPorts": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable opening of the peer port(s) in the firewall."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "transmission", "openPeerPorts"], "readOnly": false, "type": "boolean"}, "services.transmission.openRPCPort": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable opening of the RPC port in the firewall."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "transmission", "openRPCPort"], "readOnly": false, "type": "boolean"}, "services.transmission.package": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "pkgs.transmission"}, "description": {"_type": "mdDoc", "text": "The transmission package to use."}, "loc": ["services", "transmission", "package"], "readOnly": false, "type": "package"}, "services.transmission.performanceNetParameters": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable tweaking of kernel parameters\nto open many more connections at the same time.\n\nNote that you may also want to increase\n`peer-limit-global`.\nAnd be aware that these settings are quite aggressive\nand might not suite your regular desktop use.\nFor instance, SSH sessions may time out more easily.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "transmission", "performanceNetParameters"], "readOnly": false, "type": "boolean"}, "services.transmission.settings": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings whose options overwrite fields in\n`.config/transmission-daemon/settings.json`\n(each time the service starts).\n\nSee [Transmission's Wiki](https://github.com/transmission/transmission/wiki/Editing-Configuration-Files)\nfor documentation of settings not explicitly covered by this module.\n"}, "loc": ["services", "transmission", "settings"], "readOnly": false, "type": "JSON value"}, "services.transmission.settings.download-dir": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.transmission.home}/Downloads\""}, "description": {"_type": "mdDoc", "text": "Directory where to download torrents."}, "loc": ["services", "transmission", "settings", "download-dir"], "readOnly": false, "type": "path"}, "services.transmission.settings.incomplete-dir": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.transmission.home}/.incomplete\""}, "description": {"_type": "mdDoc", "text": "When enabled with\nservices.transmission.home\n[](#opt-services.transmission.settings.incomplete-dir-enabled),\nnew torrents will download the files to this directory.\nWhen complete, the files will be moved to download-dir\n[](#opt-services.transmission.settings.download-dir).\n"}, "loc": ["services", "transmission", "settings", "incomplete-dir"], "readOnly": false, "type": "path"}, "services.transmission.settings.incomplete-dir-enabled": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": ""}, "loc": ["services", "transmission", "settings", "incomplete-dir-enabled"], "readOnly": false, "type": "boolean"}, "services.transmission.settings.message-level": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Set verbosity of transmission messages."}, "loc": ["services", "transmission", "settings", "message-level"], "readOnly": false, "type": "integer between 0 and 3 (both inclusive)"}, "services.transmission.settings.peer-port": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "51413"}, "description": {"_type": "mdDoc", "text": "The peer port to listen for incoming connections."}, "loc": ["services", "transmission", "settings", "peer-port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.transmission.settings.peer-port-random-high": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "65535"}, "description": {"_type": "mdDoc", "text": "The maximum peer port to listen to for incoming connections\nwhen [](#opt-services.transmission.settings.peer-port-random-on-start) is enabled.\n"}, "loc": ["services", "transmission", "settings", "peer-port-random-high"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.transmission.settings.peer-port-random-low": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "65535"}, "description": {"_type": "mdDoc", "text": "The minimal peer port to listen to for incoming connections\nwhen [](#opt-services.transmission.settings.peer-port-random-on-start) is enabled.\n"}, "loc": ["services", "transmission", "settings", "peer-port-random-low"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.transmission.settings.peer-port-random-on-start": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Randomize the peer port."}, "loc": ["services", "transmission", "settings", "peer-port-random-on-start"], "readOnly": false, "type": "boolean"}, "services.transmission.settings.rpc-bind-address": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Where to listen for RPC connections.\nUse `0.0.0.0` to listen on all interfaces.\n"}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "loc": ["services", "transmission", "settings", "rpc-bind-address"], "readOnly": false, "type": "string"}, "services.transmission.settings.rpc-port": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "9091"}, "description": {"_type": "mdDoc", "text": "The RPC port to listen to."}, "loc": ["services", "transmission", "settings", "rpc-port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.transmission.settings.script-torrent-done-enabled": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run\n[](#opt-services.transmission.settings.script-torrent-done-filename)\nat torrent completion.\n"}, "loc": ["services", "transmission", "settings", "script-torrent-done-enabled"], "readOnly": false, "type": "boolean"}, "services.transmission.settings.script-torrent-done-filename": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Executable to be run at torrent completion."}, "loc": ["services", "transmission", "settings", "script-torrent-done-filename"], "readOnly": false, "type": "null or path"}, "services.transmission.settings.trash-original-torrent-files": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to delete torrents added from the\n              [](#opt-services.transmission.settings.watch-dir).\n"}, "loc": ["services", "transmission", "settings", "trash-original-torrent-files"], "readOnly": false, "type": "boolean"}, "services.transmission.settings.umask": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Sets transmission's file mode creation mask.\nSee the umask(2) manpage for more information.\nUsers who want their saved torrents to be world-writable\nmay want to set this value to 0.\nBear in mind that the json markup language only accepts numbers in base 10,\nso the standard umask(2) octal notation \"022\" is written in settings.json as 18.\n"}, "loc": ["services", "transmission", "settings", "umask"], "readOnly": false, "type": "signed integer"}, "services.transmission.settings.utp-enabled": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable [Micro Transport Protocol (\u00b5TP)](http://en.wikipedia.org/wiki/Micro_Transport_Protocol).\n"}, "loc": ["services", "transmission", "settings", "utp-enabled"], "readOnly": false, "type": "boolean"}, "services.transmission.settings.watch-dir": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.transmission.home}/watchdir\""}, "description": {"_type": "mdDoc", "text": "Watch a directory for torrent files and add them to transmission."}, "loc": ["services", "transmission", "settings", "watch-dir"], "readOnly": false, "type": "path"}, "services.transmission.settings.watch-dir-enabled": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the\n              [](#opt-services.transmission.settings.watch-dir).\n"}, "loc": ["services", "transmission", "settings", "watch-dir-enabled"], "readOnly": false, "type": "boolean"}, "services.transmission.user": {"declarations": ["nixos/modules/services/torrent/transmission.nix"], "default": {"_type": "literalExpression", "text": "\"transmission\""}, "description": {"_type": "mdDoc", "text": "User account under which Transmission runs."}, "loc": ["services", "transmission", "user"], "readOnly": false, "type": "string"}, "services.tremor-rs.enable": {"declarations": ["nixos/modules/services/monitoring/tremor-rs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Tremor event- or stream-processing system."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tremor-rs", "enable"], "readOnly": false, "type": "boolean"}, "services.tremor-rs.host": {"declarations": ["nixos/modules/services/monitoring/tremor-rs.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The host tremor should be listening on"}, "loc": ["services", "tremor-rs", "host"], "readOnly": false, "type": "string"}, "services.tremor-rs.loggerSettings": {"declarations": ["nixos/modules/services/monitoring/tremor-rs.nix"], "default": {"_type": "literalExpression", "text": "{\n  refresh_rate = \"30 seconds\";\n  appenders.stdout.kind = \"console\";\n  root = {\n    level = \"warn\";\n    appenders = [ \"stdout\" ];\n  };\n  loggers = {\n    tremor_runtime = {\n      level = \"debug\";\n      appenders = [ \"stdout\" ];\n      additive = false;\n    };\n    tremor = {\n      level = \"debug\";\n      appenders = [ \"stdout\" ];\n      additive = false;\n    };\n  };\n}\n"}, "description": {"_type": "mdDoc", "text": "Tremor logger configuration"}, "example": {"_type": "literalExpression", "text": "{\n  appenders = {\n    stdout = {\n      kind = \"console\";\n    };\n  };\n  loggers = {\n    tremor = {\n      additive = false;\n      appenders = [\n        \"stdout\"\n      ];\n      level = \"debug\";\n    };\n    tremor_runtime = {\n      additive = false;\n      appenders = [\n        \"stdout\"\n      ];\n      level = \"debug\";\n    };\n  };\n  refresh_rate = \"30 seconds\";\n  root = {\n    appenders = [\n      \"stdout\"\n    ];\n    level = \"warn\";\n  };\n}"}, "loc": ["services", "tremor-rs", "loggerSettings"], "readOnly": false, "type": "YAML value"}, "services.tremor-rs.port": {"declarations": ["nixos/modules/services/monitoring/tremor-rs.nix"], "default": {"_type": "literalExpression", "text": "9898"}, "description": {"_type": "mdDoc", "text": "the port tremor should be listening on"}, "loc": ["services", "tremor-rs", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tremor-rs.tremorLibDir": {"declarations": ["nixos/modules/services/monitoring/tremor-rs.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Directory where to find /lib containing tremor script files"}, "loc": ["services", "tremor-rs", "tremorLibDir"], "readOnly": false, "type": "path"}, "services.tremor-rs.troyFileList": {"declarations": ["nixos/modules/services/monitoring/tremor-rs.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of troy files to load."}, "loc": ["services", "tremor-rs", "troyFileList"], "readOnly": false, "type": "list of path"}, "services.trezord.emulator.enable": {"declarations": ["nixos/modules/services/hardware/trezord.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Trezor emulator support.\n"}, "loc": ["services", "trezord", "emulator", "enable"], "readOnly": false, "type": "boolean"}, "services.trezord.emulator.port": {"declarations": ["nixos/modules/services/hardware/trezord.nix"], "default": {"_type": "literalExpression", "text": "21324"}, "description": {"_type": "mdDoc", "text": "Listening port for the Trezor emulator.\n"}, "loc": ["services", "trezord", "emulator", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.trezord.enable": {"declarations": ["nixos/modules/services/hardware/trezord.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Trezor bridge daemon, for use with Trezor hardware bitcoin wallets.\n"}, "loc": ["services", "trezord", "enable"], "readOnly": false, "type": "boolean"}, "services.trickster.configFile": {"declarations": ["nixos/modules/services/networking/trickster.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to configuration file.\n"}, "loc": ["services", "trickster", "configFile"], "readOnly": false, "type": "null or path"}, "services.trickster.enable": {"declarations": ["nixos/modules/services/networking/trickster.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Trickster.\n"}, "loc": ["services", "trickster", "enable"], "readOnly": false, "type": "boolean"}, "services.trickster.instance-id": {"declarations": ["nixos/modules/services/networking/trickster.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Instance ID for when running multiple processes (default null).\n"}, "loc": ["services", "trickster", "instance-id"], "readOnly": false, "type": "null or signed integer"}, "services.trickster.log-level": {"declarations": ["nixos/modules/services/networking/trickster.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Level of Logging to use (debug, info, warn, error) (default \"info\").\n"}, "loc": ["services", "trickster", "log-level"], "readOnly": false, "type": "string"}, "services.trickster.metrics-port": {"declarations": ["nixos/modules/services/networking/trickster.nix"], "default": {"_type": "literalExpression", "text": "8082"}, "description": {"_type": "mdDoc", "text": "Port that the /metrics endpoint will listen on.\n"}, "loc": ["services", "trickster", "metrics-port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.trickster.origin-type": {"declarations": ["nixos/modules/services/networking/trickster.nix"], "default": {"_type": "literalExpression", "text": "\"prometheus\""}, "description": {"_type": "mdDoc", "text": "Type of origin (prometheus, influxdb)\n"}, "loc": ["services", "trickster", "origin-type"], "readOnly": false, "type": "one of \"prometheus\", \"influxdb\""}, "services.trickster.origin-url": {"declarations": ["nixos/modules/services/networking/trickster.nix"], "default": {"_type": "literalExpression", "text": "\"http://prometheus:9090\""}, "description": {"_type": "mdDoc", "text": "URL to the Origin. Enter it like you would in grafana, e.g., http://prometheus:9090 (default http://prometheus:9090).\n"}, "loc": ["services", "trickster", "origin-url"], "readOnly": false, "type": "string"}, "services.trickster.package": {"declarations": ["nixos/modules/services/networking/trickster.nix"], "default": {"_type": "literalExpression", "text": "pkgs.trickster"}, "description": {"_type": "mdDoc", "text": "Package that should be used for trickster.\n"}, "loc": ["services", "trickster", "package"], "readOnly": false, "type": "package"}, "services.trickster.profiler-port": {"declarations": ["nixos/modules/services/networking/trickster.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port that the /debug/pprof endpoint will listen on.\n"}, "loc": ["services", "trickster", "profiler-port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.trickster.proxy-port": {"declarations": ["nixos/modules/services/networking/trickster.nix"], "default": {"_type": "literalExpression", "text": "9090"}, "description": {"_type": "mdDoc", "text": "Port that the Proxy server will listen on.\n"}, "loc": ["services", "trickster", "proxy-port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.triggerhappy.bindings": {"declarations": ["nixos/modules/services/hardware/triggerhappy.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Key bindings for {command}`triggerhappy`.\n"}, "example": {"_type": "literalExpression", "text": "[ { keys = [\"PLAYPAUSE\"];  cmd = \"${pkgs.mpc-cli}/bin/mpc -q toggle\"; } ]\n"}, "loc": ["services", "triggerhappy", "bindings"], "readOnly": false, "type": "list of (submodule)"}, "services.triggerhappy.bindings.*.cmd": {"declarations": ["nixos/modules/services/hardware/triggerhappy.nix"], "description": {"_type": "mdDoc", "text": "What to run."}, "loc": ["services", "triggerhappy", "bindings", "*", "cmd"], "readOnly": false, "type": "string"}, "services.triggerhappy.bindings.*.event": {"declarations": ["nixos/modules/services/hardware/triggerhappy.nix"], "default": {"_type": "literalExpression", "text": "\"press\""}, "description": {"_type": "mdDoc", "text": "Event to match."}, "loc": ["services", "triggerhappy", "bindings", "*", "event"], "readOnly": false, "type": "one of \"press\", \"hold\", \"release\""}, "services.triggerhappy.bindings.*.keys": {"declarations": ["nixos/modules/services/hardware/triggerhappy.nix"], "description": {"_type": "mdDoc", "text": "List of keys to match.  Key names as defined in linux/input-event-codes.h"}, "loc": ["services", "triggerhappy", "bindings", "*", "keys"], "readOnly": false, "type": "list of string"}, "services.triggerhappy.enable": {"declarations": ["nixos/modules/services/hardware/triggerhappy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the {command}`triggerhappy` hotkey daemon.\n"}, "loc": ["services", "triggerhappy", "enable"], "readOnly": false, "type": "boolean"}, "services.triggerhappy.extraConfig": {"declarations": ["nixos/modules/services/hardware/triggerhappy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Literal contents to append to the end of {command}`triggerhappy` configuration file.\n"}, "loc": ["services", "triggerhappy", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.triggerhappy.user": {"declarations": ["nixos/modules/services/hardware/triggerhappy.nix"], "default": {"_type": "literalExpression", "text": "\"nobody\""}, "description": {"_type": "mdDoc", "text": "User account under which {command}`triggerhappy` runs.\n"}, "example": {"_type": "literalExpression", "text": "\"root\""}, "loc": ["services", "triggerhappy", "user"], "readOnly": false, "type": "string"}, "services.trilium-server.dataDir": {"declarations": ["nixos/modules/services/web-apps/trilium.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/trilium\""}, "description": {"_type": "mdDoc", "text": "The directory storing the notes database and the configuration.\n"}, "loc": ["services", "trilium-server", "dataDir"], "readOnly": false, "type": "string"}, "services.trilium-server.enable": {"declarations": ["nixos/modules/services/web-apps/trilium.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable trilium-server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "trilium-server", "enable"], "readOnly": false, "type": "boolean"}, "services.trilium-server.host": {"declarations": ["nixos/modules/services/web-apps/trilium.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The host address to bind to (defaults to localhost).\n"}, "loc": ["services", "trilium-server", "host"], "readOnly": false, "type": "string"}, "services.trilium-server.instanceName": {"declarations": ["nixos/modules/services/web-apps/trilium.nix"], "default": {"_type": "literalExpression", "text": "\"Trilium\""}, "description": {"_type": "mdDoc", "text": "Instance name used to distinguish between different instances\n"}, "loc": ["services", "trilium-server", "instanceName"], "readOnly": false, "type": "string"}, "services.trilium-server.nginx": {"declarations": ["nixos/modules/services/web-apps/trilium.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for nginx reverse proxy.\n"}, "loc": ["services", "trilium-server", "nginx"], "readOnly": false, "type": "submodule"}, "services.trilium-server.nginx.enable": {"declarations": ["nixos/modules/services/web-apps/trilium.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Configure the nginx reverse proxy settings.\n"}, "loc": ["services", "trilium-server", "nginx", "enable"], "readOnly": false, "type": "boolean"}, "services.trilium-server.nginx.hostName": {"declarations": ["nixos/modules/services/web-apps/trilium.nix"], "description": {"_type": "mdDoc", "text": "The hostname use to setup the virtualhost configuration\n"}, "loc": ["services", "trilium-server", "nginx", "hostName"], "readOnly": false, "type": "string"}, "services.trilium-server.noAuthentication": {"declarations": ["nixos/modules/services/web-apps/trilium.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set to true, no password is required to access the web frontend.\n"}, "loc": ["services", "trilium-server", "noAuthentication"], "readOnly": false, "type": "boolean"}, "services.trilium-server.noBackup": {"declarations": ["nixos/modules/services/web-apps/trilium.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable periodic database backups.\n"}, "loc": ["services", "trilium-server", "noBackup"], "readOnly": false, "type": "boolean"}, "services.trilium-server.port": {"declarations": ["nixos/modules/services/web-apps/trilium.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "The port number to bind to.\n"}, "loc": ["services", "trilium-server", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tsmBackup.autoTime": {"declarations": ["nixos/modules/services/backup/tsm.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The backup service will be invoked\nautomatically at the given date/time,\nwhich must be in the format described in\n{manpage}`systemd.time(5)`.\nThe default `null`\ndisables automatic backups.\n"}, "example": {"_type": "literalExpression", "text": "\"12:00\""}, "loc": ["services", "tsmBackup", "autoTime"], "readOnly": false, "type": "null or non-empty string"}, "services.tsmBackup.command": {"declarations": ["nixos/modules/services/backup/tsm.nix"], "default": {"_type": "literalExpression", "text": "\"backup\""}, "description": {"_type": "mdDoc", "text": "The actual command passed to the\n`dsmc` executable to start the backup.\n"}, "example": {"_type": "literalExpression", "text": "\"incr\""}, "loc": ["services", "tsmBackup", "command"], "readOnly": false, "type": "non-empty string"}, "services.tsmBackup.enable": {"declarations": ["nixos/modules/services/backup/tsm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic backups with the\nIBM Spectrum Protect (Tivoli Storage Manager, TSM) client.\nThis also enables\n{option}`programs.tsmClient.enable`\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tsmBackup", "enable"], "readOnly": false, "type": "boolean"}, "services.tsmBackup.servername": {"declarations": ["nixos/modules/services/backup/tsm.nix"], "description": {"_type": "mdDoc", "text": "Create a systemd system service\n`tsm-backup.service` that starts\na backup based on the given servername's stanza.\nNote that this server's\n{option}`passwdDir` will default to\n{file}`/var/lib/tsm-backup/password`\n(but may be overridden);\nalso, the service will use\n{file}`/var/lib/tsm-backup` as\n`HOME` when calling\n`dsmc`.\n"}, "example": {"_type": "literalExpression", "text": "\"mainTsmServer\""}, "loc": ["services", "tsmBackup", "servername"], "readOnly": false, "type": "non-empty string"}, "services.tt-rss.auth.autoCreate": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow authentication modules to auto-create users in tt-rss internal\ndatabase when authenticated successfully.\n"}, "loc": ["services", "tt-rss", "auth", "autoCreate"], "readOnly": false, "type": "boolean"}, "services.tt-rss.auth.autoLogin": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Automatically login user on remote or other kind of externally supplied\nauthentication, otherwise redirect to login form as normal.\nIf set to true, users won't be able to set application language\nand settings profile.\n"}, "loc": ["services", "tt-rss", "auth", "autoLogin"], "readOnly": false, "type": "boolean"}, "services.tt-rss.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally."}, "loc": ["services", "tt-rss", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.tt-rss.database.host": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host of the database. Leave null to use Unix domain socket.\n"}, "loc": ["services", "tt-rss", "database", "host"], "readOnly": false, "type": "null or string"}, "services.tt-rss.database.name": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"tt_rss\""}, "description": {"_type": "mdDoc", "text": "Name of the existing database.\n"}, "loc": ["services", "tt-rss", "database", "name"], "readOnly": false, "type": "string"}, "services.tt-rss.database.password": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The database user's password.\n"}, "loc": ["services", "tt-rss", "database", "password"], "readOnly": false, "type": "null or string"}, "services.tt-rss.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The database user's password.\n"}, "loc": ["services", "tt-rss", "database", "passwordFile"], "readOnly": false, "type": "null or string"}, "services.tt-rss.database.port": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The database's port. If not set, the default ports will be provided (5432\nand 3306 for pgsql and mysql respectively).\n"}, "loc": ["services", "tt-rss", "database", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tt-rss.database.type": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"pgsql\""}, "description": {"_type": "mdDoc", "text": "Database to store feeds. Supported are pgsql and mysql.\n"}, "loc": ["services", "tt-rss", "database", "type"], "readOnly": false, "type": "one of \"pgsql\", \"mysql\""}, "services.tt-rss.database.user": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"tt_rss\""}, "description": {"_type": "mdDoc", "text": "The database user. The user must exist and has access to\nthe specified database.\n"}, "loc": ["services", "tt-rss", "database", "user"], "readOnly": false, "type": "string"}, "services.tt-rss.email.digestSubject": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"[tt-rss] New headlines for last 24 hours\""}, "description": {"_type": "mdDoc", "text": "Subject line for email digests.\n"}, "loc": ["services", "tt-rss", "email", "digestSubject"], "readOnly": false, "type": "string"}, "services.tt-rss.email.fromAddress": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Address for sending outgoing mail. This applies to password reset\nnotifications, digest emails and any other mail.\n"}, "loc": ["services", "tt-rss", "email", "fromAddress"], "readOnly": false, "type": "string"}, "services.tt-rss.email.fromName": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"Tiny Tiny RSS\""}, "description": {"_type": "mdDoc", "text": "Name for sending outgoing mail. This applies to password reset\nnotifications, digest emails and any other mail.\n"}, "loc": ["services", "tt-rss", "email", "fromName"], "readOnly": false, "type": "string"}, "services.tt-rss.email.login": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "SMTP authentication login used when sending outgoing mail.\n"}, "loc": ["services", "tt-rss", "email", "login"], "readOnly": false, "type": "string"}, "services.tt-rss.email.password": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "SMTP authentication password used when sending outgoing mail.\n"}, "loc": ["services", "tt-rss", "email", "password"], "readOnly": false, "type": "string"}, "services.tt-rss.email.security": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Used to select a secure SMTP connection. Allowed values: ssl, tls,\nor empty.\n"}, "loc": ["services", "tt-rss", "email", "security"], "readOnly": false, "type": "one of \"\", \"ssl\", \"tls\""}, "services.tt-rss.email.server": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Hostname:port combination to send outgoing mail. Blank - use system\nMTA.\n"}, "example": {"_type": "literalExpression", "text": "\"localhost:25\""}, "loc": ["services", "tt-rss", "email", "server"], "readOnly": false, "type": "string"}, "services.tt-rss.enable": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable tt-rss."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tt-rss", "enable"], "readOnly": false, "type": "boolean"}, "services.tt-rss.enableGZipOutput": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Selectively gzip output to improve wire performance. This requires\nPHP Zlib extension on the server.\nEnabling this can break tt-rss in several httpd/php configurations,\nif you experience weird errors and tt-rss failing to start, blank pages\nafter login, or content encoding errors, disable it.\n"}, "loc": ["services", "tt-rss", "enableGZipOutput"], "readOnly": false, "type": "boolean"}, "services.tt-rss.extraConfig": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional lines to append to `config.php`.\n"}, "loc": ["services", "tt-rss", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.tt-rss.feedCryptKey": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Key used for encryption of passwords for password-protected feeds\nin the database. A string of 24 random characters. If left blank, encryption\nis not used. Requires mcrypt functions.\nWarning: changing this key will make your stored feed passwords impossible\nto decrypt.\n"}, "loc": ["services", "tt-rss", "feedCryptKey"], "readOnly": false, "type": "string"}, "services.tt-rss.forceArticlePurge": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "When this option is not 0, users ability to control feed purging\nintervals is disabled and all articles (which are not starred)\nolder than this amount of days are purged.\n"}, "loc": ["services", "tt-rss", "forceArticlePurge"], "readOnly": false, "type": "signed integer"}, "services.tt-rss.logDestination": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"sql\""}, "description": {"_type": "mdDoc", "text": "Log destination to use. Possible values: sql (uses internal logging\nyou can read in Preferences -> System), syslog - logs to system log.\nSetting this to blank uses PHP logging (usually to http server\nerror.log).\n"}, "loc": ["services", "tt-rss", "logDestination"], "readOnly": false, "type": "one of \"\", \"sql\", \"syslog\""}, "services.tt-rss.pluginPackages": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of plugins to install. The list elements are expected to\nbe derivations. All elements in this derivation are automatically\ncopied to the `plugins.local` directory.\n"}, "loc": ["services", "tt-rss", "pluginPackages"], "readOnly": false, "type": "list of package"}, "services.tt-rss.plugins": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"auth_internal\"\n  \"note\"\n]"}, "description": {"_type": "mdDoc", "text": "List of plugins to load automatically for all users.\nSystem plugins have to be specified here. Please enable at least one\nauthentication plugin here (auth_*).\nUsers may enable other user plugins from Preferences/Plugins but may not\ndisable plugins specified in this list.\nDisabling auth_internal in this list would automatically disable\nreset password link on the login form.\n"}, "loc": ["services", "tt-rss", "plugins"], "readOnly": false, "type": "list of string"}, "services.tt-rss.pool": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"tt-rss\""}, "description": {"_type": "mdDoc", "text": "Name of existing phpfpm pool that is used to run web-application.\nIf not specified a pool will be created automatically with\ndefault values.\n"}, "loc": ["services", "tt-rss", "pool"], "readOnly": false, "type": "string"}, "services.tt-rss.pubSubHubbub.enable": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable client PubSubHubbub support in tt-rss. When disabled, tt-rss\nwon't try to subscribe to PUSH feed updates.\n"}, "loc": ["services", "tt-rss", "pubSubHubbub", "enable"], "readOnly": false, "type": "boolean"}, "services.tt-rss.pubSubHubbub.hub": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "URL to a PubSubHubbub-compatible hub server. If defined, \"Published\narticles\" generated feed would automatically become PUSH-enabled.\n"}, "loc": ["services", "tt-rss", "pubSubHubbub", "hub"], "readOnly": false, "type": "string"}, "services.tt-rss.registration.enable": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow users to register themselves. Please be aware that allowing\nrandom people to access your tt-rss installation is a security risk\nand potentially might lead to data loss or server exploit. Disabled\nby default.\n"}, "loc": ["services", "tt-rss", "registration", "enable"], "readOnly": false, "type": "boolean"}, "services.tt-rss.registration.maxUsers": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Maximum amount of users which will be allowed to register on this\nsystem. 0 - no limit.\n"}, "loc": ["services", "tt-rss", "registration", "maxUsers"], "readOnly": false, "type": "signed integer"}, "services.tt-rss.registration.notifyAddress": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Email address to send new user notifications to.\n"}, "loc": ["services", "tt-rss", "registration", "notifyAddress"], "readOnly": false, "type": "string"}, "services.tt-rss.root": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/tt-rss\""}, "description": {"_type": "mdDoc", "text": "Root of the application.\n"}, "loc": ["services", "tt-rss", "root"], "readOnly": false, "type": "path"}, "services.tt-rss.selfUrlPath": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "description": {"_type": "mdDoc", "text": "Full URL of your tt-rss installation. This should be set to the\nlocation of tt-rss directory, e.g. http://example.org/tt-rss/\nYou need to set this option correctly otherwise several features\nincluding PUSH, bookmarklets and browser integration will not work properly.\n"}, "example": {"_type": "literalExpression", "text": "\"http://localhost\""}, "loc": ["services", "tt-rss", "selfUrlPath"], "readOnly": false, "type": "string"}, "services.tt-rss.sessionCookieLifetime": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "86400"}, "description": {"_type": "mdDoc", "text": "Default lifetime of a session (e.g. login) cookie. In seconds,\n0 means cookie will be deleted when browser closes.\n"}, "loc": ["services", "tt-rss", "sessionCookieLifetime"], "readOnly": false, "type": "signed integer"}, "services.tt-rss.simpleUpdateMode": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables fallback update mode where tt-rss tries to update feeds in\nbackground while tt-rss is open in your browser.\nIf you don't have a lot of feeds and don't want to or can't run\nbackground processes while not running tt-rss, this method is generally\nviable to keep your feeds up to date.\nStill, there are more robust (and recommended) updating methods\navailable, you can read about them here: http://tt-rss.org/wiki/UpdatingFeeds\n"}, "loc": ["services", "tt-rss", "simpleUpdateMode"], "readOnly": false, "type": "boolean"}, "services.tt-rss.singleUserMode": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Operate in single user mode, disables all functionality related to\nmultiple users and authentication. Enabling this assumes you have\nyour tt-rss directory protected by other means (e.g. http auth).\n"}, "loc": ["services", "tt-rss", "singleUserMode"], "readOnly": false, "type": "boolean"}, "services.tt-rss.sphinx.index": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"ttrss\"\n  \"delta\"\n]"}, "description": {"_type": "mdDoc", "text": "Index names in Sphinx configuration. Example configuration\nfiles are available on tt-rss wiki.\n"}, "loc": ["services", "tt-rss", "sphinx", "index"], "readOnly": false, "type": "list of string"}, "services.tt-rss.sphinx.server": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:9312\""}, "description": {"_type": "mdDoc", "text": "Hostname:port combination for the Sphinx server.\n"}, "loc": ["services", "tt-rss", "sphinx", "server"], "readOnly": false, "type": "string"}, "services.tt-rss.themePackages": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of themes to install. The list elements are expected to\nbe derivations. All elements in this derivation are automatically\ncopied to the `themes.local` directory.\n"}, "loc": ["services", "tt-rss", "themePackages"], "readOnly": false, "type": "list of package"}, "services.tt-rss.user": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"tt_rss\""}, "description": {"_type": "mdDoc", "text": "User account under which both the update daemon and the web-application run.\n"}, "loc": ["services", "tt-rss", "user"], "readOnly": false, "type": "string"}, "services.tt-rss.virtualHost": {"declarations": ["nixos/modules/services/web-apps/tt-rss.nix"], "default": {"_type": "literalExpression", "text": "\"tt-rss\""}, "description": {"_type": "mdDoc", "text": "Name of the nginx virtualhost to use and setup. If null, do not setup any virtualhost.\n"}, "loc": ["services", "tt-rss", "virtualHost"], "readOnly": false, "type": "null or string"}, "services.tts.servers": {"declarations": ["nixos/modules/services/audio/tts.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "TTS server instances.\n"}, "example": {"_type": "literalExpression", "text": "{\n  english = {\n    port = 5300;\n    model = \"tts_models/en/ljspeech/tacotron2-DDC\";\n  };\n  german = {\n    port = 5301;\n    model = \"tts_models/de/thorsten/tacotron2-DDC\";\n  };\n  dutch = {\n    port = 5302;\n    model = \"tts_models/nl/mai/tacotron2-DDC\";\n  };\n}\n"}, "loc": ["services", "tts", "servers"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.tts.servers.<name>.enable": {"declarations": ["nixos/modules/services/audio/tts.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Coqui TTS server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tts", "servers", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.tts.servers.<name>.extraArgs": {"declarations": ["nixos/modules/services/audio/tts.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra arguments to pass to the server commandline.\n"}, "loc": ["services", "tts", "servers", "<name>", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.tts.servers.<name>.model": {"declarations": ["nixos/modules/services/audio/tts.nix"], "default": {"_type": "literalExpression", "text": "\"tts_models/en/ljspeech/tacotron2-DDC\""}, "description": {"_type": "mdDoc", "text": "Name of the model to download and use for speech synthesis.\n\nCheck `tts-server --list_models` for possible values.\n\nSet to `null` to use a custom model.\n"}, "example": {"_type": "literalExpression", "text": "null"}, "loc": ["services", "tts", "servers", "<name>", "model"], "readOnly": false, "type": "null or string"}, "services.tts.servers.<name>.port": {"declarations": ["nixos/modules/services/audio/tts.nix"], "description": {"_type": "mdDoc", "text": "Port to bind the TTS server to.\n"}, "example": {"_type": "literalExpression", "text": "5000"}, "loc": ["services", "tts", "servers", "<name>", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.tts.servers.<name>.useCuda": {"declarations": ["nixos/modules/services/audio/tts.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to offload computation onto a CUDA compatible GPU.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tts", "servers", "<name>", "useCuda"], "readOnly": false, "type": "boolean"}, "services.ttyd.caFile": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SSL CA file path for client certificate verification."}, "loc": ["services", "ttyd", "caFile"], "readOnly": false, "type": "null or path"}, "services.ttyd.certFile": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SSL certificate file path."}, "loc": ["services", "ttyd", "certFile"], "readOnly": false, "type": "null or path"}, "services.ttyd.checkOrigin": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow a websocket connection from a different origin."}, "loc": ["services", "ttyd", "checkOrigin"], "readOnly": false, "type": "boolean"}, "services.ttyd.clientOptions": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute set of client options for xtermjs.\n<https://xtermjs.org/docs/api/terminal/interfaces/iterminaloptions/>\n"}, "example": {"_type": "literalExpression", "text": "{\n          fontSize = \"16\";\n          fontFamily = \"Fira Code\";\n\n        }"}, "loc": ["services", "ttyd", "clientOptions"], "readOnly": false, "type": "attribute set of string"}, "services.ttyd.enable": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ttyd daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ttyd", "enable"], "readOnly": false, "type": "boolean"}, "services.ttyd.enableIPv6": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to enable IPv6 support."}, "loc": ["services", "ttyd", "enableIPv6"], "readOnly": false, "type": "boolean"}, "services.ttyd.enableSSL": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to enable SSL (https) support."}, "loc": ["services", "ttyd", "enableSSL"], "readOnly": false, "type": "boolean"}, "services.ttyd.indexFile": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Custom index.html path"}, "loc": ["services", "ttyd", "indexFile"], "readOnly": false, "type": "null or path"}, "services.ttyd.interface": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Network interface to bind."}, "example": {"_type": "literalExpression", "text": "\"eth0\""}, "loc": ["services", "ttyd", "interface"], "readOnly": false, "type": "null or string"}, "services.ttyd.keyFile": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SSL key file path.\nFor insecurely putting the keyFile in the globally readable store use\n`pkgs.writeText \"ttydKeyFile\" \"SSLKEY\"`.\n"}, "loc": ["services", "ttyd", "keyFile"], "readOnly": false, "type": "null or path"}, "services.ttyd.logLevel": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "7"}, "description": {"_type": "mdDoc", "text": "Set log level."}, "loc": ["services", "ttyd", "logLevel"], "readOnly": false, "type": "signed integer"}, "services.ttyd.maxClients": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Maximum clients to support (0, no limit)"}, "loc": ["services", "ttyd", "maxClients"], "readOnly": false, "type": "signed integer"}, "services.ttyd.passwordFile": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing the password to use for basic authentication.\nFor insecurely putting the password in the globally readable store use\n`pkgs.writeText \"ttydpw\" \"MyPassword\"`.\n"}, "loc": ["services", "ttyd", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.ttyd.port": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "7681"}, "description": {"_type": "mdDoc", "text": "Port to listen on (use 0 for random port)"}, "loc": ["services", "ttyd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.ttyd.signal": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Signal to send to the command on session close."}, "loc": ["services", "ttyd", "signal"], "readOnly": false, "type": "8 bit unsigned integer; between 0 and 255 (both inclusive)"}, "services.ttyd.socket": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "UNIX domain socket path to bind."}, "example": {"_type": "literalExpression", "text": "\"/var/run/ttyd.sock\""}, "loc": ["services", "ttyd", "socket"], "readOnly": false, "type": "null or path"}, "services.ttyd.terminalType": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "\"xterm-256color\""}, "description": {"_type": "mdDoc", "text": "Terminal type to report."}, "loc": ["services", "ttyd", "terminalType"], "readOnly": false, "type": "string"}, "services.ttyd.username": {"declarations": ["nixos/modules/services/web-servers/ttyd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Username for basic authentication."}, "loc": ["services", "ttyd", "username"], "readOnly": false, "type": "null or string"}, "services.tumbler.enable": {"declarations": ["nixos/modules/services/desktops/tumbler.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Tumbler, A D-Bus thumbnailer service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tumbler", "enable"], "readOnly": false, "type": "boolean"}, "services.tuptime.enable": {"declarations": ["nixos/modules/services/monitoring/tuptime.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the total uptime service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tuptime", "enable"], "readOnly": false, "type": "boolean"}, "services.tuptime.timer.enable": {"declarations": ["nixos/modules/services/monitoring/tuptime.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to regularly log uptime to detect bad shutdowns."}, "loc": ["services", "tuptime", "timer", "enable"], "readOnly": false, "type": "boolean"}, "services.tuptime.timer.period": {"declarations": ["nixos/modules/services/monitoring/tuptime.nix"], "default": {"_type": "literalExpression", "text": "\"*:0/5\""}, "description": {"_type": "mdDoc", "text": "systemd calendar event"}, "loc": ["services", "tuptime", "timer", "period"], "readOnly": false, "type": "string"}, "services.tvheadend.enable": {"declarations": ["nixos/modules/services/networking/tvheadend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Tvheadend."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "tvheadend", "enable"], "readOnly": false, "type": "boolean"}, "services.tvheadend.htspPort": {"declarations": ["nixos/modules/services/networking/tvheadend.nix"], "default": {"_type": "literalExpression", "text": "9982"}, "description": {"_type": "mdDoc", "text": "Port to bind HTSP to."}, "loc": ["services", "tvheadend", "htspPort"], "readOnly": false, "type": "signed integer"}, "services.tvheadend.httpPort": {"declarations": ["nixos/modules/services/networking/tvheadend.nix"], "default": {"_type": "literalExpression", "text": "9981"}, "description": {"_type": "mdDoc", "text": "Port to bind HTTP to."}, "loc": ["services", "tvheadend", "httpPort"], "readOnly": false, "type": "signed integer"}, "services.twingate.enable": {"declarations": ["nixos/modules/services/networking/twingate.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Twingate Client daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "twingate", "enable"], "readOnly": false, "type": "boolean"}, "services.tzupdate.enable": {"declarations": ["nixos/modules/services/misc/tzupdate.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the tzupdate timezone updating service. This provides\na one-shot service which can be activated with systemctl to\nupdate the timezone.\n"}, "loc": ["services", "tzupdate", "enable"], "readOnly": false, "type": "boolean"}, "services.u9fs.enable": {"declarations": ["nixos/modules/services/network-filesystems/u9fs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run the u9fs 9P server for Unix."}, "loc": ["services", "u9fs", "enable"], "readOnly": false, "type": "boolean"}, "services.u9fs.extraArgs": {"declarations": ["nixos/modules/services/network-filesystems/u9fs.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra arguments to pass on invocation,\nsee {command}`man 4 u9fs`\n"}, "example": {"_type": "literalExpression", "text": "\"-a none\""}, "loc": ["services", "u9fs", "extraArgs"], "readOnly": false, "type": "string"}, "services.u9fs.listenStreams": {"declarations": ["nixos/modules/services/network-filesystems/u9fs.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"564\"\n]"}, "description": {"_type": "mdDoc", "text": "Sockets to listen for clients on.\nSee {command}`man 5 systemd.socket` for socket syntax.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"192.168.16.1:564\"\n]"}, "loc": ["services", "u9fs", "listenStreams"], "readOnly": false, "type": "list of string"}, "services.u9fs.user": {"declarations": ["nixos/modules/services/network-filesystems/u9fs.nix"], "default": {"_type": "literalExpression", "text": "\"nobody\""}, "description": {"_type": "mdDoc", "text": "User to run u9fs under."}, "loc": ["services", "u9fs", "user"], "readOnly": false, "type": "string"}, "services.udev.enable": {"declarations": ["nixos/modules/services/hardware/udev.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable udev."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "udev", "enable"], "readOnly": false, "type": "boolean"}, "services.udev.extraHwdb": {"declarations": ["nixos/modules/services/hardware/udev.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional {command}`hwdb` files. They'll be written\ninto file {file}`99-local.hwdb`. Thus they are\nread after all other files.\n"}, "example": {"_type": "literalExpression", "text": "''\n  evdev:input:b0003v05AFp8277*\n    KEYBOARD_KEY_70039=leftalt\n    KEYBOARD_KEY_700e2=leftctrl\n''"}, "loc": ["services", "udev", "extraHwdb"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.udev.extraRules": {"declarations": ["nixos/modules/services/hardware/udev.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional {command}`udev` rules. They'll be written\ninto file {file}`99-local.rules`. Thus they are\nread and applied after all other rules.\n"}, "example": {"_type": "literalExpression", "text": "''\n  ENV{ID_VENDOR_ID}==\"046d\", ENV{ID_MODEL_ID}==\"0825\", ENV{PULSE_IGNORE}=\"1\"\n''"}, "loc": ["services", "udev", "extraRules"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.udev.packages": {"declarations": ["nixos/modules/services/hardware/udev.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of packages containing {command}`udev` rules.\nAll files found in\n{file}`\u00abpkg\u00bb/etc/udev/rules.d` and\n{file}`\u00abpkg\u00bb/lib/udev/rules.d`\nwill be included.\n"}, "loc": ["services", "udev", "packages"], "readOnly": false, "type": "list of path"}, "services.udev.path": {"declarations": ["nixos/modules/services/hardware/udev.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages added to the {env}`PATH` environment variable when\nexecuting programs from Udev rules.\n"}, "loc": ["services", "udev", "path"], "readOnly": false, "type": "list of path"}, "services.udisks2.enable": {"declarations": ["nixos/modules/services/hardware/udisks2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable udisks2, a DBus service that allows applications to query and manipulate storage devices."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "udisks2", "enable"], "readOnly": false, "type": "boolean"}, "services.udisks2.mountOnMedia": {"declarations": ["nixos/modules/services/hardware/udisks2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When enabled, instructs udisks2 to mount removable drives under `/media/` directory, instead of the\ndefault, ACL-controlled `/run/media/$USER/`. Since `/media/` is not mounted as tmpfs by default, it\nrequires cleanup to get rid of stale mountpoints; enabling this option will take care of this at boot.\n"}, "loc": ["services", "udisks2", "mountOnMedia"], "readOnly": false, "type": "boolean"}, "services.udisks2.settings": {"declarations": ["nixos/modules/services/hardware/udisks2.nix"], "default": {"_type": "literalExpression", "text": "{\n  \"udisks2.conf\" = {\n    defaults = {\n      encryption = \"luks2\";\n    };\n    udisks2 = {\n      modules = [\n        \"*\"\n      ];\n      modules_load_preference = \"ondemand\";\n    };\n  };\n}"}, "description": {"_type": "mdDoc", "text": "Options passed to udisksd.\nSee [here](http://manpages.ubuntu.com/manpages/latest/en/man5/udisks2.conf.5.html) and\ndrive configuration in [here](http://manpages.ubuntu.com/manpages/latest/en/man8/udisks.8.html) for supported options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"WDC-WD10EZEX-60M2NA0-WD-WCC3F3SJ0698.conf\" = {\n    ATA = {\n      StandbyTimeout = 50;\n    };\n  };\n};\n"}, "loc": ["services", "udisks2", "settings"], "readOnly": false, "type": "attribute set of attribute set of attribute set of (INI atom (null, bool, int, float or string) or a non-empty list of them)"}, "services.uhub": {"declarations": ["nixos/modules/services/misc/uhub.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Uhub ADC hub instances"}, "loc": ["services", "uhub"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.uhub.<name>.enable": {"declarations": ["nixos/modules/services/misc/uhub.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable hub instance."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "uhub", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.uhub.<name>.enableTLS": {"declarations": ["nixos/modules/services/misc/uhub.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable TLS support."}, "loc": ["services", "uhub", "<name>", "enableTLS"], "readOnly": false, "type": "boolean"}, "services.uhub.<name>.plugins": {"declarations": ["nixos/modules/services/misc/uhub.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Uhub plugin configuration."}, "loc": ["services", "uhub", "<name>", "plugins"], "readOnly": false, "type": "list of (submodule)"}, "services.uhub.<name>.plugins.*.plugin": {"declarations": ["nixos/modules/services/misc/uhub.nix"], "description": {"_type": "mdDoc", "text": "Path to plugin file."}, "example": {"_type": "literalExpression", "text": "$${pkgs.uhub}/plugins/mod_auth_sqlite.so"}, "loc": ["services", "uhub", "<name>", "plugins", "*", "plugin"], "readOnly": false, "type": "path"}, "services.uhub.<name>.plugins.*.settings": {"declarations": ["nixos/modules/services/misc/uhub.nix"], "description": {"_type": "mdDoc", "text": "Settings specific to this plugin."}, "example": {"_type": "literalExpression", "text": "{\n  file = \"/etc/uhub/users.db\";\n}"}, "loc": ["services", "uhub", "<name>", "plugins", "*", "settings"], "readOnly": false, "type": "attribute set of string"}, "services.uhub.<name>.settings": {"declarations": ["nixos/modules/services/misc/uhub.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration of uhub.\nSee https://www.uhub.org/doc/config.php for a list of options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  hub_description = \"Yet another ADC hub\";\n  hub_name = \"My Public Hub\";\n  max_users = 150;\n  server_bind_addr = \"any\";\n  server_port = 1511;\n}"}, "loc": ["services", "uhub", "<name>", "settings"], "readOnly": false, "type": "attribute set of (boolean or signed integer or string)"}, "services.ulogd.enable": {"declarations": ["nixos/modules/services/logging/ulogd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ulogd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ulogd", "enable"], "readOnly": false, "type": "boolean"}, "services.ulogd.logLevel": {"declarations": ["nixos/modules/services/logging/ulogd.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Log level (1 = debug, 3 = info, 5 = notice, 7 = error, 8 = fatal)"}, "loc": ["services", "ulogd", "logLevel"], "readOnly": false, "type": "one of 1, 3, 5, 7, 8"}, "services.ulogd.settings": {"declarations": ["nixos/modules/services/logging/ulogd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for ulogd. See {file}`/share/doc/ulogd/` in `pkgs.ulogd.doc`."}, "example": {"_type": "literalExpression", "text": "{\n  global = {\n    stack = \"stack=log1:NFLOG,base1:BASE,pcap1:PCAP\";\n  };\n  log1 = {\n    group = 2;\n  };\n  pcap1 = {\n    file = \"/var/log/ulogd.pcap\";\n    sync = 1;\n  };\n}"}, "loc": ["services", "ulogd", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.unbound.enable": {"declarations": ["nixos/modules/services/networking/unbound.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Unbound domain name server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "unbound", "enable"], "readOnly": false, "type": "boolean"}, "services.unbound.enableRootTrustAnchor": {"declarations": ["nixos/modules/services/networking/unbound.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Use and update root trust anchor for DNSSEC validation."}, "loc": ["services", "unbound", "enableRootTrustAnchor"], "readOnly": false, "type": "boolean"}, "services.unbound.group": {"declarations": ["nixos/modules/services/networking/unbound.nix"], "default": {"_type": "literalExpression", "text": "\"unbound\""}, "description": {"_type": "mdDoc", "text": "Group under which unbound runs."}, "loc": ["services", "unbound", "group"], "readOnly": false, "type": "string"}, "services.unbound.localControlSocketPath": {"declarations": ["nixos/modules/services/networking/unbound.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "When not set to `null` this option defines the path\nat which the unbound remote control socket should be created at. The\nsocket will be owned by the unbound user (`unbound`)\nand group will be `nogroup`.\n\nUsers that should be permitted to access the socket must be in the\n`config.services.unbound.group` group.\n\nIf this option is `null` remote control will not be\nenabled. Unbounds default values apply.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/unbound/unbound.ctl\""}, "loc": ["services", "unbound", "localControlSocketPath"], "readOnly": false, "type": "null or string"}, "services.unbound.package": {"declarations": ["nixos/modules/services/networking/unbound.nix"], "default": {"_type": "literalExpression", "text": "pkgs.unbound-with-systemd"}, "description": {"_type": "mdDoc", "text": "The unbound package to use"}, "loc": ["services", "unbound", "package"], "readOnly": false, "type": "package"}, "services.unbound.resolveLocalQueries": {"declarations": ["nixos/modules/services/networking/unbound.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether unbound should resolve local queries (i.e. add 127.0.0.1 to\n/etc/resolv.conf).\n"}, "loc": ["services", "unbound", "resolveLocalQueries"], "readOnly": false, "type": "boolean"}, "services.unbound.settings": {"declarations": ["nixos/modules/services/networking/unbound.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative Unbound configuration\nSee the {manpage}`unbound.conf(5)` manpage for a list of\navailable options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  server = {\n    interface = [ \"127.0.0.1\" ];\n  };\n  forward-zone = [\n    {\n      name = \".\";\n      forward-addr = \"1.1.1.1@853#cloudflare-dns.com\";\n    }\n    {\n      name = \"example.org.\";\n      forward-addr = [\n        \"1.1.1.1@853#cloudflare-dns.com\"\n        \"1.0.0.1@853#cloudflare-dns.com\"\n      ];\n    }\n  ];\n  remote-control.control-enable = true;\n};\n"}, "loc": ["services", "unbound", "settings"], "readOnly": false, "type": "unbound.conf configuration type. The format consist of an attribute\nset of settings. Each settings can be either one value, a list of\nvalues or an attribute set. The allowed values are integers,\nstrings, booleans or floats.\n"}, "services.unbound.stateDir": {"declarations": ["nixos/modules/services/networking/unbound.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/unbound\""}, "description": {"_type": "mdDoc", "text": "Directory holding all state for unbound to run."}, "loc": ["services", "unbound", "stateDir"], "readOnly": false, "type": "path"}, "services.unbound.user": {"declarations": ["nixos/modules/services/networking/unbound.nix"], "default": {"_type": "literalExpression", "text": "\"unbound\""}, "description": {"_type": "mdDoc", "text": "User account under which unbound runs."}, "loc": ["services", "unbound", "user"], "readOnly": false, "type": "string"}, "services.unclutter-xfixes.enable": {"declarations": ["nixos/modules/services/x11/unclutter-xfixes.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable unclutter-xfixes to hide your mouse cursor when inactive."}, "loc": ["services", "unclutter-xfixes", "enable"], "readOnly": false, "type": "boolean"}, "services.unclutter-xfixes.extraOptions": {"declarations": ["nixos/modules/services/x11/unclutter-xfixes.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "More arguments to pass to the unclutter-xfixes command."}, "example": {"_type": "literalExpression", "text": "[\n  \"exclude-root\"\n  \"ignore-scrolling\"\n  \"fork\"\n]"}, "loc": ["services", "unclutter-xfixes", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.unclutter-xfixes.package": {"declarations": ["nixos/modules/services/x11/unclutter-xfixes.nix"], "default": {"_type": "literalExpression", "text": "pkgs.unclutter-xfixes"}, "description": {"_type": "mdDoc", "text": "unclutter-xfixes derivation to use."}, "loc": ["services", "unclutter-xfixes", "package"], "readOnly": false, "type": "package"}, "services.unclutter-xfixes.threshold": {"declarations": ["nixos/modules/services/x11/unclutter-xfixes.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Minimum number of pixels considered cursor movement."}, "loc": ["services", "unclutter-xfixes", "threshold"], "readOnly": false, "type": "signed integer"}, "services.unclutter-xfixes.timeout": {"declarations": ["nixos/modules/services/x11/unclutter-xfixes.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Number of seconds before the cursor is marked inactive."}, "loc": ["services", "unclutter-xfixes", "timeout"], "readOnly": false, "type": "signed integer"}, "services.unclutter.enable": {"declarations": ["nixos/modules/services/x11/unclutter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable unclutter to hide your mouse cursor when inactive"}, "loc": ["services", "unclutter", "enable"], "readOnly": false, "type": "boolean"}, "services.unclutter.excluded": {"declarations": ["nixos/modules/services/x11/unclutter.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Names of windows where unclutter should not apply"}, "example": {"_type": "literalExpression", "text": "[\n  \"\"\n]"}, "loc": ["services", "unclutter", "excluded"], "readOnly": false, "type": "list of string"}, "services.unclutter.extraOptions": {"declarations": ["nixos/modules/services/x11/unclutter.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "More arguments to pass to the unclutter command"}, "example": {"_type": "literalExpression", "text": "[\n  \"noevent\"\n  \"grab\"\n]"}, "loc": ["services", "unclutter", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.unclutter.keystroke": {"declarations": ["nixos/modules/services/x11/unclutter.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Wait for a keystroke before hiding the cursor"}, "loc": ["services", "unclutter", "keystroke"], "readOnly": false, "type": "boolean"}, "services.unclutter.package": {"declarations": ["nixos/modules/services/x11/unclutter.nix"], "default": {"_type": "literalExpression", "text": "pkgs.unclutter"}, "description": {"_type": "mdDoc", "text": "unclutter derivation to use."}, "loc": ["services", "unclutter", "package"], "readOnly": false, "type": "package"}, "services.unclutter.threshold": {"declarations": ["nixos/modules/services/x11/unclutter.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Minimum number of pixels considered cursor movement"}, "loc": ["services", "unclutter", "threshold"], "readOnly": false, "type": "signed integer"}, "services.unclutter.timeout": {"declarations": ["nixos/modules/services/x11/unclutter.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Number of seconds before the cursor is marked inactive"}, "loc": ["services", "unclutter", "timeout"], "readOnly": false, "type": "signed integer"}, "services.undervolt.analogioOffset": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The amount of voltage in mV to offset analogio by.\n"}, "loc": ["services", "undervolt", "analogioOffset"], "readOnly": false, "type": "null or signed integer"}, "services.undervolt.coreOffset": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The amount of voltage in mV to offset the CPU cores by.\n"}, "loc": ["services", "undervolt", "coreOffset"], "readOnly": false, "type": "null or signed integer"}, "services.undervolt.enable": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Undervolting service for Intel CPUs.\n\nWarning: This service is not endorsed by Intel and may permanently damage your hardware. Use at your own risk!\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "undervolt", "enable"], "readOnly": false, "type": "boolean"}, "services.undervolt.gpuOffset": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The amount of voltage in mV to offset the GPU by.\n"}, "loc": ["services", "undervolt", "gpuOffset"], "readOnly": false, "type": "null or signed integer"}, "services.undervolt.p1.limit": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The P1 Power Limit in Watts.\nBoth limit and window must be set.\n"}, "loc": ["services", "undervolt", "p1", "limit"], "readOnly": false, "type": "null or signed integer"}, "services.undervolt.p1.window": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The P1 Time Window in seconds.\nBoth limit and window must be set.\n"}, "loc": ["services", "undervolt", "p1", "window"], "readOnly": false, "type": "null or floating point number or signed integer"}, "services.undervolt.p2.limit": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The P2 Power Limit in Watts.\nBoth limit and window must be set.\n"}, "loc": ["services", "undervolt", "p2", "limit"], "readOnly": false, "type": "null or signed integer"}, "services.undervolt.p2.window": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The P2 Time Window in seconds.\nBoth limit and window must be set.\n"}, "loc": ["services", "undervolt", "p2", "window"], "readOnly": false, "type": "null or floating point number or signed integer"}, "services.undervolt.package": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "pkgs.undervolt"}, "description": {"_type": "mdDoc", "text": "undervolt derivation to use.\n"}, "loc": ["services", "undervolt", "package"], "readOnly": false, "type": "package"}, "services.undervolt.temp": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The temperature target in Celsius degrees.\n"}, "loc": ["services", "undervolt", "temp"], "readOnly": false, "type": "null or signed integer"}, "services.undervolt.tempAc": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The temperature target on AC power in Celsius degrees.\n"}, "loc": ["services", "undervolt", "tempAc"], "readOnly": false, "type": "null or signed integer"}, "services.undervolt.tempBat": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The temperature target on battery power in Celsius degrees.\n"}, "loc": ["services", "undervolt", "tempBat"], "readOnly": false, "type": "null or signed integer"}, "services.undervolt.uncoreOffset": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The amount of voltage in mV to offset uncore by.\n"}, "loc": ["services", "undervolt", "uncoreOffset"], "readOnly": false, "type": "null or signed integer"}, "services.undervolt.useTimer": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to set a timer that applies the undervolt settings every 30s.\nThis will cause spam in the journal but might be required for some\nhardware under specific conditions.\nEnable this if your undervolt settings don't hold.\n"}, "loc": ["services", "undervolt", "useTimer"], "readOnly": false, "type": "boolean"}, "services.undervolt.verbose": {"declarations": ["nixos/modules/services/hardware/undervolt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable verbose logging.\n"}, "loc": ["services", "undervolt", "verbose"], "readOnly": false, "type": "boolean"}, "services.unifi-video.dataDir": {"declarations": ["nixos/modules/services/video/unifi-video.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/unifi-video/data\""}, "description": {"_type": "mdDoc", "text": "Where to store the database and other data.\n"}, "loc": ["services", "unifi-video", "dataDir"], "readOnly": false, "type": "string"}, "services.unifi-video.enable": {"declarations": ["nixos/modules/services/video/unifi-video.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to enable the unifi-video service.\n"}, "loc": ["services", "unifi-video", "enable"], "readOnly": false, "type": "boolean"}, "services.unifi-video.jrePackage": {"declarations": ["nixos/modules/services/video/unifi-video.nix"], "default": {"_type": "literalExpression", "text": "pkgs.jre8"}, "description": {"_type": "mdDoc", "text": "The JRE package to use. Check the release notes to ensure it is supported.\n"}, "loc": ["services", "unifi-video", "jrePackage"], "readOnly": false, "type": "package"}, "services.unifi-video.logDir": {"declarations": ["nixos/modules/services/video/unifi-video.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/unifi-video/logs\""}, "description": {"_type": "mdDoc", "text": "Where to store the logs.\n"}, "loc": ["services", "unifi-video", "logDir"], "readOnly": false, "type": "string"}, "services.unifi-video.maximumJavaHeapSize": {"declarations": ["nixos/modules/services/video/unifi-video.nix"], "default": {"_type": "literalExpression", "text": "1024"}, "description": {"_type": "mdDoc", "text": "Set the maximum heap size for the JVM in MB.\n"}, "example": {"_type": "literalExpression", "text": "4096"}, "loc": ["services", "unifi-video", "maximumJavaHeapSize"], "readOnly": false, "type": "null or signed integer"}, "services.unifi-video.mongodbPackage": {"declarations": ["nixos/modules/services/video/unifi-video.nix"], "default": {"_type": "literalExpression", "text": "pkgs.mongodb"}, "description": {"_type": "mdDoc", "text": "The mongodb package to use.\n"}, "loc": ["services", "unifi-video", "mongodbPackage"], "readOnly": false, "type": "package"}, "services.unifi-video.openFirewall": {"declarations": ["nixos/modules/services/video/unifi-video.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to open the required ports on the firewall.\n"}, "loc": ["services", "unifi-video", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.unifi-video.pidFile": {"declarations": ["nixos/modules/services/video/unifi-video.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.unifi-video.dataDir}/unifi-video.pid\""}, "description": {"_type": "mdDoc", "text": "Location of unifi-video pid file."}, "loc": ["services", "unifi-video", "pidFile"], "readOnly": false, "type": "path"}, "services.unifi-video.unifiVideoPackage": {"declarations": ["nixos/modules/services/video/unifi-video.nix"], "default": {"_type": "literalExpression", "text": "pkgs.unifi-video"}, "description": {"_type": "mdDoc", "text": "The unifi-video package to use.\n"}, "loc": ["services", "unifi-video", "unifiVideoPackage"], "readOnly": false, "type": "package"}, "services.unifi.enable": {"declarations": ["nixos/modules/services/networking/unifi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to enable the unifi controller service.\n"}, "loc": ["services", "unifi", "enable"], "readOnly": false, "type": "boolean"}, "services.unifi.initialJavaHeapSize": {"declarations": ["nixos/modules/services/networking/unifi.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the initial heap size for the JVM in MB. If this option isn't set, the\nJVM will decide this value at runtime.\n"}, "example": {"_type": "literalExpression", "text": "1024"}, "loc": ["services", "unifi", "initialJavaHeapSize"], "readOnly": false, "type": "null or signed integer"}, "services.unifi.jrePackage": {"declarations": ["nixos/modules/services/networking/unifi.nix"], "default": {"_type": "literalExpression", "text": "if (lib.versionAtLeast (lib.getVersion cfg.unifiPackage) \"7.3\" then pkgs.jdk11 else pkgs.jre8"}, "description": {"_type": "mdDoc", "text": "The JRE package to use. Check the release notes to ensure it is supported.\n"}, "loc": ["services", "unifi", "jrePackage"], "readOnly": false, "type": "package"}, "services.unifi.maximumJavaHeapSize": {"declarations": ["nixos/modules/services/networking/unifi.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the maximum heap size for the JVM in MB. If this option isn't set, the\nJVM will decide this value at runtime.\n"}, "example": {"_type": "literalExpression", "text": "4096"}, "loc": ["services", "unifi", "maximumJavaHeapSize"], "readOnly": false, "type": "null or signed integer"}, "services.unifi.mongodbPackage": {"declarations": ["nixos/modules/services/networking/unifi.nix"], "default": {"_type": "literalExpression", "text": "pkgs.mongodb"}, "description": {"_type": "mdDoc", "text": "The mongodb package to use. Please note: unifi7 officially only supports mongodb up until 3.6 but works with 4.2.\n"}, "loc": ["services", "unifi", "mongodbPackage"], "readOnly": false, "type": "package"}, "services.unifi.openFirewall": {"declarations": ["nixos/modules/services/networking/unifi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to open the minimum required ports on the firewall.\n\nThis is necessary to allow firmware upgrades and device discovery to\nwork. For remote login, you should additionally open (or forward) port\n8443.\n"}, "loc": ["services", "unifi", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.unifi.unifiPackage": {"declarations": ["nixos/modules/services/networking/unifi.nix"], "default": {"_type": "literalExpression", "text": "pkgs.unifi5"}, "description": {"_type": "mdDoc", "text": "The unifi package to use.\n"}, "loc": ["services", "unifi", "unifiPackage"], "readOnly": false, "type": "package"}, "services.unit.config": {"declarations": ["nixos/modules/services/web-servers/unit/default.nix"], "default": {"_type": "literalExpression", "text": "''\n  {\n    \"listeners\": {},\n    \"applications\": {}\n  }\n''"}, "description": {"_type": "mdDoc", "text": "Unit configuration in JSON format. More details here https://unit.nginx.org/configuration"}, "example": {"_type": "literalExpression", "text": "''\n  {\n    \"listeners\": {\n      \"*:8300\": {\n        \"application\": \"example-php-72\"\n      }\n    },\n    \"applications\": {\n      \"example-php-72\": {\n        \"type\": \"php 7.2\",\n        \"processes\": 4,\n        \"user\": \"nginx\",\n        \"group\": \"nginx\",\n        \"root\": \"/var/www\",\n        \"index\": \"index.php\",\n        \"options\": {\n          \"file\": \"/etc/php.d/default.ini\",\n          \"admin\": {\n            \"max_execution_time\": \"30\",\n            \"max_input_time\": \"30\",\n            \"display_errors\": \"off\",\n            \"display_startup_errors\": \"off\",\n            \"open_basedir\": \"/dev/urandom:/proc/cpuinfo:/proc/meminfo:/etc/ssl/certs:/var/www\",\n            \"disable_functions\": \"exec,passthru,shell_exec,system\"\n          }\n        }\n      }\n    }\n  }\n''"}, "loc": ["services", "unit", "config"], "readOnly": false, "type": "string"}, "services.unit.enable": {"declarations": ["nixos/modules/services/web-servers/unit/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Unit App Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "unit", "enable"], "readOnly": false, "type": "boolean"}, "services.unit.group": {"declarations": ["nixos/modules/services/web-servers/unit/default.nix"], "default": {"_type": "literalExpression", "text": "\"unit\""}, "description": {"_type": "mdDoc", "text": "Group account under which unit runs."}, "loc": ["services", "unit", "group"], "readOnly": false, "type": "string"}, "services.unit.logDir": {"declarations": ["nixos/modules/services/web-servers/unit/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/log/unit\""}, "description": {"_type": "mdDoc", "text": "Unit log directory."}, "loc": ["services", "unit", "logDir"], "readOnly": false, "type": "path"}, "services.unit.package": {"declarations": ["nixos/modules/services/web-servers/unit/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.unit"}, "description": {"_type": "mdDoc", "text": "Unit package to use."}, "loc": ["services", "unit", "package"], "readOnly": false, "type": "package"}, "services.unit.stateDir": {"declarations": ["nixos/modules/services/web-servers/unit/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/spool/unit\""}, "description": {"_type": "mdDoc", "text": "Unit data directory."}, "loc": ["services", "unit", "stateDir"], "readOnly": false, "type": "path"}, "services.unit.user": {"declarations": ["nixos/modules/services/web-servers/unit/default.nix"], "default": {"_type": "literalExpression", "text": "\"unit\""}, "description": {"_type": "mdDoc", "text": "User account under which unit runs."}, "loc": ["services", "unit", "user"], "readOnly": false, "type": "string"}, "services.unpoller.enable": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable unpoller."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "unpoller", "enable"], "readOnly": false, "type": "boolean"}, "services.unpoller.influxdb.db": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"unifi\""}, "description": {"_type": "mdDoc", "text": "Database name. Database should exist.\n"}, "loc": ["services", "unpoller", "influxdb", "db"], "readOnly": false, "type": "string"}, "services.unpoller.influxdb.disable": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to disable the influxdb output plugin.\n"}, "loc": ["services", "unpoller", "influxdb", "disable"], "readOnly": false, "type": "boolean"}, "services.unpoller.influxdb.interval": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"30s\""}, "description": {"_type": "mdDoc", "text": "Setting this lower than the Unifi controller's refresh\ninterval may lead to zeroes in your database.\n"}, "loc": ["services", "unpoller", "influxdb", "interval"], "readOnly": false, "type": "string"}, "services.unpoller.influxdb.pass": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "unpoller-influxdb-default.password"}, "description": {"_type": "mdDoc", "text": "Path of a file containing the password for influxdb.\nThis file needs to be readable by the unifi-poller user.\n"}, "loc": ["services", "unpoller", "influxdb", "pass"], "readOnly": false, "type": "path"}, "services.unpoller.influxdb.url": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"http://127.0.0.1:8086\""}, "description": {"_type": "mdDoc", "text": "URL of the influxdb host.\n"}, "loc": ["services", "unpoller", "influxdb", "url"], "readOnly": false, "type": "string"}, "services.unpoller.influxdb.user": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"unifipoller\""}, "description": {"_type": "mdDoc", "text": "Username for the influxdb.\n"}, "loc": ["services", "unpoller", "influxdb", "user"], "readOnly": false, "type": "string"}, "services.unpoller.influxdb.verify_ssl": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Verify the influxdb's certificate.\n"}, "loc": ["services", "unpoller", "influxdb", "verify_ssl"], "readOnly": false, "type": "boolean"}, "services.unpoller.loki.interval": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"2m\""}, "description": {"_type": "mdDoc", "text": "How often the events are polled and pushed to Loki.\n"}, "loc": ["services", "unpoller", "loki", "interval"], "readOnly": false, "type": "string"}, "services.unpoller.loki.pass": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"unpoller-influxdb-default.password\""}, "description": {"_type": "mdDoc", "text": "Path of a file containing the password for Loki.\nThis file needs to be readable by the unifi-poller user.\n"}, "loc": ["services", "unpoller", "loki", "pass"], "readOnly": false, "type": "path"}, "services.unpoller.loki.tenant_id": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Tenant ID to use in Loki.\n"}, "loc": ["services", "unpoller", "loki", "tenant_id"], "readOnly": false, "type": "string"}, "services.unpoller.loki.timeout": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"10s\""}, "description": {"_type": "mdDoc", "text": "Should be increased in case of timeout errors.\n"}, "loc": ["services", "unpoller", "loki", "timeout"], "readOnly": false, "type": "string"}, "services.unpoller.loki.url": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "URL of the Loki host.\n"}, "loc": ["services", "unpoller", "loki", "url"], "readOnly": false, "type": "string"}, "services.unpoller.loki.user": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Username for Loki.\n"}, "loc": ["services", "unpoller", "loki", "user"], "readOnly": false, "type": "string"}, "services.unpoller.loki.verify_ssl": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Verify Loki's certificate.\n"}, "loc": ["services", "unpoller", "loki", "verify_ssl"], "readOnly": false, "type": "boolean"}, "services.unpoller.poller.debug": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Turns on line numbers, microsecond logging, and a per-device log.\nThis may be noisy if you have a lot of devices. It adds one line per device.\n"}, "loc": ["services", "unpoller", "poller", "debug"], "readOnly": false, "type": "boolean"}, "services.unpoller.poller.plugins": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Load additional plugins.\n"}, "loc": ["services", "unpoller", "poller", "plugins"], "readOnly": false, "type": "list of string"}, "services.unpoller.poller.quiet": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Turns off per-interval logs. Only startup and error logs will be emitted.\n"}, "loc": ["services", "unpoller", "poller", "quiet"], "readOnly": false, "type": "boolean"}, "services.unpoller.prometheus.disable": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to disable the prometheus output plugin.\n"}, "loc": ["services", "unpoller", "prometheus", "disable"], "readOnly": false, "type": "boolean"}, "services.unpoller.prometheus.http_listen": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"[::]:9130\""}, "description": {"_type": "mdDoc", "text": "Bind the prometheus exporter to this IP or hostname.\n"}, "loc": ["services", "unpoller", "prometheus", "http_listen"], "readOnly": false, "type": "string"}, "services.unpoller.prometheus.report_errors": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to report errors.\n"}, "loc": ["services", "unpoller", "prometheus", "report_errors"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.controllers": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of Unifi controllers to poll. Use defaults if empty.\n"}, "loc": ["services", "unpoller", "unifi", "controllers"], "readOnly": false, "type": "list of (submodule)"}, "services.unpoller.unifi.controllers.*.hash_pii": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Hash, with md5, client names and MAC addresses. This attempts\nto protect personally identifiable information.\n"}, "loc": ["services", "unpoller", "unifi", "controllers", "*", "hash_pii"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.controllers.*.pass": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "unpoller-unifi-default.password"}, "description": {"_type": "mdDoc", "text": "Path of a file containing the password for the unifi service user.\nThis file needs to be readable by the unifi-poller user.\n"}, "loc": ["services", "unpoller", "unifi", "controllers", "*", "pass"], "readOnly": false, "type": "path"}, "services.unpoller.unifi.controllers.*.save_alarms": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from UniFi alarms to influxdb and Loki.\n"}, "loc": ["services", "unpoller", "unifi", "controllers", "*", "save_alarms"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.controllers.*.save_anomalies": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from UniFi anomalies to influxdb and Loki.\n"}, "loc": ["services", "unpoller", "unifi", "controllers", "*", "save_anomalies"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.controllers.*.save_dpi": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from deep packet inspection.\nAdds around 150 data points and impacts performance.\n"}, "loc": ["services", "unpoller", "unifi", "controllers", "*", "save_dpi"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.controllers.*.save_events": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from UniFi events to influxdb and Loki.\n"}, "loc": ["services", "unpoller", "unifi", "controllers", "*", "save_events"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.controllers.*.save_ids": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from the intrusion detection system to influxdb and Loki.\n"}, "loc": ["services", "unpoller", "unifi", "controllers", "*", "save_ids"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.controllers.*.save_sites": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Collect and save site data.\n"}, "loc": ["services", "unpoller", "unifi", "controllers", "*", "save_sites"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.controllers.*.sites": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"all\""}, "description": {"_type": "mdDoc", "text": "List of site names for which statistics should be exported.\nOr the string \"default\" for the default site or the string \"all\" for all sites.\n"}, "loc": ["services", "unpoller", "unifi", "controllers", "*", "sites"], "readOnly": false, "type": "one of \"default\", \"all\" or list of string"}, "services.unpoller.unifi.controllers.*.url": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"https://unifi:8443\""}, "description": {"_type": "mdDoc", "text": "URL of the Unifi controller.\n"}, "loc": ["services", "unpoller", "unifi", "controllers", "*", "url"], "readOnly": false, "type": "string"}, "services.unpoller.unifi.controllers.*.user": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"unifi\""}, "description": {"_type": "mdDoc", "text": "Unifi service user name.\n"}, "loc": ["services", "unpoller", "unifi", "controllers", "*", "user"], "readOnly": false, "type": "string"}, "services.unpoller.unifi.controllers.*.verify_ssl": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Verify the Unifi controller's certificate.\n"}, "loc": ["services", "unpoller", "unifi", "controllers", "*", "verify_ssl"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.defaults.hash_pii": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Hash, with md5, client names and MAC addresses. This attempts\nto protect personally identifiable information.\n"}, "loc": ["services", "unpoller", "unifi", "defaults", "hash_pii"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.defaults.pass": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "unpoller-unifi-default.password"}, "description": {"_type": "mdDoc", "text": "Path of a file containing the password for the unifi service user.\nThis file needs to be readable by the unifi-poller user.\n"}, "loc": ["services", "unpoller", "unifi", "defaults", "pass"], "readOnly": false, "type": "path"}, "services.unpoller.unifi.defaults.save_alarms": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from UniFi alarms to influxdb and Loki.\n"}, "loc": ["services", "unpoller", "unifi", "defaults", "save_alarms"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.defaults.save_anomalies": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from UniFi anomalies to influxdb and Loki.\n"}, "loc": ["services", "unpoller", "unifi", "defaults", "save_anomalies"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.defaults.save_dpi": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from deep packet inspection.\nAdds around 150 data points and impacts performance.\n"}, "loc": ["services", "unpoller", "unifi", "defaults", "save_dpi"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.defaults.save_events": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from UniFi events to influxdb and Loki.\n"}, "loc": ["services", "unpoller", "unifi", "defaults", "save_events"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.defaults.save_ids": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Collect and save data from the intrusion detection system to influxdb and Loki.\n"}, "loc": ["services", "unpoller", "unifi", "defaults", "save_ids"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.defaults.save_sites": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Collect and save site data.\n"}, "loc": ["services", "unpoller", "unifi", "defaults", "save_sites"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.defaults.sites": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"all\""}, "description": {"_type": "mdDoc", "text": "List of site names for which statistics should be exported.\nOr the string \"default\" for the default site or the string \"all\" for all sites.\n"}, "loc": ["services", "unpoller", "unifi", "defaults", "sites"], "readOnly": false, "type": "one of \"default\", \"all\" or list of string"}, "services.unpoller.unifi.defaults.url": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"https://unifi:8443\""}, "description": {"_type": "mdDoc", "text": "URL of the Unifi controller.\n"}, "loc": ["services", "unpoller", "unifi", "defaults", "url"], "readOnly": false, "type": "string"}, "services.unpoller.unifi.defaults.user": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "\"unifi\""}, "description": {"_type": "mdDoc", "text": "Unifi service user name.\n"}, "loc": ["services", "unpoller", "unifi", "defaults", "user"], "readOnly": false, "type": "string"}, "services.unpoller.unifi.defaults.verify_ssl": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Verify the Unifi controller's certificate.\n"}, "loc": ["services", "unpoller", "unifi", "defaults", "verify_ssl"], "readOnly": false, "type": "boolean"}, "services.unpoller.unifi.dynamic": {"declarations": ["nixos/modules/services/monitoring/unpoller.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Let prometheus select which controller to poll when scraping.\nUse with default credentials. See unifi-poller wiki for more.\n"}, "loc": ["services", "unpoller", "unifi", "dynamic"], "readOnly": false, "type": "boolean"}, "services.upower.criticalPowerAction": {"declarations": ["nixos/modules/services/hardware/upower.nix"], "default": {"_type": "literalExpression", "text": "\"HybridSleep\""}, "description": {"_type": "mdDoc", "text": "The action to take when `timeAction` or\n`percentageAction` has been reached for the batteries\n(UPS or laptop batteries) supplying the computer\n"}, "loc": ["services", "upower", "criticalPowerAction"], "readOnly": false, "type": "one of \"PowerOff\", \"Hibernate\", \"HybridSleep\""}, "services.upower.enable": {"declarations": ["nixos/modules/services/hardware/upower.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Upower, a DBus service that provides power\nmanagement support to applications.\n"}, "loc": ["services", "upower", "enable"], "readOnly": false, "type": "boolean"}, "services.upower.enableWattsUpPro": {"declarations": ["nixos/modules/services/hardware/upower.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the Watts Up Pro device.\n\nThe Watts Up Pro contains a generic FTDI USB device without a specific\nvendor and product ID. When we probe for WUP devices, we can cause\nthe user to get a perplexing \"Device or resource busy\" error when\nattempting to use their non-WUP device.\n\nThe generic FTDI device is known to also be used on:\n\n- Sparkfun FT232 breakout board\n- Parallax Propeller\n"}, "loc": ["services", "upower", "enableWattsUpPro"], "readOnly": false, "type": "boolean"}, "services.upower.ignoreLid": {"declarations": ["nixos/modules/services/hardware/upower.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Do we ignore the lid state\n\nSome laptops are broken. The lid state is either inverted, or stuck\non or off. We can't do much to fix these problems, but this is a way\nfor users to make the laptop panel vanish, a state that might be used\nby a couple of user-space daemons. On Linux systems, see also\nlogind.conf(5).\n"}, "loc": ["services", "upower", "ignoreLid"], "readOnly": false, "type": "boolean"}, "services.upower.noPollBatteries": {"declarations": ["nixos/modules/services/hardware/upower.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Don't poll the kernel for battery level changes.\n\nSome hardware will send us battery level changes through\nevents, rather than us having to poll for it. This option\nallows disabling polling for hardware that sends out events.\n"}, "loc": ["services", "upower", "noPollBatteries"], "readOnly": false, "type": "boolean"}, "services.upower.package": {"declarations": ["nixos/modules/services/hardware/upower.nix"], "default": {"_type": "literalExpression", "text": "pkgs.upower"}, "description": {"_type": "mdDoc", "text": "Which upower package to use.\n"}, "loc": ["services", "upower", "package"], "readOnly": false, "type": "package"}, "services.upower.percentageAction": {"declarations": ["nixos/modules/services/hardware/upower.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "When `usePercentageForPolicy` is\n`true`, the levels at which UPower will take action\nfor the critical battery level.\n\nThis will also be used for batteries which don't have time information\nsuch as that of peripherals.\n\nIf any value (of `percentageLow`,\n`percentageCritical` and\n`percentageAction`) is invalid, or not in descending\norder, the defaults will be used.\n"}, "loc": ["services", "upower", "percentageAction"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.upower.percentageCritical": {"declarations": ["nixos/modules/services/hardware/upower.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "When `usePercentageForPolicy` is\n`true`, the levels at which UPower will consider the\nbattery critical.\n\nThis will also be used for batteries which don't have time information\nsuch as that of peripherals.\n\nIf any value (of `percentageLow`,\n`percentageCritical` and\n`percentageAction`) is invalid, or not in descending\norder, the defaults will be used.\n"}, "loc": ["services", "upower", "percentageCritical"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.upower.percentageLow": {"declarations": ["nixos/modules/services/hardware/upower.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "When `usePercentageForPolicy` is\n`true`, the levels at which UPower will consider the\nbattery low.\n\nThis will also be used for batteries which don't have time information\nsuch as that of peripherals.\n\nIf any value (of `percentageLow`,\n`percentageCritical` and\n`percentageAction`) is invalid, or not in descending\norder, the defaults will be used.\n"}, "loc": ["services", "upower", "percentageLow"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.upower.timeAction": {"declarations": ["nixos/modules/services/hardware/upower.nix"], "default": {"_type": "literalExpression", "text": "120"}, "description": {"_type": "mdDoc", "text": "When `usePercentageForPolicy` is\n`false`, the time remaining in seconds at which\nUPower will take action for the critical battery level.\n\nIf any value (of `timeLow`,\n`timeCritical` and `timeAction`) is\ninvalid, or not in descending order, the defaults will be used.\n"}, "loc": ["services", "upower", "timeAction"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.upower.timeCritical": {"declarations": ["nixos/modules/services/hardware/upower.nix"], "default": {"_type": "literalExpression", "text": "300"}, "description": {"_type": "mdDoc", "text": "When `usePercentageForPolicy` is\n`false`, the time remaining in seconds at which\nUPower will consider the battery critical.\n\nIf any value (of `timeLow`,\n`timeCritical` and `timeAction`) is\ninvalid, or not in descending order, the defaults will be used.\n"}, "loc": ["services", "upower", "timeCritical"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.upower.timeLow": {"declarations": ["nixos/modules/services/hardware/upower.nix"], "default": {"_type": "literalExpression", "text": "1200"}, "description": {"_type": "mdDoc", "text": "When `usePercentageForPolicy` is\n`false`, the time remaining in seconds at which\nUPower will consider the battery low.\n\nIf any value (of `timeLow`,\n`timeCritical` and `timeAction`) is\ninvalid, or not in descending order, the defaults will be used.\n"}, "loc": ["services", "upower", "timeLow"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.upower.usePercentageForPolicy": {"declarations": ["nixos/modules/services/hardware/upower.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Policy for warnings and action based on battery levels\n\nWhether battery percentage based policy should be used. The default\nis to use the percentage, which\nshould work around broken firmwares. It is also more reliable than\nthe time left (frantically saving all your files is going to use more\nbattery than letting it rest for example).\n"}, "loc": ["services", "upower", "usePercentageForPolicy"], "readOnly": false, "type": "boolean"}, "services.uptermd.enable": {"declarations": ["nixos/modules/services/networking/uptermd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable uptermd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "uptermd", "enable"], "readOnly": false, "type": "boolean"}, "services.uptermd.extraFlags": {"declarations": ["nixos/modules/services/networking/uptermd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra flags passed to the uptermd command.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--debug\"\n]"}, "loc": ["services", "uptermd", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.uptermd.hostKey": {"declarations": ["nixos/modules/services/networking/uptermd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to SSH host key. If not defined, an ed25519 keypair is generated automatically.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/upterm_host_ed25519_key\""}, "loc": ["services", "uptermd", "hostKey"], "readOnly": false, "type": "null or path"}, "services.uptermd.listenAddress": {"declarations": ["nixos/modules/services/networking/uptermd.nix"], "default": {"_type": "literalExpression", "text": "\"[::]\""}, "description": {"_type": "mdDoc", "text": "Address the server will listen on.\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "uptermd", "listenAddress"], "readOnly": false, "type": "string"}, "services.uptermd.openFirewall": {"declarations": ["nixos/modules/services/networking/uptermd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the firewall for the port in {option}`services.uptermd.port`.\n"}, "loc": ["services", "uptermd", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.uptermd.port": {"declarations": ["nixos/modules/services/networking/uptermd.nix"], "default": {"_type": "literalExpression", "text": "2222"}, "description": {"_type": "mdDoc", "text": "Port the server will listen on.\n"}, "loc": ["services", "uptermd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.uptime-kuma.appriseSupport": {"declarations": ["nixos/modules/services/monitoring/uptime-kuma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable apprise support for notifications."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "uptime-kuma", "appriseSupport"], "readOnly": false, "type": "boolean"}, "services.uptime-kuma.enable": {"declarations": ["nixos/modules/services/monitoring/uptime-kuma.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Uptime Kuma, this assumes a reverse proxy to be set."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "uptime-kuma", "enable"], "readOnly": false, "type": "boolean"}, "services.uptime-kuma.package": {"declarations": ["nixos/modules/services/monitoring/uptime-kuma.nix"], "default": {"_type": "literalExpression", "text": "pkgs.uptime-kuma"}, "description": {"_type": "mdDoc", "text": "Uptime Kuma package to use."}, "loc": ["services", "uptime-kuma", "package"], "readOnly": false, "type": "package"}, "services.uptime-kuma.settings": {"declarations": ["nixos/modules/services/monitoring/uptime-kuma.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional configuration for Uptime Kuma, see\n<https://github.com/louislam/uptime-kuma/wiki/Environment-Variables>\nfor supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  NODE_EXTRA_CA_CERTS = \"/etc/ssl/certs/ca-certificates.crt\";\n  PORT = \"4000\";\n}"}, "loc": ["services", "uptime-kuma", "settings"], "readOnly": false, "type": "attribute set of string"}, "services.uptime.configFile": {"declarations": ["nixos/modules/services/monitoring/uptime.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The uptime configuration file\n\nIf mongodb: server != localhost, please set usesRemoteMongo = true\n\nIf you only want to run the monitor, please set enableWebService = false\nand enableSeparateMonitoringService = true\n\nIf autoStartMonitor: false (recommended) and you want to run both\nservices, please set enableSeparateMonitoringService = true\n"}, "loc": ["services", "uptime", "configFile"], "readOnly": false, "type": "null or path"}, "services.uptime.enableSeparateMonitoringService": {"declarations": ["nixos/modules/services/monitoring/uptime.nix"], "default": {"_type": "literalExpression", "text": "config.services.uptime.enableWebService"}, "description": {"_type": "mdDoc", "text": "Whether to enable the uptime monitoring service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "uptime", "enableSeparateMonitoringService"], "readOnly": false, "type": "boolean"}, "services.uptime.enableWebService": {"declarations": ["nixos/modules/services/monitoring/uptime.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the uptime monitoring program web service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "uptime", "enableWebService"], "readOnly": false, "type": "boolean"}, "services.uptime.nodeEnv": {"declarations": ["nixos/modules/services/monitoring/uptime.nix"], "default": {"_type": "literalExpression", "text": "\"production\""}, "description": {"_type": "mdDoc", "text": "The node environment to run in (development, production, etc.)"}, "loc": ["services", "uptime", "nodeEnv"], "readOnly": false, "type": "string"}, "services.uptime.usesRemoteMongo": {"declarations": ["nixos/modules/services/monitoring/uptime.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the configuration file specifies a remote mongo instance"}, "loc": ["services", "uptime", "usesRemoteMongo"], "readOnly": false, "type": "boolean"}, "services.uptimed.enable": {"declarations": ["nixos/modules/services/system/uptimed.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable `uptimed`, allowing you to track\nyour highest uptimes.\n"}, "loc": ["services", "uptimed", "enable"], "readOnly": false, "type": "boolean"}, "services.urserver.enable": {"declarations": ["nixos/modules/services/x11/urserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable urserver."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "urserver", "enable"], "readOnly": false, "type": "boolean"}, "services.urxvtd.enable": {"declarations": ["nixos/modules/services/x11/urxvtd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable urxvtd, the urxvt terminal daemon. To use urxvtd, run\n\"urxvtc\".\n"}, "loc": ["services", "urxvtd", "enable"], "readOnly": false, "type": "boolean"}, "services.urxvtd.package": {"declarations": ["nixos/modules/services/x11/urxvtd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.rxvt-unicode"}, "description": {"_type": "mdDoc", "text": "Package to install. Usually pkgs.rxvt-unicode.\n"}, "loc": ["services", "urxvtd", "package"], "readOnly": false, "type": "package"}, "services.usbguard.IPCAllowedGroups": {"declarations": ["nixos/modules/services/security/usbguard.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of groupnames that the daemon will accept IPC connections\nfrom.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"wheel\"\n]"}, "loc": ["services", "usbguard", "IPCAllowedGroups"], "readOnly": false, "type": "list of string"}, "services.usbguard.IPCAllowedUsers": {"declarations": ["nixos/modules/services/security/usbguard.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"root\"\n]"}, "description": {"_type": "mdDoc", "text": "A list of usernames that the daemon will accept IPC connections from.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"root\"\n  \"yourusername\"\n]"}, "loc": ["services", "usbguard", "IPCAllowedUsers"], "readOnly": false, "type": "list of string"}, "services.usbguard.deviceRulesWithPort": {"declarations": ["nixos/modules/services/security/usbguard.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Generate device specific rules including the \"via-port\" attribute.\n"}, "loc": ["services", "usbguard", "deviceRulesWithPort"], "readOnly": false, "type": "boolean"}, "services.usbguard.enable": {"declarations": ["nixos/modules/services/security/usbguard.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable USBGuard daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "usbguard", "enable"], "readOnly": false, "type": "boolean"}, "services.usbguard.implictPolicyTarget": {"declarations": ["nixos/modules/services/security/usbguard.nix"], "default": {"_type": "literalExpression", "text": "\"block\""}, "description": {"_type": "mdDoc", "text": "How to treat USB devices that don't match any rule in the policy.\nTarget should be one of allow, block or reject (logically remove the\ndevice node from the system).\n"}, "loc": ["services", "usbguard", "implictPolicyTarget"], "readOnly": false, "type": "one of \"allow\", \"block\", \"reject\", \"keep\", \"apply-policy\""}, "services.usbguard.insertedDevicePolicy": {"declarations": ["nixos/modules/services/security/usbguard.nix"], "default": {"_type": "literalExpression", "text": "\"apply-policy\""}, "description": {"_type": "mdDoc", "text": "How to treat USB devices that are already connected after the daemon\nstarts. One of block, reject, apply-policy.\n"}, "loc": ["services", "usbguard", "insertedDevicePolicy"], "readOnly": false, "type": "one of \"allow\", \"block\", \"reject\", \"keep\", \"apply-policy\""}, "services.usbguard.package": {"declarations": ["nixos/modules/services/security/usbguard.nix"], "default": {"_type": "literalExpression", "text": "pkgs.usbguard"}, "description": {"_type": "mdDoc", "text": "The usbguard package to use. If you do not need the Qt GUI, use\n`pkgs.usbguard-nox` to save disk space.\n"}, "loc": ["services", "usbguard", "package"], "readOnly": false, "type": "package"}, "services.usbguard.presentControllerPolicy": {"declarations": ["nixos/modules/services/security/usbguard.nix"], "default": {"_type": "literalExpression", "text": "\"keep\""}, "description": {"_type": "mdDoc", "text": "How to treat USB controller devices that are already connected when\nthe daemon starts. One of allow, block, reject, keep or apply-policy.\n"}, "loc": ["services", "usbguard", "presentControllerPolicy"], "readOnly": false, "type": "one of \"allow\", \"block\", \"reject\", \"keep\", \"apply-policy\""}, "services.usbguard.presentDevicePolicy": {"declarations": ["nixos/modules/services/security/usbguard.nix"], "default": {"_type": "literalExpression", "text": "\"apply-policy\""}, "description": {"_type": "mdDoc", "text": "How to treat USB devices that are already connected when the daemon\nstarts. Policy should be one of allow, block, reject, keep (keep\nwhatever state the device is currently in) or apply-policy (evaluate\nthe rule set for every present device).\n"}, "loc": ["services", "usbguard", "presentDevicePolicy"], "readOnly": false, "type": "one of \"allow\", \"block\", \"reject\", \"keep\", \"apply-policy\""}, "services.usbguard.restoreControllerDeviceState": {"declarations": ["nixos/modules/services/security/usbguard.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "The  USBGuard  daemon  modifies  some attributes of controller\ndevices like the default authorization state of new child device\ninstances. Using this setting, you can control whether the daemon\nwill try to restore the attribute values to the state before\nmodification on shutdown.\n"}, "loc": ["services", "usbguard", "restoreControllerDeviceState"], "readOnly": false, "type": "boolean"}, "services.usbguard.rules": {"declarations": ["nixos/modules/services/security/usbguard.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The USBGuard daemon will load this as the policy rule set.\nAs these rules are NixOS managed they are immutable and can't\nbe changed by the IPC interface.\n\nIf you do not set this option, the USBGuard daemon will load\nit's policy rule set from `/var/lib/usbguard/rules.conf`.\nThis file can be changed manually or via the IPC interface.\n\nRunning `usbguard generate-policy` as root will\ngenerate a config for your currently plugged in devices.\n\nFor more details see {manpage}`usbguard-rules.conf(5)`.\n"}, "example": {"_type": "literalExpression", "text": "''\n  allow with-interface equals { 08:*:* }\n''"}, "loc": ["services", "usbguard", "rules"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.usbmuxd.enable": {"declarations": ["nixos/modules/services/hardware/usbmuxd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the usbmuxd (\"USB multiplexing daemon\") service. This daemon is\nin charge of multiplexing connections over USB to an iOS device. This is\nneeded for transferring data from and to iOS devices (see ifuse). Also\nthis may enable plug-n-play tethering for iPhones.\n"}, "loc": ["services", "usbmuxd", "enable"], "readOnly": false, "type": "boolean"}, "services.usbmuxd.group": {"declarations": ["nixos/modules/services/hardware/usbmuxd.nix"], "default": {"_type": "literalExpression", "text": "\"usbmux\""}, "description": {"_type": "mdDoc", "text": "The group usbmuxd should use to run after startup.\n"}, "loc": ["services", "usbmuxd", "group"], "readOnly": false, "type": "string"}, "services.usbmuxd.package": {"declarations": ["nixos/modules/services/hardware/usbmuxd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.usbmuxd"}, "description": {"_type": "mdDoc", "text": "Which package to use for the usbmuxd daemon."}, "loc": ["services", "usbmuxd", "package"], "readOnly": false, "relatedPackages": "- [`pkgs.usbmuxd`](\n    https://search.nixos.org/packages?show=usbmuxd&sort=relevance&query=usbmuxd\n  )\n- [`pkgs.usbmuxd2`](\n    https://search.nixos.org/packages?show=usbmuxd2&sort=relevance&query=usbmuxd2\n  )\n", "type": "package"}, "services.usbmuxd.user": {"declarations": ["nixos/modules/services/hardware/usbmuxd.nix"], "default": {"_type": "literalExpression", "text": "\"usbmux\""}, "description": {"_type": "mdDoc", "text": "The user usbmuxd should use to run after startup.\n"}, "loc": ["services", "usbmuxd", "user"], "readOnly": false, "type": "string"}, "services.usbrelayd.broker": {"declarations": ["nixos/modules/services/hardware/usbrelayd.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Hostname or IP address of your MQTT Broker."}, "example": {"_type": "literalExpression", "text": "[\n  \"mqtt\"\n  \"192.168.1.1\"\n]"}, "loc": ["services", "usbrelayd", "broker"], "readOnly": false, "type": "string"}, "services.usbrelayd.clientName": {"declarations": ["nixos/modules/services/hardware/usbrelayd.nix"], "default": {"_type": "literalExpression", "text": "\"MyUSBRelay\""}, "description": {"_type": "mdDoc", "text": "Name, your client connects as."}, "loc": ["services", "usbrelayd", "clientName"], "readOnly": false, "type": "string"}, "services.usbrelayd.enable": {"declarations": ["nixos/modules/services/hardware/usbrelayd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable USB Relay MQTT daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "usbrelayd", "enable"], "readOnly": false, "type": "boolean"}, "services.userdbd.enable": {"declarations": ["nixos/modules/system/boot/systemd/userdbd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Enables the systemd JSON user/group record lookup service\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "userdbd", "enable"], "readOnly": false, "type": "boolean"}, "services.uvcvideo.dynctrl.enable": {"declarations": ["nixos/modules/hardware/video/uvcvideo/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable {command}`uvcvideo` dynamic controls.\n\nNote that enabling this brings the {command}`uvcdynctrl` tool\ninto your environment and register all dynamic controls from\nspecified {command}`packages` to the {command}`uvcvideo` driver.\n"}, "loc": ["services", "uvcvideo", "dynctrl", "enable"], "readOnly": false, "type": "boolean"}, "services.uvcvideo.dynctrl.packages": {"declarations": ["nixos/modules/hardware/video/uvcvideo/default.nix"], "description": {"_type": "mdDoc", "text": "List of packages containing {command}`uvcvideo` dynamic controls\nrules. All files found in\n{file}`\u00abpkg\u00bb/share/uvcdynctrl/data`\nwill be included.\n\nNote that these will serve as input to the {command}`libwebcam`\npackage which through its own {command}`udev` rule will register\nthe dynamic controls from specified packages to the {command}`uvcvideo`\ndriver.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.tiscamera ]"}, "loc": ["services", "uvcvideo", "dynctrl", "packages"], "readOnly": false, "type": "list of path"}, "services.uwsgi.capabilities": {"declarations": ["nixos/modules/services/web-servers/uwsgi.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Grant capabilities to the uWSGI instance. See the\n`capabilities(7)` for available values.\n\n::: {.note}\nuWSGI runs as an unprivileged user (even as Emperor) with the minimal\ncapabilities required. This option can be used to add fine-grained\npermissions without running the service as root.\n\nWhen in Emperor mode, any capability to be inherited by a vassal must\nbe specified again in the vassal configuration using `cap`.\nSee the uWSGI [docs](https://uwsgi-docs.readthedocs.io/en/latest/Capabilities.html)\nfor more information.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"CAP_NET_BIND_SERVICE\" # bind on ports <1024\n  \"CAP_NET_RAW\"          # open raw sockets\n]\n"}, "loc": ["services", "uwsgi", "capabilities"], "readOnly": false, "type": "list of string"}, "services.uwsgi.enable": {"declarations": ["nixos/modules/services/web-servers/uwsgi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable uWSGI"}, "loc": ["services", "uwsgi", "enable"], "readOnly": false, "type": "boolean"}, "services.uwsgi.group": {"declarations": ["nixos/modules/services/web-servers/uwsgi.nix"], "default": {"_type": "literalExpression", "text": "\"uwsgi\""}, "description": {"_type": "mdDoc", "text": "Group account under which uWSGI runs."}, "loc": ["services", "uwsgi", "group"], "readOnly": false, "type": "string"}, "services.uwsgi.instance": {"declarations": ["nixos/modules/services/web-servers/uwsgi.nix"], "default": {"_type": "literalExpression", "text": "{\n  type = \"normal\";\n}"}, "description": {"_type": "mdDoc", "text": "uWSGI configuration. It awaits an attribute `type` inside which can be either\n`normal` or `emperor`.\n\nFor `normal` mode you can specify `pythonPackages` as a function\nfrom libraries set into a list of libraries. `pythonpath` will be set accordingly.\n\nFor `emperor` mode, you should use `vassals` attribute\nwhich should be either a set of names and configurations or a path to a directory.\n\nOther attributes will be used in configuration file as-is. Notice that you can redefine\n`plugins` setting here.\n"}, "example": {"_type": "literalExpression", "text": "{\n  type = \"emperor\";\n  vassals = {\n    moin = {\n      type = \"normal\";\n      pythonPackages = self: with self; [ moinmoin ];\n      socket = \"${config.services.uwsgi.runDir}/uwsgi.sock\";\n    };\n  };\n}\n"}, "loc": ["services", "uwsgi", "instance"], "readOnly": false, "type": "Json value or lambda"}, "services.uwsgi.plugins": {"declarations": ["nixos/modules/services/web-servers/uwsgi.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Plugins used with uWSGI"}, "loc": ["services", "uwsgi", "plugins"], "readOnly": false, "type": "list of string"}, "services.uwsgi.runDir": {"declarations": ["nixos/modules/services/web-servers/uwsgi.nix"], "default": {"_type": "literalExpression", "text": "\"/run/uwsgi\""}, "description": {"_type": "mdDoc", "text": "Where uWSGI communication sockets can live"}, "loc": ["services", "uwsgi", "runDir"], "readOnly": false, "type": "path"}, "services.uwsgi.user": {"declarations": ["nixos/modules/services/web-servers/uwsgi.nix"], "default": {"_type": "literalExpression", "text": "\"uwsgi\""}, "description": {"_type": "mdDoc", "text": "User account under which uWSGI runs."}, "loc": ["services", "uwsgi", "user"], "readOnly": false, "type": "string"}, "services.v2ray.config": {"declarations": ["nixos/modules/services/networking/v2ray.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The configuration object.\n\nEither `configFile` or `config` must be specified.\n\nSee <https://www.v2fly.org/en_US/v5/config/overview.html>.\n"}, "example": {"_type": "literalExpression", "text": "{\n  inbounds = [\n    {\n      listen = \"127.0.0.1\";\n      port = 1080;\n      protocol = \"http\";\n    }\n  ];\n  outbounds = [\n    {\n      protocol = \"freedom\";\n    }\n  ];\n}"}, "loc": ["services", "v2ray", "config"], "readOnly": false, "type": "null or (attribute set of unspecified value)"}, "services.v2ray.configFile": {"declarations": ["nixos/modules/services/networking/v2ray.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The absolute path to the configuration file.\n\nEither `configFile` or `config` must be specified.\n\nSee <https://www.v2fly.org/en_US/v5/config/overview.html>.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/v2ray/config.json\""}, "loc": ["services", "v2ray", "configFile"], "readOnly": false, "type": "null or string"}, "services.v2ray.enable": {"declarations": ["nixos/modules/services/networking/v2ray.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run v2ray server.\n\nEither `configFile` or `config` must be specified.\n"}, "loc": ["services", "v2ray", "enable"], "readOnly": false, "type": "boolean"}, "services.v2ray.package": {"declarations": ["nixos/modules/services/networking/v2ray.nix"], "default": {"_type": "literalExpression", "text": "pkgs.v2ray"}, "description": {"_type": "mdDoc", "text": "Which v2ray package to use.\n"}, "loc": ["services", "v2ray", "package"], "readOnly": false, "type": "package"}, "services.v2raya.enable": {"declarations": ["nixos/modules/services/networking/v2raya.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the v2rayA service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "v2raya", "enable"], "readOnly": false, "type": "boolean"}, "services.v4l2-relayd.instances": {"declarations": ["nixos/modules/services/video/v4l2-relayd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "v4l2-relayd instances to be created.\n"}, "example": {"_type": "literalExpression", "text": "{\n  example = {\n    cardLabel = \"Example card\";\n    input.pipeline = \"videotestsrc\";\n  };\n}\n"}, "loc": ["services", "v4l2-relayd", "instances"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.v4l2-relayd.instances.<name>.cardLabel": {"declarations": ["nixos/modules/services/video/v4l2-relayd.nix"], "description": {"_type": "mdDoc", "text": "The name the camera will show up as.\n"}, "loc": ["services", "v4l2-relayd", "instances", "<name>", "cardLabel"], "readOnly": false, "type": "string"}, "services.v4l2-relayd.instances.<name>.enable": {"declarations": ["nixos/modules/services/video/v4l2-relayd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable this v4l2-relayd instance."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "v4l2-relayd", "instances", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.v4l2-relayd.instances.<name>.extraPackages": {"declarations": ["nixos/modules/services/video/v4l2-relayd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra packages to add to {env}`GST_PLUGIN_PATH` for the instance.\n"}, "loc": ["services", "v4l2-relayd", "instances", "<name>", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.v4l2-relayd.instances.<name>.input.format": {"declarations": ["nixos/modules/services/video/v4l2-relayd.nix"], "default": {"_type": "literalExpression", "text": "\"YUY2\""}, "description": {"_type": "mdDoc", "text": "The video-format to read from input-stream.\n"}, "loc": ["services", "v4l2-relayd", "instances", "<name>", "input", "format"], "readOnly": false, "type": "string"}, "services.v4l2-relayd.instances.<name>.input.framerate": {"declarations": ["nixos/modules/services/video/v4l2-relayd.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "The framerate to read from input-stream.\n"}, "loc": ["services", "v4l2-relayd", "instances", "<name>", "input", "framerate"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.v4l2-relayd.instances.<name>.input.height": {"declarations": ["nixos/modules/services/video/v4l2-relayd.nix"], "default": {"_type": "literalExpression", "text": "720"}, "description": {"_type": "mdDoc", "text": "The height to read from input-stream.\n"}, "loc": ["services", "v4l2-relayd", "instances", "<name>", "input", "height"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.v4l2-relayd.instances.<name>.input.pipeline": {"declarations": ["nixos/modules/services/video/v4l2-relayd.nix"], "description": {"_type": "mdDoc", "text": "The gstreamer-pipeline to use for the input-stream.\n"}, "loc": ["services", "v4l2-relayd", "instances", "<name>", "input", "pipeline"], "readOnly": false, "type": "string"}, "services.v4l2-relayd.instances.<name>.input.width": {"declarations": ["nixos/modules/services/video/v4l2-relayd.nix"], "default": {"_type": "literalExpression", "text": "1280"}, "description": {"_type": "mdDoc", "text": "The width to read from input-stream.\n"}, "loc": ["services", "v4l2-relayd", "instances", "<name>", "input", "width"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.v4l2-relayd.instances.<name>.name": {"declarations": ["nixos/modules/services/video/v4l2-relayd.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The name of the instance.\n"}, "loc": ["services", "v4l2-relayd", "instances", "<name>", "name"], "readOnly": false, "type": "string"}, "services.v4l2-relayd.instances.<name>.output.format": {"declarations": ["nixos/modules/services/video/v4l2-relayd.nix"], "default": {"_type": "literalExpression", "text": "\"YUY2\""}, "description": {"_type": "mdDoc", "text": "The video-format to write to output-stream.\n"}, "loc": ["services", "v4l2-relayd", "instances", "<name>", "output", "format"], "readOnly": false, "type": "string"}, "services.varnish.config": {"declarations": ["nixos/modules/services/web-servers/varnish/default.nix"], "description": {"_type": "mdDoc", "text": "Verbatim default.vcl configuration.\n"}, "loc": ["services", "varnish", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.varnish.enable": {"declarations": ["nixos/modules/services/web-servers/varnish/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Varnish Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "varnish", "enable"], "readOnly": false, "type": "boolean"}, "services.varnish.enableConfigCheck": {"declarations": ["nixos/modules/services/web-servers/varnish/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable checking the config during build time."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "varnish", "enableConfigCheck"], "readOnly": false, "type": "boolean"}, "services.varnish.extraCommandLine": {"declarations": ["nixos/modules/services/web-servers/varnish/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Command line switches for varnishd (run 'varnishd -?' to get list of options)\n"}, "example": {"_type": "literalExpression", "text": "\"-s malloc,256M\""}, "loc": ["services", "varnish", "extraCommandLine"], "readOnly": false, "type": "string"}, "services.varnish.extraModules": {"declarations": ["nixos/modules/services/web-servers/varnish/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Varnish modules (except 'std').\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.varnishPackages.geoip ]"}, "loc": ["services", "varnish", "extraModules"], "readOnly": false, "type": "list of package"}, "services.varnish.http_address": {"declarations": ["nixos/modules/services/web-servers/varnish/default.nix"], "default": {"_type": "literalExpression", "text": "\"*:6081\""}, "description": {"_type": "mdDoc", "text": "HTTP listen address and port.\n"}, "loc": ["services", "varnish", "http_address"], "readOnly": false, "type": "string"}, "services.varnish.package": {"declarations": ["nixos/modules/services/web-servers/varnish/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.varnish"}, "description": {"_type": "mdDoc", "text": "The package to use\n"}, "loc": ["services", "varnish", "package"], "readOnly": false, "type": "package"}, "services.varnish.stateDir": {"declarations": ["nixos/modules/services/web-servers/varnish/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/spool/varnish/${config.networking.hostName}\""}, "description": {"_type": "mdDoc", "text": "Directory holding all state for Varnish to run.\n"}, "loc": ["services", "varnish", "stateDir"], "readOnly": false, "type": "path"}, "services.vault-agent.instances": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute set of vault-agent instances.\nCreates independent `vault-agent-${name}.service` systemd units for each instance defined here.\n"}, "loc": ["services", "vault-agent", "instances"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.vault-agent.instances.<name>.enable": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable this vault-agent instance."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "vault-agent", "instances", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.vault-agent.instances.<name>.group": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "Group under which this instance runs.\n"}, "loc": ["services", "vault-agent", "instances", "<name>", "group"], "readOnly": false, "type": "string"}, "services.vault-agent.instances.<name>.package": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "pkgs.vault"}, "description": {"_type": "mdDoc", "text": "The vault package to use."}, "loc": ["services", "vault-agent", "instances", "<name>", "package"], "readOnly": false, "type": "package"}, "services.vault-agent.instances.<name>.settings": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Free-form settings written directly to the `config.json` file.\nRefer to <https://developer.hashicorp.com/vault/docs/agent#configuration-file-options> for supported values.\n\n::: {.note}\nResulting format is JSON not HCL.\nRefer to <https://www.hcl2json.com/> if you are unsure how to convert HCL options to JSON.\n:::\n"}, "loc": ["services", "vault-agent", "instances", "<name>", "settings"], "readOnly": false, "type": "JSON value"}, "services.vault-agent.instances.<name>.settings.pid_file": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "\"/run/vault-agent/\u2039name\u203a.pid\""}, "description": {"_type": "mdDoc", "text": "Path to use for the pid file.\n"}, "loc": ["services", "vault-agent", "instances", "<name>", "settings", "pid_file"], "readOnly": false, "type": "string"}, "services.vault-agent.instances.<name>.settings.template": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Template section of vault-agent.\nRefer to <https://developer.hashicorp.com/vault/docs/agent/template> for supported values.\n"}, "loc": ["services", "vault-agent", "instances", "<name>", "settings", "template"], "readOnly": false, "type": "list of attribute set of anything"}, "services.vault-agent.instances.<name>.user": {"declarations": ["nixos/modules/services/security/vault-agent.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "User under which this instance runs.\n"}, "loc": ["services", "vault-agent", "instances", "<name>", "user"], "readOnly": false, "type": "string"}, "services.vault.address": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:8200\""}, "description": {"_type": "mdDoc", "text": "The name of the ip interface to listen to"}, "loc": ["services", "vault", "address"], "readOnly": false, "type": "string"}, "services.vault.dev": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "In this mode, Vault runs in-memory and starts unsealed. This option is not meant production but for development and testing i.e. for nixos tests.\n"}, "loc": ["services", "vault", "dev"], "readOnly": false, "type": "boolean"}, "services.vault.devRootTokenID": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Initial root token. This only applies when {option}`services.vault.dev` is true\n"}, "loc": ["services", "vault", "devRootTokenID"], "readOnly": false, "type": "string"}, "services.vault.enable": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Vault daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "vault", "enable"], "readOnly": false, "type": "boolean"}, "services.vault.extraConfig": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra text appended to {file}`vault.hcl`."}, "loc": ["services", "vault", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.vault.extraSettingsPaths": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Configuration files to load besides the immutable one defined by the NixOS module.\nThis can be used to avoid putting credentials in the Nix store, which can be read by any user.\n\nEach path can point to a JSON- or HCL-formatted file, or a directory\nto be scanned for files with `.hcl` or\n`.json` extensions.\n\nTo upload the confidential file with NixOps, use for example:\n\n```\n# https://releases.nixos.org/nixops/latest/manual/manual.html#opt-deployment.keys\ndeployment.keys.\"vault.hcl\" = let db = import ./db-credentials.nix; in {\n  text = ''\n    storage \"postgresql\" {\n      connection_url = \"postgres://${db.username}:${db.password}@host.example.com/exampledb?sslmode=verify-ca\"\n    }\n  '';\n  user = \"vault\";\n};\nservices.vault.extraSettingsPaths = [\"/run/keys/vault.hcl\"];\nservices.vault.storageBackend = \"postgresql\";\nusers.users.vault.extraGroups = [\"keys\"];\n```\n"}, "loc": ["services", "vault", "extraSettingsPaths"], "readOnly": false, "type": "list of path"}, "services.vault.listenerExtraConfig": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "''\n  tls_min_version = \"tls12\"\n''"}, "description": {"_type": "mdDoc", "text": "Extra text appended to the listener section."}, "loc": ["services", "vault", "listenerExtraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.vault.package": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "pkgs.vault"}, "description": {"_type": "mdDoc", "text": "This option specifies the vault package to use."}, "loc": ["services", "vault", "package"], "readOnly": false, "type": "package"}, "services.vault.storageBackend": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "\"inmem\""}, "description": {"_type": "mdDoc", "text": "The name of the type of storage backend"}, "loc": ["services", "vault", "storageBackend"], "readOnly": false, "type": "one of \"inmem\", \"file\", \"consul\", \"zookeeper\", \"s3\", \"azure\", \"dynamodb\", \"etcd\", \"mssql\", \"mysql\", \"postgresql\", \"swift\", \"gcs\", \"raft\""}, "services.vault.storageConfig": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "HCL configuration to insert in the storageBackend section.\n\nConfidential values should not be specified here because this option's\nvalue is written to the Nix store, which is publicly readable.\nProvide credentials and such in a separate file using\n[](#opt-services.vault.extraSettingsPaths).\n"}, "loc": ["services", "vault", "storageConfig"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "services.vault.storagePath": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "if config.services.vault.storageBackend == \"file\" || cfg.storageBackend == \"raft\"\nthen \"/var/lib/vault\"\nelse null\n"}, "description": {"_type": "mdDoc", "text": "Data directory for file backend"}, "loc": ["services", "vault", "storagePath"], "readOnly": false, "type": "null or path"}, "services.vault.telemetryConfig": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Telemetry configuration"}, "loc": ["services", "vault", "telemetryConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.vault.tlsCertFile": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS certificate file. TLS will be disabled unless this option is set"}, "example": {"_type": "literalExpression", "text": "\"/path/to/your/cert.pem\""}, "loc": ["services", "vault", "tlsCertFile"], "readOnly": false, "type": "null or string"}, "services.vault.tlsKeyFile": {"declarations": ["nixos/modules/services/security/vault.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS private key file. TLS will be disabled unless this option is set"}, "example": {"_type": "literalExpression", "text": "\"/path/to/your/key.pem\""}, "loc": ["services", "vault", "tlsKeyFile"], "readOnly": false, "type": "null or string"}, "services.vdirsyncer.enable": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable vdirsyncer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "vdirsyncer", "enable"], "readOnly": false, "type": "boolean"}, "services.vdirsyncer.jobs": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "description": {"_type": "mdDoc", "text": "vdirsyncer job configurations"}, "loc": ["services", "vdirsyncer", "jobs"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.vdirsyncer.jobs.<name>.additionalGroups": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "additional groups to add the dynamic user to"}, "loc": ["services", "vdirsyncer", "jobs", "<name>", "additionalGroups"], "readOnly": false, "type": "list of string"}, "services.vdirsyncer.jobs.<name>.config.general": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "general configuration"}, "loc": ["services", "vdirsyncer", "jobs", "<name>", "config", "general"], "readOnly": false, "type": "attribute set"}, "services.vdirsyncer.jobs.<name>.config.pairs": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "vdirsyncer pair configurations"}, "example": {"_type": "literalExpression", "text": "{\n  my_contacts = {\n    a = \"my_cloud_contacts\";\n    b = \"my_local_contacts\";\n    collections = [ \"from a\" ];\n    conflict_resolution = \"a wins\";\n    metadata = [ \"color\" \"displayname\" ];\n  };\n};\n"}, "loc": ["services", "vdirsyncer", "jobs", "<name>", "config", "pairs"], "readOnly": false, "type": "attribute set of (attribute set)"}, "services.vdirsyncer.jobs.<name>.config.statusPath": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "default": {"_type": "literalExpression", "text": "/var/lib/vdirsyncer/${attrName}"}, "description": {"_type": "mdDoc", "text": "vdirsyncer's status path"}, "loc": ["services", "vdirsyncer", "jobs", "<name>", "config", "statusPath"], "readOnly": false, "type": "null or string"}, "services.vdirsyncer.jobs.<name>.config.storages": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "vdirsyncer storage configurations"}, "example": {"_type": "literalExpression", "text": "{\n  my_cloud_contacts = {\n    type = \"carddav\";\n    url = \"https://dav.example.com/\";\n    read_only = true;\n    username = \"user\";\n    \"password.fetch\" = [ \"command\" \"cat\" \"/etc/vdirsyncer/cloud.passwd\" ];\n  };\n  my_local_contacts = {\n    type = \"carddav\";\n    url = \"https://localhost/\";\n    username = \"user\";\n    \"password.fetch\" = [ \"command\" \"cat\" \"/etc/vdirsyncer/local.passwd\" ];\n  };\n}\n"}, "loc": ["services", "vdirsyncer", "jobs", "<name>", "config", "storages"], "readOnly": false, "type": "attribute set of (attribute set)"}, "services.vdirsyncer.jobs.<name>.configFile": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "existing configuration file"}, "loc": ["services", "vdirsyncer", "jobs", "<name>", "configFile"], "readOnly": false, "type": "null or path"}, "services.vdirsyncer.jobs.<name>.enable": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable this vdirsyncer job."}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "vdirsyncer", "jobs", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.vdirsyncer.jobs.<name>.forceDiscover": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Run `yes | vdirsyncer discover` prior to `vdirsyncer sync`\n"}, "loc": ["services", "vdirsyncer", "jobs", "<name>", "forceDiscover"], "readOnly": false, "type": "boolean"}, "services.vdirsyncer.jobs.<name>.group": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "group to run vdirsyncer as"}, "loc": ["services", "vdirsyncer", "jobs", "<name>", "group"], "readOnly": false, "type": "null or string"}, "services.vdirsyncer.jobs.<name>.timerConfig": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "default": {"_type": "literalExpression", "text": "{\n  OnBootSec = \"1h\";\n  OnUnitActiveSec = \"6h\";\n}"}, "description": {"_type": "mdDoc", "text": "systemd timer configuration"}, "loc": ["services", "vdirsyncer", "jobs", "<name>", "timerConfig"], "readOnly": false, "type": "attribute set"}, "services.vdirsyncer.jobs.<name>.user": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "User account to run vdirsyncer as, otherwise as a systemd\ndynamic user\n"}, "loc": ["services", "vdirsyncer", "jobs", "<name>", "user"], "readOnly": false, "type": "null or string"}, "services.vdirsyncer.package": {"declarations": ["nixos/modules/services/networking/vdirsyncer.nix"], "default": {"_type": "literalExpression", "text": "pkgs.vdirsyncer"}, "description": {"_type": "mdDoc", "text": "The vdirsyncer package to use."}, "loc": ["services", "vdirsyncer", "package"], "readOnly": false, "type": "package"}, "services.vdr.enable": {"declarations": ["nixos/modules/services/hardware/vdr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable VDR. Please put config into /var/lib/vdr."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "vdr", "enable"], "readOnly": false, "type": "boolean"}, "services.vdr.enableLirc": {"declarations": ["nixos/modules/services/hardware/vdr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable LIRC."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "vdr", "enableLirc"], "readOnly": false, "type": "boolean"}, "services.vdr.extraArguments": {"declarations": ["nixos/modules/services/hardware/vdr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command line arguments to pass to VDR."}, "loc": ["services", "vdr", "extraArguments"], "readOnly": false, "type": "list of string"}, "services.vdr.package": {"declarations": ["nixos/modules/services/hardware/vdr.nix"], "default": {"_type": "literalExpression", "text": "pkgs.vdr"}, "description": {"_type": "mdDoc", "text": "Package to use."}, "example": {"_type": "literalExpression", "text": "pkgs.wrapVdr.override { plugins = with pkgs.vdrPlugins; [ hello ]; }"}, "loc": ["services", "vdr", "package"], "readOnly": false, "type": "package"}, "services.vdr.videoDir": {"declarations": ["nixos/modules/services/hardware/vdr.nix"], "default": {"_type": "literalExpression", "text": "\"/srv/vdr/video\""}, "description": {"_type": "mdDoc", "text": "Recording directory"}, "loc": ["services", "vdr", "videoDir"], "readOnly": false, "type": "path"}, "services.vector.enable": {"declarations": ["nixos/modules/services/logging/vector.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Vector."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "vector", "enable"], "readOnly": false, "type": "boolean"}, "services.vector.journaldAccess": {"declarations": ["nixos/modules/services/logging/vector.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Vector to access journald.\n"}, "loc": ["services", "vector", "journaldAccess"], "readOnly": false, "type": "boolean"}, "services.vector.package": {"declarations": ["nixos/modules/services/logging/vector.nix"], "default": {"_type": "literalExpression", "text": "pkgs.vector"}, "description": {"_type": "mdDoc", "text": "The vector package to use."}, "loc": ["services", "vector", "package"], "readOnly": false, "type": "package"}, "services.vector.settings": {"declarations": ["nixos/modules/services/logging/vector.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specify the configuration for Vector in Nix.\n"}, "loc": ["services", "vector", "settings"], "readOnly": false, "type": "JSON value"}, "services.victoriametrics.enable": {"declarations": ["nixos/modules/services/databases/victoriametrics.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable victoriametrics."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "victoriametrics", "enable"], "readOnly": false, "type": "boolean"}, "services.victoriametrics.extraOptions": {"declarations": ["nixos/modules/services/databases/victoriametrics.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options to pass to VictoriaMetrics. See the README:\n<https://github.com/VictoriaMetrics/VictoriaMetrics/blob/master/README.md>\nor {command}`victoriametrics -help` for more\ninformation.\n"}, "loc": ["services", "victoriametrics", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.victoriametrics.listenAddress": {"declarations": ["nixos/modules/services/databases/victoriametrics.nix"], "default": {"_type": "literalExpression", "text": "\":8428\""}, "description": {"_type": "mdDoc", "text": "The listen address for the http interface.\n"}, "loc": ["services", "victoriametrics", "listenAddress"], "readOnly": false, "type": "string"}, "services.victoriametrics.package": {"declarations": ["nixos/modules/services/databases/victoriametrics.nix"], "default": {"_type": "literalExpression", "text": "pkgs.victoriametrics"}, "description": {"_type": "mdDoc", "text": "The VictoriaMetrics distribution to use.\n"}, "loc": ["services", "victoriametrics", "package"], "readOnly": false, "type": "package"}, "services.victoriametrics.retentionPeriod": {"declarations": ["nixos/modules/services/databases/victoriametrics.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Retention period in months.\n"}, "loc": ["services", "victoriametrics", "retentionPeriod"], "readOnly": false, "type": "signed integer"}, "services.vikunja.database.database": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "default": {"_type": "literalExpression", "text": "\"vikunja\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "vikunja", "database", "database"], "readOnly": false, "type": "string"}, "services.vikunja.database.host": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host address. Can also be a socket."}, "loc": ["services", "vikunja", "database", "host"], "readOnly": false, "type": "string"}, "services.vikunja.database.path": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/vikunja/vikunja.db\""}, "description": {"_type": "mdDoc", "text": "Path to the sqlite3 database file."}, "loc": ["services", "vikunja", "database", "path"], "readOnly": false, "type": "string"}, "services.vikunja.database.type": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite\""}, "description": {"_type": "mdDoc", "text": "Database engine to use."}, "example": {"_type": "literalExpression", "text": "\"postgres\""}, "loc": ["services", "vikunja", "database", "type"], "readOnly": false, "type": "one of \"sqlite\", \"mysql\", \"postgres\""}, "services.vikunja.database.user": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "default": {"_type": "literalExpression", "text": "\"vikunja\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "vikunja", "database", "user"], "readOnly": false, "type": "string"}, "services.vikunja.enable": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable vikunja service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "vikunja", "enable"], "readOnly": false, "type": "boolean"}, "services.vikunja.environmentFiles": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of environment files set in the vikunja systemd service.\nFor example passwords should be set in one of these files.\n"}, "loc": ["services", "vikunja", "environmentFiles"], "readOnly": false, "type": "list of path"}, "services.vikunja.frontendHostname": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "description": {"_type": "mdDoc", "text": "The Hostname under which the frontend is running."}, "loc": ["services", "vikunja", "frontendHostname"], "readOnly": false, "type": "string"}, "services.vikunja.frontendScheme": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "description": {"_type": "mdDoc", "text": "Whether the site is available via http or https.\nThis does not configure https or ACME in nginx!\n"}, "loc": ["services", "vikunja", "frontendScheme"], "readOnly": false, "type": "one of \"http\", \"https\""}, "services.vikunja.package-api": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "default": {"_type": "literalExpression", "text": "pkgs.vikunja-api"}, "description": {"_type": "mdDoc", "text": "vikunja-api derivation to use."}, "loc": ["services", "vikunja", "package-api"], "readOnly": false, "type": "package"}, "services.vikunja.package-frontend": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "default": {"_type": "literalExpression", "text": "pkgs.vikunja-frontend"}, "description": {"_type": "mdDoc", "text": "vikunja-frontend derivation to use."}, "loc": ["services", "vikunja", "package-frontend"], "readOnly": false, "type": "package"}, "services.vikunja.port": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "default": {"_type": "literalExpression", "text": "3456"}, "description": {"_type": "mdDoc", "text": "The TCP port exposed by the API."}, "loc": ["services", "vikunja", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.vikunja.settings": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Vikunja configuration. Refer to\n<https://vikunja.io/docs/config-options/>\nfor details on supported values.\n"}, "loc": ["services", "vikunja", "settings"], "readOnly": false, "type": "YAML value"}, "services.vikunja.setupNginx": {"declarations": ["nixos/modules/services/web-apps/vikunja.nix"], "default": {"_type": "literalExpression", "text": "config.services.nginx.enable"}, "description": {"_type": "mdDoc", "text": "Whether to setup NGINX.\nFurther nginx configuration can be done by changing\n{option}`services.nginx.virtualHosts.<frontendHostname>`.\nThis does not enable TLS or ACME by default. To enable this, set the\n{option}`services.nginx.virtualHosts.<frontendHostname>.enableACME` to\n`true` and if appropriate do the same for\n{option}`services.nginx.virtualHosts.<frontendHostname>.forceSSL`.\n"}, "loc": ["services", "vikunja", "setupNginx"], "readOnly": false, "type": "boolean"}, "services.vmagent.dataDir": {"declarations": ["nixos/modules/services/monitoring/vmagent.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/vmagent\""}, "description": {"_type": "mdDoc", "text": "The directory where vmagent stores its data files.\n"}, "loc": ["services", "vmagent", "dataDir"], "readOnly": false, "type": "string"}, "services.vmagent.enable": {"declarations": ["nixos/modules/services/monitoring/vmagent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable vmagent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "vmagent", "enable"], "readOnly": false, "type": "boolean"}, "services.vmagent.group": {"declarations": ["nixos/modules/services/monitoring/vmagent.nix"], "default": {"_type": "literalExpression", "text": "\"vmagent\""}, "description": {"_type": "mdDoc", "text": "Group under which vmagent runs.\n"}, "loc": ["services", "vmagent", "group"], "readOnly": false, "type": "string"}, "services.vmagent.openFirewall": {"declarations": ["nixos/modules/services/monitoring/vmagent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the firewall for the default ports.\n"}, "loc": ["services", "vmagent", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.vmagent.package": {"declarations": ["nixos/modules/services/monitoring/vmagent.nix"], "default": {"_type": "literalMD", "text": "pkgs.vmagent"}, "description": {"_type": "mdDoc", "text": "vmagent package to use.\n"}, "loc": ["services", "vmagent", "package"], "readOnly": false, "type": "package"}, "services.vmagent.prometheusConfig": {"declarations": ["nixos/modules/services/monitoring/vmagent.nix"], "description": {"_type": "mdDoc", "text": "Config for prometheus style metrics\n"}, "loc": ["services", "vmagent", "prometheusConfig"], "readOnly": false, "type": "JSON value"}, "services.vmagent.remoteWriteUrl": {"declarations": ["nixos/modules/services/monitoring/vmagent.nix"], "default": {"_type": "literalExpression", "text": "\"http://localhost:8428/api/v1/write\""}, "description": {"_type": "mdDoc", "text": "The storage endpoint such as VictoriaMetrics\n"}, "loc": ["services", "vmagent", "remoteWriteUrl"], "readOnly": false, "type": "string"}, "services.vmagent.user": {"declarations": ["nixos/modules/services/monitoring/vmagent.nix"], "default": {"_type": "literalExpression", "text": "\"vmagent\""}, "description": {"_type": "mdDoc", "text": "User account under which vmagent runs.\n"}, "loc": ["services", "vmagent", "user"], "readOnly": false, "type": "string"}, "services.vmalert.enable": {"declarations": ["nixos/modules/services/monitoring/vmalert.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable vmalert."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "vmalert", "enable"], "readOnly": false, "type": "boolean"}, "services.vmalert.package": {"declarations": ["nixos/modules/services/monitoring/vmalert.nix"], "default": {"_type": "literalExpression", "text": "\"pkgs.victoriametrics\""}, "description": {"_type": "mdDoc", "text": "The VictoriaMetrics derivation to use.\n"}, "loc": ["services", "vmalert", "package"], "readOnly": false, "type": "package"}, "services.vmalert.rules": {"declarations": ["nixos/modules/services/monitoring/vmalert.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A list of the given alerting or recording rules against configured `\"datasource.url\"` compatible with\nPrometheus HTTP API for `vmalert` to execute. Refer to\n<https://github.com/VictoriaMetrics/VictoriaMetrics/blob/master/app/vmalert/README.md#rules>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  group = [\n    {\n      name = \"TestGroup\";\n      rules = [\n        {\n          alert = \"ExampleAlertAlwaysFiring\";\n          expr = ''\n            sum by(job)\n            (up == 1)\n          '';\n        }\n      ];\n    }\n  ];\n}"}, "loc": ["services", "vmalert", "rules"], "readOnly": false, "type": "YAML value"}, "services.vmalert.settings": {"declarations": ["nixos/modules/services/monitoring/vmalert.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "`vmalert` configuration, passed via command line flags. Refer to\n<https://github.com/VictoriaMetrics/VictoriaMetrics/blob/master/app/vmalert/README.md#configuration>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"datasource.disableKeepAlive\" = true;\n  \"datasource.showURL\" = false;\n  \"datasource.url\" = \"http://localhost:8428\";\n  rule = [\n    \"http://<some-server-addr>/path/to/rules\"\n    \"dir/*.yaml\"\n  ];\n}"}, "loc": ["services", "vmalert", "settings"], "readOnly": false, "type": "attribute set of (boolean or signed integer or path or string or list of (boolean or signed integer or path or string))"}, "services.vmalert.settings.\"datasource.url\"": {"declarations": ["nixos/modules/services/monitoring/vmalert.nix"], "description": {"_type": "mdDoc", "text": "Datasource compatible with Prometheus HTTP API.\n"}, "example": {"_type": "literalExpression", "text": "\"http://localhost:8428\""}, "loc": ["services", "vmalert", "settings", "datasource.url"], "readOnly": false, "type": "non-empty string"}, "services.vmalert.settings.\"notifier.url\"": {"declarations": ["nixos/modules/services/monitoring/vmalert.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Prometheus Alertmanager URL. List all Alertmanager URLs if it runs in the cluster mode to ensure high availability.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"http://127.0.0.1:9093\"\n]"}, "loc": ["services", "vmalert", "settings", "notifier.url"], "readOnly": false, "type": "list of non-empty string"}, "services.vmalert.settings.rule": {"declarations": ["nixos/modules/services/monitoring/vmalert.nix"], "description": {"_type": "mdDoc", "text": "Path to the files with alerting and/or recording rules.\n\n::: {.note}\nConsider using the {option}`services.vmalert.rules` option as a convenient alternative for declaring rules\ndirectly in the `nix` language.\n:::\n"}, "loc": ["services", "vmalert", "settings", "rule"], "readOnly": false, "type": "list of path"}, "services.vnstat.enable": {"declarations": ["nixos/modules/services/monitoring/vnstat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable update of network usage statistics via vnstatd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "vnstat", "enable"], "readOnly": false, "type": "boolean"}, "services.vsftpd.allowWriteableChroot": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allow the use of writeable root inside chroot().\n"}, "loc": ["services", "vsftpd", "allowWriteableChroot"], "readOnly": false, "type": "boolean"}, "services.vsftpd.anonymousMkdirEnable": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether any uploads are permitted to anonymous users.\n"}, "loc": ["services", "vsftpd", "anonymousMkdirEnable"], "readOnly": false, "type": "boolean"}, "services.vsftpd.anonymousUmask": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "\"077\""}, "description": {"_type": "mdDoc", "text": "Anonymous write umask."}, "example": {"_type": "literalExpression", "text": "\"002\""}, "loc": ["services", "vsftpd", "anonymousUmask"], "readOnly": false, "type": "string"}, "services.vsftpd.anonymousUploadEnable": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether any uploads are permitted to anonymous users.\n"}, "loc": ["services", "vsftpd", "anonymousUploadEnable"], "readOnly": false, "type": "boolean"}, "services.vsftpd.anonymousUser": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the anonymous FTP user.\n"}, "loc": ["services", "vsftpd", "anonymousUser"], "readOnly": false, "type": "boolean"}, "services.vsftpd.anonymousUserHome": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "\"/home/ftp/\""}, "description": {"_type": "mdDoc", "text": "Directory to consider the HOME of the anonymous user.\n"}, "loc": ["services", "vsftpd", "anonymousUserHome"], "readOnly": false, "type": "path"}, "services.vsftpd.anonymousUserNoPassword": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to disable the password for the anonymous FTP user.\n"}, "loc": ["services", "vsftpd", "anonymousUserNoPassword"], "readOnly": false, "type": "boolean"}, "services.vsftpd.chrootlocalUser": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether local users are confined to their home directory.\n"}, "loc": ["services", "vsftpd", "chrootlocalUser"], "readOnly": false, "type": "boolean"}, "services.vsftpd.enable": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable vsftpd."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "vsftpd", "enable"], "readOnly": false, "type": "boolean"}, "services.vsftpd.enableVirtualUsers": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the `pam_userdb`-based\nvirtual user system\n"}, "loc": ["services", "vsftpd", "enableVirtualUsers"], "readOnly": false, "type": "boolean"}, "services.vsftpd.extraConfig": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to add at the bottom of the generated configuration file."}, "example": {"_type": "literalExpression", "text": "\"ftpd_banner=Hello\""}, "loc": ["services", "vsftpd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.vsftpd.forceLocalDataSSL": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Only applies if {option}`sslEnable` is true. Non anonymous (local) users\nmust use a secure SSL connection for sending/receiving data on data connection.\n"}, "loc": ["services", "vsftpd", "forceLocalDataSSL"], "readOnly": false, "type": "boolean"}, "services.vsftpd.forceLocalLoginsSSL": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Only applies if {option}`sslEnable` is true. Non anonymous (local) users\nmust use a secure SSL connection to send a password.\n"}, "loc": ["services", "vsftpd", "forceLocalLoginsSSL"], "readOnly": false, "type": "boolean"}, "services.vsftpd.localRoot": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This option represents a directory which vsftpd will try to\nchange into after a local (i.e. non- anonymous) login.\n\nFailure is silently ignored.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/www/$USER\""}, "loc": ["services", "vsftpd", "localRoot"], "readOnly": false, "type": "null or string"}, "services.vsftpd.localUsers": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable FTP for local users.\n"}, "loc": ["services", "vsftpd", "localUsers"], "readOnly": false, "type": "boolean"}, "services.vsftpd.portPromiscuous": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Set to YES if you want to disable the PORT security check that ensures that\noutgoing data connections can only connect to the client. Only enable if you\nknow what you are doing!\n"}, "loc": ["services", "vsftpd", "portPromiscuous"], "readOnly": false, "type": "boolean"}, "services.vsftpd.rsaCertFile": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "RSA certificate file."}, "loc": ["services", "vsftpd", "rsaCertFile"], "readOnly": false, "type": "null or path"}, "services.vsftpd.rsaKeyFile": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "RSA private key file."}, "loc": ["services", "vsftpd", "rsaKeyFile"], "readOnly": false, "type": "null or path"}, "services.vsftpd.ssl_sslv2": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Only applies if {option}`ssl_enable` is activated. If\nenabled, this option will permit SSL v2 protocol connections.\nTLS v1 connections are preferred.\n"}, "loc": ["services", "vsftpd", "ssl_sslv2"], "readOnly": false, "type": "boolean"}, "services.vsftpd.ssl_sslv3": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Only applies if {option}`ssl_enable` is activated. If\nenabled, this option will permit SSL v3 protocol connections.\nTLS v1 connections are preferred.\n"}, "loc": ["services", "vsftpd", "ssl_sslv3"], "readOnly": false, "type": "boolean"}, "services.vsftpd.ssl_tlsv1": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Only applies if {option}`ssl_enable` is activated. If\nenabled, this option will permit TLS v1 protocol connections.\nTLS v1 connections are preferred.\n"}, "loc": ["services", "vsftpd", "ssl_tlsv1"], "readOnly": false, "type": "boolean"}, "services.vsftpd.userDbPath": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Only applies if {option}`enableVirtualUsers` is true.\nPath pointing to the `pam_userdb` user\ndatabase used by vsftpd to authenticate the virtual users.\n\nThis user list should be stored in the Berkeley DB database\nformat.\n\nTo generate a new user database, create a text file, add\nyour users using the following format:\n```\nuser1\npassword1\nuser2\npassword2\n```\n\nYou can then install `pkgs.db` to generate\nthe Berkeley DB using\n```\ndb_load -T -t hash -f logins.txt userDb.db\n```\n\nCaution: `pam_userdb` will automatically\nappend a `.db` suffix to the filename you\nprovide though this option. This option shouldn't include\nthis filetype suffix.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/vsftpd/userDb\""}, "loc": ["services", "vsftpd", "userDbPath"], "readOnly": false, "type": "null or string"}, "services.vsftpd.userlist": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "See {option}`userlistFile`."}, "loc": ["services", "vsftpd", "userlist"], "readOnly": false, "type": "list of string"}, "services.vsftpd.userlistDeny": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Specifies whether {option}`userlistFile` is a list of user\nnames to allow or deny access.\nThe default `false` means whitelist/allow.\n"}, "loc": ["services", "vsftpd", "userlistDeny"], "readOnly": false, "type": "boolean"}, "services.vsftpd.userlistEnable": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether users are included.\n"}, "loc": ["services", "vsftpd", "userlistEnable"], "readOnly": false, "type": "boolean"}, "services.vsftpd.userlistFile": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.writeText \"userlist\" (concatMapStrings (x: \"${x}\\n\") cfg.userlist)"}, "description": {"_type": "mdDoc", "text": "Newline separated list of names to be allowed/denied if {option}`userlistEnable`\nis `true`. Meaning see {option}`userlistDeny`.\n\nThe default is a file containing the users from {option}`userlist`.\n\nIf explicitly set to null userlist_file will not be set in vsftpd's config file.\n"}, "loc": ["services", "vsftpd", "userlistFile"], "readOnly": false, "type": "path"}, "services.vsftpd.virtualUseLocalPrivs": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, virtual users will use the same privileges as local\nusers. By default, virtual users will use the same privileges as\nanonymous users, which tends to be more restrictive (especially\nin terms of write access).\n"}, "loc": ["services", "vsftpd", "virtualUseLocalPrivs"], "readOnly": false, "type": "boolean"}, "services.vsftpd.writeEnable": {"declarations": ["nixos/modules/services/networking/vsftpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether any write activity is permitted to users.\n"}, "loc": ["services", "vsftpd", "writeEnable"], "readOnly": false, "type": "boolean"}, "services.wasabibackend.customConfigFile": {"declarations": ["nixos/modules/services/networking/wasabibackend.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Defines the path to a custom configuration file that is copied to the user's directory. Overrides any config options."}, "loc": ["services", "wasabibackend", "customConfigFile"], "readOnly": false, "type": "null or path"}, "services.wasabibackend.dataDir": {"declarations": ["nixos/modules/services/networking/wasabibackend.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/wasabibackend\""}, "description": {"_type": "mdDoc", "text": "The data directory for the Wasabi backend node."}, "loc": ["services", "wasabibackend", "dataDir"], "readOnly": false, "type": "path"}, "services.wasabibackend.enable": {"declarations": ["nixos/modules/services/networking/wasabibackend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Wasabi backend service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "wasabibackend", "enable"], "readOnly": false, "type": "boolean"}, "services.wasabibackend.endpoint.ip": {"declarations": ["nixos/modules/services/networking/wasabibackend.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "IP address for P2P connection to bitcoind."}, "loc": ["services", "wasabibackend", "endpoint", "ip"], "readOnly": false, "type": "string"}, "services.wasabibackend.endpoint.port": {"declarations": ["nixos/modules/services/networking/wasabibackend.nix"], "default": {"_type": "literalExpression", "text": "8333"}, "description": {"_type": "mdDoc", "text": "Port for P2P connection to bitcoind."}, "loc": ["services", "wasabibackend", "endpoint", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.wasabibackend.group": {"declarations": ["nixos/modules/services/networking/wasabibackend.nix"], "default": {"_type": "literalExpression", "text": "config.services.wasabibackend.user"}, "description": {"_type": "mdDoc", "text": "The group as which to run the wasabibackend node."}, "loc": ["services", "wasabibackend", "group"], "readOnly": false, "type": "string"}, "services.wasabibackend.network": {"declarations": ["nixos/modules/services/networking/wasabibackend.nix"], "default": {"_type": "literalExpression", "text": "\"mainnet\""}, "description": {"_type": "mdDoc", "text": "The network to use for the Wasabi backend service."}, "loc": ["services", "wasabibackend", "network"], "readOnly": false, "type": "one of \"mainnet\", \"testnet\", \"regtest\""}, "services.wasabibackend.rpc.ip": {"declarations": ["nixos/modules/services/networking/wasabibackend.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "IP address for RPC connection to bitcoind."}, "loc": ["services", "wasabibackend", "rpc", "ip"], "readOnly": false, "type": "string"}, "services.wasabibackend.rpc.password": {"declarations": ["nixos/modules/services/networking/wasabibackend.nix"], "default": {"_type": "literalExpression", "text": "\"password\""}, "description": {"_type": "mdDoc", "text": "RPC password for the bitcoin endpoint. Warning: this is stored in cleartext in the Nix store! Use `configFile` or `passwordFile` if needed."}, "loc": ["services", "wasabibackend", "rpc", "password"], "readOnly": false, "type": "string"}, "services.wasabibackend.rpc.passwordFile": {"declarations": ["nixos/modules/services/networking/wasabibackend.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File that contains the password of the RPC user."}, "loc": ["services", "wasabibackend", "rpc", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.wasabibackend.rpc.port": {"declarations": ["nixos/modules/services/networking/wasabibackend.nix"], "default": {"_type": "literalExpression", "text": "8332"}, "description": {"_type": "mdDoc", "text": "Port for RPC connection to bitcoind."}, "loc": ["services", "wasabibackend", "rpc", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.wasabibackend.rpc.user": {"declarations": ["nixos/modules/services/networking/wasabibackend.nix"], "default": {"_type": "literalExpression", "text": "\"bitcoin\""}, "description": {"_type": "mdDoc", "text": "RPC user for the bitcoin endpoint."}, "loc": ["services", "wasabibackend", "rpc", "user"], "readOnly": false, "type": "string"}, "services.wasabibackend.user": {"declarations": ["nixos/modules/services/networking/wasabibackend.nix"], "default": {"_type": "literalExpression", "text": "\"wasabibackend\""}, "description": {"_type": "mdDoc", "text": "The user as which to run the wasabibackend node."}, "loc": ["services", "wasabibackend", "user"], "readOnly": false, "type": "string"}, "services.webdav-server-rs.configFile": {"declarations": ["nixos/modules/services/network-filesystems/webdav-server-rs.nix"], "default": {"_type": "literalExpression", "text": "\"Config file generated from services.webdav-server-rs.settings\""}, "description": {"_type": "mdDoc", "text": "Path to config file. If this option is set, it will override any\nconfiguration done in services.webdav-server-rs.settings.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/webdav-server.toml\""}, "loc": ["services", "webdav-server-rs", "configFile"], "readOnly": false, "type": "path"}, "services.webdav-server-rs.debug": {"declarations": ["nixos/modules/services/network-filesystems/webdav-server-rs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable debug mode."}, "loc": ["services", "webdav-server-rs", "debug"], "readOnly": false, "type": "boolean"}, "services.webdav-server-rs.enable": {"declarations": ["nixos/modules/services/network-filesystems/webdav-server-rs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable WebDAV server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "webdav-server-rs", "enable"], "readOnly": false, "type": "boolean"}, "services.webdav-server-rs.group": {"declarations": ["nixos/modules/services/network-filesystems/webdav-server-rs.nix"], "default": {"_type": "literalExpression", "text": "\"webdav\""}, "description": {"_type": "mdDoc", "text": "Group to run under when setuid is not enabled."}, "loc": ["services", "webdav-server-rs", "group"], "readOnly": false, "type": "string"}, "services.webdav-server-rs.settings": {"declarations": ["nixos/modules/services/network-filesystems/webdav-server-rs.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attrset that is converted and passed as config file. Available\noptions can be found at\n[here](https://github.com/miquels/webdav-server-rs/blob/master/webdav-server.toml).\n"}, "example": {"_type": "literalExpression", "text": "{\n  server.listen = [ \"0.0.0.0:4918\" \"[::]:4918\" ];\n  accounts = {\n    auth-type = \"htpasswd.default\";\n    acct-type = \"unix\";\n  };\n  htpasswd.default = {\n    htpasswd = \"/etc/htpasswd\";\n  };\n  location = [\n    {\n      route = [ \"/public/*path\" ];\n      directory = \"/srv/public\";\n      handler = \"filesystem\";\n      methods = [ \"webdav-ro\" ];\n      autoindex = true;\n      auth = \"false\";\n    }\n    {\n      route = [ \"/user/:user/*path\" ];\n      directory = \"~\";\n      handler = \"filesystem\";\n      methods = [ \"webdav-rw\" ];\n      autoindex = true;\n      auth = \"true\";\n      setuid = true;\n    }\n  ];\n}\n"}, "loc": ["services", "webdav-server-rs", "settings"], "readOnly": false, "type": "TOML value"}, "services.webdav-server-rs.user": {"declarations": ["nixos/modules/services/network-filesystems/webdav-server-rs.nix"], "default": {"_type": "literalExpression", "text": "\"webdav\""}, "description": {"_type": "mdDoc", "text": "User to run under when setuid is not enabled."}, "loc": ["services", "webdav-server-rs", "user"], "readOnly": false, "type": "string"}, "services.webdav.configFile": {"declarations": ["nixos/modules/services/network-filesystems/webdav.nix"], "default": {"_type": "literalExpression", "text": "\"Config file generated from services.webdav.settings\""}, "description": {"_type": "mdDoc", "text": "Path to config file. If this option is set, it will override any\nconfiguration done in options.services.webdav.settings.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/webdav/config.yaml\""}, "loc": ["services", "webdav", "configFile"], "readOnly": false, "type": "path"}, "services.webdav.enable": {"declarations": ["nixos/modules/services/network-filesystems/webdav.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable WebDAV server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "webdav", "enable"], "readOnly": false, "type": "boolean"}, "services.webdav.environmentFile": {"declarations": ["nixos/modules/services/network-filesystems/webdav.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file as defined in {manpage}`systemd.exec(5)`.\n"}, "loc": ["services", "webdav", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.webdav.group": {"declarations": ["nixos/modules/services/network-filesystems/webdav.nix"], "default": {"_type": "literalExpression", "text": "\"webdav\""}, "description": {"_type": "mdDoc", "text": "Group under which WebDAV runs."}, "loc": ["services", "webdav", "group"], "readOnly": false, "type": "string"}, "services.webdav.settings": {"declarations": ["nixos/modules/services/network-filesystems/webdav.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attrset that is converted and passed as config file. Available options\ncan be found at\n[here](https://github.com/hacdias/webdav).\n\nThis program supports reading username and password configuration\nfrom environment variables, so it's strongly recommended to store\nusername and password in a separate\n[EnvironmentFile](https://www.freedesktop.org/software/systemd/man/systemd.exec.html#EnvironmentFile=).\nThis prevents adding secrets to the world-readable Nix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n    address = \"0.0.0.0\";\n    port = 8080;\n    scope = \"/srv/public\";\n    modify = true;\n    auth = true;\n    users = [\n      {\n        username = \"{env}ENV_USERNAME\";\n        password = \"{env}ENV_PASSWORD\";\n      }\n    ];\n}\n"}, "loc": ["services", "webdav", "settings"], "readOnly": false, "type": "YAML value"}, "services.webdav.user": {"declarations": ["nixos/modules/services/network-filesystems/webdav.nix"], "default": {"_type": "literalExpression", "text": "\"webdav\""}, "description": {"_type": "mdDoc", "text": "User account under which WebDAV runs."}, "loc": ["services", "webdav", "user"], "readOnly": false, "type": "string"}, "services.webhook.enable": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable [Webhook](https://github.com/adnanh/webhook), a server written in Go that allows you to create HTTP endpoints (hooks),\nwhich execute configured commands for any person or service that knows the URL\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "webhook", "enable"], "readOnly": false, "type": "boolean"}, "services.webhook.enableTemplates": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "hooksTemplated != {}"}, "description": {"_type": "mdDoc", "text": "Enable the generated hooks file to be parsed as a Go template.\nSee [the documentation](https://github.com/adnanh/webhook/blob/master/docs/Templates.md) for more information.\n"}, "loc": ["services", "webhook", "enableTemplates"], "readOnly": false, "type": "boolean"}, "services.webhook.environment": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra environment variables passed to webhook."}, "loc": ["services", "webhook", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.webhook.extraArgs": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "These are arguments passed to the webhook command in the systemd service.\nYou can find the available arguments and options in the [documentation][parameters].\n\n[parameters]: https://github.com/adnanh/webhook/blob/master/docs/Webhook-Parameters.md\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-secure\"\n]"}, "loc": ["services", "webhook", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.webhook.group": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "\"webhook\""}, "description": {"_type": "mdDoc", "text": "Webhook will be run under this group.\n\nIf set, you must create this group yourself!\n"}, "loc": ["services", "webhook", "group"], "readOnly": false, "type": "string"}, "services.webhook.hooks": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The actual configuration of which hooks will be served.\n\nRead more on the [project homepage] and on the [hook definition] page.\nAt least one hook needs to be configured.\n\n[hook definition]: https://github.com/adnanh/webhook/blob/master/docs/Hook-Definition.md\n[project homepage]: https://github.com/adnanh/webhook#configuration\n"}, "example": {"_type": "literalExpression", "text": "{\n  echo = {\n    execute-command = \"echo\";\n    response-message = \"Webhook is reachable!\";\n  };\n  redeploy-webhook = {\n    command-working-directory = \"/var/webhook\";\n    execute-command = \"/var/scripts/redeploy.sh\";\n  };\n}"}, "loc": ["services", "webhook", "hooks"], "readOnly": false, "type": "attribute set of (JSON value)"}, "services.webhook.hooks.<name>.execute-command": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "description": {"_type": "mdDoc", "text": "The command that should be executed when the hook is triggered."}, "loc": ["services", "webhook", "hooks", "<name>", "execute-command"], "readOnly": false, "type": "string"}, "services.webhook.hooks.<name>.id": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The ID of your hook. This value is used to create the HTTP endpoint (`protocol://yourserver:port/prefix/${id}`).\n"}, "loc": ["services", "webhook", "hooks", "<name>", "id"], "readOnly": false, "type": "string"}, "services.webhook.hooksTemplated": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Same as {option}`hooks`, but these hooks are specified as literal strings instead of Nix values,\nand hence can include [template syntax](https://github.com/adnanh/webhook/blob/master/docs/Templates.md)\nwhich might not be representable as JSON.\n\nTemplate syntax requires the {option}`enableTemplates` option to be set to `true`, which is\ndone by default if this option is set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  echo-template = ''\n    {\n      \"id\": \"echo-template\",\n      \"execute-command\": \"echo\",\n      \"response-message\": \"{{ getenv \"MESSAGE\" }}\"\n    }\n  '';\n}"}, "loc": ["services", "webhook", "hooksTemplated"], "readOnly": false, "type": "attribute set of string"}, "services.webhook.ip": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "The IP webhook should serve hooks on.\n\nThe default means it can be reached on any interface if `openFirewall = true`.\n"}, "loc": ["services", "webhook", "ip"], "readOnly": false, "type": "string"}, "services.webhook.openFirewall": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open the configured port in the firewall for external ingress traffic.\nPreferably the Webhook server is instead put behind a reverse proxy.\n"}, "loc": ["services", "webhook", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.webhook.package": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "pkgs.webhook"}, "description": {"_type": "mdDoc", "text": "The webhook package to use."}, "loc": ["services", "webhook", "package"], "readOnly": false, "type": "package"}, "services.webhook.port": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "9000"}, "description": {"_type": "mdDoc", "text": "The port webhook should be reachable from."}, "loc": ["services", "webhook", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.webhook.urlPrefix": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "\"hooks\""}, "description": {"_type": "mdDoc", "text": "The URL path prefix to use for served hooks (`protocol://yourserver:port/${prefix}/hook-id`).\n"}, "loc": ["services", "webhook", "urlPrefix"], "readOnly": false, "type": "string"}, "services.webhook.user": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "\"webhook\""}, "description": {"_type": "mdDoc", "text": "Webhook will be run under this user.\n\nIf set, you must create this user yourself!\n"}, "loc": ["services", "webhook", "user"], "readOnly": false, "type": "string"}, "services.webhook.verbose": {"declarations": ["nixos/modules/services/networking/webhook.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to show verbose output."}, "loc": ["services", "webhook", "verbose"], "readOnly": false, "type": "boolean"}, "services.weechat.binary": {"declarations": ["nixos/modules/services/misc/weechat.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.weechat}/bin/weechat\""}, "description": {"_type": "mdDoc", "text": "Binary to execute."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.weechat}/bin/weechat-headless\""}, "loc": ["services", "weechat", "binary"], "readOnly": false, "type": "path"}, "services.weechat.enable": {"declarations": ["nixos/modules/services/misc/weechat.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable weechat."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "weechat", "enable"], "readOnly": false, "type": "boolean"}, "services.weechat.root": {"declarations": ["nixos/modules/services/misc/weechat.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/weechat\""}, "description": {"_type": "mdDoc", "text": "Weechat state directory."}, "loc": ["services", "weechat", "root"], "readOnly": false, "type": "string"}, "services.weechat.sessionName": {"declarations": ["nixos/modules/services/misc/weechat.nix"], "default": {"_type": "literalExpression", "text": "\"weechat-screen\""}, "description": {"_type": "mdDoc", "text": "Name of the `screen` session for weechat."}, "loc": ["services", "weechat", "sessionName"], "readOnly": false, "type": "string"}, "services.wg-netmanager.enable": {"declarations": ["nixos/modules/services/networking/wg-netmanager.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Wireguard network manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "wg-netmanager", "enable"], "readOnly": false, "type": "boolean"}, "services.wgautomesh.enable": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the wgautomesh daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "wgautomesh", "enable"], "readOnly": false, "type": "boolean"}, "services.wgautomesh.enableGossipEncryption": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable encryption of gossip traffic."}, "loc": ["services", "wgautomesh", "enableGossipEncryption"], "readOnly": false, "type": "boolean"}, "services.wgautomesh.enablePersistence": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable persistence of Wireguard peer info between restarts."}, "loc": ["services", "wgautomesh", "enablePersistence"], "readOnly": false, "type": "boolean"}, "services.wgautomesh.gossipSecretFile": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "description": {"_type": "mdDoc", "text": "File containing the shared secret key to use for gossip encryption.\nRequired if `enableGossipEncryption` is set.\n"}, "loc": ["services", "wgautomesh", "gossipSecretFile"], "readOnly": false, "type": "path"}, "services.wgautomesh.logLevel": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "wgautomesh log level."}, "loc": ["services", "wgautomesh", "logLevel"], "readOnly": false, "type": "one of \"trace\", \"debug\", \"info\", \"warn\", \"error\""}, "services.wgautomesh.openFirewall": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Automatically open gossip port in firewall (recommended)."}, "loc": ["services", "wgautomesh", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.wgautomesh.settings": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for wgautomesh."}, "loc": ["services", "wgautomesh", "settings"], "readOnly": false, "type": "TOML value"}, "services.wgautomesh.settings.gossip_port": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "default": {"_type": "literalExpression", "text": "1666"}, "description": {"_type": "mdDoc", "text": "wgautomesh gossip port, this MUST be the same number on all nodes in\nthe wgautomesh network.\n"}, "loc": ["services", "wgautomesh", "settings", "gossip_port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.wgautomesh.settings.interface": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "description": {"_type": "mdDoc", "text": "Wireguard interface to manage (it is NOT created by wgautomesh, you\nshould use another NixOS option to create it such as\n`networking.wireguard.interfaces.wg0 = {...};`).\n"}, "example": {"_type": "literalExpression", "text": "\"wg0\""}, "loc": ["services", "wgautomesh", "settings", "interface"], "readOnly": false, "type": "string"}, "services.wgautomesh.settings.lan_discovery": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable discovery of peers on the same LAN using UDP broadcast."}, "loc": ["services", "wgautomesh", "settings", "lan_discovery"], "readOnly": false, "type": "boolean"}, "services.wgautomesh.settings.peers": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "wgautomesh peer list."}, "loc": ["services", "wgautomesh", "settings", "peers"], "readOnly": false, "type": "list of (submodule)"}, "services.wgautomesh.settings.peers.*.address": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "description": {"_type": "mdDoc", "text": "Wireguard address of this peer (a single IP address, multiple\naddresses or address ranges are not supported).\n"}, "example": {"_type": "literalExpression", "text": "\"10.0.0.42\""}, "loc": ["services", "wgautomesh", "settings", "peers", "*", "address"], "readOnly": false, "type": "string"}, "services.wgautomesh.settings.peers.*.endpoint": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Bootstrap endpoint for connecting to this Wireguard peer if no\nother address is known or none are working.\n"}, "example": {"_type": "literalExpression", "text": "\"wgnode.mydomain.example:51820\""}, "loc": ["services", "wgautomesh", "settings", "peers", "*", "endpoint"], "readOnly": false, "type": "null or string"}, "services.wgautomesh.settings.peers.*.pubkey": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "description": {"_type": "mdDoc", "text": "Wireguard public key of this peer."}, "loc": ["services", "wgautomesh", "settings", "peers", "*", "pubkey"], "readOnly": false, "type": "string"}, "services.wgautomesh.settings.upnp_forward_external_port": {"declarations": ["nixos/modules/services/networking/wgautomesh.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Public port number to try to redirect to this machine's Wireguard\ndaemon using UPnP IGD.\n"}, "loc": ["services", "wgautomesh", "settings", "upnp_forward_external_port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.whitebophir.enable": {"declarations": ["nixos/modules/services/web-apps/whitebophir.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable whitebophir, an online collaborative whiteboard server (persistent state will be maintained under {file}`/var/lib/whitebophir`)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "whitebophir", "enable"], "readOnly": false, "type": "boolean"}, "services.whitebophir.listenAddress": {"declarations": ["nixos/modules/services/web-apps/whitebophir.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Address to listen on (use 0.0.0.0 to allow access from any address)."}, "loc": ["services", "whitebophir", "listenAddress"], "readOnly": false, "type": "string"}, "services.whitebophir.package": {"declarations": ["nixos/modules/services/web-apps/whitebophir.nix"], "default": {"_type": "literalExpression", "text": "pkgs.whitebophir"}, "description": {"_type": "mdDoc", "text": "Whitebophir package to use."}, "loc": ["services", "whitebophir", "package"], "readOnly": false, "type": "package"}, "services.whitebophir.port": {"declarations": ["nixos/modules/services/web-apps/whitebophir.nix"], "default": {"_type": "literalExpression", "text": "5001"}, "description": {"_type": "mdDoc", "text": "Port to bind to."}, "loc": ["services", "whitebophir", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.wiki-js.enable": {"declarations": ["nixos/modules/services/web-apps/wiki-js.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable wiki-js."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "wiki-js", "enable"], "readOnly": false, "type": "boolean"}, "services.wiki-js.environmentFile": {"declarations": ["nixos/modules/services/web-apps/wiki-js.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file to inject e.g. secrets into the configuration.\n"}, "example": {"_type": "literalExpression", "text": "\"/root/wiki-js.env\""}, "loc": ["services", "wiki-js", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.wiki-js.settings": {"declarations": ["nixos/modules/services/web-apps/wiki-js.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings to configure `wiki-js`. This directly\ncorresponds to [the upstream configuration options](https://docs.requarks.io/install/config).\n\nSecrets can be injected via the environment by\n- specifying [](#opt-services.wiki-js.environmentFile)\n  to contain secrets\n- and setting sensitive values to `$(ENVIRONMENT_VAR)`\n  with this value defined in the environment-file.\n"}, "loc": ["services", "wiki-js", "settings"], "readOnly": false, "type": "JSON value"}, "services.wiki-js.settings.bindIP": {"declarations": ["nixos/modules/services/web-apps/wiki-js.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "IPs the service should listen to.\n"}, "loc": ["services", "wiki-js", "settings", "bindIP"], "readOnly": false, "type": "string"}, "services.wiki-js.settings.db.db": {"declarations": ["nixos/modules/services/web-apps/wiki-js.nix"], "default": {"_type": "literalExpression", "text": "\"wiki\""}, "description": {"_type": "mdDoc", "text": "Name of the database to use.\n"}, "loc": ["services", "wiki-js", "settings", "db", "db"], "readOnly": false, "type": "string"}, "services.wiki-js.settings.db.host": {"declarations": ["nixos/modules/services/web-apps/wiki-js.nix"], "description": {"_type": "mdDoc", "text": "Hostname or socket-path to connect to.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/postgresql\""}, "loc": ["services", "wiki-js", "settings", "db", "host"], "readOnly": false, "type": "string"}, "services.wiki-js.settings.db.type": {"declarations": ["nixos/modules/services/web-apps/wiki-js.nix"], "default": {"_type": "literalExpression", "text": "\"postgres\""}, "description": {"_type": "mdDoc", "text": "Database driver to use for persistence. Please note that `sqlite`\nis currently not supported as the build process for it is currently not implemented\nin `pkgs.wiki-js` and it's not recommended by upstream for\nproduction use.\n"}, "loc": ["services", "wiki-js", "settings", "db", "type"], "readOnly": false, "type": "one of \"postgres\", \"mysql\", \"mariadb\", \"mssql\""}, "services.wiki-js.settings.logLevel": {"declarations": ["nixos/modules/services/web-apps/wiki-js.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Define how much detail is supposed to be logged at runtime.\n"}, "loc": ["services", "wiki-js", "settings", "logLevel"], "readOnly": false, "type": "one of \"error\", \"warn\", \"info\", \"verbose\", \"debug\", \"silly\""}, "services.wiki-js.settings.offline": {"declarations": ["nixos/modules/services/web-apps/wiki-js.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable latest file updates and enable\n[sideloading](https://docs.requarks.io/install/sideload).\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "wiki-js", "settings", "offline"], "readOnly": false, "type": "boolean"}, "services.wiki-js.settings.port": {"declarations": ["nixos/modules/services/web-apps/wiki-js.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "TCP port the process should listen to.\n"}, "loc": ["services", "wiki-js", "settings", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.wiki-js.stateDirectoryName": {"declarations": ["nixos/modules/services/web-apps/wiki-js.nix"], "default": {"_type": "literalExpression", "text": "\"wiki-js\""}, "description": {"_type": "mdDoc", "text": "Name of the directory in {file}`/var/lib`.\n"}, "loc": ["services", "wiki-js", "stateDirectoryName"], "readOnly": false, "type": "string"}, "services.woodpecker-agents.agents": {"declarations": ["nixos/modules/services/continuous-integration/woodpecker/agents.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "woodpecker-agents configurations"}, "example": {"_type": "literalExpression", "text": "{\n  docker = {\n    environment = {\n      DOCKER_HOST = \"unix:///run/podman/podman.sock\";\n      WOODPECKER_BACKEND = \"docker\";\n      WOODPECKER_SERVER = \"localhost:9000\";\n    };\n    environmentFile = \"/run/secrets/woodpecker/agent-secret.txt\";\n    extraGroups = [\n      \"docker\"\n    ];\n  };\n  exec = {\n    environment = {\n      WOODPECKER_BACKEND = \"exec\";\n      WOODPECKER_SERVER = \"localhost:9000\";\n    };\n    environmentFile = \"/run/secrets/woodpecker/agent-secret.txt\";\n  };\n}"}, "loc": ["services", "woodpecker-agents", "agents"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.woodpecker-agents.agents.<name>.enable": {"declarations": ["nixos/modules/services/continuous-integration/woodpecker/agents.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable this Woodpecker-Agent. Agents execute tasks generated by a Server, every install will need one server and at least one agent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "woodpecker-agents", "agents", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.woodpecker-agents.agents.<name>.environment": {"declarations": ["nixos/modules/services/continuous-integration/woodpecker/agents.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "woodpecker-agent config environment variables, for other options read the [documentation](https://woodpecker-ci.org/docs/administration/agent-config)"}, "example": {"_type": "literalExpression", "text": "{\n  WOODPECKER_SERVER = \"localhost:9000\";\n  WOODPECKER_BACKEND = \"docker\";\n  DOCKER_HOST = \"unix:///run/podman/podman.sock\";\n}\n"}, "loc": ["services", "woodpecker-agents", "agents", "<name>", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.woodpecker-agents.agents.<name>.environmentFile": {"declarations": ["nixos/modules/services/continuous-integration/woodpecker/agents.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "File to load environment variables\nfrom. This is helpful for specifying secrets.\nExample content of environmentFile:\n```\nWOODPECKER_AGENT_SECRET=your-shared-secret-goes-here\n```\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/var/secrets/woodpecker-agent.env\"\n]"}, "loc": ["services", "woodpecker-agents", "agents", "<name>", "environmentFile"], "readOnly": false, "type": "list of path"}, "services.woodpecker-agents.agents.<name>.extraGroups": {"declarations": ["nixos/modules/services/continuous-integration/woodpecker/agents.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional groups for the systemd service.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"podman\"\n]"}, "loc": ["services", "woodpecker-agents", "agents", "<name>", "extraGroups"], "readOnly": false, "type": "list of string"}, "services.woodpecker-agents.agents.<name>.package": {"declarations": ["nixos/modules/services/continuous-integration/woodpecker/agents.nix"], "default": {"_type": "literalExpression", "text": "pkgs.woodpecker-agent"}, "description": {"_type": "mdDoc", "text": "The woodpecker-agent package to use."}, "loc": ["services", "woodpecker-agents", "agents", "<name>", "package"], "readOnly": false, "type": "package"}, "services.woodpecker-server.enable": {"declarations": ["nixos/modules/services/continuous-integration/woodpecker/server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Woodpecker-Server, a CI/CD application for automatic builds, deployments and tests."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "woodpecker-server", "enable"], "readOnly": false, "type": "boolean"}, "services.woodpecker-server.environment": {"declarations": ["nixos/modules/services/continuous-integration/woodpecker/server.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "woodpecker-server config environment variables, for other options read the [documentation](https://woodpecker-ci.org/docs/administration/server-config)"}, "example": {"_type": "literalExpression", "text": "{\n  WOODPECKER_HOST = \"https://woodpecker.example.com\";\n  WOODPECKER_OPEN = \"true\";\n  WOODPECKER_GITEA = \"true\";\n  WOODPECKER_GITEA_CLIENT = \"ffffffff-ffff-ffff-ffff-ffffffffffff\";\n  WOODPECKER_GITEA_URL = \"https://git.example.com\";\n}\n"}, "loc": ["services", "woodpecker-server", "environment"], "readOnly": false, "type": "attribute set of string"}, "services.woodpecker-server.environmentFile": {"declarations": ["nixos/modules/services/continuous-integration/woodpecker/server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File to load environment variables\nfrom. This is helpful for specifying secrets.\nExample content of environmentFile:\n```\nWOODPECKER_AGENT_SECRET=your-shared-secret-goes-here\nWOODPECKER_GITEA_SECRET=gto_**************************************\n```\n"}, "example": {"_type": "literalExpression", "text": "\"/root/woodpecker-server.env\""}, "loc": ["services", "woodpecker-server", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.woodpecker-server.package": {"declarations": ["nixos/modules/services/continuous-integration/woodpecker/server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.woodpecker-server"}, "description": {"_type": "mdDoc", "text": "The woodpecker-server package to use."}, "loc": ["services", "woodpecker-server", "package"], "readOnly": false, "type": "package"}, "services.wordpress.sites": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specification of one or more WordPress sites to serve"}, "loc": ["services", "wordpress", "sites"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.wordpress.sites.<name>.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally."}, "loc": ["services", "wordpress", "sites", "<name>", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.wordpress.sites.<name>.database.host": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "wordpress", "sites", "<name>", "database", "host"], "readOnly": false, "type": "string"}, "services.wordpress.sites.<name>.database.name": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"wordpress\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "wordpress", "sites", "<name>", "database", "name"], "readOnly": false, "type": "string"}, "services.wordpress.sites.<name>.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/wordpress-dbpassword\""}, "loc": ["services", "wordpress", "sites", "<name>", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.wordpress.sites.<name>.database.port": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "3306"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "wordpress", "sites", "<name>", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.wordpress.sites.<name>.database.socket": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "/run/mysqld/mysqld.sock"}, "description": {"_type": "mdDoc", "text": "Path to the unix socket file to use for authentication."}, "loc": ["services", "wordpress", "sites", "<name>", "database", "socket"], "readOnly": false, "type": "null or path"}, "services.wordpress.sites.<name>.database.tablePrefix": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"wp_\""}, "description": {"_type": "mdDoc", "text": "The $table_prefix is the value placed in the front of your database tables.\nChange the value if you want to use something other than wp_ for your database\nprefix. Typically this is changed if you are installing multiple WordPress blogs\nin the same database.\n\nSee <https://codex.wordpress.org/Editing_wp-config.php#table_prefix>.\n"}, "loc": ["services", "wordpress", "sites", "<name>", "database", "tablePrefix"], "readOnly": false, "type": "string"}, "services.wordpress.sites.<name>.database.user": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"wordpress\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "wordpress", "sites", "<name>", "database", "user"], "readOnly": false, "type": "string"}, "services.wordpress.sites.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Any additional text to be appended to the wp-config.php\nconfiguration file. This is a PHP script. For configuration\nsettings, see <https://codex.wordpress.org/Editing_wp-config.php>.\n\n**Note**: Please pass structured settings via\n`services.wordpress.sites.\u2039name\u203a.settings` instead.\n"}, "example": {"_type": "literalExpression", "text": "''\n  @ini_set( 'log_errors', 'Off' );\n  @ini_set( 'display_errors', 'On' );\n''"}, "loc": ["services", "wordpress", "sites", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.wordpress.sites.<name>.fontsDir": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/wordpress/\u2039name\u203a/fonts\""}, "description": {"_type": "mdDoc", "text": "This directory is used to download fonts from a remote location, e.g.\nto host google fonts locally.\n"}, "loc": ["services", "wordpress", "sites", "<name>", "fontsDir"], "readOnly": false, "type": "path"}, "services.wordpress.sites.<name>.languages": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of path(s) to respective language(s) which are copied from the 'languages' directory.\n"}, "example": {"_type": "literalExpression", "text": "[(\n  # Let's package the German language.\n  # For other languages try to replace language and country code in the download URL with your desired one.\n  # Reference https://translate.wordpress.org for available translations and\n  # codes.\n  language-de = pkgs.stdenv.mkDerivation {\n    name = \"language-de\";\n    src = pkgs.fetchurl {\n      url = \"https://de.wordpress.org/wordpress-${pkgs.wordpress.version}-de_DE.tar.gz\";\n      # Name is required to invalidate the hash when wordpress is updated\n      name = \"wordpress-${pkgs.wordpress.version}-language-de\"\n      sha256 = \"sha256-dlas0rXTSV4JAl8f/UyMbig57yURRYRhTMtJwF9g8h0=\";\n    };\n    installPhase = \"mkdir -p $out; cp -r ./wp-content/languages/* $out/\";\n  };\n)];\n"}, "loc": ["services", "wordpress", "sites", "<name>", "languages"], "readOnly": false, "type": "list of path"}, "services.wordpress.sites.<name>.mergedConfig": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "{\n  DISALLOW_FILE_EDIT = true;\n  AUTOMATIC_UPDATER_DISABLED = true;\n}\n"}, "description": {"_type": "mdDoc", "text": "Read only representation of the final configuration.\n"}, "loc": ["services", "wordpress", "sites", "<name>", "mergedConfig"], "readOnly": true, "type": "unspecified value"}, "services.wordpress.sites.<name>.package": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "pkgs.wordpress"}, "description": {"_type": "mdDoc", "text": "Which WordPress package to use."}, "loc": ["services", "wordpress", "sites", "<name>", "package"], "readOnly": false, "type": "package"}, "services.wordpress.sites.<name>.plugins": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Path(s) to respective plugin(s) which are copied from the 'plugins' directory.\n\n::: {.note}\nThese plugins need to be packaged before use, see example.\n:::\n"}, "example": {"_type": "literalExpression", "text": "{\n  inherit (pkgs.wordpressPackages.plugins) embed-pdf-viewer-plugin;\n}\n"}, "loc": ["services", "wordpress", "sites", "<name>", "plugins"], "readOnly": false, "type": "(attribute set of path) or (list of path) convertible to it"}, "services.wordpress.sites.<name>.poolConfig": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = 32;\n  \"pm.max_requests\" = 500;\n  \"pm.max_spare_servers\" = 4;\n  \"pm.min_spare_servers\" = 2;\n  \"pm.start_servers\" = 2;\n}"}, "description": {"_type": "mdDoc", "text": "Options for the WordPress PHP pool. See the documentation on `php-fpm.conf`\nfor details on configuration directives.\n"}, "loc": ["services", "wordpress", "sites", "<name>", "poolConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.wordpress.sites.<name>.settings": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Structural Wordpress configuration.\nRefer to <https://developer.wordpress.org/apis/wp-config-php>\nfor details and supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  WP_DEFAULT_THEME = \"twentytwentytwo\";\n  WP_SITEURL = \"https://example.org\";\n  WP_HOME = \"https://example.org\";\n  WP_DEBUG = true;\n  WP_DEBUG_DISPLAY = true;\n  WPLANG = \"de_DE\";\n  FORCE_SSL_ADMIN = true;\n  AUTOMATIC_UPDATER_DISABLED = true;\n}\n"}, "loc": ["services", "wordpress", "sites", "<name>", "settings"], "readOnly": false, "type": "attribute set of anything"}, "services.wordpress.sites.<name>.themes": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "{ inherit (pkgs.wordpressPackages.themes) twentytwentythree; }"}, "description": {"_type": "mdDoc", "text": "Path(s) to respective theme(s) which are copied from the 'theme' directory.\n\n::: {.note}\nThese themes need to be packaged before use, see example.\n:::\n"}, "example": {"_type": "literalExpression", "text": "{\n  inherit (pkgs.wordpressPackages.themes) responsive-theme;\n}\n"}, "loc": ["services", "wordpress", "sites", "<name>", "themes"], "readOnly": false, "type": "(attribute set of path) or (list of path) convertible to it"}, "services.wordpress.sites.<name>.uploadsDir": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/wordpress/\u2039name\u203a/uploads\""}, "description": {"_type": "mdDoc", "text": "This directory is used for uploads of pictures. The directory passed here is automatically\ncreated and permissions adjusted as required.\n"}, "loc": ["services", "wordpress", "sites", "<name>", "uploadsDir"], "readOnly": false, "type": "path"}, "services.wordpress.sites.<name>.virtualHost": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "description": {"_type": "mdDoc", "text": "Apache configuration can be done by adapting {option}`services.httpd.virtualHosts`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  adminAddr = \"webmaster@example.org\";\n  forceSSL = true;\n  enableACME = true;\n}\n"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost"], "readOnly": false, "type": "submodule"}, "services.wordpress.sites.<name>.virtualHost.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the acme challenge which is PUBLIC, don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.wordpress.sites.<name>.virtualHost.addSSL": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "addSSL"], "readOnly": false, "type": "boolean"}, "services.wordpress.sites.<name>.virtualHost.adminAddr": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "E-mail address of the server administrator."}, "example": {"_type": "literalExpression", "text": "\"admin@example.org\""}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "adminAddr"], "readOnly": false, "type": "null or string"}, "services.wordpress.sites.<name>.virtualHost.documentRoot": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of Apache's document root directory.  If left undefined,\nan empty directory in the Nix store will be used as root.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "documentRoot"], "readOnly": false, "type": "null or path"}, "services.wordpress.sites.<name>.virtualHost.enableACME": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "enableACME"], "readOnly": false, "type": "boolean"}, "services.wordpress.sites.<name>.virtualHost.enableUserDir": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable serving {file}`~/public_html` as\n`/~\u00abusername\u00bb`.\n"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "enableUserDir"], "readOnly": false, "type": "boolean"}, "services.wordpress.sites.<name>.virtualHost.extraConfig": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to httpd.conf verbatim. They will go after\ndirectories and directory aliases defined by default.\n"}, "example": {"_type": "literalExpression", "text": "''\n  <Directory /home>\n    Options FollowSymlinks\n    AllowOverride All\n  </Directory>\n''"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.wordpress.sites.<name>.virtualHost.forceSSL": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.wordpress.sites.<name>.virtualHost.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given URL.\n"}, "example": {"_type": "literalExpression", "text": "\"http://newserver.example.org/\""}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.wordpress.sites.<name>.virtualHost.hostName": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Canonical hostname for the server."}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "hostName"], "readOnly": false, "type": "string"}, "services.wordpress.sites.<name>.virtualHost.http2": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTP 2. HTTP/2 is supported in all multi-processing modules that come with httpd. *However, if you use the prefork mpm, there will\nbe severe restrictions.* Refer to <https://httpd.apache.org/docs/2.4/howto/http2.html#mpm-config> for details.\n"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "http2"], "readOnly": false, "type": "boolean"}, "services.wordpress.sites.<name>.virtualHost.listen": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\n\n::: {.note}\nThis option overrides `addSSL`, `forceSSL` and `onlySSL`.\n\nIf you only want to set the addresses manually and not the ports, take a look at `listenAddresses`.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    ip = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    ip = \"192.154.1.1\";\n    port = 80;\n  }\n  {\n    ip = \"*\";\n    port = 8080;\n  }\n]"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.wordpress.sites.<name>.virtualHost.listen.*.ip": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"*\""}, "description": {"_type": "mdDoc", "text": "IP to listen on. 0.0.0.0 for IPv4 only, * for all."}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "listen", "*", "ip"], "readOnly": false, "type": "string"}, "services.wordpress.sites.<name>.virtualHost.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "description": {"_type": "mdDoc", "text": "Port to listen on"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.wordpress.sites.<name>.virtualHost.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SSL (https) support."}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.wordpress.sites.<name>.virtualHost.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*\"\n]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "listenAddresses"], "readOnly": false, "type": "non-empty (list of string)"}, "services.wordpress.sites.<name>.virtualHost.locations": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config. See <https://httpd.apache.org/docs/2.4/mod/core.html#location> for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n  \"/foo/bar.png\" = {\n    alias = \"/home/eelco/some-file.png\";\n  };\n};\n"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.wordpress.sites.<name>.virtualHost.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests. See <https://httpd.apache.org/docs/2.4/mod/mod_alias.html#alias>.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.wordpress.sites.<name>.virtualHost.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.wordpress.sites.<name>.virtualHost.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds DirectoryIndex directive. See <https://httpd.apache.org/docs/2.4/mod/mod_dir.html#directoryindex>.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.wordpress.sites.<name>.virtualHost.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.wordpress.sites.<name>.virtualHost.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets up a simple reverse proxy as described by <https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple>.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.wordpress.sites.<name>.virtualHost.logFormat": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"common\""}, "description": {"_type": "mdDoc", "text": "Log format for Apache's log files. Possible values are: combined, common, referer, agent.\n"}, "example": {"_type": "literalExpression", "text": "\"combined\""}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "logFormat"], "readOnly": false, "type": "string"}, "services.wordpress.sites.<name>.virtualHost.onlySSL": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.wordpress.sites.<name>.virtualHost.robotsEntries": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Specification of pages to be ignored by web crawlers. See <http://www.robotstxt.org/> for details.\n"}, "example": {"_type": "literalExpression", "text": "\"Disallow: /foo/\""}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "robotsEntries"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.wordpress.sites.<name>.virtualHost.servedDirs": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve static directories.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    dir = \"/home/eelco/Dev/nix-homepage\";\n    urlPath = \"/nix\";\n  }\n]"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "servedDirs"], "readOnly": false, "type": "list of (attribute set)"}, "services.wordpress.sites.<name>.virtualHost.servedFiles": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve individual, static files.\n\n::: {.note}\nThis option has been deprecated and will be removed in a future\nversion of NixOS. You can achieve the same result by making use of\nthe `locations.<name>.alias` option.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    file = \"/home/eelco/some-file.png\";\n    urlPath = \"/foo/bar.png\";\n  }\n]"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "servedFiles"], "readOnly": false, "type": "list of (attribute set)"}, "services.wordpress.sites.<name>.virtualHost.serverAliases": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"www.example.org:8080\"\n  \"example.org\"\n]"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.wordpress.sites.<name>.virtualHost.sslServerCert": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "sslServerCert"], "readOnly": false, "type": "path"}, "services.wordpress.sites.<name>.virtualHost.sslServerChain": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to server SSL chain file."}, "example": {"_type": "literalExpression", "text": "\"/var/ca.pem\""}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "sslServerChain"], "readOnly": false, "type": "null or path"}, "services.wordpress.sites.<name>.virtualHost.sslServerKey": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "sslServerKey"], "readOnly": false, "type": "path"}, "services.wordpress.sites.<name>.virtualHost.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "wordpress", "sites", "<name>", "virtualHost", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.wordpress.webserver": {"declarations": ["nixos/modules/services/web-apps/wordpress.nix"], "default": {"_type": "literalExpression", "text": "\"httpd\""}, "description": {"_type": "mdDoc", "text": "Whether to use apache2 or nginx for virtual host management.\n\nFurther nginx configuration can be done by adapting `services.nginx.virtualHosts.<name>`.\nSee [](#opt-services.nginx.virtualHosts) for further information.\n\nFurther apache2 configuration can be done by adapting `services.httpd.virtualHosts.<name>`.\nSee [](#opt-services.httpd.virtualHosts) for further information.\n"}, "loc": ["services", "wordpress", "webserver"], "readOnly": false, "type": "one of \"httpd\", \"nginx\", \"caddy\""}, "services.writefreely.acme.enable": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to automatically fetch and configure SSL certs."}, "loc": ["services", "writefreely", "acme", "enable"], "readOnly": false, "type": "boolean"}, "services.writefreely.admin.initialPasswordFile": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "\"/nix/store/xxx-default-admin-pass\""}, "description": {"_type": "mdDoc", "text": "Path to a file containing the initial password for the admin user.\nIf not provided, the default password will be set to `nixos`.\n"}, "loc": ["services", "writefreely", "admin", "initialPasswordFile"], "readOnly": false, "type": "path"}, "services.writefreely.admin.name": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the first admin user."}, "loc": ["services", "writefreely", "admin", "name"], "readOnly": false, "type": "null or string"}, "services.writefreely.database.createLocally": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When {option}`services.writefreely.database.type` is set to\n`\"mysql\"`, this option will enable the MySQL service locally.\n"}, "loc": ["services", "writefreely", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.writefreely.database.host": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The database host to connect to."}, "loc": ["services", "writefreely", "database", "host"], "readOnly": false, "type": "string"}, "services.writefreely.database.migrate": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether or not to automatically run migrations on startup."}, "loc": ["services", "writefreely", "database", "migrate"], "readOnly": false, "type": "boolean"}, "services.writefreely.database.name": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "\"writefreely\""}, "description": {"_type": "mdDoc", "text": "The name of the database to store data in."}, "loc": ["services", "writefreely", "database", "name"], "readOnly": false, "type": "string"}, "services.writefreely.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The file to load the database password from."}, "loc": ["services", "writefreely", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.writefreely.database.port": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "3306"}, "description": {"_type": "mdDoc", "text": "The port used when connecting to the database host."}, "loc": ["services", "writefreely", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.writefreely.database.tls": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not TLS should be used for the database connection."}, "loc": ["services", "writefreely", "database", "tls"], "readOnly": false, "type": "boolean"}, "services.writefreely.database.type": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite3\""}, "description": {"_type": "mdDoc", "text": "The database provider to use."}, "loc": ["services", "writefreely", "database", "type"], "readOnly": false, "type": "one of \"sqlite3\", \"mysql\""}, "services.writefreely.database.user": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "\"writefreely\""}, "description": {"_type": "mdDoc", "text": "The database user to connect as."}, "loc": ["services", "writefreely", "database", "user"], "readOnly": false, "type": "null or string"}, "services.writefreely.enable": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Writefreely, build a digital writing community."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "writefreely", "enable"], "readOnly": false, "type": "boolean"}, "services.writefreely.group": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "\"writefreely\""}, "description": {"_type": "mdDoc", "text": "Group under which Writefreely is ran."}, "loc": ["services", "writefreely", "group"], "readOnly": false, "type": "string"}, "services.writefreely.host": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The public host name to serve."}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "writefreely", "host"], "readOnly": false, "type": "string"}, "services.writefreely.nginx.enable": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to enable and configure nginx as a proxy for WriteFreely."}, "loc": ["services", "writefreely", "nginx", "enable"], "readOnly": false, "type": "boolean"}, "services.writefreely.nginx.forceSSL": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to force the use of SSL."}, "loc": ["services", "writefreely", "nginx", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.writefreely.package": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "pkgs.writefreely"}, "description": {"_type": "mdDoc", "text": "Writefreely package to use."}, "loc": ["services", "writefreely", "package"], "readOnly": false, "type": "package"}, "services.writefreely.settings": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Writefreely configuration ({file}`config.ini`). Refer to\n<https://writefreely.org/docs/latest/admin/config>\nfor details.\n"}, "loc": ["services", "writefreely", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.writefreely.settings.app.theme": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "\"write\""}, "description": {"_type": "mdDoc", "text": "The theme to apply."}, "loc": ["services", "writefreely", "settings", "app", "theme"], "readOnly": false, "type": "string"}, "services.writefreely.settings.server.port": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "\"80\""}, "description": {"_type": "mdDoc", "text": "The port WriteFreely should listen on."}, "loc": ["services", "writefreely", "settings", "server", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.writefreely.stateDir": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/writefreely\""}, "description": {"_type": "mdDoc", "text": "The state directory where keys and data are stored."}, "loc": ["services", "writefreely", "stateDir"], "readOnly": false, "type": "path"}, "services.writefreely.user": {"declarations": ["nixos/modules/services/web-apps/writefreely.nix"], "default": {"_type": "literalExpression", "text": "\"writefreely\""}, "description": {"_type": "mdDoc", "text": "User under which Writefreely is ran."}, "loc": ["services", "writefreely", "user"], "readOnly": false, "type": "string"}, "services.wstunnel.clients": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "`wstunnel` clients to set up."}, "example": {"_type": "literalExpression", "text": "{\n  wg-tunnel = {\n    connectTo = {\n      host = \"example.com\";\n      port = 8080;\n    };\n    enableHTTPS = true;\n    localToRemote = {\n      local = {\n        host = \"127.0.0.1\";\n        port = 51820;\n      };\n      remote = {\n        host = \"127.0.0.1\";\n        port = 51820;\n      };\n    };\n    udp = true;\n  };\n}"}, "loc": ["services", "wstunnel", "clients"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.wstunnel.clients.<name>.autoStart": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether this tunnel server should be started automatically."}, "loc": ["services", "wstunnel", "clients", "<name>", "autoStart"], "readOnly": false, "type": "boolean"}, "services.wstunnel.clients.<name>.connectTo": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "Server address and port to connect to."}, "example": {"_type": "literalExpression", "text": "{\n  host = \"example.com\";\n}"}, "loc": ["services", "wstunnel", "clients", "<name>", "connectTo"], "readOnly": false, "type": "submodule"}, "services.wstunnel.clients.<name>.connectTo.host": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "The hostname."}, "loc": ["services", "wstunnel", "clients", "<name>", "connectTo", "host"], "readOnly": false, "type": "string"}, "services.wstunnel.clients.<name>.connectTo.port": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "The port."}, "loc": ["services", "wstunnel", "clients", "<name>", "connectTo", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.wstunnel.clients.<name>.customHeaders": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Custom HTTP headers to send during the upgrade request."}, "example": {"_type": "literalExpression", "text": "{\n  X-Some-Header = \"some-value\";\n}"}, "loc": ["services", "wstunnel", "clients", "<name>", "customHeaders"], "readOnly": false, "type": "attribute set of string"}, "services.wstunnel.clients.<name>.dynamicToRemote": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host and port for the SOCKS5 proxy to dynamically forward traffic to. Leave this at `null` to disable the SOCKS5 proxy. Setting the port to a value less than 1024 will additionally give the service the required CAP_NET_BIND_SERVICE capability."}, "example": {"_type": "literalExpression", "text": "{\n  host = \"127.0.0.1\";\n  port = 1080;\n}"}, "loc": ["services", "wstunnel", "clients", "<name>", "dynamicToRemote"], "readOnly": false, "type": "null or (submodule)"}, "services.wstunnel.clients.<name>.dynamicToRemote.host": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "The hostname."}, "loc": ["services", "wstunnel", "clients", "<name>", "dynamicToRemote", "host"], "readOnly": false, "type": "string"}, "services.wstunnel.clients.<name>.dynamicToRemote.port": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "The port."}, "loc": ["services", "wstunnel", "clients", "<name>", "dynamicToRemote", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.wstunnel.clients.<name>.enable": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable this `wstunnel` instance."}, "loc": ["services", "wstunnel", "clients", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.wstunnel.clients.<name>.enableHTTPS": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable HTTPS when connecting to the server."}, "loc": ["services", "wstunnel", "clients", "<name>", "enableHTTPS"], "readOnly": false, "type": "boolean"}, "services.wstunnel.clients.<name>.environmentFile": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file to be passed to the systemd service. Useful for passing secrets to the service to prevent them from being world-readable in the Nix store. Note however that the secrets are passed to `wstunnel` through the command line, which makes them locally readable for all users of the system at runtime."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/secrets/wstunnelSecrets\""}, "loc": ["services", "wstunnel", "clients", "<name>", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.wstunnel.clients.<name>.extraArgs": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra command line arguments to pass to `wstunnel`. Attributes of the form `argName = true;` will be translated to `--argName`, and `argName = \"value\"` to `--argName=value`."}, "example": {"_type": "literalExpression", "text": "{\n  someNewOption = true;\n  someNewOptionWithValue = \"someValue\";\n}"}, "loc": ["services", "wstunnel", "clients", "<name>", "extraArgs"], "readOnly": false, "type": "attribute set of (string or boolean)"}, "services.wstunnel.clients.<name>.hostHeader": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use this as the HTTP host header instead of the real hostname. Useful for circumventing hostname-based firewalls."}, "loc": ["services", "wstunnel", "clients", "<name>", "hostHeader"], "readOnly": false, "type": "null or string"}, "services.wstunnel.clients.<name>.httpProxy": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Proxy to use to connect to the wstunnel server (`USER:PASS@HOST:PORT`).\n\n::: {.warning}\nPasswords specified here will be world-readable in the Nix store! To pass a password to the service, point the `environmentFile` option to a file containing `PROXY_PASSWORD=<your-password-here>` and set this option to `<user>:$PROXY_PASSWORD@<host>:<port>`. Note however that this will also locally leak the passwords at runtime via e.g. /proc/<pid>/cmdline.\n\n:::\n"}, "loc": ["services", "wstunnel", "clients", "<name>", "httpProxy"], "readOnly": false, "type": "null or string"}, "services.wstunnel.clients.<name>.localToRemote": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Local hosts and ports to listen on, plus the hosts and ports on remote to forward traffic to. Setting a local port to a value less than 1024 will additionally give the process the required CAP_NET_BIND_SERVICE capability."}, "example": {"_type": "literalExpression", "text": "[\n  {\n    local = {\n      host = \"127.0.0.1\";\n      port = 8080;\n    };\n    remote = {\n      host = \"127.0.0.1\";\n      port = 8080;\n    };\n  }\n]"}, "loc": ["services", "wstunnel", "clients", "<name>", "localToRemote"], "readOnly": false, "type": "list of (submodule)"}, "services.wstunnel.clients.<name>.localToRemote.*.local": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "Local address and port to listen on."}, "example": {"_type": "literalExpression", "text": "{\n  host = \"127.0.0.1\";\n  port = 51820;\n}"}, "loc": ["services", "wstunnel", "clients", "<name>", "localToRemote", "*", "local"], "readOnly": false, "type": "submodule"}, "services.wstunnel.clients.<name>.localToRemote.*.local.host": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "The hostname."}, "loc": ["services", "wstunnel", "clients", "<name>", "localToRemote", "*", "local", "host"], "readOnly": false, "type": "string"}, "services.wstunnel.clients.<name>.localToRemote.*.local.port": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "The port."}, "loc": ["services", "wstunnel", "clients", "<name>", "localToRemote", "*", "local", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.wstunnel.clients.<name>.localToRemote.*.remote": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "Address and port on remote to forward traffic to."}, "example": {"_type": "literalExpression", "text": "{\n  host = \"127.0.0.1\";\n  port = 51820;\n}"}, "loc": ["services", "wstunnel", "clients", "<name>", "localToRemote", "*", "remote"], "readOnly": false, "type": "submodule"}, "services.wstunnel.clients.<name>.localToRemote.*.remote.host": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "The hostname."}, "loc": ["services", "wstunnel", "clients", "<name>", "localToRemote", "*", "remote", "host"], "readOnly": false, "type": "string"}, "services.wstunnel.clients.<name>.localToRemote.*.remote.port": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "The port."}, "loc": ["services", "wstunnel", "clients", "<name>", "localToRemote", "*", "remote", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.wstunnel.clients.<name>.package": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "pkgs.wstunnel"}, "description": {"_type": "mdDoc", "text": "The wstunnel package to use."}, "loc": ["services", "wstunnel", "clients", "<name>", "package"], "readOnly": false, "type": "package"}, "services.wstunnel.clients.<name>.soMark": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Mark network packets with the SO_MARK sockoption with the specified value. Setting this option will also enable the required `CAP_NET_ADMIN` capability for the systemd service."}, "loc": ["services", "wstunnel", "clients", "<name>", "soMark"], "readOnly": false, "type": "null or signed integer"}, "services.wstunnel.clients.<name>.tlsSNI": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use this as the SNI while connecting via TLS. Useful for circumventing hostname-based firewalls."}, "loc": ["services", "wstunnel", "clients", "<name>", "tlsSNI"], "readOnly": false, "type": "null or string"}, "services.wstunnel.clients.<name>.tlsVerifyCertificate": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to verify the TLS certificate of the server. It might be useful to set this to `false` when working with the `tlsSNI` option."}, "loc": ["services", "wstunnel", "clients", "<name>", "tlsVerifyCertificate"], "readOnly": false, "type": "boolean"}, "services.wstunnel.clients.<name>.udp": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to forward UDP instead of TCP traffic."}, "loc": ["services", "wstunnel", "clients", "<name>", "udp"], "readOnly": false, "type": "boolean"}, "services.wstunnel.clients.<name>.udpTimeout": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "When using UDP forwarding, timeout in seconds after which the tunnel connection is closed. `-1` means no timeout."}, "loc": ["services", "wstunnel", "clients", "<name>", "udpTimeout"], "readOnly": false, "type": "signed integer"}, "services.wstunnel.clients.<name>.upgradeCredentials": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use these credentials to authenticate during the HTTP upgrade request (Basic authorization type, `USER:[PASS]`).\n\n::: {.warning}\nPasswords specified here will be world-readable in the Nix store! To pass a password to the service, point the `environmentFile` option to a file containing `HTTP_PASSWORD=<your-password-here>` and set this option to `<user>:$HTTP_PASSWORD`. Note however that this will also locally leak the passwords at runtime via e.g. /proc/<pid>/cmdline.\n:::\n"}, "loc": ["services", "wstunnel", "clients", "<name>", "upgradeCredentials"], "readOnly": false, "type": "null or string"}, "services.wstunnel.clients.<name>.upgradePathPrefix": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use a specific HTTP path prefix that will show up in the upgrade request to the `wstunnel` server. Useful when running `wstunnel` behind a reverse proxy."}, "example": {"_type": "literalExpression", "text": "\"wstunnel\""}, "loc": ["services", "wstunnel", "clients", "<name>", "upgradePathPrefix"], "readOnly": false, "type": "null or string"}, "services.wstunnel.clients.<name>.verboseLogging": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable verbose logging."}, "loc": ["services", "wstunnel", "clients", "<name>", "verboseLogging"], "readOnly": false, "type": "boolean"}, "services.wstunnel.clients.<name>.websocketPingInterval": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Do a heartbeat ping every N seconds to keep up the websocket connection."}, "loc": ["services", "wstunnel", "clients", "<name>", "websocketPingInterval"], "readOnly": false, "type": "null or unsigned integer, meaning >=0"}, "services.wstunnel.enable": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable wstunnel."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "wstunnel", "enable"], "readOnly": false, "type": "boolean"}, "services.wstunnel.servers": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "`wstunnel` servers to set up."}, "example": {"_type": "literalExpression", "text": "{\n  wg-tunnel = {\n    enableHTTPS = true;\n    listen = {\n      port = 8080;\n    };\n    restrictTo = {\n      host = \"127.0.0.1\";\n      port = 51820;\n    };\n    tlsCertificate = \"/var/lib/secrets/fullchain.pem\";\n    tlsKey = \"/var/lib/secrets/key.pem\";\n  };\n}"}, "loc": ["services", "wstunnel", "servers"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.wstunnel.servers.<name>.autoStart": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether this tunnel server should be started automatically."}, "loc": ["services", "wstunnel", "servers", "<name>", "autoStart"], "readOnly": false, "type": "boolean"}, "services.wstunnel.servers.<name>.enable": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable this `wstunnel` instance."}, "loc": ["services", "wstunnel", "servers", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.wstunnel.servers.<name>.enableHTTPS": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Use HTTPS for the tunnel server."}, "loc": ["services", "wstunnel", "servers", "<name>", "enableHTTPS"], "readOnly": false, "type": "boolean"}, "services.wstunnel.servers.<name>.environmentFile": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file to be passed to the systemd service. Useful for passing secrets to the service to prevent them from being world-readable in the Nix store. Note however that the secrets are passed to `wstunnel` through the command line, which makes them locally readable for all users of the system at runtime."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/secrets/wstunnelSecrets\""}, "loc": ["services", "wstunnel", "servers", "<name>", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.wstunnel.servers.<name>.extraArgs": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra command line arguments to pass to `wstunnel`. Attributes of the form `argName = true;` will be translated to `--argName`, and `argName = \"value\"` to `--argName=value`."}, "example": {"_type": "literalExpression", "text": "{\n  someNewOption = true;\n  someNewOptionWithValue = \"someValue\";\n}"}, "loc": ["services", "wstunnel", "servers", "<name>", "extraArgs"], "readOnly": false, "type": "attribute set of (string or boolean)"}, "services.wstunnel.servers.<name>.listen": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "{\n  address = \"0.0.0.0\";\n  port = if enableHTTPS then 443 else 80;\n}\n"}, "description": {"_type": "mdDoc", "text": "Address and port to listen on. Setting the port to a value below 1024 will also give the process the required `CAP_NET_BIND_SERVICE` capability."}, "loc": ["services", "wstunnel", "servers", "<name>", "listen"], "readOnly": false, "type": "submodule"}, "services.wstunnel.servers.<name>.listen.host": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "The hostname."}, "loc": ["services", "wstunnel", "servers", "<name>", "listen", "host"], "readOnly": false, "type": "string"}, "services.wstunnel.servers.<name>.listen.port": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "The port."}, "loc": ["services", "wstunnel", "servers", "<name>", "listen", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.wstunnel.servers.<name>.package": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "pkgs.wstunnel"}, "description": {"_type": "mdDoc", "text": "The wstunnel package to use."}, "loc": ["services", "wstunnel", "servers", "<name>", "package"], "readOnly": false, "type": "package"}, "services.wstunnel.servers.<name>.restrictTo": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "Accepted traffic will be forwarded only to this service. Set to `null` to allow forwarding to arbitrary addresses."}, "example": {"_type": "literalExpression", "text": "{\n  host = \"127.0.0.1\";\n  port = 51820;\n}"}, "loc": ["services", "wstunnel", "servers", "<name>", "restrictTo"], "readOnly": false, "type": "null or (submodule)"}, "services.wstunnel.servers.<name>.restrictTo.host": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "The hostname."}, "loc": ["services", "wstunnel", "servers", "<name>", "restrictTo", "host"], "readOnly": false, "type": "string"}, "services.wstunnel.servers.<name>.restrictTo.port": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "description": {"_type": "mdDoc", "text": "The port."}, "loc": ["services", "wstunnel", "servers", "<name>", "restrictTo", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.wstunnel.servers.<name>.tlsCertificate": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS certificate to use instead of the hardcoded one in case of HTTPS connections. Use together with `tlsKey`."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/secrets/cert.pem\""}, "loc": ["services", "wstunnel", "servers", "<name>", "tlsCertificate"], "readOnly": false, "type": "null or path"}, "services.wstunnel.servers.<name>.tlsKey": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS key to use instead of the hardcoded on in case of HTTPS connections. Use together with `tlsCertificate`."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/secrets/key.pem\""}, "loc": ["services", "wstunnel", "servers", "<name>", "tlsKey"], "readOnly": false, "type": "null or path"}, "services.wstunnel.servers.<name>.useACMEHost": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Use a certificate generated by the NixOS ACME module for the given host. Note that this will not generate a new certificate - you will need to do so with `security.acme.certs`."}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "wstunnel", "servers", "<name>", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.wstunnel.servers.<name>.verboseLogging": {"declarations": ["nixos/modules/services/networking/wstunnel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable verbose logging."}, "loc": ["services", "wstunnel", "servers", "<name>", "verboseLogging"], "readOnly": false, "type": "boolean"}, "services.x2goserver.enable": {"declarations": ["nixos/modules/services/networking/x2goserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables the x2goserver module.\nNOTE: This will create a good amount of symlinks in `/usr/local/bin`\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "x2goserver", "enable"], "readOnly": false, "type": "boolean"}, "services.x2goserver.nxagentDefaultOptions": {"declarations": ["nixos/modules/services/networking/x2goserver.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"-extension GLX\"\n  \"-nolisten tcp\"\n]"}, "description": {"_type": "mdDoc", "text": "List of default nx agent options.\n"}, "loc": ["services", "x2goserver", "nxagentDefaultOptions"], "readOnly": false, "type": "list of string"}, "services.x2goserver.settings": {"declarations": ["nixos/modules/services/networking/x2goserver.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "x2goserver.conf ini configuration as nix attributes. See\n`x2goserver.conf(5)` for details\n"}, "example": {"_type": "literalExpression", "text": "{\n  superenicer = {\n    \"enable\" = \"yes\";\n    \"idle-nice-level\" = 19;\n  };\n  telekinesis = { \"enable\" = \"no\"; };\n}\n"}, "loc": ["services", "x2goserver", "settings"], "readOnly": false, "type": "attribute set of (attribute set)"}, "services.x2goserver.superenicer.enable": {"declarations": ["nixos/modules/services/networking/x2goserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables the SupeReNicer code in x2gocleansessions, this will renice\nsuspended sessions to nice level 19 and renice them to level 0 if the\nsession becomes marked as running again\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "x2goserver", "superenicer", "enable"], "readOnly": false, "type": "boolean"}, "services.xandikos.address": {"declarations": ["nixos/modules/services/networking/xandikos.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The IP address on which Xandikos will listen.\nBy default listens on localhost.\n"}, "loc": ["services", "xandikos", "address"], "readOnly": false, "type": "string"}, "services.xandikos.enable": {"declarations": ["nixos/modules/services/networking/xandikos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Xandikos CalDAV and CardDAV server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xandikos", "enable"], "readOnly": false, "type": "boolean"}, "services.xandikos.extraOptions": {"declarations": ["nixos/modules/services/networking/xandikos.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line arguments to pass to xandikos.\n"}, "example": {"_type": "literalExpression", "text": "[ \"--autocreate\"\n  \"--defaults\"\n  \"--current-user-principal user\"\n  \"--dump-dav-xml\"\n]\n"}, "loc": ["services", "xandikos", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.xandikos.nginx": {"declarations": ["nixos/modules/services/networking/xandikos.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for nginx reverse proxy.\n"}, "loc": ["services", "xandikos", "nginx"], "readOnly": false, "type": "submodule"}, "services.xandikos.nginx.enable": {"declarations": ["nixos/modules/services/networking/xandikos.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Configure the nginx reverse proxy settings.\n"}, "loc": ["services", "xandikos", "nginx", "enable"], "readOnly": false, "type": "boolean"}, "services.xandikos.nginx.hostName": {"declarations": ["nixos/modules/services/networking/xandikos.nix"], "description": {"_type": "mdDoc", "text": "The hostname use to setup the virtualhost configuration\n"}, "loc": ["services", "xandikos", "nginx", "hostName"], "readOnly": false, "type": "string"}, "services.xandikos.package": {"declarations": ["nixos/modules/services/networking/xandikos.nix"], "default": {"_type": "literalExpression", "text": "pkgs.xandikos"}, "description": {"_type": "mdDoc", "text": "The Xandikos package to use."}, "loc": ["services", "xandikos", "package"], "readOnly": false, "type": "package"}, "services.xandikos.port": {"declarations": ["nixos/modules/services/networking/xandikos.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "The port of the Xandikos web application"}, "loc": ["services", "xandikos", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.xandikos.routePrefix": {"declarations": ["nixos/modules/services/networking/xandikos.nix"], "default": {"_type": "literalExpression", "text": "\"/\""}, "description": {"_type": "mdDoc", "text": "Path to Xandikos.\nUseful when Xandikos is behind a reverse proxy.\n"}, "loc": ["services", "xandikos", "routePrefix"], "readOnly": false, "type": "string"}, "services.xbanish.arguments": {"declarations": ["nixos/modules/services/x11/xbanish.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Arguments to pass to xbanish command"}, "example": {"_type": "literalExpression", "text": "\"-d -i shift\""}, "loc": ["services", "xbanish", "arguments"], "readOnly": false, "type": "string"}, "services.xbanish.enable": {"declarations": ["nixos/modules/services/x11/xbanish.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable xbanish."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xbanish", "enable"], "readOnly": false, "type": "boolean"}, "services.xe-guest-utilities.enable": {"declarations": ["nixos/modules/virtualisation/xe-guest-utilities.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Xen guest utilities daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xe-guest-utilities", "enable"], "readOnly": false, "type": "boolean"}, "services.xfs.enable": {"declarations": ["nixos/modules/services/x11/xfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the X Font Server."}, "loc": ["services", "xfs", "enable"], "readOnly": false, "type": "boolean"}, "services.xinetd.enable": {"declarations": ["nixos/modules/services/networking/xinetd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the xinetd super-server daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xinetd", "enable"], "readOnly": false, "type": "boolean"}, "services.xinetd.extraDefaults": {"declarations": ["nixos/modules/services/networking/xinetd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional configuration lines added to the default section of xinetd's configuration.\n"}, "loc": ["services", "xinetd", "extraDefaults"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xinetd.services": {"declarations": ["nixos/modules/services/networking/xinetd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of services provided by xinetd.\n"}, "loc": ["services", "xinetd", "services"], "readOnly": false, "type": "list of (submodule)"}, "services.xinetd.services.*.extraConfig": {"declarations": ["nixos/modules/services/networking/xinetd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration-lines added to the section of the service."}, "loc": ["services", "xinetd", "services", "*", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xinetd.services.*.flags": {"declarations": ["nixos/modules/services/networking/xinetd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": ""}, "loc": ["services", "xinetd", "services", "*", "flags"], "readOnly": false, "type": "string"}, "services.xinetd.services.*.name": {"declarations": ["nixos/modules/services/networking/xinetd.nix"], "description": {"_type": "mdDoc", "text": "Name of the service."}, "example": {"_type": "literalExpression", "text": "\"login\""}, "loc": ["services", "xinetd", "services", "*", "name"], "readOnly": false, "type": "string"}, "services.xinetd.services.*.port": {"declarations": ["nixos/modules/services/networking/xinetd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Port number of the service."}, "example": {"_type": "literalExpression", "text": "123"}, "loc": ["services", "xinetd", "services", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.xinetd.services.*.protocol": {"declarations": ["nixos/modules/services/networking/xinetd.nix"], "default": {"_type": "literalExpression", "text": "\"tcp\""}, "description": {"_type": "mdDoc", "text": "Protocol of the service.  Usually `tcp` or `udp`."}, "loc": ["services", "xinetd", "services", "*", "protocol"], "readOnly": false, "type": "string"}, "services.xinetd.services.*.server": {"declarations": ["nixos/modules/services/networking/xinetd.nix"], "description": {"_type": "mdDoc", "text": "Path of the program that implements the service."}, "example": {"_type": "literalExpression", "text": "\"/foo/bin/ftpd\""}, "loc": ["services", "xinetd", "services", "*", "server"], "readOnly": false, "type": "string"}, "services.xinetd.services.*.serverArgs": {"declarations": ["nixos/modules/services/networking/xinetd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Command-line arguments for the server program."}, "loc": ["services", "xinetd", "services", "*", "serverArgs"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.xinetd.services.*.unlisted": {"declarations": ["nixos/modules/services/networking/xinetd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether this server is listed in\n{file}`/etc/services`.  If so, the port\nnumber can be omitted.\n"}, "loc": ["services", "xinetd", "services", "*", "unlisted"], "readOnly": false, "type": "boolean"}, "services.xinetd.services.*.user": {"declarations": ["nixos/modules/services/networking/xinetd.nix"], "default": {"_type": "literalExpression", "text": "\"nobody\""}, "description": {"_type": "mdDoc", "text": "User account for the service"}, "loc": ["services", "xinetd", "services", "*", "user"], "readOnly": false, "type": "string"}, "services.xl2tpd.clientIpRange": {"declarations": ["nixos/modules/services/networking/xl2tpd.nix"], "default": {"_type": "literalExpression", "text": "\"10.125.125.2-11\""}, "description": {"_type": "mdDoc", "text": "The range from which client IPs are drawn."}, "loc": ["services", "xl2tpd", "clientIpRange"], "readOnly": false, "type": "string"}, "services.xl2tpd.enable": {"declarations": ["nixos/modules/services/networking/xl2tpd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable xl2tpd, the Layer 2 Tunnelling Protocol Daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xl2tpd", "enable"], "readOnly": false, "type": "boolean"}, "services.xl2tpd.extraPppdOptions": {"declarations": ["nixos/modules/services/networking/xl2tpd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Adds extra lines to the pppd options file."}, "example": {"_type": "literalExpression", "text": "''\n  ms-dns 8.8.8.8\n  ms-dns 8.8.4.4\n''"}, "loc": ["services", "xl2tpd", "extraPppdOptions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xl2tpd.extraXl2tpOptions": {"declarations": ["nixos/modules/services/networking/xl2tpd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Adds extra lines to the xl2tpd configuration file."}, "loc": ["services", "xl2tpd", "extraXl2tpOptions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xl2tpd.serverIp": {"declarations": ["nixos/modules/services/networking/xl2tpd.nix"], "default": {"_type": "literalExpression", "text": "\"10.125.125.1\""}, "description": {"_type": "mdDoc", "text": "The server-side IP address."}, "loc": ["services", "xl2tpd", "serverIp"], "readOnly": false, "type": "string"}, "services.xmr-stak.configFiles": {"declarations": ["nixos/modules/services/misc/xmr-stak.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Content of config files like config.txt, pools.txt or cpu.txt.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"config.txt\" = ''\n    \"verbose_level\" : 4,\n    \"h_print_time\" : 60,\n    \"tls_secure_algo\" : true,\n  '';\n  \"pools.txt\" = ''\n    \"currency\" : \"monero7\",\n    \"pool_list\" :\n    [ { \"pool_address\" : \"pool.supportxmr.com:443\",\n        \"wallet_address\" : \"my-wallet-address\",\n        \"rig_id\" : \"\",\n        \"pool_password\" : \"nixos\",\n        \"use_nicehash\" : false,\n        \"use_tls\" : true,\n        \"tls_fingerprint\" : \"\",\n        \"pool_weight\" : 23\n      },\n    ],\n  '';\n}\n"}, "loc": ["services", "xmr-stak", "configFiles"], "readOnly": false, "type": "attribute set of string"}, "services.xmr-stak.cudaSupport": {"declarations": ["nixos/modules/services/misc/xmr-stak.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable support for CUDA (NVidia graphics cards)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xmr-stak", "cudaSupport"], "readOnly": false, "type": "boolean"}, "services.xmr-stak.enable": {"declarations": ["nixos/modules/services/misc/xmr-stak.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable xmr-stak miner."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xmr-stak", "enable"], "readOnly": false, "type": "boolean"}, "services.xmr-stak.extraArgs": {"declarations": ["nixos/modules/services/misc/xmr-stak.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of parameters to pass to xmr-stak."}, "example": {"_type": "literalExpression", "text": "[\n  \"--noCPU\"\n  \"--currency monero\"\n]"}, "loc": ["services", "xmr-stak", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.xmr-stak.openclSupport": {"declarations": ["nixos/modules/services/misc/xmr-stak.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable support for OpenCL (AMD/ATI graphics cards)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xmr-stak", "openclSupport"], "readOnly": false, "type": "boolean"}, "services.xmrig.enable": {"declarations": ["nixos/modules/services/misc/xmrig.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable XMRig Mining Software."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xmrig", "enable"], "readOnly": false, "type": "boolean"}, "services.xmrig.package": {"declarations": ["nixos/modules/services/misc/xmrig.nix"], "default": {"_type": "literalExpression", "text": "pkgs.xmrig"}, "description": {"_type": "mdDoc", "text": "XMRig package to use."}, "example": {"_type": "literalExpression", "text": "pkgs.xmrig-mo"}, "loc": ["services", "xmrig", "package"], "readOnly": false, "type": "package"}, "services.xmrig.settings": {"declarations": ["nixos/modules/services/misc/xmrig.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "XMRig configuration. Refer to\n<https://xmrig.com/docs/miner/config>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  autosave = true;\n  cpu = true;\n  opencl = false;\n  cuda = false;\n  pools = [\n    {\n      url = \"pool.supportxmr.com:443\";\n      user = \"your-wallet\";\n      keepalive = true;\n      tls = true;\n    }\n  ]\n}\n"}, "loc": ["services", "xmrig", "settings"], "readOnly": false, "type": "JSON value"}, "services.xray.enable": {"declarations": ["nixos/modules/services/networking/xray.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run xray server.\n\nEither `settingsFile` or `settings` must be specified.\n"}, "loc": ["services", "xray", "enable"], "readOnly": false, "type": "boolean"}, "services.xray.package": {"declarations": ["nixos/modules/services/networking/xray.nix"], "default": {"_type": "literalExpression", "text": "pkgs.xray"}, "description": {"_type": "mdDoc", "text": "Which xray package to use.\n"}, "loc": ["services", "xray", "package"], "readOnly": false, "type": "package"}, "services.xray.settings": {"declarations": ["nixos/modules/services/networking/xray.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The configuration object.\n\nEither `settingsFile` or `settings` must be specified.\n\nSee <https://www.v2fly.org/en_US/config/overview.html>.\n"}, "example": {"_type": "literalExpression", "text": "{\n  inbounds = [\n    {\n      listen = \"127.0.0.1\";\n      port = 1080;\n      protocol = \"http\";\n    }\n  ];\n  outbounds = [\n    {\n      protocol = \"freedom\";\n    }\n  ];\n}"}, "loc": ["services", "xray", "settings"], "readOnly": false, "type": "null or (attribute set of unspecified value)"}, "services.xray.settingsFile": {"declarations": ["nixos/modules/services/networking/xray.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The absolute path to the configuration file.\n\nEither `settingsFile` or `settings` must be specified.\n\nSee <https://www.v2fly.org/en_US/config/overview.html>.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/xray/config.json\""}, "loc": ["services", "xray", "settingsFile"], "readOnly": false, "type": "null or path"}, "services.xrdp.confDir": {"declarations": ["nixos/modules/services/networking/xrdp.nix"], "default": {"_type": "literalMD", "text": "generated from configuration"}, "description": {"_type": "mdDoc", "text": "The location of the config files for xrdp."}, "loc": ["services", "xrdp", "confDir"], "readOnly": false, "type": "path"}, "services.xrdp.defaultWindowManager": {"declarations": ["nixos/modules/services/networking/xrdp.nix"], "default": {"_type": "literalExpression", "text": "\"xterm\""}, "description": {"_type": "mdDoc", "text": "The script to run when user log in, usually a window manager, e.g. \"icewm\", \"xfce4-session\"\nThis is per-user overridable, if file ~/startwm.sh exists it will be used instead.\n"}, "example": {"_type": "literalExpression", "text": "\"xfce4-session\""}, "loc": ["services", "xrdp", "defaultWindowManager"], "readOnly": false, "type": "string"}, "services.xrdp.enable": {"declarations": ["nixos/modules/services/networking/xrdp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable xrdp, the Remote Desktop Protocol server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xrdp", "enable"], "readOnly": false, "type": "boolean"}, "services.xrdp.openFirewall": {"declarations": ["nixos/modules/services/networking/xrdp.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the firewall for the specified RDP port."}, "loc": ["services", "xrdp", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.xrdp.package": {"declarations": ["nixos/modules/services/networking/xrdp.nix"], "default": {"_type": "literalExpression", "text": "pkgs.xrdp"}, "description": {"_type": "mdDoc", "text": "The package to use for the xrdp daemon's binary.\n"}, "loc": ["services", "xrdp", "package"], "readOnly": false, "type": "package"}, "services.xrdp.port": {"declarations": ["nixos/modules/services/networking/xrdp.nix"], "default": {"_type": "literalExpression", "text": "3389"}, "description": {"_type": "mdDoc", "text": "Specifies on which port the xrdp daemon listens.\n"}, "loc": ["services", "xrdp", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.xrdp.sslCert": {"declarations": ["nixos/modules/services/networking/xrdp.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/xrdp/cert.pem\""}, "description": {"_type": "mdDoc", "text": "ssl certificate path\nA self-signed certificate will be generated if file not exists.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/your/cert.pem\""}, "loc": ["services", "xrdp", "sslCert"], "readOnly": false, "type": "string"}, "services.xrdp.sslKey": {"declarations": ["nixos/modules/services/networking/xrdp.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/xrdp/key.pem\""}, "description": {"_type": "mdDoc", "text": "ssl private key path\nA self-signed certificate will be generated if file not exists.\n"}, "example": {"_type": "literalExpression", "text": "\"/path/to/your/key.pem\""}, "loc": ["services", "xrdp", "sslKey"], "readOnly": false, "type": "string"}, "services.xserver.cmt.enable": {"declarations": ["nixos/modules/services/x11/hardware/cmt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable chrome multitouch input (cmt). Touchpad drivers that are configured for chromebooks."}, "loc": ["services", "xserver", "cmt", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.cmt.models": {"declarations": ["nixos/modules/services/x11/hardware/cmt.nix"], "description": {"_type": "mdDoc", "text": "Which models to enable cmt for. Enter the Code Name for your Chromebook.\nCode Name can be found at <https://www.chromium.org/chromium-os/developer-information-for-chrome-os-devices>.\n"}, "example": {"_type": "literalExpression", "text": "\"banjo\""}, "loc": ["services", "xserver", "cmt", "models"], "readOnly": false, "type": "one of \"atlas\", \"banjo\", \"candy\", \"caroline\", \"cave\", \"celes\", \"clapper\", \"cyan\", \"daisy\", \"elan\", \"elm\", \"enguarde\", \"eve\", \"expresso\", \"falco\", \"gandof\", \"glimmer\", \"gnawty\", \"heli\", \"kevin\", \"kip\", \"leon\", \"lulu\", \"orco\", \"pbody\", \"peppy\", \"pi\", \"pit\", \"puppy\", \"quawks\", \"rambi\", \"samus\", \"snappy\", \"spring\", \"squawks\", \"swanky\", \"winky\", \"wolf\", \"auron_paine\", \"auron_yuna\", \"daisy_skate\", \"nyan_big\", \"nyan_blaze\", \"veyron_jaq\", \"veyron_jerry\", \"veyron_mighty\", \"veyron_minnie\", \"veyron_speedy\""}, "services.xserver.desktopManager.budgie.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/budgie.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Budgie desktop."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "desktopManager", "budgie", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.budgie.extraGSettingsOverridePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/budgie.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of packages for which GSettings are overridden."}, "loc": ["services", "xserver", "desktopManager", "budgie", "extraGSettingsOverridePackages"], "readOnly": false, "type": "list of path"}, "services.xserver.desktopManager.budgie.extraGSettingsOverrides": {"declarations": ["nixos/modules/services/x11/desktop-managers/budgie.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional GSettings overrides."}, "loc": ["services", "xserver", "desktopManager", "budgie", "extraGSettingsOverrides"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.desktopManager.budgie.extraPlugins": {"declarations": ["nixos/modules/services/x11/desktop-managers/budgie.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra plugins for the Budgie desktop"}, "example": {"_type": "literalExpression", "text": "[ pkgs.budgiePlugins.budgie-analogue-clock-applet ]"}, "loc": ["services", "xserver", "desktopManager", "budgie", "extraPlugins"], "readOnly": false, "type": "list of package"}, "services.xserver.desktopManager.budgie.sessionPath": {"declarations": ["nixos/modules/services/x11/desktop-managers/budgie.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional list of packages to be added to the session search path.\nUseful for GSettings-conditional autostart.\n\nNote that this should be a last resort; patching the package is preferred (see GPaste).\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.gnome.gpaste ]"}, "loc": ["services", "xserver", "desktopManager", "budgie", "sessionPath"], "readOnly": false, "type": "list of package"}, "services.xserver.desktopManager.cde.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/cde.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Common Desktop Environment."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "desktopManager", "cde", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.cde.extraPackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/cde.nix"], "default": {"_type": "literalExpression", "text": "with pkgs.xorg; [\n  xclock bitmap xlsfonts xfd xrefresh xload xwininfo xdpyinfo xwd xwud\n]\n"}, "description": {"_type": "mdDoc", "text": "Extra packages to be installed system wide.\n"}, "loc": ["services", "xserver", "desktopManager", "cde", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.xserver.desktopManager.cinnamon.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/cinnamon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the cinnamon desktop manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "desktopManager", "cinnamon", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.cinnamon.extraGSettingsOverridePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/cinnamon.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of packages for which gsettings are overridden."}, "loc": ["services", "xserver", "desktopManager", "cinnamon", "extraGSettingsOverridePackages"], "readOnly": false, "type": "list of path"}, "services.xserver.desktopManager.cinnamon.extraGSettingsOverrides": {"declarations": ["nixos/modules/services/x11/desktop-managers/cinnamon.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional gsettings overrides."}, "loc": ["services", "xserver", "desktopManager", "cinnamon", "extraGSettingsOverrides"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.desktopManager.cinnamon.sessionPath": {"declarations": ["nixos/modules/services/x11/desktop-managers/cinnamon.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional list of packages to be added to the session search path.\nUseful for GSettings-conditional autostart.\n\nNote that this should be a last resort; patching the package is preferred (see GPaste).\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.gnome.gpaste ]"}, "loc": ["services", "xserver", "desktopManager", "cinnamon", "sessionPath"], "readOnly": false, "type": "list of package"}, "services.xserver.desktopManager.deepin.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/deepin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Enable Deepin desktop manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "desktopManager", "deepin", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.deepin.extraGSettingsOverridePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/deepin.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of packages for which gsettings are overridden."}, "loc": ["services", "xserver", "desktopManager", "deepin", "extraGSettingsOverridePackages"], "readOnly": false, "type": "list of path"}, "services.xserver.desktopManager.deepin.extraGSettingsOverrides": {"declarations": ["nixos/modules/services/x11/desktop-managers/deepin.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional gsettings overrides."}, "loc": ["services", "xserver", "desktopManager", "deepin", "extraGSettingsOverrides"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.desktopManager.default": {"declarations": ["nixos/modules/services/x11/desktop-managers/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "**Deprecated**, please use [](#opt-services.xserver.displayManager.defaultSession) instead.\n\nDefault desktop manager loaded if none have been chosen.\n"}, "example": {"_type": "literalExpression", "text": "\"none\""}, "loc": ["services", "xserver", "desktopManager", "default"], "readOnly": false, "type": "null or string"}, "services.xserver.desktopManager.enlightenment.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/enlightenment.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the Enlightenment desktop environment."}, "loc": ["services", "xserver", "desktopManager", "enlightenment", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.gnome.debug": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable gnome-session debug messages."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "desktopManager", "gnome", "debug"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.gnome.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable GNOME desktop manager."}, "loc": ["services", "xserver", "desktopManager", "gnome", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.gnome.extraGSettingsOverridePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of packages for which gsettings are overridden."}, "loc": ["services", "xserver", "desktopManager", "gnome", "extraGSettingsOverridePackages"], "readOnly": false, "type": "list of path"}, "services.xserver.desktopManager.gnome.extraGSettingsOverrides": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional gsettings overrides."}, "loc": ["services", "xserver", "desktopManager", "gnome", "extraGSettingsOverrides"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.desktopManager.gnome.flashback.customSessions": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Other GNOME Flashback sessions to enable."}, "loc": ["services", "xserver", "desktopManager", "gnome", "flashback", "customSessions"], "readOnly": false, "type": "list of (submodule)"}, "services.xserver.desktopManager.gnome.flashback.customSessions.*.enableGnomePanel": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the GNOME panel in this session."}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "xserver", "desktopManager", "gnome", "flashback", "customSessions", "*", "enableGnomePanel"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.gnome.flashback.customSessions.*.wmCommand": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "description": {"_type": "mdDoc", "text": "The executable of the window manager to use."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.haskellPackages.xmonad}/bin/xmonad\""}, "loc": ["services", "xserver", "desktopManager", "gnome", "flashback", "customSessions", "*", "wmCommand"], "readOnly": false, "type": "string"}, "services.xserver.desktopManager.gnome.flashback.customSessions.*.wmLabel": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "description": {"_type": "mdDoc", "text": "The name of the window manager to show in the session chooser."}, "example": {"_type": "literalExpression", "text": "\"XMonad\""}, "loc": ["services", "xserver", "desktopManager", "gnome", "flashback", "customSessions", "*", "wmLabel"], "readOnly": false, "type": "string"}, "services.xserver.desktopManager.gnome.flashback.customSessions.*.wmName": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "description": {"_type": "mdDoc", "text": "A unique identifier for the window manager."}, "example": {"_type": "literalExpression", "text": "\"xmonad\""}, "loc": ["services", "xserver", "desktopManager", "gnome", "flashback", "customSessions", "*", "wmName"], "readOnly": false, "type": "string matching the pattern [a-zA-Z0-9_-]+"}, "services.xserver.desktopManager.gnome.flashback.enableMetacity": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the standard GNOME Flashback session with Metacity."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "desktopManager", "gnome", "flashback", "enableMetacity"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.gnome.flashback.panelModulePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "[ pkgs.gnome.gnome-applets ]"}, "description": {"_type": "mdDoc", "text": "Packages containing modules that should be made available to `gnome-panel` (usually for applets).\n\nIf you're packaging something to use here, please install the modules in `$out/lib/gnome-panel/modules`.\n"}, "loc": ["services", "xserver", "desktopManager", "gnome", "flashback", "panelModulePackages"], "readOnly": false, "type": "list of path"}, "services.xserver.desktopManager.gnome.sessionPath": {"declarations": ["nixos/modules/services/x11/desktop-managers/gnome.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional list of packages to be added to the session search path.\nUseful for GNOME Shell extensions or GSettings-conditional autostart.\n\nNote that this should be a last resort; patching the package is preferred (see GPaste).\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.gnome.gpaste ]"}, "loc": ["services", "xserver", "desktopManager", "gnome", "sessionPath"], "readOnly": false, "type": "list of package"}, "services.xserver.desktopManager.kodi.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/kodi.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the kodi multimedia center."}, "loc": ["services", "xserver", "desktopManager", "kodi", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.kodi.package": {"declarations": ["nixos/modules/services/x11/desktop-managers/kodi.nix"], "default": {"_type": "literalExpression", "text": "pkgs.kodi"}, "description": {"_type": "mdDoc", "text": "Package that should be used for Kodi.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.kodi.withPackages (p: with p; [ jellyfin pvr-iptvsimple vfs-sftp ])"}, "loc": ["services", "xserver", "desktopManager", "kodi", "package"], "readOnly": false, "type": "package"}, "services.xserver.desktopManager.lumina.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/lumina.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the Lumina desktop manager"}, "loc": ["services", "xserver", "desktopManager", "lumina", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.lxqt.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/lxqt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the LXQt desktop manager"}, "loc": ["services", "xserver", "desktopManager", "lxqt", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.mate.debug": {"declarations": ["nixos/modules/services/x11/desktop-managers/mate.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable mate-session debug messages."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "desktopManager", "mate", "debug"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.mate.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/mate.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the MATE desktop environment"}, "loc": ["services", "xserver", "desktopManager", "mate", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.pantheon.debug": {"declarations": ["nixos/modules/services/x11/desktop-managers/pantheon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable gnome-session debug messages."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "desktopManager", "pantheon", "debug"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.pantheon.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/pantheon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the pantheon desktop manager"}, "loc": ["services", "xserver", "desktopManager", "pantheon", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.pantheon.extraGSettingsOverridePackages": {"declarations": ["nixos/modules/services/x11/desktop-managers/pantheon.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of packages for which gsettings are overridden."}, "loc": ["services", "xserver", "desktopManager", "pantheon", "extraGSettingsOverridePackages"], "readOnly": false, "type": "list of path"}, "services.xserver.desktopManager.pantheon.extraGSettingsOverrides": {"declarations": ["nixos/modules/services/x11/desktop-managers/pantheon.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional gsettings overrides."}, "loc": ["services", "xserver", "desktopManager", "pantheon", "extraGSettingsOverrides"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.desktopManager.pantheon.extraSwitchboardPlugs": {"declarations": ["nixos/modules/services/x11/desktop-managers/pantheon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Plugs to add to Switchboard."}, "loc": ["services", "xserver", "desktopManager", "pantheon", "extraSwitchboardPlugs"], "readOnly": false, "type": "null or (list of package)"}, "services.xserver.desktopManager.pantheon.extraWingpanelIndicators": {"declarations": ["nixos/modules/services/x11/desktop-managers/pantheon.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Indicators to add to Wingpanel."}, "loc": ["services", "xserver", "desktopManager", "pantheon", "extraWingpanelIndicators"], "readOnly": false, "type": "null or (list of package)"}, "services.xserver.desktopManager.pantheon.sessionPath": {"declarations": ["nixos/modules/services/x11/desktop-managers/pantheon.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional list of packages to be added to the session search path.\nUseful for GSettings-conditional autostart.\n\nNote that this should be a last resort; patching the package is preferred (see GPaste).\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.gnome.gpaste ]"}, "loc": ["services", "xserver", "desktopManager", "pantheon", "sessionPath"], "readOnly": false, "type": "list of package"}, "services.xserver.desktopManager.phosh.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/phosh.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the Phone Shell."}, "loc": ["services", "xserver", "desktopManager", "phosh", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.phosh.group": {"declarations": ["nixos/modules/services/x11/desktop-managers/phosh.nix"], "description": {"_type": "mdDoc", "text": "The group to run the Phosh service."}, "example": {"_type": "literalExpression", "text": "\"users\""}, "loc": ["services", "xserver", "desktopManager", "phosh", "group"], "readOnly": false, "type": "string"}, "services.xserver.desktopManager.phosh.package": {"declarations": ["nixos/modules/services/x11/desktop-managers/phosh.nix"], "default": {"_type": "literalExpression", "text": "pkgs.phosh"}, "description": {"_type": "mdDoc", "text": "Package that should be used for Phosh.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.phosh"}, "loc": ["services", "xserver", "desktopManager", "phosh", "package"], "readOnly": false, "type": "package"}, "services.xserver.desktopManager.phosh.phocConfig": {"declarations": ["nixos/modules/services/x11/desktop-managers/phosh.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configurations for the Phoc compositor.\n"}, "loc": ["services", "xserver", "desktopManager", "phosh", "phocConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\" or path or (submodule)"}, "services.xserver.desktopManager.phosh.user": {"declarations": ["nixos/modules/services/x11/desktop-managers/phosh.nix"], "description": {"_type": "mdDoc", "text": "The user to run the Phosh service."}, "example": {"_type": "literalExpression", "text": "\"alice\""}, "loc": ["services", "xserver", "desktopManager", "phosh", "user"], "readOnly": false, "type": "string"}, "services.xserver.desktopManager.plasma5.bigscreen.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/plasma5.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable support for running the Plasma Bigscreen session.\n"}, "loc": ["services", "xserver", "desktopManager", "plasma5", "bigscreen", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.plasma5.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/plasma5.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the Plasma 5 (KDE 5) desktop environment."}, "loc": ["services", "xserver", "desktopManager", "plasma5", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.plasma5.mobile.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/plasma5.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable support for running the Plasma Mobile shell.\n"}, "loc": ["services", "xserver", "desktopManager", "plasma5", "mobile", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.plasma5.mobile.installRecommendedSoftware": {"declarations": ["nixos/modules/services/x11/desktop-managers/plasma5.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Installs software recommended for use with Plasma Mobile, but which\nis not strictly required for Plasma Mobile to run.\n"}, "loc": ["services", "xserver", "desktopManager", "plasma5", "mobile", "installRecommendedSoftware"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.plasma5.notoPackage": {"declarations": ["nixos/modules/services/x11/desktop-managers/plasma5.nix"], "default": {"_type": "literalExpression", "text": "pkgs.noto-fonts"}, "description": {"_type": "mdDoc", "text": "The Noto fonts package to use."}, "example": {"_type": "literalExpression", "text": "noto-fonts-lgc-plus"}, "loc": ["services", "xserver", "desktopManager", "plasma5", "notoPackage"], "readOnly": false, "type": "package"}, "services.xserver.desktopManager.plasma5.phononBackend": {"declarations": ["nixos/modules/services/x11/desktop-managers/plasma5.nix"], "default": {"_type": "literalExpression", "text": "\"vlc\""}, "description": {"_type": "mdDoc", "text": "Phonon audio backend to install."}, "example": {"_type": "literalExpression", "text": "\"gstreamer\""}, "loc": ["services", "xserver", "desktopManager", "plasma5", "phononBackend"], "readOnly": false, "type": "one of \"gstreamer\", \"vlc\""}, "services.xserver.desktopManager.plasma5.runUsingSystemd": {"declarations": ["nixos/modules/services/x11/desktop-managers/plasma5.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Use systemd to manage the Plasma session"}, "loc": ["services", "xserver", "desktopManager", "plasma5", "runUsingSystemd"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.plasma5.useQtScaling": {"declarations": ["nixos/modules/services/x11/desktop-managers/plasma5.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable HiDPI scaling in Qt."}, "loc": ["services", "xserver", "desktopManager", "plasma5", "useQtScaling"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.retroarch.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/retroarch.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable RetroArch."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "desktopManager", "retroarch", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.retroarch.extraArgs": {"declarations": ["nixos/modules/services/x11/desktop-managers/retroarch.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra arguments to pass to RetroArch."}, "example": {"_type": "literalExpression", "text": "[\n  \"--verbose\"\n  \"--host\"\n]"}, "loc": ["services", "xserver", "desktopManager", "retroarch", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.xserver.desktopManager.retroarch.package": {"declarations": ["nixos/modules/services/x11/desktop-managers/retroarch.nix"], "default": {"_type": "literalExpression", "text": "pkgs.retroarch"}, "description": {"_type": "mdDoc", "text": "RetroArch package to use."}, "example": {"_type": "literalExpression", "text": "pkgs.retroarch-full"}, "loc": ["services", "xserver", "desktopManager", "retroarch", "package"], "readOnly": false, "type": "package"}, "services.xserver.desktopManager.runXdgAutostartIfNone": {"declarations": ["nixos/modules/services/x11/desktop-managers/none.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to run XDG autostart files for sessions without a desktop manager\n(with only a window manager), these sessions usually don't handle XDG\nautostart files by default.\n\nSome services like {option}`i18n.inputMethod` and\n{option}`service.earlyoom` use XDG autostart files to start.\nIf this option is not set to `true` and you are using\na window manager without a desktop manager, you need to manually start\nthem or running `dex` somewhere.\n"}, "loc": ["services", "xserver", "desktopManager", "runXdgAutostartIfNone"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.surf-display.defaultWwwUri": {"declarations": ["nixos/modules/services/x11/desktop-managers/surf-display.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.surf-display}/share/surf-display/empty-page.html\""}, "description": {"_type": "mdDoc", "text": "Default URI to display."}, "example": {"_type": "literalExpression", "text": "\"https://www.example.com/\""}, "loc": ["services", "xserver", "desktopManager", "surf-display", "defaultWwwUri"], "readOnly": false, "type": "string"}, "services.xserver.desktopManager.surf-display.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/surf-display.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable surf-display as a kiosk browser session."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "desktopManager", "surf-display", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.surf-display.extraConfig": {"declarations": ["nixos/modules/services/x11/desktop-managers/surf-display.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options to append to `/etc/default/surf-display`.\n"}, "example": {"_type": "literalExpression", "text": "''\n  # Enforce fixed resolution for all displays (default: not set):\n  DEFAULT_RESOLUTION=\"1920x1080\"\n  \n  # HTTP proxy URL, if needed (default: not set).\n  HTTP_PROXY_URL=\"http://webcache:3128\"\n  \n  # Configure individual display screens with host specific parameters:\n  DISPLAYS['display-host-0']=\"www_uri=https://www.displayserver.comany.net/display-1/index.html\"\n  DISPLAYS['display-host-1']=\"www_uri=https://www.displayserver.comany.net/display-2/index.html\"\n  DISPLAYS['display-host-2']=\"www_uri=https://www.displayserver.comany.net/display-3/index.html|res=1920x1280\"\n  DISPLAYS['display-host-3']=\"www_uri=https://www.displayserver.comany.net/display-4/index.html\"|res=1280x1024\"\n  DISPLAYS['display-host-local-file']=\"www_uri=file:///usr/share/doc/surf-display/empty-page.html\"\n''"}, "loc": ["services", "xserver", "desktopManager", "surf-display", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.desktopManager.surf-display.hideIdlePointer": {"declarations": ["nixos/modules/services/x11/desktop-managers/surf-display.nix"], "default": {"_type": "literalExpression", "text": "\"yes\""}, "description": {"_type": "mdDoc", "text": "Hide idle mouse pointer."}, "example": {"_type": "literalExpression", "text": "\"no\""}, "loc": ["services", "xserver", "desktopManager", "surf-display", "hideIdlePointer"], "readOnly": false, "type": "string"}, "services.xserver.desktopManager.surf-display.inactivityInterval": {"declarations": ["nixos/modules/services/x11/desktop-managers/surf-display.nix"], "default": {"_type": "literalExpression", "text": "300"}, "description": {"_type": "mdDoc", "text": "Setting for internal inactivity timer to restart surf-display if the\nuser goes inactive/idle to get a fresh session for the next user of\nthe kiosk.\n\nIf this value is set to zero, the whole feature of restarting due to\ninactivity is disabled.\n"}, "example": {"_type": "literalExpression", "text": "0"}, "loc": ["services", "xserver", "desktopManager", "surf-display", "inactivityInterval"], "readOnly": false, "type": "signed integer"}, "services.xserver.desktopManager.surf-display.pointerButtonMap": {"declarations": ["nixos/modules/services/x11/desktop-managers/surf-display.nix"], "default": {"_type": "literalExpression", "text": "\"1 0 0 4 5 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0\""}, "description": {"_type": "mdDoc", "text": "Disable right and middle pointer device click in browser sessions\nwhile keeping scrolling wheels' functionality intact. See pointer\nsubcommand on `man xmodmap` for details.\n"}, "loc": ["services", "xserver", "desktopManager", "surf-display", "pointerButtonMap"], "readOnly": false, "type": "string"}, "services.xserver.desktopManager.surf-display.screensaverSettings": {"declarations": ["nixos/modules/services/x11/desktop-managers/surf-display.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Screensaver settings, see `man 1 xset` for possible options.\n"}, "loc": ["services", "xserver", "desktopManager", "surf-display", "screensaverSettings"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.xserver.desktopManager.wallpaper.combineScreens": {"declarations": ["nixos/modules/services/x11/desktop-managers/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When set to `true` the wallpaper will stretch across all screens.\nWhen set to `false` the wallpaper is duplicated to all screens.\n"}, "loc": ["services", "xserver", "desktopManager", "wallpaper", "combineScreens"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.wallpaper.mode": {"declarations": ["nixos/modules/services/x11/desktop-managers/default.nix"], "default": {"_type": "literalExpression", "text": "\"scale\""}, "description": {"_type": "mdDoc", "text": "The file {file}`~/.background-image` is used as a background image.\nThis option specifies the placement of this image onto your desktop.\n\nPossible values:\n`center`: Center the image on the background. If it is too small, it will be surrounded by a black border.\n`fill`: Like `scale`, but preserves aspect ratio by zooming the image until it fits. Either a horizontal or a vertical part of the image will be cut off.\n`max`: Like `fill`, but scale the image to the maximum size that fits the screen with black borders on one side.\n`scale`: Fit the file into the background without repeating it, cutting off stuff or using borders. But the aspect ratio is not preserved either.\n`tile`: Tile (repeat) the image in case it is too small for the screen.\n"}, "example": {"_type": "literalExpression", "text": "\"fill\""}, "loc": ["services", "xserver", "desktopManager", "wallpaper", "mode"], "readOnly": false, "type": "one of \"center\", \"fill\", \"max\", \"scale\", \"tile\""}, "services.xserver.desktopManager.xfce.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/xfce.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the Xfce desktop environment."}, "loc": ["services", "xserver", "desktopManager", "xfce", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.xfce.enableScreensaver": {"declarations": ["nixos/modules/services/x11/desktop-managers/xfce.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable the XFCE screensaver."}, "loc": ["services", "xserver", "desktopManager", "xfce", "enableScreensaver"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.xfce.enableXfwm": {"declarations": ["nixos/modules/services/x11/desktop-managers/xfce.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable the XFWM (default) window manager."}, "loc": ["services", "xserver", "desktopManager", "xfce", "enableXfwm"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.xfce.noDesktop": {"declarations": ["nixos/modules/services/x11/desktop-managers/xfce.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Don't install XFCE desktop components (xfdesktop and panel)."}, "loc": ["services", "xserver", "desktopManager", "xfce", "noDesktop"], "readOnly": false, "type": "boolean"}, "services.xserver.desktopManager.xterm.enable": {"declarations": ["nixos/modules/services/x11/desktop-managers/xterm.nix"], "default": {"_type": "literalExpression", "text": "versionOlder config.system.stateVersion \"19.09\" && config.services.xserver.enable;"}, "description": {"_type": "mdDoc", "text": "Enable a xterm terminal as a desktop manager."}, "loc": ["services", "xserver", "desktopManager", "xterm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.digimend.enable": {"declarations": ["nixos/modules/services/x11/hardware/digimend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the digimend drivers for Huion/XP-Pen/etc. tablets."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "digimend", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.autoLogin": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Auto login configuration attrset.\n"}, "loc": ["services", "xserver", "displayManager", "autoLogin"], "readOnly": false, "type": "submodule"}, "services.xserver.displayManager.autoLogin.enable": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalExpression", "text": "config.services.xserver.displayManager.autoLogin.user != null"}, "description": {"_type": "mdDoc", "text": "Automatically log in as {option}`autoLogin.user`.\n"}, "loc": ["services", "xserver", "displayManager", "autoLogin", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.autoLogin.user": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "User to be used for the automatic login.\n"}, "loc": ["services", "xserver", "displayManager", "autoLogin", "user"], "readOnly": false, "type": "null or string"}, "services.xserver.displayManager.defaultSession": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalMD", "text": "Taken from display manager settings or window manager settings, if either is set.\n"}, "description": {"_type": "mdDoc", "text": "Graphical session to pre-select in the session chooser (only effective for GDM, LightDM and SDDM).\n\nOn GDM, LightDM and SDDM, it will also be used as a session for auto-login.\n"}, "example": {"_type": "literalExpression", "text": "\"gnome\""}, "loc": ["services", "xserver", "displayManager", "defaultSession"], "readOnly": false, "type": "session name"}, "services.xserver.displayManager.gdm.autoLogin.delay": {"declarations": ["nixos/modules/services/x11/display-managers/gdm.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Seconds of inactivity after which the autologin will be performed.\n"}, "loc": ["services", "xserver", "displayManager", "gdm", "autoLogin", "delay"], "readOnly": false, "type": "signed integer"}, "services.xserver.displayManager.gdm.autoSuspend": {"declarations": ["nixos/modules/services/x11/display-managers/gdm.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "On the GNOME Display Manager login screen, suspend the machine after inactivity.\n(Does not affect automatic suspend while logged in, or at lock screen.)\n"}, "loc": ["services", "xserver", "displayManager", "gdm", "autoSuspend"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.gdm.debug": {"declarations": ["nixos/modules/services/x11/display-managers/gdm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable debugging messages in GDM."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "displayManager", "gdm", "debug"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.gdm.enable": {"declarations": ["nixos/modules/services/x11/display-managers/gdm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable GDM, the GNOME Display Manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "displayManager", "gdm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.gdm.settings": {"declarations": ["nixos/modules/services/x11/display-managers/gdm.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Options passed to the gdm daemon.\nSee [here](https://help.gnome.org/admin/gdm/stable/configuration.html.en#daemonconfig) for supported options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  debug = {\n    enable = true;\n  };\n}"}, "loc": ["services", "xserver", "displayManager", "gdm", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.xserver.displayManager.gdm.wayland": {"declarations": ["nixos/modules/services/x11/display-managers/gdm.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow GDM to run on Wayland instead of Xserver.\n"}, "loc": ["services", "xserver", "displayManager", "gdm", "wayland"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.hiddenUsers": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"nobody\"\n]"}, "description": {"_type": "mdDoc", "text": "A list of users which will not be shown in the display manager.\n"}, "loc": ["services", "xserver", "displayManager", "hiddenUsers"], "readOnly": false, "type": "list of string"}, "services.xserver.displayManager.job.environment": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional environment variables needed by the display manager."}, "loc": ["services", "xserver", "displayManager", "job", "environment"], "readOnly": false, "type": "attribute set of unspecified value"}, "services.xserver.displayManager.job.execCmd": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "description": {"_type": "mdDoc", "text": "Command to start the display manager."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.lightdm}/bin/lightdm\""}, "loc": ["services", "xserver", "displayManager", "job", "execCmd"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.job.logToFile": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the display manager redirects the output of the\nsession script to {file}`~/.xsession-errors`.\n"}, "loc": ["services", "xserver", "displayManager", "job", "logToFile"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.job.logToJournal": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the display manager redirects the output of the\nsession script to the systemd journal.\n"}, "loc": ["services", "xserver", "displayManager", "job", "logToJournal"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.job.preStart": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Script executed before the display manager is started."}, "example": {"_type": "literalExpression", "text": "\"rm -f /var/log/my-display-manager.log\""}, "loc": ["services", "xserver", "displayManager", "job", "preStart"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.displayManager.lightdm.autoLogin.timeout": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Show the greeter for this many seconds before automatic login occurs.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "autoLogin", "timeout"], "readOnly": false, "type": "signed integer"}, "services.xserver.displayManager.lightdm.background": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm.nix"], "default": {"_type": "literalExpression", "text": "pkgs.nixos-artwork.wallpapers.simple-dark-gray-bottom.gnomeFilePath"}, "description": {"_type": "mdDoc", "text": "The background image or color to use.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "background"], "readOnly": false, "type": "path or string matching the pattern ^#[0-9]{6}$"}, "services.xserver.displayManager.lightdm.enable": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable lightdm as the display manager.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.lightdm.extraConfig": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to append to LightDM section."}, "example": {"_type": "literalExpression", "text": "''\n  user-authority-in-system-dir = true\n''"}, "loc": ["services", "xserver", "displayManager", "lightdm", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.displayManager.lightdm.extraSeatDefaults": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to append to SeatDefaults section."}, "example": {"_type": "literalExpression", "text": "''\n  greeter-show-manual-login=true\n''"}, "loc": ["services", "xserver", "displayManager", "lightdm", "extraSeatDefaults"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.displayManager.lightdm.greeter.enable": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, run lightdm in greeterless mode. This only works if autologin\nis enabled and autoLogin.timeout is zero.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeter", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.lightdm.greeter.name": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm.nix"], "description": {"_type": "mdDoc", "text": "The name of a .desktop file in the directory specified\nin the 'package' option.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeter", "name"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.lightdm.greeter.package": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm.nix"], "description": {"_type": "mdDoc", "text": "The LightDM greeter to login via. The package should be a directory\ncontaining a .desktop file matching the name in the 'name' option.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeter", "package"], "readOnly": false, "type": "package"}, "services.xserver.displayManager.lightdm.greeters.enso.blur": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/enso-os.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to enable blur\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "enso", "blur"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.lightdm.greeters.enso.brightness": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/enso-os.nix"], "default": {"_type": "literalExpression", "text": "7"}, "description": {"_type": "mdDoc", "text": "Brightness\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "enso", "brightness"], "readOnly": false, "type": "signed integer"}, "services.xserver.displayManager.lightdm.greeters.enso.cursorTheme.name": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/enso-os.nix"], "default": {"_type": "literalExpression", "text": "\"capitane-cursors\""}, "description": {"_type": "mdDoc", "text": "Name of the cursor theme to use for the lightdm-enso-os-greeter\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "enso", "cursorTheme", "name"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.lightdm.greeters.enso.cursorTheme.package": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/enso-os.nix"], "default": {"_type": "literalExpression", "text": "pkgs.capitaine-cursors"}, "description": {"_type": "mdDoc", "text": "The package path that contains the cursor theme given in the name option.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "enso", "cursorTheme", "package"], "readOnly": false, "type": "package"}, "services.xserver.displayManager.lightdm.greeters.enso.enable": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/enso-os.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable enso-os-greeter as the lightdm greeter\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "enso", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.lightdm.greeters.enso.extraConfig": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/enso-os.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration that should be put in the greeter.conf\nconfiguration file\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "enso", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.displayManager.lightdm.greeters.enso.iconTheme.name": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/enso-os.nix"], "default": {"_type": "literalExpression", "text": "\"ePapirus\""}, "description": {"_type": "mdDoc", "text": "Name of the icon theme to use for the lightdm-enso-os-greeter\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "enso", "iconTheme", "name"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.lightdm.greeters.enso.iconTheme.package": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/enso-os.nix"], "default": {"_type": "literalExpression", "text": "pkgs.papirus-icon-theme"}, "description": {"_type": "mdDoc", "text": "The package path that contains the icon theme given in the name option.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "enso", "iconTheme", "package"], "readOnly": false, "type": "package"}, "services.xserver.displayManager.lightdm.greeters.enso.theme.name": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/enso-os.nix"], "default": {"_type": "literalExpression", "text": "\"Adwaita\""}, "description": {"_type": "mdDoc", "text": "Name of the theme to use for the lightdm-enso-os-greeter\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "enso", "theme", "name"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.lightdm.greeters.enso.theme.package": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/enso-os.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gnome.gnome-themes-extra"}, "description": {"_type": "mdDoc", "text": "The package path that contains the theme given in the name option.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "enso", "theme", "package"], "readOnly": false, "type": "package"}, "services.xserver.displayManager.lightdm.greeters.gtk.clock-format": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Clock format string (as expected by strftime, e.g. \"%H:%M\")\nto use with the lightdm gtk greeter panel.\n\nIf set to null the default clock format is used.\n"}, "example": {"_type": "literalExpression", "text": "\"%F\""}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "gtk", "clock-format"], "readOnly": false, "type": "null or string"}, "services.xserver.displayManager.lightdm.greeters.gtk.cursorTheme.name": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix"], "default": {"_type": "literalExpression", "text": "\"Adwaita\""}, "description": {"_type": "mdDoc", "text": "Name of the cursor theme to use for the lightdm-gtk-greeter.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "gtk", "cursorTheme", "name"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.lightdm.greeters.gtk.cursorTheme.package": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gnome.adwaita-icon-theme"}, "description": {"_type": "mdDoc", "text": "The package path that contains the cursor theme given in the name option.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "gtk", "cursorTheme", "package"], "readOnly": false, "type": "package"}, "services.xserver.displayManager.lightdm.greeters.gtk.cursorTheme.size": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix"], "default": {"_type": "literalExpression", "text": "16"}, "description": {"_type": "mdDoc", "text": "Size of the cursor theme to use for the lightdm-gtk-greeter.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "gtk", "cursorTheme", "size"], "readOnly": false, "type": "signed integer"}, "services.xserver.displayManager.lightdm.greeters.gtk.enable": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable lightdm-gtk-greeter as the lightdm greeter.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "gtk", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.lightdm.greeters.gtk.extraConfig": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration that should be put in the lightdm-gtk-greeter.conf\nconfiguration file.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "gtk", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.displayManager.lightdm.greeters.gtk.iconTheme.name": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix"], "default": {"_type": "literalExpression", "text": "\"Adwaita\""}, "description": {"_type": "mdDoc", "text": "Name of the icon theme to use for the lightdm-gtk-greeter.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "gtk", "iconTheme", "name"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.lightdm.greeters.gtk.iconTheme.package": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gnome.adwaita-icon-theme"}, "description": {"_type": "mdDoc", "text": "The package path that contains the icon theme given in the name option.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "gtk", "iconTheme", "package"], "readOnly": false, "type": "package"}, "services.xserver.displayManager.lightdm.greeters.gtk.indicators": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of allowed indicator modules to use for the lightdm gtk\ngreeter panel.\n\nBuilt-in indicators include \"~a11y\", \"~language\", \"~session\",\n\"~power\", \"~clock\", \"~host\", \"~spacer\". Unity indicators can be\nrepresented by short name (e.g. \"sound\", \"power\"), service file name,\nor absolute path.\n\nIf set to null the default indicators are used.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"~host\"\n  \"~spacer\"\n  \"~clock\"\n  \"~spacer\"\n  \"~session\"\n  \"~language\"\n  \"~a11y\"\n  \"~power\"\n]"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "gtk", "indicators"], "readOnly": false, "type": "null or (list of string)"}, "services.xserver.displayManager.lightdm.greeters.gtk.theme.name": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix"], "default": {"_type": "literalExpression", "text": "\"Adwaita\""}, "description": {"_type": "mdDoc", "text": "Name of the theme to use for the lightdm-gtk-greeter.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "gtk", "theme", "name"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.lightdm.greeters.gtk.theme.package": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/gtk.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gnome.gnome-themes-extra"}, "description": {"_type": "mdDoc", "text": "The package path that contains the theme given in the name option.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "gtk", "theme", "package"], "readOnly": false, "type": "package"}, "services.xserver.displayManager.lightdm.greeters.mini.enable": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/mini.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable lightdm-mini-greeter as the lightdm greeter.\n\nNote that this greeter starts only the default X session.\nYou can configure the default X session using\n[](#opt-services.xserver.displayManager.defaultSession).\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "mini", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.lightdm.greeters.mini.extraConfig": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/mini.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration that should be put in the lightdm-mini-greeter.conf\nconfiguration file.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "mini", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.displayManager.lightdm.greeters.mini.user": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/mini.nix"], "default": {"_type": "literalExpression", "text": "\"root\""}, "description": {"_type": "mdDoc", "text": "The user to login as.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "mini", "user"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.lightdm.greeters.mobile.enable": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/mobile.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable lightdm-mobile-greeter as the lightdm greeter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "mobile", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.lightdm.greeters.pantheon.enable": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/pantheon.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable elementary-greeter as the lightdm greeter.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "pantheon", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.lightdm.greeters.slick.cursorTheme.name": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/slick.nix"], "default": {"_type": "literalExpression", "text": "\"Adwaita\""}, "description": {"_type": "mdDoc", "text": "Name of the cursor theme to use for the lightdm-slick-greeter.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "slick", "cursorTheme", "name"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.lightdm.greeters.slick.cursorTheme.package": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/slick.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gnome.adwaita-icon-theme"}, "description": {"_type": "mdDoc", "text": "The package path that contains the cursor theme given in the name option.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "slick", "cursorTheme", "package"], "readOnly": false, "type": "package"}, "services.xserver.displayManager.lightdm.greeters.slick.cursorTheme.size": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/slick.nix"], "default": {"_type": "literalExpression", "text": "24"}, "description": {"_type": "mdDoc", "text": "Size of the cursor theme to use for the lightdm-slick-greeter.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "slick", "cursorTheme", "size"], "readOnly": false, "type": "signed integer"}, "services.xserver.displayManager.lightdm.greeters.slick.draw-user-backgrounds": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/slick.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable draw user backgrounds."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "slick", "draw-user-backgrounds"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.lightdm.greeters.slick.enable": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/slick.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable lightdm-slick-greeter as the lightdm greeter."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "slick", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.lightdm.greeters.slick.extraConfig": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/slick.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration that should be put in the lightdm-slick-greeter.conf\nconfiguration file.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "slick", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.displayManager.lightdm.greeters.slick.font.name": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/slick.nix"], "default": {"_type": "literalExpression", "text": "\"Ubuntu 11\""}, "description": {"_type": "mdDoc", "text": "Name of the font to use.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "slick", "font", "name"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.lightdm.greeters.slick.font.package": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/slick.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ubuntu_font_family"}, "description": {"_type": "mdDoc", "text": "The package path that contains the font given in the name option.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "slick", "font", "package"], "readOnly": false, "type": "package"}, "services.xserver.displayManager.lightdm.greeters.slick.iconTheme.name": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/slick.nix"], "default": {"_type": "literalExpression", "text": "\"Adwaita\""}, "description": {"_type": "mdDoc", "text": "Name of the icon theme to use for the lightdm-slick-greeter.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "slick", "iconTheme", "name"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.lightdm.greeters.slick.iconTheme.package": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/slick.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gnome.adwaita-icon-theme"}, "description": {"_type": "mdDoc", "text": "The package path that contains the icon theme given in the name option.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "slick", "iconTheme", "package"], "readOnly": false, "type": "package"}, "services.xserver.displayManager.lightdm.greeters.slick.theme.name": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/slick.nix"], "default": {"_type": "literalExpression", "text": "\"Adwaita\""}, "description": {"_type": "mdDoc", "text": "Name of the theme to use for the lightdm-slick-greeter.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "slick", "theme", "name"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.lightdm.greeters.slick.theme.package": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/slick.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gnome.gnome-themes-extra"}, "description": {"_type": "mdDoc", "text": "The package path that contains the theme given in the name option.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "slick", "theme", "package"], "readOnly": false, "type": "package"}, "services.xserver.displayManager.lightdm.greeters.tiny.enable": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/tiny.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable lightdm-tiny-greeter as the lightdm greeter.\n\nNote that this greeter starts only the default X session.\nYou can configure the default X session using\n[](#opt-services.xserver.displayManager.defaultSession).\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "tiny", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.lightdm.greeters.tiny.extraConfig": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/tiny.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Section to describe style and ui.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "tiny", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.displayManager.lightdm.greeters.tiny.label.pass": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/tiny.nix"], "default": {"_type": "literalExpression", "text": "\"Password\""}, "description": {"_type": "mdDoc", "text": "The string to represent the pass_text label.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "tiny", "label", "pass"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.lightdm.greeters.tiny.label.user": {"declarations": ["nixos/modules/services/x11/display-managers/lightdm-greeters/tiny.nix"], "default": {"_type": "literalExpression", "text": "\"Username\""}, "description": {"_type": "mdDoc", "text": "The string to represent the user_text label.\n"}, "loc": ["services", "xserver", "displayManager", "lightdm", "greeters", "tiny", "label", "user"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.sddm.autoLogin.minimumUid": {"declarations": ["nixos/modules/services/x11/display-managers/sddm.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Minimum user ID for auto-login user.\n"}, "loc": ["services", "xserver", "displayManager", "sddm", "autoLogin", "minimumUid"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.xserver.displayManager.sddm.autoLogin.relogin": {"declarations": ["nixos/modules/services/x11/display-managers/sddm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If true automatic login will kick in again on session exit (logout), otherwise it\nwill only log in automatically when the display-manager is started.\n"}, "loc": ["services", "xserver", "displayManager", "sddm", "autoLogin", "relogin"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.sddm.autoNumlock": {"declarations": ["nixos/modules/services/x11/display-managers/sddm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable numlock at login.\n"}, "loc": ["services", "xserver", "displayManager", "sddm", "autoNumlock"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.sddm.enable": {"declarations": ["nixos/modules/services/x11/display-managers/sddm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sddm as the display manager.\n"}, "loc": ["services", "xserver", "displayManager", "sddm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.sddm.enableHidpi": {"declarations": ["nixos/modules/services/x11/display-managers/sddm.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable automatic HiDPI mode.\n"}, "loc": ["services", "xserver", "displayManager", "sddm", "enableHidpi"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.sddm.settings": {"declarations": ["nixos/modules/services/x11/display-managers/sddm.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra settings merged in and overwriting defaults in sddm.conf.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Autologin = {\n    Session = \"plasma.desktop\";\n    User = \"john\";\n  };\n}"}, "loc": ["services", "xserver", "displayManager", "sddm", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.xserver.displayManager.sddm.setupScript": {"declarations": ["nixos/modules/services/x11/display-managers/sddm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "A script to execute when starting the display server. DEPRECATED, please\nuse {option}`services.xserver.displayManager.setupCommands`.\n"}, "example": {"_type": "literalExpression", "text": "''\n  # workaround for using NVIDIA Optimus without Bumblebee\n  xrandr --setprovideroutputsource modesetting NVIDIA-0\n  xrandr --auto\n''"}, "loc": ["services", "xserver", "displayManager", "sddm", "setupScript"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.sddm.stopScript": {"declarations": ["nixos/modules/services/x11/display-managers/sddm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "A script to execute when stopping the display server.\n"}, "loc": ["services", "xserver", "displayManager", "sddm", "stopScript"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.sddm.theme": {"declarations": ["nixos/modules/services/x11/display-managers/sddm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Greeter theme to use.\n"}, "loc": ["services", "xserver", "displayManager", "sddm", "theme"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.session": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of sessions supported with the command used to start each\nsession.  Each session script can set the\n{var}`waitPID` shell variable to make this script\nwait until the end of the user session.  Each script is used\nto define either a window manager or a desktop manager.  These\ncan be differentiated by setting the attribute\n{var}`manage` either to `\"window\"`\nor `\"desktop\"`.\n\nThe list of desktop manager and window manager should appear\ninside the display manager with the desktop manager name\nfollowed by the window manager name.\n"}, "example": {"_type": "literalExpression", "text": "[ { manage = \"desktop\";\n    name = \"xterm\";\n    start = ''\n      ${pkgs.xterm}/bin/xterm -ls &\n      waitPID=$!\n    '';\n  }\n]\n"}, "loc": ["services", "xserver", "displayManager", "session"], "readOnly": false, "type": "list of (attribute set)"}, "services.xserver.displayManager.sessionCommands": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed just before the window or desktop manager is\nstarted. These commands are not currently sourced for Wayland sessions.\n"}, "example": {"_type": "literalExpression", "text": "''\n  xmessage \"Hello World!\" &\n''"}, "loc": ["services", "xserver", "displayManager", "sessionCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.displayManager.sessionPackages": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of packages containing x11 or wayland session files to be passed to the display manager.\n"}, "loc": ["services", "xserver", "displayManager", "sessionPackages"], "readOnly": false, "type": "list of package with provided sessions"}, "services.xserver.displayManager.setupCommands": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed just after the X server has started.\n\nThis option is only effective for display managers for which this feature\nis supported; currently these are LightDM, GDM and SDDM.\n"}, "loc": ["services", "xserver", "displayManager", "setupCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.displayManager.startx.enable": {"declarations": ["nixos/modules/services/x11/display-managers/startx.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the dummy \"startx\" pseudo-display manager,\nwhich allows users to start X manually via the \"startx\" command\nfrom a vt shell. The X server runs under the user's id, not as root.\nThe user must provide a ~/.xinitrc file containing session startup\ncommands, see startx(1). This is not automatically generated\nfrom the desktopManager and windowManager settings.\n"}, "loc": ["services", "xserver", "displayManager", "startx", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.sx.enable": {"declarations": ["nixos/modules/services/x11/display-managers/sx.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the \"sx\" pseudo-display manager, which allows users\nto start manually via the \"sx\" command from a vt shell. The X server\nruns under the user's id, not as root. The user must provide a\n~/.config/sx/sxrc file containing session startup commands, see\nsx(1). This is not automatically generated from the desktopManager\nand windowManager settings. sx doesn't have a way to directly set\nX server flags, but it can be done by overriding its xorgserver\ndependency.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "displayManager", "sx", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.xpra.auth": {"declarations": ["nixos/modules/services/x11/display-managers/xpra.nix"], "default": {"_type": "literalExpression", "text": "\"pam\""}, "description": {"_type": "mdDoc", "text": "Authentication to use when connecting to xpra"}, "example": {"_type": "literalExpression", "text": "\"password:value=mysecret\""}, "loc": ["services", "xserver", "displayManager", "xpra", "auth"], "readOnly": false, "type": "string"}, "services.xserver.displayManager.xpra.bindTcp": {"declarations": ["nixos/modules/services/x11/display-managers/xpra.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1:10000\""}, "description": {"_type": "mdDoc", "text": "Bind xpra to TCP"}, "example": {"_type": "literalExpression", "text": "\"0.0.0.0:10000\""}, "loc": ["services", "xserver", "displayManager", "xpra", "bindTcp"], "readOnly": false, "type": "null or string"}, "services.xserver.displayManager.xpra.desktop": {"declarations": ["nixos/modules/services/x11/display-managers/xpra.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Start a desktop environment instead of seamless mode"}, "example": {"_type": "literalExpression", "text": "\"gnome-shell\""}, "loc": ["services", "xserver", "displayManager", "xpra", "desktop"], "readOnly": false, "type": "null or string"}, "services.xserver.displayManager.xpra.enable": {"declarations": ["nixos/modules/services/x11/display-managers/xpra.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable xpra as display manager."}, "loc": ["services", "xserver", "displayManager", "xpra", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.xpra.extraOptions": {"declarations": ["nixos/modules/services/x11/display-managers/xpra.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra xpra options"}, "loc": ["services", "xserver", "displayManager", "xpra", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.xserver.displayManager.xpra.pulseaudio": {"declarations": ["nixos/modules/services/x11/display-managers/xpra.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable pulseaudio audio streaming."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "displayManager", "xpra", "pulseaudio"], "readOnly": false, "type": "boolean"}, "services.xserver.displayManager.xserverArgs": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of arguments for the X server."}, "example": {"_type": "literalExpression", "text": "[\n  \"-ac\"\n  \"-logverbose\"\n  \"-verbose\"\n  \"-nolisten tcp\"\n]"}, "loc": ["services", "xserver", "displayManager", "xserverArgs"], "readOnly": false, "type": "list of string"}, "services.xserver.displayManager.xserverBin": {"declarations": ["nixos/modules/services/x11/display-managers/default.nix"], "description": {"_type": "mdDoc", "text": "Path to the X server used by display managers."}, "loc": ["services", "xserver", "displayManager", "xserverBin"], "readOnly": false, "type": "path"}, "services.xserver.extraLayouts": {"declarations": ["nixos/modules/services/x11/extra-layouts.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra custom layouts that will be included in the xkb configuration.\nInformation on how to create a new layout can be found here:\n<https://www.x.org/releases/current/doc/xorg-docs/input/XKB-Enhancing.html#Defining_New_Layouts>.\nFor more examples see\n<https://wiki.archlinux.org/index.php/X_KeyBoard_extension#Basic_examples>\n"}, "example": {"_type": "literalExpression", "text": "{\n  mine = {\n    description = \"My custom xkb layout.\";\n    languages = [ \"eng\" ];\n    symbolsFile = /path/to/my/layout;\n  };\n}\n"}, "loc": ["services", "xserver", "extraLayouts"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.xserver.extraLayouts.<name>.compatFile": {"declarations": ["nixos/modules/services/x11/extra-layouts.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the xkb compat file.\nThis file sets the compatibility state, used to preserve\ncompatibility with xkb-unaware programs.\nIt must contain a `xkb_compat \"name\" { ... }` block.\n"}, "loc": ["services", "xserver", "extraLayouts", "<name>", "compatFile"], "readOnly": false, "type": "null or path"}, "services.xserver.extraLayouts.<name>.description": {"declarations": ["nixos/modules/services/x11/extra-layouts.nix"], "description": {"_type": "mdDoc", "text": "A short description of the layout."}, "loc": ["services", "xserver", "extraLayouts", "<name>", "description"], "readOnly": false, "type": "string"}, "services.xserver.extraLayouts.<name>.geometryFile": {"declarations": ["nixos/modules/services/x11/extra-layouts.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the xkb geometry file.\nThis (completely optional) file describes the physical layout of\nkeyboard, which maybe be used by programs to depict it.\nIt must contain a `xkb_geometry \"name\" { ... }` block.\n"}, "loc": ["services", "xserver", "extraLayouts", "<name>", "geometryFile"], "readOnly": false, "type": "null or path"}, "services.xserver.extraLayouts.<name>.keycodesFile": {"declarations": ["nixos/modules/services/x11/extra-layouts.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the xkb keycodes file.\nThis file specifies the range and the interpretation of the raw\nkeycodes sent by the keyboard.\nIt must contain a `xkb_keycodes \"name\" { ... }` block.\n"}, "loc": ["services", "xserver", "extraLayouts", "<name>", "keycodesFile"], "readOnly": false, "type": "null or path"}, "services.xserver.extraLayouts.<name>.languages": {"declarations": ["nixos/modules/services/x11/extra-layouts.nix"], "description": {"_type": "mdDoc", "text": "A list of languages provided by the layout.\n(Use ISO 639-2 codes, for example: \"eng\" for english)\n"}, "loc": ["services", "xserver", "extraLayouts", "<name>", "languages"], "readOnly": false, "type": "list of string"}, "services.xserver.extraLayouts.<name>.symbolsFile": {"declarations": ["nixos/modules/services/x11/extra-layouts.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the xkb symbols file.\nThis is the most important file: it defines which symbol or action\nmaps to each key and must contain a\n`xkb_symbols \"name\" { ... }` block.\n"}, "loc": ["services", "xserver", "extraLayouts", "<name>", "symbolsFile"], "readOnly": false, "type": "null or path"}, "services.xserver.extraLayouts.<name>.typesFile": {"declarations": ["nixos/modules/services/x11/extra-layouts.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to the xkb types file.\nThis file specifies the key types that can be associated with\nthe various keyboard keys.\nIt must contain a `xkb_types \"name\" { ... }` block.\n"}, "loc": ["services", "xserver", "extraLayouts", "<name>", "typesFile"], "readOnly": false, "type": "null or path"}, "services.xserver.gdk-pixbuf.modulePackages": {"declarations": ["nixos/modules/services/x11/gdk-pixbuf.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages providing GDK-Pixbuf modules, for cache generation."}, "loc": ["services", "xserver", "gdk-pixbuf", "modulePackages"], "readOnly": false, "type": "list of package"}, "services.xserver.imwheel.enable": {"declarations": ["nixos/modules/services/x11/imwheel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable IMWheel service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "imwheel", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.imwheel.extraOptions": {"declarations": ["nixos/modules/services/x11/imwheel.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"--buttons=45\"\n]"}, "description": {"_type": "mdDoc", "text": "Additional command-line arguments to pass to\n{command}`imwheel`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--debug\"\n]"}, "loc": ["services", "xserver", "imwheel", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.xserver.imwheel.rules": {"declarations": ["nixos/modules/services/x11/imwheel.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Window class translation rules.\n/etc/X11/imwheelrc is generated based on this config\nwhich means this config is global for all users.\nSee [official man pages](http://imwheel.sourceforge.net/imwheel.1.html)\nfor more information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \".*\" = ''\n    None,      Up,   Button4, 8\n    None,      Down, Button5, 8\n    Shift_L,   Up,   Shift_L|Button4, 4\n    Shift_L,   Down, Shift_L|Button5, 4\n    Control_L, Up,   Control_L|Button4\n    Control_L, Down, Control_L|Button5\n  '';\n}\n"}, "loc": ["services", "xserver", "imwheel", "rules"], "readOnly": false, "type": "attribute set of string"}, "services.xserver.libinput.enable": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "config.services.xserver.enable"}, "description": {"_type": "mdDoc", "text": "Whether to enable libinput."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "libinput", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.mouse.accelProfile": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "\"adaptive\""}, "description": {"_type": "mdDoc", "text": "Sets the pointer acceleration profile to the given profile.\nPermitted values are `adaptive`, `flat`.\nNot all devices support this option or all profiles.\nIf a profile is unsupported, the default profile for this is used.\n`flat`: Pointer motion is accelerated by a constant\n(device-specific) factor, depending on the current speed.\n`adaptive`: Pointer acceleration depends on the input speed.\nThis is the default profile for most devices.\n"}, "example": {"_type": "literalExpression", "text": "\"flat\""}, "loc": ["services", "xserver", "libinput", "mouse", "accelProfile"], "readOnly": false, "type": "one of \"flat\", \"adaptive\""}, "services.xserver.libinput.mouse.accelSpeed": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Cursor acceleration (how fast speed increases from minSpeed to maxSpeed)."}, "example": {"_type": "literalExpression", "text": "\"-0.5\""}, "loc": ["services", "xserver", "libinput", "mouse", "accelSpeed"], "readOnly": false, "type": "null or string"}, "services.xserver.libinput.mouse.additionalOptions": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional options for libinput mouse driver. See\n{manpage}`libinput(4)`\nfor available options.\";\n"}, "example": {"_type": "literalExpression", "text": "''\n  Option \"DragLockButtons\" \"L1 B1 L2 B2\"\n''"}, "loc": ["services", "xserver", "libinput", "mouse", "additionalOptions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.libinput.mouse.buttonMapping": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the logical button mapping for this device, see XSetPointerMapping(3). The string  must\nbe  a  space-separated  list  of  button mappings in the order of the logical buttons on the\ndevice, starting with button 1.  The default mapping is \"1 2 3 ... 32\". A mapping of 0 deac\u2010\ntivates the button. Multiple buttons can have the same mapping.  Invalid mapping strings are\ndiscarded and the default mapping is used for all buttons.  Buttons  not  specified  in  the\nuser's mapping use the default mapping. See section BUTTON MAPPING for more details.\n"}, "example": {"_type": "literalExpression", "text": "\"1 6 3 4 5 0 7\""}, "loc": ["services", "xserver", "libinput", "mouse", "buttonMapping"], "readOnly": false, "type": "null or string"}, "services.xserver.libinput.mouse.calibrationMatrix": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A string of 9 space-separated floating point numbers. Sets the calibration matrix to the\n3x3 matrix where the first row is (abc), the second row is (def) and the third row is (ghi).\n"}, "example": {"_type": "literalExpression", "text": "\"0.5 0 0 0 0.8 0.1 0 0 1\""}, "loc": ["services", "xserver", "libinput", "mouse", "calibrationMatrix"], "readOnly": false, "type": "null or string"}, "services.xserver.libinput.mouse.clickMethod": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Enables a click method. Permitted values are `none`,\n`buttonareas`, `clickfinger`.\nNot all devices support all methods, if an option is unsupported,\nthe default click method for this device is used.\n"}, "example": {"_type": "literalExpression", "text": "\"buttonareas\""}, "loc": ["services", "xserver", "libinput", "mouse", "clickMethod"], "readOnly": false, "type": "null or one of \"none\", \"buttonareas\", \"clickfinger\""}, "services.xserver.libinput.mouse.dev": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path for mouse device.  Set to `null` to apply to any\nauto-detected mouse.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/input/event0\""}, "loc": ["services", "xserver", "libinput", "mouse", "dev"], "readOnly": false, "type": "null or string"}, "services.xserver.libinput.mouse.disableWhileTyping": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable input method while typing.\n"}, "loc": ["services", "xserver", "libinput", "mouse", "disableWhileTyping"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.mouse.horizontalScrolling": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Disables horizontal scrolling. When disabled, this driver will discard any horizontal scroll\nevents from libinput. Note that this does not disable horizontal scrolling, it merely\ndiscards the horizontal axis from any scroll events.\n"}, "loc": ["services", "xserver", "libinput", "mouse", "horizontalScrolling"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.mouse.leftHanded": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables left-handed button orientation, i.e. swapping left and right buttons."}, "loc": ["services", "xserver", "libinput", "mouse", "leftHanded"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.mouse.middleEmulation": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enables middle button emulation. When enabled, pressing the left and right buttons\nsimultaneously produces a middle mouse button click.\n"}, "loc": ["services", "xserver", "libinput", "mouse", "middleEmulation"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.mouse.naturalScrolling": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables or disables natural scrolling behavior."}, "loc": ["services", "xserver", "libinput", "mouse", "naturalScrolling"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.mouse.scrollButton": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Designates a button as scroll button. If the ScrollMethod is button and the button is logically\nheld down, x/y axis movement is converted into scroll events.\n"}, "example": {"_type": "literalExpression", "text": "1"}, "loc": ["services", "xserver", "libinput", "mouse", "scrollButton"], "readOnly": false, "type": "null or signed integer"}, "services.xserver.libinput.mouse.scrollMethod": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "\"twofinger\""}, "description": {"_type": "mdDoc", "text": "Specify the scrolling method: `twofinger`, `edge`,\n`button`, or `none`\n"}, "example": {"_type": "literalExpression", "text": "\"edge\""}, "loc": ["services", "xserver", "libinput", "mouse", "scrollMethod"], "readOnly": false, "type": "one of \"twofinger\", \"edge\", \"button\", \"none\""}, "services.xserver.libinput.mouse.sendEventsMode": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "\"enabled\""}, "description": {"_type": "mdDoc", "text": "Sets the send events mode to `disabled`, `enabled`,\nor `disabled-on-external-mouse`\n"}, "example": {"_type": "literalExpression", "text": "\"disabled\""}, "loc": ["services", "xserver", "libinput", "mouse", "sendEventsMode"], "readOnly": false, "type": "one of \"disabled\", \"enabled\", \"disabled-on-external-mouse\""}, "services.xserver.libinput.mouse.tapping": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enables or disables tap-to-click behavior.\n"}, "loc": ["services", "xserver", "libinput", "mouse", "tapping"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.mouse.tappingButtonMap": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the button mapping for 1/2/3-finger taps to left/right/middle or left/middle/right, respectively.\n"}, "loc": ["services", "xserver", "libinput", "mouse", "tappingButtonMap"], "readOnly": false, "type": "null or one of \"lrm\", \"lmr\""}, "services.xserver.libinput.mouse.tappingDragLock": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enables or disables drag lock during tapping behavior. When enabled, a finger up during tap-\nand-drag will not immediately release the button. If the finger is set down again within the\ntimeout, the dragging process continues.\n"}, "loc": ["services", "xserver", "libinput", "mouse", "tappingDragLock"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.mouse.transformationMatrix": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A string of 9 space-separated floating point numbers. Sets the transformation matrix to\nthe 3x3 matrix where the first row is (abc), the second row is (def) and the third row is (ghi).\n"}, "example": {"_type": "literalExpression", "text": "\"0.5 0 0 0 0.8 0.1 0 0 1\""}, "loc": ["services", "xserver", "libinput", "mouse", "transformationMatrix"], "readOnly": false, "type": "null or string"}, "services.xserver.libinput.touchpad.accelProfile": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "\"adaptive\""}, "description": {"_type": "mdDoc", "text": "Sets the pointer acceleration profile to the given profile.\nPermitted values are `adaptive`, `flat`.\nNot all devices support this option or all profiles.\nIf a profile is unsupported, the default profile for this is used.\n`flat`: Pointer motion is accelerated by a constant\n(device-specific) factor, depending on the current speed.\n`adaptive`: Pointer acceleration depends on the input speed.\nThis is the default profile for most devices.\n"}, "example": {"_type": "literalExpression", "text": "\"flat\""}, "loc": ["services", "xserver", "libinput", "touchpad", "accelProfile"], "readOnly": false, "type": "one of \"flat\", \"adaptive\""}, "services.xserver.libinput.touchpad.accelSpeed": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Cursor acceleration (how fast speed increases from minSpeed to maxSpeed)."}, "example": {"_type": "literalExpression", "text": "\"-0.5\""}, "loc": ["services", "xserver", "libinput", "touchpad", "accelSpeed"], "readOnly": false, "type": "null or string"}, "services.xserver.libinput.touchpad.additionalOptions": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional options for libinput touchpad driver. See\n{manpage}`libinput(4)`\nfor available options.\";\n"}, "example": {"_type": "literalExpression", "text": "''\n  Option \"DragLockButtons\" \"L1 B1 L2 B2\"\n''"}, "loc": ["services", "xserver", "libinput", "touchpad", "additionalOptions"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.libinput.touchpad.buttonMapping": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the logical button mapping for this device, see XSetPointerMapping(3). The string  must\nbe  a  space-separated  list  of  button mappings in the order of the logical buttons on the\ndevice, starting with button 1.  The default mapping is \"1 2 3 ... 32\". A mapping of 0 deac\u2010\ntivates the button. Multiple buttons can have the same mapping.  Invalid mapping strings are\ndiscarded and the default mapping is used for all buttons.  Buttons  not  specified  in  the\nuser's mapping use the default mapping. See section BUTTON MAPPING for more details.\n"}, "example": {"_type": "literalExpression", "text": "\"1 6 3 4 5 0 7\""}, "loc": ["services", "xserver", "libinput", "touchpad", "buttonMapping"], "readOnly": false, "type": "null or string"}, "services.xserver.libinput.touchpad.calibrationMatrix": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A string of 9 space-separated floating point numbers. Sets the calibration matrix to the\n3x3 matrix where the first row is (abc), the second row is (def) and the third row is (ghi).\n"}, "example": {"_type": "literalExpression", "text": "\"0.5 0 0 0 0.8 0.1 0 0 1\""}, "loc": ["services", "xserver", "libinput", "touchpad", "calibrationMatrix"], "readOnly": false, "type": "null or string"}, "services.xserver.libinput.touchpad.clickMethod": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Enables a click method. Permitted values are `none`,\n`buttonareas`, `clickfinger`.\nNot all devices support all methods, if an option is unsupported,\nthe default click method for this device is used.\n"}, "example": {"_type": "literalExpression", "text": "\"buttonareas\""}, "loc": ["services", "xserver", "libinput", "touchpad", "clickMethod"], "readOnly": false, "type": "null or one of \"none\", \"buttonareas\", \"clickfinger\""}, "services.xserver.libinput.touchpad.dev": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path for touchpad device.  Set to `null` to apply to any\nauto-detected touchpad.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/input/event0\""}, "loc": ["services", "xserver", "libinput", "touchpad", "dev"], "readOnly": false, "type": "null or string"}, "services.xserver.libinput.touchpad.disableWhileTyping": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable input method while typing.\n"}, "loc": ["services", "xserver", "libinput", "touchpad", "disableWhileTyping"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.touchpad.horizontalScrolling": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Disables horizontal scrolling. When disabled, this driver will discard any horizontal scroll\nevents from libinput. Note that this does not disable horizontal scrolling, it merely\ndiscards the horizontal axis from any scroll events.\n"}, "loc": ["services", "xserver", "libinput", "touchpad", "horizontalScrolling"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.touchpad.leftHanded": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables left-handed button orientation, i.e. swapping left and right buttons."}, "loc": ["services", "xserver", "libinput", "touchpad", "leftHanded"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.touchpad.middleEmulation": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enables middle button emulation. When enabled, pressing the left and right buttons\nsimultaneously produces a middle mouse button click.\n"}, "loc": ["services", "xserver", "libinput", "touchpad", "middleEmulation"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.touchpad.naturalScrolling": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables or disables natural scrolling behavior."}, "loc": ["services", "xserver", "libinput", "touchpad", "naturalScrolling"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.touchpad.scrollButton": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Designates a button as scroll button. If the ScrollMethod is button and the button is logically\nheld down, x/y axis movement is converted into scroll events.\n"}, "example": {"_type": "literalExpression", "text": "1"}, "loc": ["services", "xserver", "libinput", "touchpad", "scrollButton"], "readOnly": false, "type": "null or signed integer"}, "services.xserver.libinput.touchpad.scrollMethod": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "\"twofinger\""}, "description": {"_type": "mdDoc", "text": "Specify the scrolling method: `twofinger`, `edge`,\n`button`, or `none`\n"}, "example": {"_type": "literalExpression", "text": "\"edge\""}, "loc": ["services", "xserver", "libinput", "touchpad", "scrollMethod"], "readOnly": false, "type": "one of \"twofinger\", \"edge\", \"button\", \"none\""}, "services.xserver.libinput.touchpad.sendEventsMode": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "\"enabled\""}, "description": {"_type": "mdDoc", "text": "Sets the send events mode to `disabled`, `enabled`,\nor `disabled-on-external-mouse`\n"}, "example": {"_type": "literalExpression", "text": "\"disabled\""}, "loc": ["services", "xserver", "libinput", "touchpad", "sendEventsMode"], "readOnly": false, "type": "one of \"disabled\", \"enabled\", \"disabled-on-external-mouse\""}, "services.xserver.libinput.touchpad.tapping": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enables or disables tap-to-click behavior.\n"}, "loc": ["services", "xserver", "libinput", "touchpad", "tapping"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.touchpad.tappingButtonMap": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the button mapping for 1/2/3-finger taps to left/right/middle or left/middle/right, respectively.\n"}, "loc": ["services", "xserver", "libinput", "touchpad", "tappingButtonMap"], "readOnly": false, "type": "null or one of \"lrm\", \"lmr\""}, "services.xserver.libinput.touchpad.tappingDragLock": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enables or disables drag lock during tapping behavior. When enabled, a finger up during tap-\nand-drag will not immediately release the button. If the finger is set down again within the\ntimeout, the dragging process continues.\n"}, "loc": ["services", "xserver", "libinput", "touchpad", "tappingDragLock"], "readOnly": false, "type": "boolean"}, "services.xserver.libinput.touchpad.transformationMatrix": {"declarations": ["nixos/modules/services/x11/hardware/libinput.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A string of 9 space-separated floating point numbers. Sets the transformation matrix to\nthe 3x3 matrix where the first row is (abc), the second row is (def) and the third row is (ghi).\n"}, "example": {"_type": "literalExpression", "text": "\"0.5 0 0 0 0.8 0.1 0 0 1\""}, "loc": ["services", "xserver", "libinput", "touchpad", "transformationMatrix"], "readOnly": false, "type": "null or string"}, "services.xserver.synaptics.accelFactor": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "\"0.001\""}, "description": {"_type": "mdDoc", "text": "Cursor acceleration (how fast speed increases from minSpeed to maxSpeed)."}, "loc": ["services", "xserver", "synaptics", "accelFactor"], "readOnly": false, "type": "null or string"}, "services.xserver.synaptics.additionalOptions": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional options for synaptics touchpad driver.\n"}, "example": {"_type": "literalExpression", "text": "''\n  Option \"RTCornerButton\" \"2\"\n  Option \"RBCornerButton\" \"3\"\n''"}, "loc": ["services", "xserver", "synaptics", "additionalOptions"], "readOnly": false, "type": "string"}, "services.xserver.synaptics.buttonsMap": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "[\n  1\n  2\n  3\n]"}, "description": {"_type": "mdDoc", "text": "Remap touchpad buttons."}, "example": {"_type": "literalExpression", "text": "[\n  1\n  3\n  2\n]"}, "loc": ["services", "xserver", "synaptics", "buttonsMap"], "readOnly": false, "type": "list of signed integer"}, "services.xserver.synaptics.dev": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path for touchpad device.  Set to null to apply to any\nauto-detected touchpad.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/input/event0\""}, "loc": ["services", "xserver", "synaptics", "dev"], "readOnly": false, "type": "null or string"}, "services.xserver.synaptics.enable": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable touchpad support. Deprecated: Consider services.xserver.libinput.enable."}, "loc": ["services", "xserver", "synaptics", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.synaptics.fingersMap": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "[\n  1\n  2\n  3\n]"}, "description": {"_type": "mdDoc", "text": "Remap several-fingers taps."}, "example": {"_type": "literalExpression", "text": "[\n  1\n  3\n  2\n]"}, "loc": ["services", "xserver", "synaptics", "fingersMap"], "readOnly": false, "type": "list of signed integer"}, "services.xserver.synaptics.horizEdgeScroll": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "! config.services.xserver.synaptics.horizTwoFingerScroll"}, "description": {"_type": "mdDoc", "text": "Whether to enable horizontal edge drag-scrolling."}, "loc": ["services", "xserver", "synaptics", "horizEdgeScroll"], "readOnly": false, "type": "boolean"}, "services.xserver.synaptics.horizTwoFingerScroll": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "config.services.xserver.synaptics.twoFingerScroll"}, "description": {"_type": "mdDoc", "text": "Whether to enable horizontal two-finger drag-scrolling."}, "loc": ["services", "xserver", "synaptics", "horizTwoFingerScroll"], "readOnly": false, "type": "boolean"}, "services.xserver.synaptics.horizontalScroll": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable horizontal scrolling (on touchpad)"}, "loc": ["services", "xserver", "synaptics", "horizontalScroll"], "readOnly": false, "type": "boolean"}, "services.xserver.synaptics.maxSpeed": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "\"1.0\""}, "description": {"_type": "mdDoc", "text": "Cursor speed factor for highest-speed finger motion."}, "loc": ["services", "xserver", "synaptics", "maxSpeed"], "readOnly": false, "type": "null or string"}, "services.xserver.synaptics.minSpeed": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "\"0.6\""}, "description": {"_type": "mdDoc", "text": "Cursor speed factor for precision finger motion."}, "loc": ["services", "xserver", "synaptics", "minSpeed"], "readOnly": false, "type": "null or string"}, "services.xserver.synaptics.palmDetect": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable palm detection (hardware support required)"}, "loc": ["services", "xserver", "synaptics", "palmDetect"], "readOnly": false, "type": "boolean"}, "services.xserver.synaptics.palmMinWidth": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Minimum finger width at which touch is considered a palm"}, "example": {"_type": "literalExpression", "text": "5"}, "loc": ["services", "xserver", "synaptics", "palmMinWidth"], "readOnly": false, "type": "null or signed integer"}, "services.xserver.synaptics.palmMinZ": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Minimum finger pressure at which touch is considered a palm"}, "example": {"_type": "literalExpression", "text": "20"}, "loc": ["services", "xserver", "synaptics", "palmMinZ"], "readOnly": false, "type": "null or signed integer"}, "services.xserver.synaptics.scrollDelta": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Move distance of the finger for a scroll event."}, "example": {"_type": "literalExpression", "text": "75"}, "loc": ["services", "xserver", "synaptics", "scrollDelta"], "readOnly": false, "type": "null or signed integer"}, "services.xserver.synaptics.tapButtons": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable tap buttons."}, "loc": ["services", "xserver", "synaptics", "tapButtons"], "readOnly": false, "type": "boolean"}, "services.xserver.synaptics.twoFingerScroll": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable two-finger drag-scrolling. Overridden by horizTwoFingerScroll and vertTwoFingerScroll."}, "loc": ["services", "xserver", "synaptics", "twoFingerScroll"], "readOnly": false, "type": "boolean"}, "services.xserver.synaptics.vertEdgeScroll": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "! config.services.xserver.synaptics.vertTwoFingerScroll"}, "description": {"_type": "mdDoc", "text": "Whether to enable vertical edge drag-scrolling."}, "loc": ["services", "xserver", "synaptics", "vertEdgeScroll"], "readOnly": false, "type": "boolean"}, "services.xserver.synaptics.vertTwoFingerScroll": {"declarations": ["nixos/modules/services/x11/hardware/synaptics.nix"], "default": {"_type": "literalExpression", "text": "config.services.xserver.synaptics.twoFingerScroll"}, "description": {"_type": "mdDoc", "text": "Whether to enable vertical two-finger drag-scrolling."}, "loc": ["services", "xserver", "synaptics", "vertTwoFingerScroll"], "readOnly": false, "type": "boolean"}, "services.xserver.wacom.enable": {"declarations": ["nixos/modules/services/x11/hardware/wacom.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Wacom touchscreen/digitizer/tablet.\nIf you ever have any issues such as, try switching to terminal (ctrl-alt-F1) and back\nwhich will make Xorg reconfigure the device ?\n\nIf you're not satisfied by the default behaviour you can override\n{option}`environment.etc.\"X11/xorg.conf.d/70-wacom.conf\"` in\nconfiguration.nix easily.\n"}, "loc": ["services", "xserver", "wacom", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.\"2bwm\".enable": {"declarations": ["nixos/modules/services/x11/window-managers/2bwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable 2bwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "2bwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.afterstep.enable": {"declarations": ["nixos/modules/services/x11/window-managers/afterstep.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable afterstep."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "afterstep", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.awesome.enable": {"declarations": ["nixos/modules/services/x11/window-managers/awesome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Awesome window manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "awesome", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.awesome.luaModules": {"declarations": ["nixos/modules/services/x11/window-managers/awesome.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of lua packages available for being used in the Awesome configuration."}, "example": {"_type": "literalExpression", "text": "[ pkgs.luaPackages.vicious ]"}, "loc": ["services", "xserver", "windowManager", "awesome", "luaModules"], "readOnly": false, "type": "list of package"}, "services.xserver.windowManager.awesome.noArgb": {"declarations": ["nixos/modules/services/x11/window-managers/awesome.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable client transparency support, which can be greatly detrimental to performance in some setups"}, "loc": ["services", "xserver", "windowManager", "awesome", "noArgb"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.awesome.package": {"declarations": ["nixos/modules/services/x11/window-managers/awesome.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Package to use for running the Awesome WM."}, "loc": ["services", "xserver", "windowManager", "awesome", "package"], "readOnly": false, "type": "null or package"}, "services.xserver.windowManager.berry.enable": {"declarations": ["nixos/modules/services/x11/window-managers/berry.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable berry."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "berry", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.bspwm.configFile": {"declarations": ["nixos/modules/services/x11/window-managers/bspwm.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the bspwm configuration file.\nIf null, $HOME/.config/bspwm/bspwmrc will be used.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.bspwm}/share/doc/bspwm/examples/bspwmrc\""}, "loc": ["services", "xserver", "windowManager", "bspwm", "configFile"], "readOnly": false, "type": "null or path"}, "services.xserver.windowManager.bspwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/bspwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable bspwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "bspwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.bspwm.package": {"declarations": ["nixos/modules/services/x11/window-managers/bspwm.nix"], "default": {"_type": "literalExpression", "text": "pkgs.bspwm"}, "description": {"_type": "mdDoc", "text": "bspwm package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.bspwm-unstable"}, "loc": ["services", "xserver", "windowManager", "bspwm", "package"], "readOnly": false, "type": "package"}, "services.xserver.windowManager.bspwm.sxhkd.configFile": {"declarations": ["nixos/modules/services/x11/window-managers/bspwm.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the sxhkd configuration file.\nIf null, $HOME/.config/sxhkd/sxhkdrc will be used.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.bspwm}/share/doc/bspwm/examples/sxhkdrc\""}, "loc": ["services", "xserver", "windowManager", "bspwm", "sxhkd", "configFile"], "readOnly": false, "type": "null or path"}, "services.xserver.windowManager.bspwm.sxhkd.package": {"declarations": ["nixos/modules/services/x11/window-managers/bspwm.nix"], "default": {"_type": "literalExpression", "text": "pkgs.sxhkd"}, "description": {"_type": "mdDoc", "text": "sxhkd package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.sxhkd-unstable"}, "loc": ["services", "xserver", "windowManager", "bspwm", "sxhkd", "package"], "readOnly": false, "type": "package"}, "services.xserver.windowManager.clfswm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/clfswm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable clfswm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "clfswm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.clfswm.package": {"declarations": ["nixos/modules/services/x11/window-managers/clfswm.nix"], "default": {"_type": "literalExpression", "text": "pkgs.lispPackages.clfswm"}, "description": {"_type": "mdDoc", "text": "clfswm package to use.\n"}, "loc": ["services", "xserver", "windowManager", "clfswm", "package"], "readOnly": false, "type": "package"}, "services.xserver.windowManager.cwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/cwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable cwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "cwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.default": {"declarations": ["nixos/modules/services/x11/window-managers/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "**Deprecated**, please use [](#opt-services.xserver.displayManager.defaultSession) instead.\n\nDefault window manager loaded if none have been chosen.\n"}, "example": {"_type": "literalExpression", "text": "\"wmii\""}, "loc": ["services", "xserver", "windowManager", "default"], "readOnly": false, "type": "null or string"}, "services.xserver.windowManager.dwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/dwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable dwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "dwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.dwm.package": {"declarations": ["nixos/modules/services/x11/window-managers/dwm.nix"], "default": {"_type": "literalExpression", "text": "pkgs.dwm"}, "description": {"_type": "mdDoc", "text": "dwm package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.dwm.overrideAttrs (oldAttrs: rec {\n  patches = [\n    (super.fetchpatch {\n      url = \"https://dwm.suckless.org/patches/steam/dwm-steam-6.2.diff\";\n      sha256 = \"1ld1z3fh6p5f8gr62zknx3axsinraayzxw3rz1qwg73mx2zk5y1f\";\n    })\n  ];\n})\n"}, "loc": ["services", "xserver", "windowManager", "dwm", "package"], "readOnly": false, "type": "package"}, "services.xserver.windowManager.e16.enable": {"declarations": ["nixos/modules/services/x11/window-managers/e16.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable e16."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "e16", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.evilwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/evilwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable evilwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "evilwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.exwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/exwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable exwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "exwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.exwm.enableDefaultConfig": {"declarations": ["nixos/modules/services/x11/window-managers/exwm.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable an uncustomised exwm configuration."}, "loc": ["services", "xserver", "windowManager", "exwm", "enableDefaultConfig"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.exwm.extraPackages": {"declarations": ["nixos/modules/services/x11/window-managers/exwm.nix"], "default": {"_type": "literalExpression", "text": "epkgs: []"}, "description": {"_type": "mdDoc", "text": "Extra packages available to Emacs. The value must be a\nfunction which receives the attrset defined in\n{var}`emacs.pkgs` as the sole argument.\n"}, "example": {"_type": "literalExpression", "text": "epkgs: [\n  epkgs.emms\n  epkgs.magit\n  epkgs.proofgeneral\n]\n"}, "loc": ["services", "xserver", "windowManager", "exwm", "extraPackages"], "readOnly": false, "type": "function that evaluates to a(n) list of package"}, "services.xserver.windowManager.exwm.loadScript": {"declarations": ["nixos/modules/services/x11/window-managers/exwm.nix"], "default": {"_type": "literalExpression", "text": "\"(require 'exwm)\""}, "description": {"_type": "mdDoc", "text": "Emacs lisp code to be run after loading the user's init\nfile. If enableDefaultConfig is true, this will be run\nbefore loading the default config.\n"}, "example": {"_type": "literalExpression", "text": "''\n  (require 'exwm)\n  (exwm-enable)\n''"}, "loc": ["services", "xserver", "windowManager", "exwm", "loadScript"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.windowManager.fluxbox.enable": {"declarations": ["nixos/modules/services/x11/window-managers/fluxbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable fluxbox."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "fluxbox", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.fvwm2.enable": {"declarations": ["nixos/modules/services/x11/window-managers/fvwm2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Fvwm2 window manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "fvwm2", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.fvwm2.gestures": {"declarations": ["nixos/modules/services/x11/window-managers/fvwm2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to enable libstroke for gesture support"}, "loc": ["services", "xserver", "windowManager", "fvwm2", "gestures"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.fvwm3.enable": {"declarations": ["nixos/modules/services/x11/window-managers/fvwm3.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Fvwm3 window manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "fvwm3", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.hackedbox.enable": {"declarations": ["nixos/modules/services/x11/window-managers/hackedbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable hackedbox."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "hackedbox", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.herbstluftwm.configFile": {"declarations": ["nixos/modules/services/x11/window-managers/herbstluftwm.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the herbstluftwm configuration file.  If left at the\ndefault value, $XDG_CONFIG_HOME/herbstluftwm/autostart will\nbe used.\n"}, "loc": ["services", "xserver", "windowManager", "herbstluftwm", "configFile"], "readOnly": false, "type": "null or path"}, "services.xserver.windowManager.herbstluftwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/herbstluftwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable herbstluftwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "herbstluftwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.herbstluftwm.package": {"declarations": ["nixos/modules/services/x11/window-managers/herbstluftwm.nix"], "default": {"_type": "literalExpression", "text": "pkgs.herbstluftwm"}, "description": {"_type": "mdDoc", "text": "Herbstluftwm package to use.\n"}, "loc": ["services", "xserver", "windowManager", "herbstluftwm", "package"], "readOnly": false, "type": "package"}, "services.xserver.windowManager.hypr.enable": {"declarations": ["nixos/modules/services/x11/window-managers/hypr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable hypr."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "hypr", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.i3.configFile": {"declarations": ["nixos/modules/services/x11/window-managers/i3.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the i3 configuration file.\nIf left at the default value, $HOME/.i3/config will be used.\n"}, "loc": ["services", "xserver", "windowManager", "i3", "configFile"], "readOnly": false, "type": "null or path"}, "services.xserver.windowManager.i3.enable": {"declarations": ["nixos/modules/services/x11/window-managers/i3.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable i3 window manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "i3", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.i3.extraPackages": {"declarations": ["nixos/modules/services/x11/window-managers/i3.nix"], "default": {"_type": "literalExpression", "text": "with pkgs; [\n  dmenu\n  i3status\n  i3lock\n]\n"}, "description": {"_type": "mdDoc", "text": "Extra packages to be installed system wide.\n"}, "loc": ["services", "xserver", "windowManager", "i3", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.xserver.windowManager.i3.extraSessionCommands": {"declarations": ["nixos/modules/services/x11/window-managers/i3.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed just before i3 is started.\n"}, "loc": ["services", "xserver", "windowManager", "i3", "extraSessionCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.windowManager.i3.package": {"declarations": ["nixos/modules/services/x11/window-managers/i3.nix"], "default": {"_type": "literalExpression", "text": "pkgs.i3"}, "description": {"_type": "mdDoc", "text": "i3 package to use.\n"}, "loc": ["services", "xserver", "windowManager", "i3", "package"], "readOnly": false, "type": "package"}, "services.xserver.windowManager.icewm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/icewm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable icewm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "icewm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.jwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/jwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable jwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "jwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.katriawm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/katriawm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable katriawm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "katriawm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.katriawm.package": {"declarations": ["nixos/modules/services/x11/window-managers/katriawm.nix"], "default": {"_type": "literalExpression", "text": "pkgs.katriawm"}, "description": {"_type": "mdDoc", "text": "The katriawm package to use."}, "loc": ["services", "xserver", "windowManager", "katriawm", "package"], "readOnly": false, "type": "package"}, "services.xserver.windowManager.leftwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/leftwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable leftwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "leftwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.lwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/lwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable lwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "lwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.metacity.enable": {"declarations": ["nixos/modules/services/x11/window-managers/metacity.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable metacity."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "metacity", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.mlvwm.configFile": {"declarations": ["nixos/modules/services/x11/window-managers/mlvwm.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the mlvwm configuration file.\nIf left at the default value, $HOME/.mlvwmrc will be used.\n"}, "loc": ["services", "xserver", "windowManager", "mlvwm", "configFile"], "readOnly": false, "type": "null or path"}, "services.xserver.windowManager.mlvwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/mlvwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Macintosh-like Virtual Window Manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "mlvwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.mwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/mwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable mwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "mwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.nimdow.enable": {"declarations": ["nixos/modules/services/x11/window-managers/nimdow.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nimdow."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "nimdow", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.notion.enable": {"declarations": ["nixos/modules/services/x11/window-managers/notion.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable notion."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "notion", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.openbox.enable": {"declarations": ["nixos/modules/services/x11/window-managers/openbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable openbox."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "openbox", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.pekwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/pekwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable pekwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "pekwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.qtile.backend": {"declarations": ["nixos/modules/services/x11/window-managers/qtile.nix"], "default": {"_type": "literalExpression", "text": "\"x11\""}, "description": {"_type": "mdDoc", "text": "Backend to use in qtile: `x11` or `wayland`.\n"}, "loc": ["services", "xserver", "windowManager", "qtile", "backend"], "readOnly": false, "type": "one of \"x11\", \"wayland\""}, "services.xserver.windowManager.qtile.configFile": {"declarations": ["nixos/modules/services/x11/window-managers/qtile.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the qtile configuration file.\nIf null, $XDG_CONFIG_HOME/qtile/config.py will be used.\n"}, "example": {"_type": "literalExpression", "text": "./your_config.py"}, "loc": ["services", "xserver", "windowManager", "qtile", "configFile"], "readOnly": false, "type": "null or path"}, "services.xserver.windowManager.qtile.enable": {"declarations": ["nixos/modules/services/x11/window-managers/qtile.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable qtile."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "qtile", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.qtile.extraPackages": {"declarations": ["nixos/modules/services/x11/window-managers/qtile.nix"], "default": {"_type": "literalExpression", "text": "python3Packages: with python3Packages; [];\n"}, "description": {"_type": "mdDoc", "text": "Extra Python packages available to Qtile.\nAn example would be to include `python3Packages.qtile-extras`\nfor additional unofficial widgets.\n"}, "example": {"_type": "literalExpression", "text": "python3Packages: with python3Packages; [\n  qtile-extras\n];\n"}, "loc": ["services", "xserver", "windowManager", "qtile", "extraPackages"], "readOnly": false, "type": "function that evaluates to a(n) list of package"}, "services.xserver.windowManager.qtile.package": {"declarations": ["nixos/modules/services/x11/window-managers/qtile.nix"], "default": {"_type": "literalExpression", "text": "pkgs.qtile-unwrapped"}, "description": {"_type": "mdDoc", "text": "The qtile-unwrapped package to use."}, "loc": ["services", "xserver", "windowManager", "qtile", "package"], "readOnly": false, "type": "package"}, "services.xserver.windowManager.ratpoison.enable": {"declarations": ["nixos/modules/services/x11/window-managers/ratpoison.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ratpoison."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "ratpoison", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.sawfish.enable": {"declarations": ["nixos/modules/services/x11/window-managers/sawfish.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sawfish."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "sawfish", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.smallwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/smallwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable smallwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "smallwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.spectrwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/spectrwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable spectrwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "spectrwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.stumpwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/stumpwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable stumpwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "stumpwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.tinywm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/tinywm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable tinywm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "tinywm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.twm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/twm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable twm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "twm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.windowlab.enable": {"declarations": ["nixos/modules/services/x11/window-managers/windowlab.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable windowlab."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "windowlab", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.windowmaker.enable": {"declarations": ["nixos/modules/services/x11/window-managers/windowmaker.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable windowmaker."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "windowmaker", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.wmderland.enable": {"declarations": ["nixos/modules/services/x11/window-managers/wmderland.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable wmderland."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "wmderland", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.wmderland.extraPackages": {"declarations": ["nixos/modules/services/x11/window-managers/wmderland.nix"], "default": {"_type": "literalExpression", "text": "with pkgs; [\n  rofi\n  dunst\n  light\n  hsetroot\n  feh\n  rxvt-unicode\n]\n"}, "description": {"_type": "mdDoc", "text": "Extra packages to be installed system wide.\n"}, "loc": ["services", "xserver", "windowManager", "wmderland", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.xserver.windowManager.wmderland.extraSessionCommands": {"declarations": ["nixos/modules/services/x11/window-managers/wmderland.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed just before wmderland is started.\n"}, "loc": ["services", "xserver", "windowManager", "wmderland", "extraSessionCommands"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.windowManager.wmii.enable": {"declarations": ["nixos/modules/services/x11/window-managers/wmii.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable wmii."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "wmii", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.xmonad.config": {"declarations": ["nixos/modules/services/x11/window-managers/xmonad.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration from which XMonad gets compiled. If no value is\nspecified, a vanilla xmonad binary is put in PATH, which will\nattempt to recompile and exec your xmonad config from $HOME/.xmonad.\nThis setup is then analogous to other (non-NixOS) linux distributions.\n\nIf you do set this option, you likely want to use \"launch\" as your\nentry point for xmonad (as in the example), to avoid xmonad's\nrecompilation logic on startup. Doing so will render the default\n\"mod+q\" restart key binding dysfunctional though, because that attempts\nto call your binary with the \"--restart\" command line option, unless\nyou implement that yourself. You way mant to bind \"mod+q\" to\n`(restart \"xmonad\" True)` instead, which will just restart\nxmonad from PATH. This allows e.g. switching to the new xmonad binary\nafter rebuilding your system with nixos-rebuild.\nFor the same reason, ghc is not added to the environment when this\noption is set, unless {option}`enableConfiguredRecompile` is\nset to `true`.\n\nIf you actually want to run xmonad with a config specified here, but\nalso be able to recompile and restart it from a copy of that source in\n$HOME/.xmonad on the fly, set {option}`enableConfiguredRecompile`\nto `true` and implement something like \"compileRestart\"\nfrom the example.\nThis should allow you to switch at will between the local xmonad and\nthe one NixOS puts in your PATH.\n"}, "example": {"_type": "literalExpression", "text": "''\n  import XMonad\n  import XMonad.Util.EZConfig (additionalKeys)\n  import Control.Monad (when)\n  import Text.Printf (printf)\n  import System.Posix.Process (executeFile)\n  import System.Info (arch,os)\n  import System.Environment (getArgs)\n  import System.FilePath ((</>))\n  \n  compiledConfig = printf \"xmonad-%s-%s\" arch os\n  \n  myConfig = defaultConfig\n    { modMask = mod4Mask -- Use Super instead of Alt\n    , terminal = \"urxvt\" }\n    `additionalKeys`\n    [ ( (mod4Mask,xK_r), compileRestart True)\n    , ( (mod4Mask,xK_q), restart \"xmonad\" True ) ]\n  \n  compileRestart resume = do\n    dirs  <- asks directories\n    whenX (recompile dirs True) $ do\n      when resume writeStateToFile\n      catchIO\n          ( do\n              args <- getArgs\n              executeFile (cacheDir dirs </> compiledConfig) False args Nothing\n          )\n  \n  main = getDirectories >>= launch myConfig\n  \n  --------------------------------------------\n  {- For versions before 0.17.0 use this instead -}\n  --------------------------------------------\n  -- compileRestart resume =\n  --   whenX (recompile True) $\n  --     when resume writeStateToFile\n  --       *> catchIO\n  --         ( do\n  --             dir <- getXMonadDataDir\n  --             args <- getArgs\n  --             executeFile (dir </> compiledConfig) False args Nothing\n  --         )\n  --\n  -- main = launch myConfig\n  --------------------------------------------\n  \n''"}, "loc": ["services", "xserver", "windowManager", "xmonad", "config"], "readOnly": false, "type": "null or path or string"}, "services.xserver.windowManager.xmonad.enable": {"declarations": ["nixos/modules/services/x11/window-managers/xmonad.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable xmonad."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "xmonad", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.xmonad.enableConfiguredRecompile": {"declarations": ["nixos/modules/services/x11/window-managers/xmonad.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable recompilation even if {option}`config` is set to a\nnon-null value. This adds the necessary Haskell dependencies (GHC with\npackages) to the xmonad binary's environment.\n"}, "loc": ["services", "xserver", "windowManager", "xmonad", "enableConfiguredRecompile"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.xmonad.enableContribAndExtras": {"declarations": ["nixos/modules/services/x11/window-managers/xmonad.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable xmonad-{contrib,extras} in Xmonad."}, "loc": ["services", "xserver", "windowManager", "xmonad", "enableContribAndExtras"], "readOnly": false, "type": "boolean"}, "services.xserver.windowManager.xmonad.extraPackages": {"declarations": ["nixos/modules/services/x11/window-managers/xmonad.nix"], "default": {"_type": "literalExpression", "text": "self: []"}, "description": {"_type": "mdDoc", "text": "Extra packages available to ghc when rebuilding Xmonad. The\nvalue must be a function which receives the attrset defined\nin {var}`haskellPackages` as the sole argument.\n"}, "example": {"_type": "literalExpression", "text": "haskellPackages: [\n  haskellPackages.xmonad-contrib\n  haskellPackages.monad-logger\n]\n"}, "loc": ["services", "xserver", "windowManager", "xmonad", "extraPackages"], "readOnly": false, "type": "function that evaluates to a(n) list of package"}, "services.xserver.windowManager.xmonad.ghcArgs": {"declarations": ["nixos/modules/services/x11/window-managers/xmonad.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Command line arguments passed to the compiler (ghc)\ninvocation when xmonad.config is set.\n"}, "loc": ["services", "xserver", "windowManager", "xmonad", "ghcArgs"], "readOnly": false, "type": "list of string"}, "services.xserver.windowManager.xmonad.haskellPackages": {"declarations": ["nixos/modules/services/x11/window-managers/xmonad.nix"], "default": {"_type": "literalExpression", "text": "pkgs.haskellPackages"}, "description": {"_type": "mdDoc", "text": "haskellPackages used to build Xmonad and other packages.\nThis can be used to change the GHC version used to build\nXmonad and the packages listed in\n{var}`extraPackages`.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.haskell.packages.ghc810"}, "loc": ["services", "xserver", "windowManager", "xmonad", "haskellPackages"], "readOnly": false, "type": "attribute set"}, "services.xserver.windowManager.xmonad.xmonadCliArgs": {"declarations": ["nixos/modules/services/x11/window-managers/xmonad.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Command line arguments passed to the xmonad binary.\n"}, "loc": ["services", "xserver", "windowManager", "xmonad", "xmonadCliArgs"], "readOnly": false, "type": "list of string"}, "services.xserver.windowManager.yeahwm.enable": {"declarations": ["nixos/modules/services/x11/window-managers/yeahwm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable yeahwm."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "windowManager", "yeahwm", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.xautolock.enable": {"declarations": ["nixos/modules/services/x11/xautolock.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable xautolock."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "xautolock", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.xautolock.enableNotifier": {"declarations": ["nixos/modules/services/x11/xautolock.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the notifier feature of xautolock.\nThis publishes a notification before the autolock.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xserver", "xautolock", "enableNotifier"], "readOnly": false, "type": "boolean"}, "services.xserver.xautolock.extraOptions": {"declarations": ["nixos/modules/services/x11/xautolock.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional command-line arguments to pass to\n{command}`xautolock`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-detectsleep\"\n]"}, "loc": ["services", "xserver", "xautolock", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.xserver.xautolock.killer": {"declarations": ["nixos/modules/services/x11/xautolock.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The script to use when nothing has happened for as long as {option}`killtime`\n"}, "example": {"_type": "literalExpression", "text": "\"/run/current-system/systemd/bin/systemctl suspend\""}, "loc": ["services", "xserver", "xautolock", "killer"], "readOnly": false, "type": "null or string"}, "services.xserver.xautolock.killtime": {"declarations": ["nixos/modules/services/x11/xautolock.nix"], "default": {"_type": "literalExpression", "text": "20"}, "description": {"_type": "mdDoc", "text": "Minutes xautolock waits until it executes the script specified in {option}`killer`\n(Has to be at least 10 minutes)\n"}, "loc": ["services", "xserver", "xautolock", "killtime"], "readOnly": false, "type": "signed integer"}, "services.xserver.xautolock.locker": {"declarations": ["nixos/modules/services/x11/xautolock.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.xlockmore}/bin/xlock\""}, "description": {"_type": "mdDoc", "text": "The script to use when automatically locking the computer.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.i3lock}/bin/i3lock -i /path/to/img\""}, "loc": ["services", "xserver", "xautolock", "locker"], "readOnly": false, "type": "string"}, "services.xserver.xautolock.notifier": {"declarations": ["nixos/modules/services/x11/xautolock.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Notification script to be used to warn about the pending autolock.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.libnotify}/bin/notify-send 'Locking in 10 seconds'\""}, "loc": ["services", "xserver", "xautolock", "notifier"], "readOnly": false, "type": "null or string"}, "services.xserver.xautolock.notify": {"declarations": ["nixos/modules/services/x11/xautolock.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Time (in seconds) before the actual lock when the notification about the pending lock should be published.\n"}, "loc": ["services", "xserver", "xautolock", "notify"], "readOnly": false, "type": "signed integer"}, "services.xserver.xautolock.nowlocker": {"declarations": ["nixos/modules/services/x11/xautolock.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The script to use when manually locking the computer with {command}`xautolock -locknow`.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.i3lock}/bin/i3lock -i /path/to/img\""}, "loc": ["services", "xserver", "xautolock", "nowlocker"], "readOnly": false, "type": "null or string"}, "services.xserver.xautolock.time": {"declarations": ["nixos/modules/services/x11/xautolock.nix"], "default": {"_type": "literalExpression", "text": "15"}, "description": {"_type": "mdDoc", "text": "Idle time (in minutes) to wait until xautolock locks the computer.\n"}, "loc": ["services", "xserver", "xautolock", "time"], "readOnly": false, "type": "signed integer"}, "services.xtreemfs.dir.address": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "If specified, it defines the interface to listen on. If not\nspecified, the service will listen on all interfaces (any).\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "xtreemfs", "dir", "address"], "readOnly": false, "type": "string"}, "services.xtreemfs.dir.enable": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable XtreemFS DIR service.\n"}, "loc": ["services", "xtreemfs", "dir", "enable"], "readOnly": false, "type": "boolean"}, "services.xtreemfs.dir.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration of XtreemFS DIR service.\nWARNING: configuration is saved as plaintext inside nix store.\nFor more options: http://www.xtreemfs.org/xtfs-guide-1.5.1/index.html\n"}, "example": {"_type": "literalExpression", "text": "''\n  # specify whether SSL is required\n  ssl.enabled = true\n  ssl.service_creds.pw = passphrase\n  ssl.service_creds.container = pkcs12\n  ssl.service_creds = /etc/xos/xtreemfs/truststore/certs/dir.p12\n  ssl.trusted_certs = /etc/xos/xtreemfs/truststore/certs/trusted.jks\n  ssl.trusted_certs.pw = jks_passphrase\n  ssl.trusted_certs.container = jks\n''"}, "loc": ["services", "xtreemfs", "dir", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xtreemfs.dir.httpPort": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "30638"}, "description": {"_type": "mdDoc", "text": "Specifies the listen port for the HTTP service that returns the\nstatus page.\n"}, "loc": ["services", "xtreemfs", "dir", "httpPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.xtreemfs.dir.port": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "32638"}, "description": {"_type": "mdDoc", "text": "The port to listen on for incoming connections (TCP).\n"}, "loc": ["services", "xtreemfs", "dir", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.xtreemfs.dir.replication.enable": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable XtreemFS DIR replication plugin."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xtreemfs", "dir", "replication", "enable"], "readOnly": false, "type": "boolean"}, "services.xtreemfs.dir.replication.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "description": {"_type": "mdDoc", "text": "Configuration of XtreemFS DIR replication plugin.\nWARNING: configuration is saved as plaintext inside nix store.\nFor more options: http://www.xtreemfs.org/xtfs-guide-1.5.1/index.html\n"}, "example": {"_type": "literalExpression", "text": "''\n  # participants of the replication including this replica\n  babudb.repl.participant.0 = 192.168.0.10\n  babudb.repl.participant.0.port = 35676\n  babudb.repl.participant.1 = 192.168.0.11\n  babudb.repl.participant.1.port = 35676\n  babudb.repl.participant.2 = 192.168.0.12\n  babudb.repl.participant.2.port = 35676\n  \n  # number of servers that at least have to be up to date\n  # To have a fault-tolerant system, this value has to be set to the\n  # majority of nodes i.e., if you have three replicas, set this to 2\n  # Please note that a setup with two nodes provides no fault-tolerance.\n  babudb.repl.sync.n = 2\n  \n  # specify whether SSL is required\n  babudb.ssl.enabled = true\n  \n  babudb.ssl.protocol = tlsv12\n  \n  # server credentials for SSL handshakes\n  babudb.ssl.service_creds = /etc/xos/xtreemfs/truststore/certs/osd.p12\n  babudb.ssl.service_creds.pw = passphrase\n  babudb.ssl.service_creds.container = pkcs12\n  \n  # trusted certificates for SSL handshakes\n  babudb.ssl.trusted_certs = /etc/xos/xtreemfs/truststore/certs/trusted.jks\n  babudb.ssl.trusted_certs.pw = jks_passphrase\n  babudb.ssl.trusted_certs.container = jks\n  \n  babudb.ssl.authenticationWithoutEncryption = false\n''"}, "loc": ["services", "xtreemfs", "dir", "replication", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xtreemfs.dir.syncMode": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "\"FSYNC\""}, "description": {"_type": "mdDoc", "text": "The sync mode influences how operations are committed to the disk\nlog before the operation is acknowledged to the caller.\n\n-ASYNC mode the writes to the disk log are buffered in memory by the operating system. This is the fastest mode but will lead to data loss in case of a crash, kernel panic or power failure.\n-SYNC_WRITE_METADATA opens the file with O_SYNC, the system will not buffer any writes. The operation will be acknowledged when data has been safely written to disk. This mode is slow but offers maximum data safety. However, BabuDB cannot influence the disk drive caches, this depends on the OS and hard disk model.\n-SYNC_WRITE similar to SYNC_WRITE_METADATA but opens file with O_DSYNC which means that only the data is commit to disk. This can lead to some data loss depending on the implementation of the underlying file system. Linux does not implement this mode.\n-FDATASYNC is similar to SYNC_WRITE but opens the file in asynchronous mode and calls fdatasync() after writing the data to disk.\n-FSYNC is similar to SYNC_WRITE_METADATA but opens the file in asynchronous mode and calls fsync() after writing the data to disk.\n\nFor best throughput use ASYNC, for maximum data safety use FSYNC.\n\n(If xtreemfs.dir.replication.enable is true then FDATASYNC is forced)\n"}, "example": {"_type": "literalExpression", "text": "\"FDATASYNC\""}, "loc": ["services", "xtreemfs", "dir", "syncMode"], "readOnly": false, "type": "one of \"ASYNC\", \"SYNC_WRITE_METADATA\", \"SYNC_WRITE\", \"FDATASYNC\", \"FSYNC\""}, "services.xtreemfs.dir.uuid": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "description": {"_type": "mdDoc", "text": "Must be set to a unique identifier, preferably a UUID according to\nRFC 4122. UUIDs can be generated with `uuidgen` command, found in\nthe `util-linux` package.\n"}, "example": {"_type": "literalExpression", "text": "\"eacb6bab-f444-4ebf-a06a-3f72d7465e40\""}, "loc": ["services", "xtreemfs", "dir", "uuid"], "readOnly": false, "type": "string"}, "services.xtreemfs.enable": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable XtreemFS."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xtreemfs", "enable"], "readOnly": false, "type": "boolean"}, "services.xtreemfs.homeDir": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/xtreemfs\""}, "description": {"_type": "mdDoc", "text": "XtreemFS home dir for the xtreemfs user.\n"}, "loc": ["services", "xtreemfs", "homeDir"], "readOnly": false, "type": "path"}, "services.xtreemfs.mrc.address": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "If specified, it defines the interface to listen on. If not\nspecified, the service will listen on all interfaces (any).\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "xtreemfs", "mrc", "address"], "readOnly": false, "type": "string"}, "services.xtreemfs.mrc.enable": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable XtreemFS MRC service.\n"}, "loc": ["services", "xtreemfs", "mrc", "enable"], "readOnly": false, "type": "boolean"}, "services.xtreemfs.mrc.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "description": {"_type": "mdDoc", "text": "Configuration of XtreemFS MRC service.\nWARNING: configuration is saved as plaintext inside nix store.\nFor more options: http://www.xtreemfs.org/xtfs-guide-1.5.1/index.html\n"}, "example": {"_type": "literalExpression", "text": "''\n  osd_check_interval = 300\n  no_atime = true\n  local_clock_renewal = 0\n  remote_time_sync = 30000\n  authentication_provider = org.xtreemfs.common.auth.NullAuthProvider\n  \n  # shared secret between the MRC and all OSDs\n  capability_secret = iNG8UuQJrJ6XVDTe\n  \n  dir_service.host = 192.168.0.10\n  dir_service.port = 32638\n  \n  # if replication is enabled\n  dir_service.1.host = 192.168.0.11\n  dir_service.1.port = 32638\n  dir_service.2.host = 192.168.0.12\n  dir_service.2.port = 32638\n  \n  # specify whether SSL is required\n  ssl.enabled = true\n  ssl.protocol = tlsv12\n  ssl.service_creds.pw = passphrase\n  ssl.service_creds.container = pkcs12\n  ssl.service_creds = /etc/xos/xtreemfs/truststore/certs/mrc.p12\n  ssl.trusted_certs = /etc/xos/xtreemfs/truststore/certs/trusted.jks\n  ssl.trusted_certs.pw = jks_passphrase\n  ssl.trusted_certs.container = jks\n''"}, "loc": ["services", "xtreemfs", "mrc", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xtreemfs.mrc.httpPort": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "30636"}, "description": {"_type": "mdDoc", "text": "Specifies the listen port for the HTTP service that returns the\nstatus page.\n"}, "loc": ["services", "xtreemfs", "mrc", "httpPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.xtreemfs.mrc.port": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "32636"}, "description": {"_type": "mdDoc", "text": "The port to listen on for incoming connections (TCP).\n"}, "loc": ["services", "xtreemfs", "mrc", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.xtreemfs.mrc.replication.enable": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable XtreemFS MRC replication plugin."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "xtreemfs", "mrc", "replication", "enable"], "readOnly": false, "type": "boolean"}, "services.xtreemfs.mrc.replication.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "description": {"_type": "mdDoc", "text": "Configuration of XtreemFS MRC replication plugin.\nWARNING: configuration is saved as plaintext inside nix store.\nFor more options: http://www.xtreemfs.org/xtfs-guide-1.5.1/index.html\n"}, "example": {"_type": "literalExpression", "text": "''\n  # participants of the replication including this replica\n  babudb.repl.participant.0 = 192.168.0.10\n  babudb.repl.participant.0.port = 35678\n  babudb.repl.participant.1 = 192.168.0.11\n  babudb.repl.participant.1.port = 35678\n  babudb.repl.participant.2 = 192.168.0.12\n  babudb.repl.participant.2.port = 35678\n  \n  # number of servers that at least have to be up to date\n  # To have a fault-tolerant system, this value has to be set to the\n  # majority of nodes i.e., if you have three replicas, set this to 2\n  # Please note that a setup with two nodes provides no fault-tolerance.\n  babudb.repl.sync.n = 2\n  \n  # specify whether SSL is required\n  babudb.ssl.enabled = true\n  \n  babudb.ssl.protocol = tlsv12\n  \n  # server credentials for SSL handshakes\n  babudb.ssl.service_creds = /etc/xos/xtreemfs/truststore/certs/osd.p12\n  babudb.ssl.service_creds.pw = passphrase\n  babudb.ssl.service_creds.container = pkcs12\n  \n  # trusted certificates for SSL handshakes\n  babudb.ssl.trusted_certs = /etc/xos/xtreemfs/truststore/certs/trusted.jks\n  babudb.ssl.trusted_certs.pw = jks_passphrase\n  babudb.ssl.trusted_certs.container = jks\n  \n  babudb.ssl.authenticationWithoutEncryption = false\n''"}, "loc": ["services", "xtreemfs", "mrc", "replication", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xtreemfs.mrc.syncMode": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "\"FSYNC\""}, "description": {"_type": "mdDoc", "text": "The sync mode influences how operations are committed to the disk\nlog before the operation is acknowledged to the caller.\n\n-ASYNC mode the writes to the disk log are buffered in memory by the operating system. This is the fastest mode but will lead to data loss in case of a crash, kernel panic or power failure.\n-SYNC_WRITE_METADATA opens the file with O_SYNC, the system will not buffer any writes. The operation will be acknowledged when data has been safely written to disk. This mode is slow but offers maximum data safety. However, BabuDB cannot influence the disk drive caches, this depends on the OS and hard disk model.\n-SYNC_WRITE similar to SYNC_WRITE_METADATA but opens file with O_DSYNC which means that only the data is commit to disk. This can lead to some data loss depending on the implementation of the underlying file system. Linux does not implement this mode.\n-FDATASYNC is similar to SYNC_WRITE but opens the file in asynchronous mode and calls fdatasync() after writing the data to disk.\n-FSYNC is similar to SYNC_WRITE_METADATA but opens the file in asynchronous mode and calls fsync() after writing the data to disk.\n\nFor best throughput use ASYNC, for maximum data safety use FSYNC.\n\n(If xtreemfs.mrc.replication.enable is true then FDATASYNC is forced)\n"}, "example": {"_type": "literalExpression", "text": "\"FDATASYNC\""}, "loc": ["services", "xtreemfs", "mrc", "syncMode"], "readOnly": false, "type": "one of \"ASYNC\", \"SYNC_WRITE_METADATA\", \"SYNC_WRITE\", \"FDATASYNC\", \"FSYNC\""}, "services.xtreemfs.mrc.uuid": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "description": {"_type": "mdDoc", "text": "Must be set to a unique identifier, preferably a UUID according to\nRFC 4122. UUIDs can be generated with `uuidgen` command, found in\nthe `util-linux` package.\n"}, "example": {"_type": "literalExpression", "text": "\"eacb6bab-f444-4ebf-a06a-3f72d7465e41\""}, "loc": ["services", "xtreemfs", "mrc", "uuid"], "readOnly": false, "type": "string"}, "services.xtreemfs.osd.address": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "If specified, it defines the interface to listen on. If not\nspecified, the service will listen on all interfaces (any).\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "xtreemfs", "osd", "address"], "readOnly": false, "type": "string"}, "services.xtreemfs.osd.enable": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable XtreemFS OSD service.\n"}, "loc": ["services", "xtreemfs", "osd", "enable"], "readOnly": false, "type": "boolean"}, "services.xtreemfs.osd.extraConfig": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "description": {"_type": "mdDoc", "text": "Configuration of XtreemFS OSD service.\nWARNING: configuration is saved as plaintext inside nix store.\nFor more options: http://www.xtreemfs.org/xtfs-guide-1.5.1/index.html\n"}, "example": {"_type": "literalExpression", "text": "''\n  local_clock_renewal = 0\n  remote_time_sync = 30000\n  report_free_space = true\n  capability_secret = iNG8UuQJrJ6XVDTe\n  \n  dir_service.host = 192.168.0.10\n  dir_service.port = 32638\n  \n  # if replication is used\n  dir_service.1.host = 192.168.0.11\n  dir_service.1.port = 32638\n  dir_service.2.host = 192.168.0.12\n  dir_service.2.port = 32638\n  \n  # specify whether SSL is required\n  ssl.enabled = true\n  ssl.service_creds.pw = passphrase\n  ssl.service_creds.container = pkcs12\n  ssl.service_creds = /etc/xos/xtreemfs/truststore/certs/osd.p12\n  ssl.trusted_certs = /etc/xos/xtreemfs/truststore/certs/trusted.jks\n  ssl.trusted_certs.pw = jks_passphrase\n  ssl.trusted_certs.container = jks\n''"}, "loc": ["services", "xtreemfs", "osd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xtreemfs.osd.httpPort": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "30640"}, "description": {"_type": "mdDoc", "text": "Specifies the listen port for the HTTP service that returns the\nstatus page.\n"}, "loc": ["services", "xtreemfs", "osd", "httpPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.xtreemfs.osd.port": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "default": {"_type": "literalExpression", "text": "32640"}, "description": {"_type": "mdDoc", "text": "The port to listen on for incoming connections (TCP and UDP).\n"}, "loc": ["services", "xtreemfs", "osd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.xtreemfs.osd.uuid": {"declarations": ["nixos/modules/services/network-filesystems/xtreemfs.nix"], "description": {"_type": "mdDoc", "text": "Must be set to a unique identifier, preferably a UUID according to\nRFC 4122. UUIDs can be generated with `uuidgen` command, found in\nthe `util-linux` package.\n"}, "example": {"_type": "literalExpression", "text": "\"eacb6bab-f444-4ebf-a06a-3f72d7465e42\""}, "loc": ["services", "xtreemfs", "osd", "uuid"], "readOnly": false, "type": "string"}, "services.yandex-disk.directory": {"declarations": ["nixos/modules/services/network-filesystems/yandex-disk.nix"], "default": {"_type": "literalExpression", "text": "\"/home/Yandex.Disk\""}, "description": {"_type": "mdDoc", "text": "The directory to use for Yandex.Disk storage"}, "loc": ["services", "yandex-disk", "directory"], "readOnly": false, "type": "path"}, "services.yandex-disk.enable": {"declarations": ["nixos/modules/services/network-filesystems/yandex-disk.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Yandex-disk client. See https://disk.yandex.ru/\n"}, "loc": ["services", "yandex-disk", "enable"], "readOnly": false, "type": "boolean"}, "services.yandex-disk.excludes": {"declarations": ["nixos/modules/services/network-filesystems/yandex-disk.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Comma-separated list of directories which are excluded from synchronization.\n"}, "example": {"_type": "literalExpression", "text": "\"data,backup\""}, "loc": ["services", "yandex-disk", "excludes"], "readOnly": false, "type": "strings concatenated with \",\""}, "services.yandex-disk.password": {"declarations": ["nixos/modules/services/network-filesystems/yandex-disk.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Your yandex.com password. Warning: it will be world-readable in /nix/store.\n"}, "loc": ["services", "yandex-disk", "password"], "readOnly": false, "type": "string"}, "services.yandex-disk.user": {"declarations": ["nixos/modules/services/network-filesystems/yandex-disk.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The user the yandex-disk daemon should run as.\n"}, "loc": ["services", "yandex-disk", "user"], "readOnly": false, "type": "null or string"}, "services.yandex-disk.username": {"declarations": ["nixos/modules/services/network-filesystems/yandex-disk.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Your yandex.com login name.\n"}, "loc": ["services", "yandex-disk", "username"], "readOnly": false, "type": "string"}, "services.yggdrasil.configFile": {"declarations": ["nixos/modules/services/networking/yggdrasil.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file which contains JSON or HJSON configuration for yggdrasil. See\nthe {option}`settings` option for more information.\n\nNote: This file must not be larger than 1 MB because it is passed to\nthe yggdrasil process via systemd\u2018s LoadCredential mechanism. For\ndetails, see <https://systemd.io/CREDENTIALS/> and `man 5\nsystemd.exec`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/yggdrasil.conf\""}, "loc": ["services", "yggdrasil", "configFile"], "readOnly": false, "type": "null or path"}, "services.yggdrasil.denyDhcpcdInterfaces": {"declarations": ["nixos/modules/services/networking/yggdrasil.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Disable the DHCP client for any interface whose name matches\nany of the shell glob patterns in this list.  Use this\noption to prevent the DHCP client from broadcasting requests\non the yggdrasil network.  It is only necessary to do so\nwhen yggdrasil is running in TAP mode, because TUN\ninterfaces do not support broadcasting.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"tap*\"\n]"}, "loc": ["services", "yggdrasil", "denyDhcpcdInterfaces"], "readOnly": false, "type": "list of string"}, "services.yggdrasil.enable": {"declarations": ["nixos/modules/services/networking/yggdrasil.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the yggdrasil system service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "yggdrasil", "enable"], "readOnly": false, "type": "boolean"}, "services.yggdrasil.group": {"declarations": ["nixos/modules/services/networking/yggdrasil.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Group to grant access to the Yggdrasil control socket. If `null`, only root can access the socket."}, "example": {"_type": "literalExpression", "text": "\"wheel\""}, "loc": ["services", "yggdrasil", "group"], "readOnly": false, "type": "null or string"}, "services.yggdrasil.openMulticastPort": {"declarations": ["nixos/modules/services/networking/yggdrasil.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the UDP port used for multicast peer discovery. The\nNixOS firewall blocks link-local communication, so in order to make\nincoming local peering work you will also need to configure\n`MulticastInterfaces` in your Yggdrasil configuration\n({option}`settings` or {option}`configFile`). You will then have to\nadd the ports that you configure there to your firewall configuration\n({option}`networking.firewall.allowedTCPPorts` or\n{option}`networking.firewall.interfaces.<name>.allowedTCPPorts`).\n"}, "loc": ["services", "yggdrasil", "openMulticastPort"], "readOnly": false, "type": "boolean"}, "services.yggdrasil.package": {"declarations": ["nixos/modules/services/networking/yggdrasil.nix"], "default": {"_type": "literalExpression", "text": "pkgs.yggdrasil"}, "description": {"_type": "mdDoc", "text": "Yggdrasil package to use."}, "loc": ["services", "yggdrasil", "package"], "readOnly": false, "type": "package"}, "services.yggdrasil.persistentKeys": {"declarations": ["nixos/modules/services/networking/yggdrasil.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable If enabled then keys will be generated once and Yggdrasil\nwill retain the same IPv6 address when the service is\nrestarted. Keys are stored at /var/lib/yggdrasil/keys.json.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "yggdrasil", "persistentKeys"], "readOnly": false, "type": "boolean"}, "services.yggdrasil.settings": {"declarations": ["nixos/modules/services/networking/yggdrasil.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for yggdrasil, as a Nix attribute set.\n\nWarning: this is stored in the WORLD-READABLE Nix store!\nTherefore, it is not appropriate for private keys. If you\nwish to specify the keys, use {option}`configFile`.\n\nIf the {option}`persistentKeys` is enabled then the\nkeys that are generated during activation will override\nthose in {option}`settings` or\n{option}`configFile`.\n\nIf no keys are specified then ephemeral keys are generated\nand the Yggdrasil interface will have a random IPv6 address\neach time the service is started. This is the default.\n\nIf both {option}`configFile` and {option}`settings`\nare supplied, they will be combined, with values from\n{option}`configFile` taking precedence.\n\nYou can use the command `nix-shell -p yggdrasil --run \"yggdrasil -genconf\"`\nto generate default configuration values with documentation.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Listen = [\n    \"tcp://0.0.0.0:xxxxx\"\n  ];\n  Peers = [\n    \"tcp://aa.bb.cc.dd:eeeee\"\n    \"tcp://[aaaa:bbbb:cccc:dddd::eeee]:fffff\"\n  ];\n}"}, "loc": ["services", "yggdrasil", "settings"], "readOnly": false, "type": "JSON value"}, "services.ympd.enable": {"declarations": ["nixos/modules/services/audio/ympd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ympd, the MPD Web GUI."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "ympd", "enable"], "readOnly": false, "type": "boolean"}, "services.ympd.mpd.host": {"declarations": ["nixos/modules/services/audio/ympd.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The host where MPD is listening."}, "loc": ["services", "ympd", "mpd", "host"], "readOnly": false, "type": "string"}, "services.ympd.mpd.port": {"declarations": ["nixos/modules/services/audio/ympd.nix"], "default": {"_type": "literalExpression", "text": "config.services.mpd.network.port"}, "description": {"_type": "mdDoc", "text": "The port where MPD is listening."}, "example": {"_type": "literalExpression", "text": "6600"}, "loc": ["services", "ympd", "mpd", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.ympd.webPort": {"declarations": ["nixos/modules/services/audio/ympd.nix"], "default": {"_type": "literalExpression", "text": "\"8080\""}, "description": {"_type": "mdDoc", "text": "The port where ympd's web interface will be available."}, "example": {"_type": "literalExpression", "text": "\"ssl://8080:/path/to/ssl-private-key.pem\""}, "loc": ["services", "ympd", "webPort"], "readOnly": false, "type": "string or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.youtrack.address": {"declarations": ["nixos/modules/services/web-apps/youtrack.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "The interface youtrack will listen on.\n"}, "loc": ["services", "youtrack", "address"], "readOnly": false, "type": "string"}, "services.youtrack.baseUrl": {"declarations": ["nixos/modules/services/web-apps/youtrack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Base URL for youtrack. Will be auto-detected and stored in database.\n"}, "loc": ["services", "youtrack", "baseUrl"], "readOnly": false, "type": "null or string"}, "services.youtrack.enable": {"declarations": ["nixos/modules/services/web-apps/youtrack.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable YouTrack service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "youtrack", "enable"], "readOnly": false, "type": "boolean"}, "services.youtrack.extraParams": {"declarations": ["nixos/modules/services/web-apps/youtrack.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra parameters to pass to youtrack. See\nhttps://www.jetbrains.com/help/youtrack/standalone/YouTrack-Java-Start-Parameters.html\nfor more information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"jetbrains.youtrack.overrideRootPassword\" = \"tortuga\";\n}\n"}, "loc": ["services", "youtrack", "extraParams"], "readOnly": false, "type": "attribute set of string"}, "services.youtrack.jvmOpts": {"declarations": ["nixos/modules/services/web-apps/youtrack.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra options to pass to the JVM.\nSee https://www.jetbrains.com/help/youtrack/standalone/Configure-JVM-Options.html\nfor more information.\n"}, "example": {"_type": "literalExpression", "text": "\"-XX:MetaspaceSize=250m\""}, "loc": ["services", "youtrack", "jvmOpts"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.youtrack.maxMemory": {"declarations": ["nixos/modules/services/web-apps/youtrack.nix"], "default": {"_type": "literalExpression", "text": "\"1g\""}, "description": {"_type": "mdDoc", "text": "Maximum Java heap size\n"}, "loc": ["services", "youtrack", "maxMemory"], "readOnly": false, "type": "string"}, "services.youtrack.maxMetaspaceSize": {"declarations": ["nixos/modules/services/web-apps/youtrack.nix"], "default": {"_type": "literalExpression", "text": "\"350m\""}, "description": {"_type": "mdDoc", "text": "Maximum java Metaspace memory.\n"}, "loc": ["services", "youtrack", "maxMetaspaceSize"], "readOnly": false, "type": "string"}, "services.youtrack.package": {"declarations": ["nixos/modules/services/web-apps/youtrack.nix"], "default": {"_type": "literalExpression", "text": "pkgs.youtrack"}, "description": {"_type": "mdDoc", "text": "Package to use.\n"}, "loc": ["services", "youtrack", "package"], "readOnly": false, "type": "package"}, "services.youtrack.port": {"declarations": ["nixos/modules/services/web-apps/youtrack.nix"], "default": {"_type": "literalExpression", "text": "8080"}, "description": {"_type": "mdDoc", "text": "The port youtrack will listen on.\n"}, "loc": ["services", "youtrack", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.youtrack.statePath": {"declarations": ["nixos/modules/services/web-apps/youtrack.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/youtrack\""}, "description": {"_type": "mdDoc", "text": "Where to keep the youtrack database.\n"}, "loc": ["services", "youtrack", "statePath"], "readOnly": false, "type": "path"}, "services.youtrack.virtualHost": {"declarations": ["nixos/modules/services/web-apps/youtrack.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the nginx virtual host to use and setup.\nIf null, do not setup anything.\n"}, "loc": ["services", "youtrack", "virtualHost"], "readOnly": false, "type": "null or string"}, "services.yubikey-agent.enable": {"declarations": ["nixos/modules/services/security/yubikey-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to start yubikey-agent when you log in.  Also sets\nSSH_AUTH_SOCK to point at yubikey-agent.\n\nNote that yubikey-agent will use whatever pinentry is\nspecified in programs.gnupg.agent.pinentryFlavor.\n"}, "loc": ["services", "yubikey-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.yubikey-agent.package": {"declarations": ["nixos/modules/services/security/yubikey-agent.nix"], "default": {"_type": "literalExpression", "text": "pkgs.yubikey-agent"}, "description": {"_type": "mdDoc", "text": "The package used for the yubikey-agent daemon.\n"}, "loc": ["services", "yubikey-agent", "package"], "readOnly": false, "type": "package"}, "services.zabbixAgent.enable": {"declarations": ["nixos/modules/services/monitoring/zabbix-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Zabbix Agent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zabbixAgent", "enable"], "readOnly": false, "type": "boolean"}, "services.zabbixAgent.extraPackages": {"declarations": ["nixos/modules/services/monitoring/zabbix-agent.nix"], "default": {"_type": "literalExpression", "text": "with pkgs; [ nettools ]"}, "description": {"_type": "mdDoc", "text": "Packages to be added to the Zabbix {env}`PATH`.\nTypically used to add executables for scripts, but can be anything.\n"}, "example": {"_type": "literalExpression", "text": "with pkgs; [ nettools mysql ]"}, "loc": ["services", "zabbixAgent", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.zabbixAgent.listen.ip": {"declarations": ["nixos/modules/services/monitoring/zabbix-agent.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "List of comma delimited IP addresses that the agent should listen on.\n"}, "loc": ["services", "zabbixAgent", "listen", "ip"], "readOnly": false, "type": "string"}, "services.zabbixAgent.listen.port": {"declarations": ["nixos/modules/services/monitoring/zabbix-agent.nix"], "default": {"_type": "literalExpression", "text": "10050"}, "description": {"_type": "mdDoc", "text": "Agent will listen on this port for connections from the server.\n"}, "loc": ["services", "zabbixAgent", "listen", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zabbixAgent.modules": {"declarations": ["nixos/modules/services/monitoring/zabbix-agent.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of modules to load."}, "example": {"_type": "literalExpression", "text": "{\n  \"dummy.so\" = pkgs.stdenv.mkDerivation {\n    name = \"zabbix-dummy-module-${cfg.package.version}\";\n    src = cfg.package.src;\n    buildInputs = [ cfg.package ];\n    sourceRoot = \"zabbix-${cfg.package.version}/src/modules/dummy\";\n    installPhase = ''\n      mkdir -p $out/lib\n      cp dummy.so $out/lib/\n    '';\n  };\n}\n"}, "loc": ["services", "zabbixAgent", "modules"], "readOnly": false, "type": "attribute set of package"}, "services.zabbixAgent.openFirewall": {"declarations": ["nixos/modules/services/monitoring/zabbix-agent.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the Zabbix Agent.\n"}, "loc": ["services", "zabbixAgent", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.zabbixAgent.package": {"declarations": ["nixos/modules/services/monitoring/zabbix-agent.nix"], "default": {"_type": "literalExpression", "text": "pkgs.zabbix.agent"}, "description": {"_type": "mdDoc", "text": "The Zabbix package to use."}, "loc": ["services", "zabbixAgent", "package"], "readOnly": false, "type": "package"}, "services.zabbixAgent.server": {"declarations": ["nixos/modules/services/monitoring/zabbix-agent.nix"], "description": {"_type": "mdDoc", "text": "The IP address or hostname of the Zabbix server to connect to.\n"}, "loc": ["services", "zabbixAgent", "server"], "readOnly": false, "type": "string"}, "services.zabbixAgent.settings": {"declarations": ["nixos/modules/services/monitoring/zabbix-agent.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Zabbix Agent configuration. Refer to\n<https://www.zabbix.com/documentation/current/manual/appendix/config/zabbix_agentd>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  DebugLevel = 4;\n  Hostname = \"example.org\";\n}"}, "loc": ["services", "zabbixAgent", "settings"], "readOnly": false, "type": "attribute set of (signed integer or string or list of string)"}, "services.zabbixProxy.database.createLocally": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to create a local database automatically."}, "loc": ["services", "zabbixProxy", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.zabbixProxy.database.host": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "zabbixProxy", "database", "host"], "readOnly": false, "type": "string"}, "services.zabbixProxy.database.name": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "zabbix"}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "zabbixProxy", "database", "name"], "readOnly": false, "type": "string"}, "services.zabbixProxy.database.passwordFile": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/zabbix-dbpassword\""}, "loc": ["services", "zabbixProxy", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.zabbixProxy.database.port": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "if config.services.zabbixProxy.database.type == \"mysql\"\nthen config.services.mysql.port\nelse config.services.postgresql.port\n"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "zabbixProxy", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zabbixProxy.database.socket": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the unix socket file to use for authentication."}, "example": {"_type": "literalExpression", "text": "\"/run/postgresql\""}, "loc": ["services", "zabbixProxy", "database", "socket"], "readOnly": false, "type": "null or path"}, "services.zabbixProxy.database.type": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"pgsql\""}, "description": {"_type": "mdDoc", "text": "Database engine to use."}, "example": {"_type": "literalExpression", "text": "\"mysql\""}, "loc": ["services", "zabbixProxy", "database", "type"], "readOnly": false, "type": "one of \"mysql\", \"pgsql\", \"sqlite\""}, "services.zabbixProxy.database.user": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"zabbix\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "zabbixProxy", "database", "user"], "readOnly": false, "type": "string"}, "services.zabbixProxy.enable": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Zabbix Proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zabbixProxy", "enable"], "readOnly": false, "type": "boolean"}, "services.zabbixProxy.extraPackages": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "[ nettools nmap traceroute ]"}, "description": {"_type": "mdDoc", "text": "Packages to be added to the Zabbix {env}`PATH`.\nTypically used to add executables for scripts, but can be anything.\n"}, "loc": ["services", "zabbixProxy", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.zabbixProxy.listen.ip": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "List of comma delimited IP addresses that the trapper should listen on.\nTrapper will listen on all network interfaces if this parameter is missing.\n"}, "loc": ["services", "zabbixProxy", "listen", "ip"], "readOnly": false, "type": "string"}, "services.zabbixProxy.listen.port": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "10051"}, "description": {"_type": "mdDoc", "text": "Listen port for trapper.\n"}, "loc": ["services", "zabbixProxy", "listen", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zabbixProxy.modules": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of modules to load."}, "example": {"_type": "literalExpression", "text": "{\n  \"dummy.so\" = pkgs.stdenv.mkDerivation {\n    name = \"zabbix-dummy-module-${cfg.package.version}\";\n    src = cfg.package.src;\n    buildInputs = [ cfg.package ];\n    sourceRoot = \"zabbix-${cfg.package.version}/src/modules/dummy\";\n    installPhase = ''\n      mkdir -p $out/lib\n      cp dummy.so $out/lib/\n    '';\n  };\n}\n"}, "loc": ["services", "zabbixProxy", "modules"], "readOnly": false, "type": "attribute set of package"}, "services.zabbixProxy.openFirewall": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the Zabbix Proxy.\n"}, "loc": ["services", "zabbixProxy", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.zabbixProxy.package": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "pkgs.zabbix.proxy-pgsql"}, "description": {"_type": "mdDoc", "text": "The Zabbix package to use."}, "loc": ["services", "zabbixProxy", "package"], "readOnly": false, "type": "package"}, "services.zabbixProxy.server": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "description": {"_type": "mdDoc", "text": "The IP address or hostname of the Zabbix server to connect to.\n"}, "loc": ["services", "zabbixProxy", "server"], "readOnly": false, "type": "string"}, "services.zabbixProxy.settings": {"declarations": ["nixos/modules/services/monitoring/zabbix-proxy.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Zabbix Proxy configuration. Refer to\n<https://www.zabbix.com/documentation/current/manual/appendix/config/zabbix_proxy>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  CacheSize = \"1G\";\n  SSHKeyLocation = \"/var/lib/zabbix/.ssh\";\n  StartPingers = 32;\n}"}, "loc": ["services", "zabbixProxy", "settings"], "readOnly": false, "type": "attribute set of (signed integer or string or list of string)"}, "services.zabbixServer.database.createLocally": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to create a local database automatically."}, "loc": ["services", "zabbixServer", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.zabbixServer.database.host": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "zabbixServer", "database", "host"], "readOnly": false, "type": "string"}, "services.zabbixServer.database.name": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "\"zabbix\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "zabbixServer", "database", "name"], "readOnly": false, "type": "string"}, "services.zabbixServer.database.passwordFile": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/zabbix-dbpassword\""}, "loc": ["services", "zabbixServer", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.zabbixServer.database.port": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "if config.services.zabbixServer.database.type == \"mysql\"\nthen config.services.mysql.port\nelse config.services.postgresql.port\n"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "zabbixServer", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zabbixServer.database.socket": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the unix socket file to use for authentication."}, "example": {"_type": "literalExpression", "text": "\"/run/postgresql\""}, "loc": ["services", "zabbixServer", "database", "socket"], "readOnly": false, "type": "null or path"}, "services.zabbixServer.database.type": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "\"pgsql\""}, "description": {"_type": "mdDoc", "text": "Database engine to use."}, "example": {"_type": "literalExpression", "text": "\"mysql\""}, "loc": ["services", "zabbixServer", "database", "type"], "readOnly": false, "type": "one of \"mysql\", \"pgsql\""}, "services.zabbixServer.database.user": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "\"zabbix\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "zabbixServer", "database", "user"], "readOnly": false, "type": "string"}, "services.zabbixServer.enable": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Zabbix Server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zabbixServer", "enable"], "readOnly": false, "type": "boolean"}, "services.zabbixServer.extraPackages": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "[ nettools nmap traceroute ]"}, "description": {"_type": "mdDoc", "text": "Packages to be added to the Zabbix {env}`PATH`.\nTypically used to add executables for scripts, but can be anything.\n"}, "loc": ["services", "zabbixServer", "extraPackages"], "readOnly": false, "type": "list of package"}, "services.zabbixServer.listen.ip": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "List of comma delimited IP addresses that the trapper should listen on.\nTrapper will listen on all network interfaces if this parameter is missing.\n"}, "loc": ["services", "zabbixServer", "listen", "ip"], "readOnly": false, "type": "string"}, "services.zabbixServer.listen.port": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "10051"}, "description": {"_type": "mdDoc", "text": "Listen port for trapper.\n"}, "loc": ["services", "zabbixServer", "listen", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zabbixServer.modules": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of modules to load."}, "example": {"_type": "literalExpression", "text": "{\n  \"dummy.so\" = pkgs.stdenv.mkDerivation {\n    name = \"zabbix-dummy-module-${cfg.package.version}\";\n    src = cfg.package.src;\n    buildInputs = [ cfg.package ];\n    sourceRoot = \"zabbix-${cfg.package.version}/src/modules/dummy\";\n    installPhase = ''\n      mkdir -p $out/lib\n      cp dummy.so $out/lib/\n    '';\n  };\n}\n"}, "loc": ["services", "zabbixServer", "modules"], "readOnly": false, "type": "attribute set of package"}, "services.zabbixServer.openFirewall": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open ports in the firewall for the Zabbix Server.\n"}, "loc": ["services", "zabbixServer", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.zabbixServer.package": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "pkgs.zabbix.server-pgsql"}, "description": {"_type": "mdDoc", "text": "The Zabbix package to use."}, "loc": ["services", "zabbixServer", "package"], "readOnly": false, "type": "package"}, "services.zabbixServer.settings": {"declarations": ["nixos/modules/services/monitoring/zabbix-server.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Zabbix Server configuration. Refer to\n<https://www.zabbix.com/documentation/current/manual/appendix/config/zabbix_server>\nfor details on supported values.\n"}, "example": {"_type": "literalExpression", "text": "{\n  CacheSize = \"1G\";\n  SSHKeyLocation = \"/var/lib/zabbix/.ssh\";\n  StartPingers = 32;\n}"}, "loc": ["services", "zabbixServer", "settings"], "readOnly": false, "type": "attribute set of (signed integer or string or list of string)"}, "services.zabbixWeb.database.host": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Database host address."}, "loc": ["services", "zabbixWeb", "database", "host"], "readOnly": false, "type": "string"}, "services.zabbixWeb.database.name": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "\"zabbix\""}, "description": {"_type": "mdDoc", "text": "Database name."}, "loc": ["services", "zabbixWeb", "database", "name"], "readOnly": false, "type": "string"}, "services.zabbixWeb.database.passwordFile": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password corresponding to\n{option}`database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/zabbix-dbpassword\""}, "loc": ["services", "zabbixWeb", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.zabbixWeb.database.port": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "if config.services.zabbixWeb.database.type == \"mysql\" then config.services.mysql.port\nelse if config.services.zabbixWeb.database.type == \"pgsql\" then config.services.postgresql.port\nelse 1521\n"}, "description": {"_type": "mdDoc", "text": "Database host port."}, "loc": ["services", "zabbixWeb", "database", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zabbixWeb.database.socket": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to the unix socket file to use for authentication."}, "example": {"_type": "literalExpression", "text": "\"/run/postgresql\""}, "loc": ["services", "zabbixWeb", "database", "socket"], "readOnly": false, "type": "null or path"}, "services.zabbixWeb.database.type": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "\"pgsql\""}, "description": {"_type": "mdDoc", "text": "Database engine to use."}, "example": {"_type": "literalExpression", "text": "\"mysql\""}, "loc": ["services", "zabbixWeb", "database", "type"], "readOnly": false, "type": "one of \"mysql\", \"pgsql\", \"oracle\""}, "services.zabbixWeb.database.user": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "\"zabbix\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "zabbixWeb", "database", "user"], "readOnly": false, "type": "string"}, "services.zabbixWeb.enable": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Zabbix web interface."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zabbixWeb", "enable"], "readOnly": false, "type": "boolean"}, "services.zabbixWeb.extraConfig": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional configuration to be copied verbatim into {file}`zabbix.conf.php`.\n"}, "loc": ["services", "zabbixWeb", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.zabbixWeb.package": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "zabbix.web"}, "description": {"_type": "mdDoc", "text": "Which Zabbix package to use."}, "loc": ["services", "zabbixWeb", "package"], "readOnly": false, "type": "package"}, "services.zabbixWeb.poolConfig": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = 32;\n  \"pm.max_requests\" = 500;\n  \"pm.max_spare_servers\" = 4;\n  \"pm.min_spare_servers\" = 2;\n  \"pm.start_servers\" = 2;\n}"}, "description": {"_type": "mdDoc", "text": "Options for the Zabbix PHP pool. See the documentation on `php-fpm.conf` for details on configuration directives.\n"}, "loc": ["services", "zabbixWeb", "poolConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.zabbixWeb.server.address": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The IP address or hostname of the Zabbix server to connect to."}, "loc": ["services", "zabbixWeb", "server", "address"], "readOnly": false, "type": "string"}, "services.zabbixWeb.server.port": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "10051"}, "description": {"_type": "mdDoc", "text": "The port of the Zabbix server to connect to."}, "loc": ["services", "zabbixWeb", "server", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zabbixWeb.virtualHost": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "description": {"_type": "mdDoc", "text": "Apache configuration can be done by adapting `services.httpd.virtualHosts.<name>`.\nSee [](#opt-services.httpd.virtualHosts) for further information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  hostName = \"zabbix.example.org\";\n  adminAddr = \"webmaster@example.org\";\n  forceSSL = true;\n  enableACME = true;\n}\n"}, "loc": ["services", "zabbixWeb", "virtualHost"], "readOnly": false, "type": "submodule"}, "services.zabbixWeb.virtualHost.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the acme challenge which is PUBLIC, don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "zabbixWeb", "virtualHost", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.zabbixWeb.virtualHost.addSSL": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "zabbixWeb", "virtualHost", "addSSL"], "readOnly": false, "type": "boolean"}, "services.zabbixWeb.virtualHost.adminAddr": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "E-mail address of the server administrator."}, "example": {"_type": "literalExpression", "text": "\"admin@example.org\""}, "loc": ["services", "zabbixWeb", "virtualHost", "adminAddr"], "readOnly": false, "type": "null or string"}, "services.zabbixWeb.virtualHost.documentRoot": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of Apache's document root directory.  If left undefined,\nan empty directory in the Nix store will be used as root.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "zabbixWeb", "virtualHost", "documentRoot"], "readOnly": false, "type": "null or path"}, "services.zabbixWeb.virtualHost.enableACME": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "zabbixWeb", "virtualHost", "enableACME"], "readOnly": false, "type": "boolean"}, "services.zabbixWeb.virtualHost.enableUserDir": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable serving {file}`~/public_html` as\n`/~\u00abusername\u00bb`.\n"}, "loc": ["services", "zabbixWeb", "virtualHost", "enableUserDir"], "readOnly": false, "type": "boolean"}, "services.zabbixWeb.virtualHost.extraConfig": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to httpd.conf verbatim. They will go after\ndirectories and directory aliases defined by default.\n"}, "example": {"_type": "literalExpression", "text": "''\n  <Directory /home>\n    Options FollowSymlinks\n    AllowOverride All\n  </Directory>\n''"}, "loc": ["services", "zabbixWeb", "virtualHost", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.zabbixWeb.virtualHost.forceSSL": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "zabbixWeb", "virtualHost", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.zabbixWeb.virtualHost.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given URL.\n"}, "example": {"_type": "literalExpression", "text": "\"http://newserver.example.org/\""}, "loc": ["services", "zabbixWeb", "virtualHost", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.zabbixWeb.virtualHost.hostName": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Canonical hostname for the server."}, "loc": ["services", "zabbixWeb", "virtualHost", "hostName"], "readOnly": false, "type": "string"}, "services.zabbixWeb.virtualHost.http2": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTP 2. HTTP/2 is supported in all multi-processing modules that come with httpd. *However, if you use the prefork mpm, there will\nbe severe restrictions.* Refer to <https://httpd.apache.org/docs/2.4/howto/http2.html#mpm-config> for details.\n"}, "loc": ["services", "zabbixWeb", "virtualHost", "http2"], "readOnly": false, "type": "boolean"}, "services.zabbixWeb.virtualHost.listen": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\n\n::: {.note}\nThis option overrides `addSSL`, `forceSSL` and `onlySSL`.\n\nIf you only want to set the addresses manually and not the ports, take a look at `listenAddresses`.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    ip = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    ip = \"192.154.1.1\";\n    port = 80;\n  }\n  {\n    ip = \"*\";\n    port = 8080;\n  }\n]"}, "loc": ["services", "zabbixWeb", "virtualHost", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.zabbixWeb.virtualHost.listen.*.ip": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "\"*\""}, "description": {"_type": "mdDoc", "text": "IP to listen on. 0.0.0.0 for IPv4 only, * for all."}, "loc": ["services", "zabbixWeb", "virtualHost", "listen", "*", "ip"], "readOnly": false, "type": "string"}, "services.zabbixWeb.virtualHost.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "description": {"_type": "mdDoc", "text": "Port to listen on"}, "loc": ["services", "zabbixWeb", "virtualHost", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zabbixWeb.virtualHost.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SSL (https) support."}, "loc": ["services", "zabbixWeb", "virtualHost", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.zabbixWeb.virtualHost.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"*\"\n]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n]"}, "loc": ["services", "zabbixWeb", "virtualHost", "listenAddresses"], "readOnly": false, "type": "non-empty (list of string)"}, "services.zabbixWeb.virtualHost.locations": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config. See <https://httpd.apache.org/docs/2.4/mod/core.html#location> for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n  \"/foo/bar.png\" = {\n    alias = \"/home/eelco/some-file.png\";\n  };\n};\n"}, "loc": ["services", "zabbixWeb", "virtualHost", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.zabbixWeb.virtualHost.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests. See <https://httpd.apache.org/docs/2.4/mod/mod_alias.html#alias>.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "zabbixWeb", "virtualHost", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.zabbixWeb.virtualHost.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "zabbixWeb", "virtualHost", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.zabbixWeb.virtualHost.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds DirectoryIndex directive. See <https://httpd.apache.org/docs/2.4/mod/mod_dir.html#directoryindex>.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "zabbixWeb", "virtualHost", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.zabbixWeb.virtualHost.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "zabbixWeb", "virtualHost", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.zabbixWeb.virtualHost.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets up a simple reverse proxy as described by <https://httpd.apache.org/docs/2.4/howto/reverse_proxy.html#simple>.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "zabbixWeb", "virtualHost", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.zabbixWeb.virtualHost.logFormat": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "\"common\""}, "description": {"_type": "mdDoc", "text": "Log format for Apache's log files. Possible values are: combined, common, referer, agent.\n"}, "example": {"_type": "literalExpression", "text": "\"combined\""}, "loc": ["services", "zabbixWeb", "virtualHost", "logFormat"], "readOnly": false, "type": "string"}, "services.zabbixWeb.virtualHost.onlySSL": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "zabbixWeb", "virtualHost", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.zabbixWeb.virtualHost.robotsEntries": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Specification of pages to be ignored by web crawlers. See <http://www.robotstxt.org/> for details.\n"}, "example": {"_type": "literalExpression", "text": "\"Disallow: /foo/\""}, "loc": ["services", "zabbixWeb", "virtualHost", "robotsEntries"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.zabbixWeb.virtualHost.servedDirs": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve static directories.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    dir = \"/home/eelco/Dev/nix-homepage\";\n    urlPath = \"/nix\";\n  }\n]"}, "loc": ["services", "zabbixWeb", "virtualHost", "servedDirs"], "readOnly": false, "type": "list of (attribute set)"}, "services.zabbixWeb.virtualHost.servedFiles": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "This option provides a simple way to serve individual, static files.\n\n::: {.note}\nThis option has been deprecated and will be removed in a future\nversion of NixOS. You can achieve the same result by making use of\nthe `locations.<name>.alias` option.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    file = \"/home/eelco/some-file.png\";\n    urlPath = \"/foo/bar.png\";\n  }\n]"}, "loc": ["services", "zabbixWeb", "virtualHost", "servedFiles"], "readOnly": false, "type": "list of (attribute set)"}, "services.zabbixWeb.virtualHost.serverAliases": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"www.example.org:8080\"\n  \"example.org\"\n]"}, "loc": ["services", "zabbixWeb", "virtualHost", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.zabbixWeb.virtualHost.sslServerCert": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "zabbixWeb", "virtualHost", "sslServerCert"], "readOnly": false, "type": "path"}, "services.zabbixWeb.virtualHost.sslServerChain": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to server SSL chain file."}, "example": {"_type": "literalExpression", "text": "\"/var/ca.pem\""}, "loc": ["services", "zabbixWeb", "virtualHost", "sslServerChain"], "readOnly": false, "type": "null or path"}, "services.zabbixWeb.virtualHost.sslServerKey": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "zabbixWeb", "virtualHost", "sslServerKey"], "readOnly": false, "type": "path"}, "services.zabbixWeb.virtualHost.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/zabbix.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "zabbixWeb", "virtualHost", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.zammad.dataDir": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/zammad\""}, "description": {"_type": "mdDoc", "text": "Path to a folder that will contain Zammad working directory.\n"}, "loc": ["services", "zammad", "dataDir"], "readOnly": false, "type": "path"}, "services.zammad.database.createLocally": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to create a local database automatically."}, "loc": ["services", "zammad", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.zammad.database.host": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "{\n  PostgreSQL = \"/run/postgresql\";\n  MySQL = \"localhost\";\n}.${config.services.zammad.database.type};\n"}, "description": {"_type": "mdDoc", "text": "Database host address.\n"}, "loc": ["services", "zammad", "database", "host"], "readOnly": false, "type": "null or string"}, "services.zammad.database.name": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "\"zammad\""}, "description": {"_type": "mdDoc", "text": "Database name.\n"}, "loc": ["services", "zammad", "database", "name"], "readOnly": false, "type": "string"}, "services.zammad.database.passwordFile": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the password for {option}`services.zammad.database.user`.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/zammad-dbpassword\""}, "loc": ["services", "zammad", "database", "passwordFile"], "readOnly": false, "type": "null or path"}, "services.zammad.database.port": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Database port. Use `null` for default port."}, "loc": ["services", "zammad", "database", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zammad.database.settings": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The {file}`database.yml` configuration file as key value set.\nSee \\<TODO\\>\nfor list of configuration parameters.\n"}, "example": {"_type": "literalExpression", "text": "{\n}\n"}, "loc": ["services", "zammad", "database", "settings"], "readOnly": false, "type": "YAML value"}, "services.zammad.database.type": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "\"PostgreSQL\""}, "description": {"_type": "mdDoc", "text": "Database engine to use."}, "example": {"_type": "literalExpression", "text": "\"MySQL\""}, "loc": ["services", "zammad", "database", "type"], "readOnly": false, "type": "one of \"PostgreSQL\", \"MySQL\""}, "services.zammad.database.user": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "\"zammad\""}, "description": {"_type": "mdDoc", "text": "Database user."}, "loc": ["services", "zammad", "database", "user"], "readOnly": false, "type": "null or string"}, "services.zammad.enable": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Zammad, a web-based, open source user support/ticketing solution."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zammad", "enable"], "readOnly": false, "type": "boolean"}, "services.zammad.host": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Host address."}, "example": {"_type": "literalExpression", "text": "\"192.168.23.42\""}, "loc": ["services", "zammad", "host"], "readOnly": false, "type": "string"}, "services.zammad.openPorts": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open firewall ports for Zammad"}, "loc": ["services", "zammad", "openPorts"], "readOnly": false, "type": "boolean"}, "services.zammad.package": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "pkgs.zammad"}, "description": {"_type": "mdDoc", "text": "Zammad package to use."}, "loc": ["services", "zammad", "package"], "readOnly": false, "type": "package"}, "services.zammad.port": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "3000"}, "description": {"_type": "mdDoc", "text": "Web service port."}, "loc": ["services", "zammad", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zammad.secretKeyBaseFile": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to a file containing the\n`secret_key_base` secret.\n\nZammad uses `secret_key_base` to encrypt\nthe cookie store, which contains session data, and to digest\nuser auth tokens.\n\nNeeds to be a 64 byte long string of hexadecimal\ncharacters. You can generate one by running\n\n```\nopenssl rand -hex 64 >/path/to/secret_key_base_file\n```\n\nThis should be a string, not a nix path, since nix paths are\ncopied into the world-readable nix store.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/secret_key_base\""}, "loc": ["services", "zammad", "secretKeyBaseFile"], "readOnly": false, "type": "null or path"}, "services.zammad.websocketPort": {"declarations": ["nixos/modules/services/development/zammad.nix"], "default": {"_type": "literalExpression", "text": "6042"}, "description": {"_type": "mdDoc", "text": "Websocket service port."}, "loc": ["services", "zammad", "websocketPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zeitgeist.enable": {"declarations": ["nixos/modules/services/desktops/zeitgeist.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable zeitgeist."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zeitgeist", "enable"], "readOnly": false, "type": "boolean"}, "services.zerobin.dataDir": {"declarations": ["nixos/modules/services/networking/zerobin.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/zerobin\""}, "description": {"_type": "mdDoc", "text": "Path to the 0bin data directory\n"}, "loc": ["services", "zerobin", "dataDir"], "readOnly": false, "type": "string"}, "services.zerobin.enable": {"declarations": ["nixos/modules/services/networking/zerobin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable 0bin."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zerobin", "enable"], "readOnly": false, "type": "boolean"}, "services.zerobin.extraConfig": {"declarations": ["nixos/modules/services/networking/zerobin.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration to be appended to the 0bin config file\n(see https://0bin.readthedocs.org/en/latest/en/options.html)\n"}, "example": {"_type": "literalExpression", "text": "''\n  MENU = (\n  ('Home', '/'),\n  )\n  COMPRESSED_STATIC_FILE = True\n''"}, "loc": ["services", "zerobin", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.zerobin.group": {"declarations": ["nixos/modules/services/networking/zerobin.nix"], "default": {"_type": "literalExpression", "text": "\"zerobin\""}, "description": {"_type": "mdDoc", "text": "The group 0bin should run as\n"}, "loc": ["services", "zerobin", "group"], "readOnly": false, "type": "string"}, "services.zerobin.listenAddress": {"declarations": ["nixos/modules/services/networking/zerobin.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The address zerobin should listen to\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "loc": ["services", "zerobin", "listenAddress"], "readOnly": false, "type": "string"}, "services.zerobin.listenPort": {"declarations": ["nixos/modules/services/networking/zerobin.nix"], "default": {"_type": "literalExpression", "text": "8000"}, "description": {"_type": "mdDoc", "text": "The port zerobin should listen on\n"}, "example": {"_type": "literalExpression", "text": "1357"}, "loc": ["services", "zerobin", "listenPort"], "readOnly": false, "type": "signed integer"}, "services.zerobin.user": {"declarations": ["nixos/modules/services/networking/zerobin.nix"], "default": {"_type": "literalExpression", "text": "\"zerobin\""}, "description": {"_type": "mdDoc", "text": "The user 0bin should run as\n"}, "loc": ["services", "zerobin", "user"], "readOnly": false, "type": "string"}, "services.zeronet.enable": {"declarations": ["nixos/modules/services/networking/zeronet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable zeronet."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zeronet", "enable"], "readOnly": false, "type": "boolean"}, "services.zeronet.fileserverPort": {"declarations": ["nixos/modules/services/networking/zeronet.nix"], "default": {"_type": "literalExpression", "text": "12261"}, "description": {"_type": "mdDoc", "text": "Zeronet fileserver port."}, "loc": ["services", "zeronet", "fileserverPort"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zeronet.package": {"declarations": ["nixos/modules/services/networking/zeronet.nix"], "default": {"_type": "literalExpression", "text": "pkgs.zeronet"}, "description": {"_type": "mdDoc", "text": "ZeroNet package to use"}, "loc": ["services", "zeronet", "package"], "readOnly": false, "type": "package"}, "services.zeronet.port": {"declarations": ["nixos/modules/services/networking/zeronet.nix"], "default": {"_type": "literalExpression", "text": "43110"}, "description": {"_type": "mdDoc", "text": "Optional zeronet web UI port."}, "loc": ["services", "zeronet", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zeronet.settings": {"declarations": ["nixos/modules/services/networking/zeronet.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "{file}`zeronet.conf` configuration. Refer to\n<https://zeronet.readthedocs.io/en/latest/faq/#is-it-possible-to-use-a-configuration-file>\nfor details on supported values;\n"}, "example": {"_type": "literalExpression", "text": "{ global.tor = enable; }"}, "loc": ["services", "zeronet", "settings"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean or list of string)"}, "services.zeronet.tor": {"declarations": ["nixos/modules/services/networking/zeronet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use TOR for zeronet traffic where possible."}, "loc": ["services", "zeronet", "tor"], "readOnly": false, "type": "boolean"}, "services.zeronet.torAlways": {"declarations": ["nixos/modules/services/networking/zeronet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use TOR for all zeronet traffic."}, "loc": ["services", "zeronet", "torAlways"], "readOnly": false, "type": "boolean"}, "services.zerotierone.enable": {"declarations": ["nixos/modules/services/networking/zerotierone.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ZeroTierOne."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zerotierone", "enable"], "readOnly": false, "type": "boolean"}, "services.zerotierone.joinNetworks": {"declarations": ["nixos/modules/services/networking/zerotierone.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of ZeroTier Network IDs to join on startup\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"a8a2c3c10c1a68de\"\n]"}, "loc": ["services", "zerotierone", "joinNetworks"], "readOnly": false, "type": "list of string"}, "services.zerotierone.package": {"declarations": ["nixos/modules/services/networking/zerotierone.nix"], "default": {"_type": "literalExpression", "text": "pkgs.zerotierone"}, "description": {"_type": "mdDoc", "text": "ZeroTier One package to use.\n"}, "loc": ["services", "zerotierone", "package"], "readOnly": false, "type": "package"}, "services.zerotierone.port": {"declarations": ["nixos/modules/services/networking/zerotierone.nix"], "default": {"_type": "literalExpression", "text": "9993"}, "description": {"_type": "mdDoc", "text": "Network port used by ZeroTier.\n"}, "loc": ["services", "zerotierone", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zeyple.enable": {"declarations": ["nixos/modules/services/mail/zeyple.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Zeyple, an utility program to automatically encrypt outgoing emails with GPG."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zeyple", "enable"], "readOnly": false, "type": "boolean"}, "services.zeyple.group": {"declarations": ["nixos/modules/services/mail/zeyple.nix"], "default": {"_type": "literalExpression", "text": "\"zeyple\""}, "description": {"_type": "mdDoc", "text": "Group to use to run Zeyple.\n\n::: {.note}\nIf left as the default value this group will automatically be created\non system activation, otherwise the sysadmin is responsible for\nensuring the user exists.\n:::\n"}, "loc": ["services", "zeyple", "group"], "readOnly": false, "type": "string"}, "services.zeyple.keys": {"declarations": ["nixos/modules/services/mail/zeyple.nix"], "description": {"_type": "mdDoc", "text": "List of public key files that will be imported by gpg."}, "loc": ["services", "zeyple", "keys"], "readOnly": false, "type": "list of path"}, "services.zeyple.rotateLogs": {"declarations": ["nixos/modules/services/mail/zeyple.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable rotation of log files."}, "loc": ["services", "zeyple", "rotateLogs"], "readOnly": false, "type": "boolean"}, "services.zeyple.settings": {"declarations": ["nixos/modules/services/mail/zeyple.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Zeyple configuration. refer to\n<https://github.com/infertux/zeyple/blob/master/zeyple/zeyple.conf.example>\nfor details on supported values.\n"}, "loc": ["services", "zeyple", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "services.zeyple.user": {"declarations": ["nixos/modules/services/mail/zeyple.nix"], "default": {"_type": "literalExpression", "text": "\"zeyple\""}, "description": {"_type": "mdDoc", "text": "User to run Zeyple as.\n\n::: {.note}\nIf left as the default value this user will automatically be created\non system activation, otherwise the sysadmin is responsible for\nensuring the user exists.\n:::\n"}, "loc": ["services", "zeyple", "user"], "readOnly": false, "type": "string"}, "services.zfs.autoReplication.enable": {"declarations": ["nixos/modules/services/backup/zfs-replication.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ZFS snapshot replication."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zfs", "autoReplication", "enable"], "readOnly": false, "type": "boolean"}, "services.zfs.autoReplication.followDelete": {"declarations": ["nixos/modules/services/backup/zfs-replication.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Remove remote snapshots that don't have a local correspondent."}, "loc": ["services", "zfs", "autoReplication", "followDelete"], "readOnly": false, "type": "boolean"}, "services.zfs.autoReplication.host": {"declarations": ["nixos/modules/services/backup/zfs-replication.nix"], "description": {"_type": "mdDoc", "text": "Remote host where snapshots should be sent. `lz4` is expected to be installed on this host."}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "zfs", "autoReplication", "host"], "readOnly": false, "type": "string"}, "services.zfs.autoReplication.identityFilePath": {"declarations": ["nixos/modules/services/backup/zfs-replication.nix"], "description": {"_type": "mdDoc", "text": "Path to SSH key used to login to host."}, "example": {"_type": "literalExpression", "text": "\"/home/username/.ssh/id_rsa\""}, "loc": ["services", "zfs", "autoReplication", "identityFilePath"], "readOnly": false, "type": "path"}, "services.zfs.autoReplication.localFilesystem": {"declarations": ["nixos/modules/services/backup/zfs-replication.nix"], "description": {"_type": "mdDoc", "text": "Local ZFS filesystem from which snapshots should be sent.  Defaults to the attribute name."}, "example": {"_type": "literalExpression", "text": "\"pool/file/path\""}, "loc": ["services", "zfs", "autoReplication", "localFilesystem"], "readOnly": false, "type": "string"}, "services.zfs.autoReplication.recursive": {"declarations": ["nixos/modules/services/backup/zfs-replication.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Recursively discover snapshots to send."}, "loc": ["services", "zfs", "autoReplication", "recursive"], "readOnly": false, "type": "boolean"}, "services.zfs.autoReplication.remoteFilesystem": {"declarations": ["nixos/modules/services/backup/zfs-replication.nix"], "description": {"_type": "mdDoc", "text": "Remote ZFS filesystem where snapshots should be sent."}, "example": {"_type": "literalExpression", "text": "\"pool/file/path\""}, "loc": ["services", "zfs", "autoReplication", "remoteFilesystem"], "readOnly": false, "type": "string"}, "services.zfs.autoReplication.username": {"declarations": ["nixos/modules/services/backup/zfs-replication.nix"], "description": {"_type": "mdDoc", "text": "Username used by SSH to login to remote host."}, "example": {"_type": "literalExpression", "text": "\"username\""}, "loc": ["services", "zfs", "autoReplication", "username"], "readOnly": false, "type": "string"}, "services.zfs.autoScrub.enable": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable periodic scrubbing of ZFS pools."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zfs", "autoScrub", "enable"], "readOnly": false, "type": "boolean"}, "services.zfs.autoScrub.interval": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "\"Sun, 02:00\""}, "description": {"_type": "mdDoc", "text": "Systemd calendar expression when to scrub ZFS pools. See\n{manpage}`systemd.time(7)`.\n"}, "example": {"_type": "literalExpression", "text": "\"daily\""}, "loc": ["services", "zfs", "autoScrub", "interval"], "readOnly": false, "type": "string"}, "services.zfs.autoScrub.pools": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of ZFS pools to periodically scrub. If empty, all pools\nwill be scrubbed.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"tank\"\n]"}, "loc": ["services", "zfs", "autoScrub", "pools"], "readOnly": false, "type": "list of string"}, "services.zfs.autoSnapshot.daily": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "7"}, "description": {"_type": "mdDoc", "text": "Number of daily auto-snapshots that you wish to keep.\n"}, "loc": ["services", "zfs", "autoSnapshot", "daily"], "readOnly": false, "type": "signed integer"}, "services.zfs.autoSnapshot.enable": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the (OpenSolaris-compatible) ZFS auto-snapshotting service.\nNote that you must set the `com.sun:auto-snapshot`\nproperty to `true` on all datasets which you wish\nto auto-snapshot.\n\nYou can override a child dataset to use, or not use auto-snapshotting\nby setting its flag with the given interval:\n`zfs set com.sun:auto-snapshot:weekly=false DATASET`\n"}, "loc": ["services", "zfs", "autoSnapshot", "enable"], "readOnly": false, "type": "boolean"}, "services.zfs.autoSnapshot.flags": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "\"-k -p\""}, "description": {"_type": "mdDoc", "text": "Flags to pass to the zfs-auto-snapshot command.\n\nRun `zfs-auto-snapshot` (without any arguments) to\nsee available flags.\n\nIf it's not too inconvenient for snapshots to have timestamps in UTC,\nit is suggested that you append `--utc` to the list\nof default options (see example).\n\nOtherwise, snapshot names can cause name conflicts or apparent time\nreversals due to daylight savings, timezone or other date/time changes.\n"}, "example": {"_type": "literalExpression", "text": "\"-k -p --utc\""}, "loc": ["services", "zfs", "autoSnapshot", "flags"], "readOnly": false, "type": "string"}, "services.zfs.autoSnapshot.frequent": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "4"}, "description": {"_type": "mdDoc", "text": "Number of frequent (15-minute) auto-snapshots that you wish to keep.\n"}, "loc": ["services", "zfs", "autoSnapshot", "frequent"], "readOnly": false, "type": "signed integer"}, "services.zfs.autoSnapshot.hourly": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "24"}, "description": {"_type": "mdDoc", "text": "Number of hourly auto-snapshots that you wish to keep.\n"}, "loc": ["services", "zfs", "autoSnapshot", "hourly"], "readOnly": false, "type": "signed integer"}, "services.zfs.autoSnapshot.monthly": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "12"}, "description": {"_type": "mdDoc", "text": "Number of monthly auto-snapshots that you wish to keep.\n"}, "loc": ["services", "zfs", "autoSnapshot", "monthly"], "readOnly": false, "type": "signed integer"}, "services.zfs.autoSnapshot.weekly": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "4"}, "description": {"_type": "mdDoc", "text": "Number of weekly auto-snapshots that you wish to keep.\n"}, "loc": ["services", "zfs", "autoSnapshot", "weekly"], "readOnly": false, "type": "signed integer"}, "services.zfs.expandOnBoot": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "\"disabled\""}, "description": {"_type": "mdDoc", "text": "After importing, expand each device in the specified pools.\n\nSet the value to the plain string \"all\" to expand all pools on boot:\n\n    services.zfs.expandOnBoot = \"all\";\n\nor set the value to a list of pools to expand the disks of specific pools:\n\n    services.zfs.expandOnBoot = [ \"tank\" \"dozer\" ];\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"tank\"\n  \"dozer\"\n]"}, "loc": ["services", "zfs", "expandOnBoot"], "readOnly": false, "type": "one of \"disabled\", \"all\" or list of string"}, "services.zfs.trim.enable": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable periodic TRIM on all ZFS pools."}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "zfs", "trim", "enable"], "readOnly": false, "type": "boolean"}, "services.zfs.trim.interval": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "\"weekly\""}, "description": {"_type": "mdDoc", "text": "How often we run trim. For most desktop and server systems\na sufficient trimming frequency is once a week.\n\nThe format is described in\n{manpage}`systemd.time(7)`.\n"}, "example": {"_type": "literalExpression", "text": "\"daily\""}, "loc": ["services", "zfs", "trim", "interval"], "readOnly": false, "type": "string"}, "services.zfs.zed.enableMail": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "default": {"_type": "literalExpression", "text": "config.boot.zfs.package.enableMail"}, "description": {"_type": "mdDoc", "text": "Whether to enable ZED's ability to send emails."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zfs", "zed", "enableMail"], "readOnly": false, "type": "boolean"}, "services.zfs.zed.settings": {"declarations": ["nixos/modules/tasks/filesystems/zfs.nix"], "description": {"_type": "mdDoc", "text": "ZFS Event Daemon /etc/zfs/zed.d/zed.rc content\n\nSee\n{manpage}`zed(8)`\nfor details on ZED and the scripts in /etc/zfs/zed.d to find the possible variables\n"}, "example": {"_type": "literalExpression", "text": "{\n  ZED_DEBUG_LOG = \"/tmp/zed.debug.log\";\n\n  ZED_EMAIL_ADDR = [ \"root\" ];\n  ZED_EMAIL_PROG = \"mail\";\n  ZED_EMAIL_OPTS = \"-s '@SUBJECT@' @ADDRESS@\";\n\n  ZED_NOTIFY_INTERVAL_SECS = 3600;\n  ZED_NOTIFY_VERBOSE = false;\n\n  ZED_USE_ENCLOSURE_LEDS = true;\n  ZED_SCRUB_AFTER_RESILVER = false;\n}\n"}, "loc": ["services", "zfs", "zed", "settings"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean or list of string)"}, "services.zigbee2mqtt.dataDir": {"declarations": ["nixos/modules/services/home-automation/zigbee2mqtt.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/zigbee2mqtt\""}, "description": {"_type": "mdDoc", "text": "Zigbee2mqtt data directory"}, "loc": ["services", "zigbee2mqtt", "dataDir"], "readOnly": false, "type": "path"}, "services.zigbee2mqtt.enable": {"declarations": ["nixos/modules/services/home-automation/zigbee2mqtt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable zigbee2mqtt service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zigbee2mqtt", "enable"], "readOnly": false, "type": "boolean"}, "services.zigbee2mqtt.package": {"declarations": ["nixos/modules/services/home-automation/zigbee2mqtt.nix"], "default": {"_type": "literalExpression", "text": "pkgs.zigbee2mqtt\n"}, "description": {"_type": "mdDoc", "text": "Zigbee2mqtt package to use"}, "loc": ["services", "zigbee2mqtt", "package"], "readOnly": false, "type": "package"}, "services.zigbee2mqtt.settings": {"declarations": ["nixos/modules/services/home-automation/zigbee2mqtt.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Your {file}`configuration.yaml` as a Nix attribute set.\nCheck the [documentation](https://www.zigbee2mqtt.io/information/configuration.html)\nfor possible options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  homeassistant = config.services.home-assistant.enable;\n  permit_join = true;\n  serial = {\n    port = \"/dev/ttyACM1\";\n  };\n}\n"}, "loc": ["services", "zigbee2mqtt", "settings"], "readOnly": false, "type": "YAML value"}, "services.znapzend.autoCreation": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically create the destination dataset if it does not exist."}, "loc": ["services", "znapzend", "autoCreation"], "readOnly": false, "type": "boolean"}, "services.znapzend.enable": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ZnapZend ZFS backup daemon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "znapzend", "enable"], "readOnly": false, "type": "boolean"}, "services.znapzend.features.compressed": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable compressed feature which adds the options `-Lce` to\nthe {command}`zfs send` command. When this is enabled, make\nsure that both the sending and receiving pool have the same relevant\nfeatures enabled. Using `-c` will skip unnecessary\ndecompress-compress stages, `-L` is for large block\nsupport and -e is for embedded data support. see\n{manpage}`znapzend(1)`\nand {manpage}`zfs(8)`\nfor more info.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "znapzend", "features", "compressed"], "readOnly": false, "type": "boolean"}, "services.znapzend.features.lowmemRecurse": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable use lowmemRecurse on systems where you have too many datasets, so a\nrecursive listing of attributes to find backup plans exhausts the\nmemory available to {command}`znapzend`: instead, go the slower\nway to first list all impacted dataset names, and then query their\nconfigs one by one.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "znapzend", "features", "lowmemRecurse"], "readOnly": false, "type": "boolean"}, "services.znapzend.features.oracleMode": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Destroy snapshots one by one instead of using one long argument list.\nIf source and destination are out of sync for a long time, you may have\nso many snapshots to destroy that the argument gets is too long and the\ncommand fails.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "znapzend", "features", "oracleMode"], "readOnly": false, "type": "boolean"}, "services.znapzend.features.recvu": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable recvu feature which uses `-u` on the receiving end to keep the destination\nfilesystem unmounted.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "znapzend", "features", "recvu"], "readOnly": false, "type": "boolean"}, "services.znapzend.features.sendRaw": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable sendRaw feature which adds the options `-w` to the\n{command}`zfs send` command. For encrypted source datasets this\ninstructs zfs not to decrypt before sending which results in a remote\nbackup that can't be read without the encryption key/passphrase, useful\nwhen the remote isn't fully trusted or not physically secure. This\noption must be used consistently, raw incrementals cannot be based on\nnon-raw snapshots and vice versa.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "znapzend", "features", "sendRaw"], "readOnly": false, "type": "boolean"}, "services.znapzend.features.skipIntermediates": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Enable the skipIntermediates feature to send a single increment\nbetween latest common snapshot and the newly made one. It may skip\nseveral source snaps if the destination was offline for some time, and\nit should skip snapshots not managed by znapzend. Normally for online\ndestinations, the new snapshot is sent as soon as it is created on the\nsource, so there are no automatic increments to skip.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "znapzend", "features", "skipIntermediates"], "readOnly": false, "type": "boolean"}, "services.znapzend.features.zfsGetType": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable use zfsGetType if your {command}`zfs get` supports a\n`-t` argument for filtering by dataset type at all AND\nlists properties for snapshots by default when recursing, so that there\nis too much data to process while searching for backup plans.\nIf these two conditions apply to your system, the time needed for a\n`--recursive` search for backup plans can literally\ndiffer by hundreds of times (depending on the amount of snapshots in\nthat dataset tree... and a decent backup plan will ensure you have a lot\nof those), so you would benefit from requesting this feature.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "znapzend", "features", "zfsGetType"], "readOnly": false, "type": "boolean"}, "services.znapzend.logLevel": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "\"debug\""}, "description": {"_type": "mdDoc", "text": "The log level when logging to file. Any of debug, info, warning, err,\nalert. Default in daemonized form is debug.\n"}, "example": {"_type": "literalExpression", "text": "\"warning\""}, "loc": ["services", "znapzend", "logLevel"], "readOnly": false, "type": "one of \"debug\", \"info\", \"warning\", \"err\", \"alert\""}, "services.znapzend.logTo": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "\"syslog::daemon\""}, "description": {"_type": "mdDoc", "text": "Where to log to (syslog::\\<facility\\> or \\<filepath\\>).\n"}, "example": {"_type": "literalExpression", "text": "\"/var/log/znapzend.log\""}, "loc": ["services", "znapzend", "logTo"], "readOnly": false, "type": "string"}, "services.znapzend.noDestroy": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Does all changes to the filesystem except destroy."}, "loc": ["services", "znapzend", "noDestroy"], "readOnly": false, "type": "boolean"}, "services.znapzend.pure": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Do not persist any stateful znapzend setups. If this option is\nenabled, your previously set znapzend setups will be cleared and only\nthe ones defined with this module will be applied.\n"}, "loc": ["services", "znapzend", "pure"], "readOnly": false, "type": "boolean"}, "services.znapzend.zetup": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Znapzend configuration."}, "example": {"_type": "literalExpression", "text": "{\n  \"tank/home\" = {\n    # Make snapshots of tank/home every hour, keep those for 1 day,\n    # keep every days snapshot for 1 month, etc.\n    plan = \"1d=>1h,1m=>1d,1y=>1m\";\n    recursive = true;\n    # Send all those snapshots to john@example.com:rtank/john as well\n    destinations.remote = {\n      host = \"john@example.com\";\n      dataset = \"rtank/john\";\n    };\n  };\n};\n"}, "loc": ["services", "znapzend", "zetup"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.znapzend.zetup.<name>.dataset": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "description": {"_type": "mdDoc", "text": "The dataset to use for this source."}, "example": {"_type": "literalExpression", "text": "\"tank/home\""}, "loc": ["services", "znapzend", "zetup", "<name>", "dataset"], "readOnly": false, "type": "string"}, "services.znapzend.zetup.<name>.destinations": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional destinations."}, "example": {"_type": "literalExpression", "text": "{\n  local = {\n    dataset = \"btank/backup\";\n    presend = \"zpool import -N btank\";\n    postsend = \"zpool export btank\";\n  };\n  remote = {\n    host = \"john@example.com\";\n    dataset = \"tank/john\";\n  };\n};\n"}, "loc": ["services", "znapzend", "zetup", "<name>", "destinations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.znapzend.zetup.<name>.destinations.<name>.dataset": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "description": {"_type": "mdDoc", "text": "Dataset name to send snapshots to."}, "example": {"_type": "literalExpression", "text": "\"tank/main\""}, "loc": ["services", "znapzend", "zetup", "<name>", "destinations", "<name>", "dataset"], "readOnly": false, "type": "string"}, "services.znapzend.zetup.<name>.destinations.<name>.host": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host to use for the destination dataset. Can be prefixed with\n`user@` to specify the ssh user.\n"}, "example": {"_type": "literalExpression", "text": "\"john@example.com\""}, "loc": ["services", "znapzend", "zetup", "<name>", "destinations", "<name>", "host"], "readOnly": false, "type": "null or string"}, "services.znapzend.zetup.<name>.destinations.<name>.label": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "description": {"_type": "mdDoc", "text": "Label for this destination. Defaults to the attribute name."}, "loc": ["services", "znapzend", "zetup", "<name>", "destinations", "<name>", "label"], "readOnly": false, "type": "string"}, "services.znapzend.zetup.<name>.destinations.<name>.plan": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "description": {"_type": "mdDoc", "text": "The znapzend backup plan to use for the source.\n\nThe plan specifies how often to backup and for how long to keep the\nbackups. It consists of a series of retention periods to interval\nassociations:\n\n```\n  retA=>intA,retB=>intB,...\n```\n\nBoth intervals and retention periods are expressed in standard units\nof time or multiples of them. You can use both the full name or a\nshortcut according to the following listing:\n\n```\n  second|sec|s, minute|min, hour|h, day|d, week|w, month|mon|m, year|y\n```\n\nSee {manpage}`znapzendzetup(1)` for more info.\n"}, "example": {"_type": "literalExpression", "text": "\"1h=>10min,1d=>1h,1w=>1d,1m=>1w,1y=>1m\""}, "loc": ["services", "znapzend", "zetup", "<name>", "destinations", "<name>", "plan"], "readOnly": false, "type": "string"}, "services.znapzend.zetup.<name>.destinations.<name>.postsend": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Command to run after sending the snapshot to the destination.\nIntended to run a remote script via {command}`ssh` on the\ndestination, e.g. to bring up a backup disk or server or to put a\nzpool online/offline. See also {option}`presend`.\n"}, "example": {"_type": "literalExpression", "text": "\"ssh root@bserv zpool export tank\""}, "loc": ["services", "znapzend", "zetup", "<name>", "destinations", "<name>", "postsend"], "readOnly": false, "type": "null or string"}, "services.znapzend.zetup.<name>.destinations.<name>.presend": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Command to run before sending the snapshot to the destination.\nIntended to run a remote script via {command}`ssh` on the\ndestination, e.g. to bring up a backup disk or server or to put a\nzpool online/offline. See also {option}`postsend`.\n"}, "example": {"_type": "literalExpression", "text": "\"ssh root@bserv zpool import -Nf tank\""}, "loc": ["services", "znapzend", "zetup", "<name>", "destinations", "<name>", "presend"], "readOnly": false, "type": "null or string"}, "services.znapzend.zetup.<name>.enable": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable this source."}, "loc": ["services", "znapzend", "zetup", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "services.znapzend.zetup.<name>.mbuffer.enable": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to use {command}`mbuffer`."}, "loc": ["services", "znapzend", "zetup", "<name>", "mbuffer", "enable"], "readOnly": false, "type": "boolean"}, "services.znapzend.zetup.<name>.mbuffer.port": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Port to use for {command}`mbuffer`.\n\nIf this is null, it will run {command}`mbuffer` through\nssh.\n\nIf this is not null, it will run {command}`mbuffer`\ndirectly through TCP, which is not encrypted but faster. In that\ncase the given port needs to be open on the destination host.\n"}, "loc": ["services", "znapzend", "zetup", "<name>", "mbuffer", "port"], "readOnly": false, "type": "null or 16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.znapzend.zetup.<name>.mbuffer.size": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "\"1G\""}, "description": {"_type": "mdDoc", "text": "The size for {command}`mbuffer`.\nSupports the units b, k, M, G.\n"}, "example": {"_type": "literalExpression", "text": "\"128M\""}, "loc": ["services", "znapzend", "zetup", "<name>", "mbuffer", "size"], "readOnly": false, "type": "string of the form number{b|k|M|G}"}, "services.znapzend.zetup.<name>.plan": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "description": {"_type": "mdDoc", "text": "The znapzend backup plan to use for the source.\n\nThe plan specifies how often to backup and for how long to keep the\nbackups. It consists of a series of retention periods to interval\nassociations:\n\n```\n  retA=>intA,retB=>intB,...\n```\n\nBoth intervals and retention periods are expressed in standard units\nof time or multiples of them. You can use both the full name or a\nshortcut according to the following listing:\n\n```\n  second|sec|s, minute|min, hour|h, day|d, week|w, month|mon|m, year|y\n```\n\nSee {manpage}`znapzendzetup(1)` for more info.\n"}, "example": {"_type": "literalExpression", "text": "\"1h=>10min,1d=>1h,1w=>1d,1m=>1w,1y=>1m\""}, "loc": ["services", "znapzend", "zetup", "<name>", "plan"], "readOnly": false, "type": "string"}, "services.znapzend.zetup.<name>.postsnap": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Command to run after snapshots are taken on the source dataset,\ne.g. for database unlocking. See also {option}`presnap`.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.coreutils}/bin/kill `${pkgs.coreutils}/bin/cat /tmp/mariadblock.pid`;${pkgs.coreutils}/bin/rm /tmp/mariadblock.pid\"\n"}, "loc": ["services", "znapzend", "zetup", "<name>", "postsnap"], "readOnly": false, "type": "null or string"}, "services.znapzend.zetup.<name>.presnap": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Command to run before snapshots are taken on the source dataset,\ne.g. for database locking/flushing. See also\n{option}`postsnap`.\n"}, "example": {"_type": "literalExpression", "text": "''${pkgs.mariadb}/bin/mysql -e \"set autocommit=0;flush tables with read lock;\\\\! ${pkgs.coreutils}/bin/sleep 600\" &  ${pkgs.coreutils}/bin/echo $! > /tmp/mariadblock.pid ; sleep 10''\n"}, "loc": ["services", "znapzend", "zetup", "<name>", "presnap"], "readOnly": false, "type": "null or string"}, "services.znapzend.zetup.<name>.recursive": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to do recursive snapshots."}, "loc": ["services", "znapzend", "zetup", "<name>", "recursive"], "readOnly": false, "type": "boolean"}, "services.znapzend.zetup.<name>.sendDelay": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Specify delay (in seconds) before sending snaps to the destination.\nMay be useful if you want to control sending time.\n"}, "example": {"_type": "literalExpression", "text": "60"}, "loc": ["services", "znapzend", "zetup", "<name>", "sendDelay"], "readOnly": false, "type": "signed integer"}, "services.znapzend.zetup.<name>.timestampFormat": {"declarations": ["nixos/modules/services/backup/znapzend.nix"], "default": {"_type": "literalExpression", "text": "\"%Y-%m-%d-%H%M%S\""}, "description": {"_type": "mdDoc", "text": "The timestamp format to use for constructing snapshot names.\nThe syntax is `strftime`-like. The string must\nconsist of the mandatory `%Y %m %d %H %M %S`.\nOptionally  `- _ . :`  characters as well as any\nalphanumeric character are allowed. If suffixed by a\n`Z`, times will be in UTC.\n"}, "example": {"_type": "literalExpression", "text": "\"znapzend-%m.%d.%Y-%H%M%SZ\""}, "loc": ["services", "znapzend", "zetup", "<name>", "timestampFormat"], "readOnly": false, "type": "string containing all of the characters %Y, %m, %d, %H, %M, %S"}, "services.znc.confOptions.extraZncConf": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config to `znc.conf` file.\n"}, "loc": ["services", "znc", "confOptions", "extraZncConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.znc.confOptions.modules": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"webadmin\"\n  \"adminlog\"\n]"}, "description": {"_type": "mdDoc", "text": "A list of modules to include in the `znc.conf` file.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"partyline\"\n  \"webadmin\"\n  \"adminlog\"\n  \"log\"\n]"}, "loc": ["services", "znc", "confOptions", "modules"], "readOnly": false, "type": "list of string"}, "services.znc.confOptions.networks": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "IRC networks to connect the user to.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"libera\" = {\n    server = \"irc.libera.chat\";\n    port = 6697;\n    useSSL = true;\n    modules = [ \"simple_away\" ];\n  };\n};\n"}, "loc": ["services", "znc", "confOptions", "networks"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.znc.confOptions.networks.<name>.channels": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "IRC channels to join.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"nixos\"\n]"}, "loc": ["services", "znc", "confOptions", "networks", "<name>", "channels"], "readOnly": false, "type": "list of string"}, "services.znc.confOptions.networks.<name>.extraConf": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config for the network. Consider using\n{option}`services.znc.config` instead.\n"}, "example": {"_type": "literalExpression", "text": "''\n  Encoding = ^UTF-8\n  FloodBurst = 4\n  FloodRate = 1.00\n  IRCConnectEnabled = true\n  Ident = johntron\n  JoinDelay = 0\n  Nick = johntron\n''"}, "loc": ["services", "znc", "confOptions", "networks", "<name>", "extraConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.znc.confOptions.networks.<name>.hasBitlbeeControlChannel": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add the special Bitlbee operations channel.\n"}, "loc": ["services", "znc", "confOptions", "networks", "<name>", "hasBitlbeeControlChannel"], "readOnly": false, "type": "boolean"}, "services.znc.confOptions.networks.<name>.modules": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"simple_away\"\n]"}, "description": {"_type": "mdDoc", "text": "ZNC network modules to load.\n"}, "example": {"_type": "literalExpression", "text": "[ \"simple_away\" \"sasl\" ]"}, "loc": ["services", "znc", "confOptions", "networks", "<name>", "modules"], "readOnly": false, "type": "list of string"}, "services.znc.confOptions.networks.<name>.password": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "IRC server password, such as for a Slack gateway.\n"}, "loc": ["services", "znc", "confOptions", "networks", "<name>", "password"], "readOnly": false, "type": "string"}, "services.znc.confOptions.networks.<name>.port": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "6697"}, "description": {"_type": "mdDoc", "text": "IRC server port.\n"}, "loc": ["services", "znc", "confOptions", "networks", "<name>", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.znc.confOptions.networks.<name>.server": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "description": {"_type": "mdDoc", "text": "IRC server address.\n"}, "example": {"_type": "literalExpression", "text": "\"irc.libera.chat\""}, "loc": ["services", "znc", "confOptions", "networks", "<name>", "server"], "readOnly": false, "type": "string"}, "services.znc.confOptions.networks.<name>.useSSL": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to use SSL to connect to the IRC server.\n"}, "loc": ["services", "znc", "confOptions", "networks", "<name>", "useSSL"], "readOnly": false, "type": "boolean"}, "services.znc.confOptions.nick": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "\"znc-user\""}, "description": {"_type": "mdDoc", "text": "The IRC nick.\n"}, "example": {"_type": "literalExpression", "text": "\"john\""}, "loc": ["services", "znc", "confOptions", "nick"], "readOnly": false, "type": "string"}, "services.znc.confOptions.passBlock": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "description": {"_type": "mdDoc", "text": "Generate with {command}`nix-shell -p znc --command \"znc --makepass\"`.\nThis is the password used to log in to the ZNC web admin interface.\nYou can also set this through\n{option}`services.znc.config.User.<username>.Pass.Method`\nand co.\n"}, "example": {"_type": "literalExpression", "text": "''\n  &lt;Pass password&gt;\n     Method = sha256\n     Hash = e2ce303c7ea75c571d80d8540a8699b46535be6a085be3414947d638e48d9e93\n     Salt = l5Xryew4g*!oa(ECfX2o\n  &lt;/Pass&gt;\n''"}, "loc": ["services", "znc", "confOptions", "passBlock"], "readOnly": false, "type": "string"}, "services.znc.confOptions.port": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "5000"}, "description": {"_type": "mdDoc", "text": "Specifies the port on which to listen.\n"}, "loc": ["services", "znc", "confOptions", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.znc.confOptions.uriPrefix": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "An optional URI prefix for the ZNC web interface. Can be\nused to make ZNC available behind a reverse proxy.\n"}, "example": {"_type": "literalExpression", "text": "\"/znc/\""}, "loc": ["services", "znc", "confOptions", "uriPrefix"], "readOnly": false, "type": "null or string"}, "services.znc.confOptions.useSSL": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Indicates whether the ZNC server should use SSL when listening on\nthe specified port. A self-signed certificate will be generated.\n"}, "loc": ["services", "znc", "confOptions", "useSSL"], "readOnly": false, "type": "boolean"}, "services.znc.confOptions.userModules": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"chansaver\"\n  \"controlpanel\"\n]"}, "description": {"_type": "mdDoc", "text": "A list of user modules to include in the `znc.conf` file.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"chansaver\"\n  \"controlpanel\"\n  \"fish\"\n  \"push\"\n]"}, "loc": ["services", "znc", "confOptions", "userModules"], "readOnly": false, "type": "list of string"}, "services.znc.confOptions.userName": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "\"znc\""}, "description": {"_type": "mdDoc", "text": "The user name used to log in to the ZNC web admin interface.\n"}, "example": {"_type": "literalExpression", "text": "\"johntron\""}, "loc": ["services", "znc", "confOptions", "userName"], "readOnly": false, "type": "string"}, "services.znc.config": {"declarations": ["nixos/modules/services/networking/znc/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for ZNC, see\n<https://wiki.znc.in/Configuration> for details. The\nNix value declared here will be translated directly to the xml-like\nformat ZNC expects. This is much more flexible than the legacy options\nunder {option}`services.znc.confOptions.*`, but also can't do\nany type checking.\n\nYou can use {command}`nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.services.znc.config`\nto view the current value. By default it contains a listener for port\n5000 with SSL enabled.\n\nNix attributes called `extraConfig` will be inserted\nverbatim into the resulting config file.\n\nIf {option}`services.znc.useLegacyConfig` is turned on, the\noption values in {option}`services.znc.confOptions.*` will be\ngracefully be applied to this option.\n\nIf you intend to update the configuration through this option, be sure\nto disable {option}`services.znc.mutable`, otherwise none of the\nchanges here will be applied after the initial deploy.\n"}, "example": {"_type": "literalExpression", "text": "{\n  LoadModule = [ \"webadmin\" \"adminlog\" ];\n  User.paul = {\n    Admin = true;\n    Nick = \"paul\";\n    AltNick = \"paul1\";\n    LoadModule = [ \"chansaver\" \"controlpanel\" ];\n    Network.libera = {\n      Server = \"irc.libera.chat +6697\";\n      LoadModule = [ \"simple_away\" ];\n      Chan = {\n        \"#nixos\" = { Detached = false; };\n        \"##linux\" = { Disabled = true; };\n      };\n    };\n    Pass.password = {\n      Method = \"sha256\";\n      Hash = \"e2ce303c7ea75c571d80d8540a8699b46535be6a085be3414947d638e48d9e93\";\n      Salt = \"l5Xryew4g*!oa(ECfX2o\";\n    };\n  };\n}\n"}, "loc": ["services", "znc", "config"], "readOnly": false, "type": "attribute set of (znc values (null, atoms (str, int, bool), list of atoms, or attrsets of znc values))"}, "services.znc.configFile": {"declarations": ["nixos/modules/services/networking/znc/default.nix"], "description": {"_type": "mdDoc", "text": "Configuration file for ZNC. It is recommended to use the\n{option}`config` option instead.\n\nSetting this option will override any auto-generated config file\nthrough the {option}`confOptions` or {option}`config`\noptions.\n"}, "example": {"_type": "literalExpression", "text": "~/.znc/configs/znc.conf"}, "loc": ["services", "znc", "configFile"], "readOnly": false, "type": "path"}, "services.znc.dataDir": {"declarations": ["nixos/modules/services/networking/znc/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/znc\""}, "description": {"_type": "mdDoc", "text": "The state directory for ZNC. The config and the modules will be linked\nto from this directory as well.\n"}, "example": {"_type": "literalExpression", "text": "\"/home/john/.znc\""}, "loc": ["services", "znc", "dataDir"], "readOnly": false, "type": "path"}, "services.znc.enable": {"declarations": ["nixos/modules/services/networking/znc/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ZNC."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "znc", "enable"], "readOnly": false, "type": "boolean"}, "services.znc.extraFlags": {"declarations": ["nixos/modules/services/networking/znc/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra arguments to use for executing znc.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--debug\"\n]"}, "loc": ["services", "znc", "extraFlags"], "readOnly": false, "type": "list of string"}, "services.znc.group": {"declarations": ["nixos/modules/services/networking/znc/default.nix"], "default": {"_type": "literalExpression", "text": "\"znc\""}, "description": {"_type": "mdDoc", "text": "Group to own the ZNC process.\n"}, "example": {"_type": "literalExpression", "text": "\"users\""}, "loc": ["services", "znc", "group"], "readOnly": false, "type": "string"}, "services.znc.modulePackages": {"declarations": ["nixos/modules/services/networking/znc/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of global znc module packages to add to znc.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.zncModules.fish pkgs.zncModules.push ]"}, "loc": ["services", "znc", "modulePackages"], "readOnly": false, "type": "list of package"}, "services.znc.mutable": {"declarations": ["nixos/modules/services/networking/znc/default.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Indicates whether to allow the contents of the\n`dataDir` directory to be changed by the user at\nrun-time.\n\nIf enabled, modifications to the ZNC configuration after its initial\ncreation are not overwritten by a NixOS rebuild. If disabled, the\nZNC configuration is rebuilt on every NixOS rebuild.\n\nIf the user wants to manage the ZNC service using the web admin\ninterface, this option should be enabled.\n"}, "loc": ["services", "znc", "mutable"], "readOnly": false, "type": "boolean"}, "services.znc.openFirewall": {"declarations": ["nixos/modules/services/networking/znc/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open ports in the firewall for ZNC. Does work with\nports for listeners specified in\n{option}`services.znc.config.Listener`.\n"}, "loc": ["services", "znc", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.znc.useLegacyConfig": {"declarations": ["nixos/modules/services/networking/znc/options.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to propagate the legacy options under\n{option}`services.znc.confOptions.*` to the znc config. If this\nis turned on, the znc config will contain a user with the default name\n\"znc\", global modules \"webadmin\" and \"adminlog\" will be enabled by\ndefault, and more, all controlled through the\n{option}`services.znc.confOptions.*` options.\nYou can use {command}`nix-instantiate --eval --strict '<nixpkgs/nixos>' -A config.services.znc.config`\nto view the current value of the config.\n\nIn any case, if you need more flexibility,\n{option}`services.znc.config` can be used to override/add to\nall of the legacy options.\n"}, "loc": ["services", "znc", "useLegacyConfig"], "readOnly": false, "type": "boolean"}, "services.znc.user": {"declarations": ["nixos/modules/services/networking/znc/default.nix"], "default": {"_type": "literalExpression", "text": "\"znc\""}, "description": {"_type": "mdDoc", "text": "The name of an existing user account to use to own the ZNC server\nprocess. If not specified, a default user will be created.\n"}, "example": {"_type": "literalExpression", "text": "\"john\""}, "loc": ["services", "znc", "user"], "readOnly": false, "type": "string"}, "services.zoneminder.cameras": {"declarations": ["nixos/modules/services/misc/zoneminder.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Set this to the number of cameras you expect to support.\n"}, "loc": ["services", "zoneminder", "cameras"], "readOnly": false, "type": "signed integer"}, "services.zoneminder.database.createLocally": {"declarations": ["nixos/modules/services/misc/zoneminder.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create the database and database user locally.\n"}, "loc": ["services", "zoneminder", "database", "createLocally"], "readOnly": false, "type": "boolean"}, "services.zoneminder.database.host": {"declarations": ["nixos/modules/services/misc/zoneminder.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Hostname hosting the database.\n"}, "loc": ["services", "zoneminder", "database", "host"], "readOnly": false, "type": "string"}, "services.zoneminder.database.name": {"declarations": ["nixos/modules/services/misc/zoneminder.nix"], "default": {"_type": "literalExpression", "text": "\"zm\""}, "description": {"_type": "mdDoc", "text": "Name of database.\n"}, "loc": ["services", "zoneminder", "database", "name"], "readOnly": false, "type": "string"}, "services.zoneminder.database.password": {"declarations": ["nixos/modules/services/misc/zoneminder.nix"], "default": {"_type": "literalExpression", "text": "\"zmpass\""}, "description": {"_type": "mdDoc", "text": "Username for accessing the database.\nNot used if `createLocally` is set.\n"}, "loc": ["services", "zoneminder", "database", "password"], "readOnly": false, "type": "string"}, "services.zoneminder.database.username": {"declarations": ["nixos/modules/services/misc/zoneminder.nix"], "default": {"_type": "literalExpression", "text": "\"zmuser\""}, "description": {"_type": "mdDoc", "text": "Username for accessing the database.\n"}, "loc": ["services", "zoneminder", "database", "username"], "readOnly": false, "type": "string"}, "services.zoneminder.enable": {"declarations": ["nixos/modules/services/misc/zoneminder.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ZoneMinder\n\nIf you intend to run the database locally, you should set\n`config.services.zoneminder.database.createLocally` to true. Otherwise,\nwhen set to `false` (the default), you will have to create the database\nand database user as well as populate the database yourself.\nAdditionally, you will need to run `zmupdate.pl` yourself when\nupgrading to a newer version.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zoneminder", "enable"], "readOnly": false, "type": "boolean"}, "services.zoneminder.extraConfig": {"declarations": ["nixos/modules/services/misc/zoneminder.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional configuration added verbatim to the configuration file.\n"}, "loc": ["services", "zoneminder", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.zoneminder.hostname": {"declarations": ["nixos/modules/services/misc/zoneminder.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "The hostname on which to listen.\n"}, "loc": ["services", "zoneminder", "hostname"], "readOnly": false, "type": "string"}, "services.zoneminder.openFirewall": {"declarations": ["nixos/modules/services/misc/zoneminder.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Open the firewall port(s).\n"}, "loc": ["services", "zoneminder", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.zoneminder.port": {"declarations": ["nixos/modules/services/misc/zoneminder.nix"], "default": {"_type": "literalExpression", "text": "8095"}, "description": {"_type": "mdDoc", "text": "The port on which to listen.\n"}, "loc": ["services", "zoneminder", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zoneminder.storageDir": {"declarations": ["nixos/modules/services/misc/zoneminder.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "ZoneMinder can generate quite a lot of data, so in case you don't want\nto use the default /var/lib/zoneminder, you can override the path here.\n"}, "example": {"_type": "literalExpression", "text": "\"/storage/tank\""}, "loc": ["services", "zoneminder", "storageDir"], "readOnly": false, "type": "null or string"}, "services.zoneminder.webserver": {"declarations": ["nixos/modules/services/misc/zoneminder.nix"], "default": {"_type": "literalExpression", "text": "\"nginx\""}, "description": {"_type": "mdDoc", "text": "The webserver to configure for the PHP frontend.\n\nSet it to `none` if you want to configure it yourself. PRs are welcome\nfor support for other web servers.\n"}, "loc": ["services", "zoneminder", "webserver"], "readOnly": false, "type": "one of \"nginx\", \"none\""}, "services.zookeeper.dataDir": {"declarations": ["nixos/modules/services/misc/zookeeper.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/zookeeper\""}, "description": {"_type": "mdDoc", "text": "Data directory for Zookeeper\n"}, "loc": ["services", "zookeeper", "dataDir"], "readOnly": false, "type": "path"}, "services.zookeeper.enable": {"declarations": ["nixos/modules/services/misc/zookeeper.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Zookeeper."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zookeeper", "enable"], "readOnly": false, "type": "boolean"}, "services.zookeeper.extraCmdLineOptions": {"declarations": ["nixos/modules/services/misc/zookeeper.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"-Dcom.sun.management.jmxremote\"\n  \"-Dcom.sun.management.jmxremote.local.only=true\"\n]"}, "description": {"_type": "mdDoc", "text": "Extra command line options for the Zookeeper launcher."}, "example": {"_type": "literalExpression", "text": "[\n  \"-Djava.net.preferIPv4Stack=true\"\n  \"-Dcom.sun.management.jmxremote\"\n  \"-Dcom.sun.management.jmxremote.local.only=true\"\n]"}, "loc": ["services", "zookeeper", "extraCmdLineOptions"], "readOnly": false, "type": "list of string"}, "services.zookeeper.extraConf": {"declarations": ["nixos/modules/services/misc/zookeeper.nix"], "default": {"_type": "literalExpression", "text": "''\n  initLimit=5\n  syncLimit=2\n  tickTime=2000\n''"}, "description": {"_type": "mdDoc", "text": "Extra configuration for Zookeeper."}, "loc": ["services", "zookeeper", "extraConf"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.zookeeper.id": {"declarations": ["nixos/modules/services/misc/zookeeper.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Zookeeper ID."}, "loc": ["services", "zookeeper", "id"], "readOnly": false, "type": "signed integer"}, "services.zookeeper.jre": {"declarations": ["nixos/modules/services/misc/zookeeper.nix"], "default": {"_type": "literalExpression", "text": "pkgs.zookeeper.jre"}, "description": {"_type": "mdDoc", "text": "The JRE with which to run Zookeeper"}, "example": {"_type": "literalExpression", "text": "pkgs.jre"}, "loc": ["services", "zookeeper", "jre"], "readOnly": false, "type": "package"}, "services.zookeeper.logging": {"declarations": ["nixos/modules/services/misc/zookeeper.nix"], "default": {"_type": "literalExpression", "text": "''\n  zookeeper.root.logger=INFO, CONSOLE\n  log4j.rootLogger=INFO, CONSOLE\n  log4j.logger.org.apache.zookeeper.audit.Log4jAuditLogger=INFO, CONSOLE\n  log4j.appender.CONSOLE=org.apache.log4j.ConsoleAppender\n  log4j.appender.CONSOLE.layout=org.apache.log4j.PatternLayout\n  log4j.appender.CONSOLE.layout.ConversionPattern=[myid:%X{myid}] - %-5p [%t:%C{1}@%L] - %m%n\n''"}, "description": {"_type": "mdDoc", "text": "Zookeeper logging configuration."}, "loc": ["services", "zookeeper", "logging"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.zookeeper.package": {"declarations": ["nixos/modules/services/misc/zookeeper.nix"], "default": {"_type": "literalExpression", "text": "pkgs.zookeeper"}, "description": {"_type": "mdDoc", "text": "The zookeeper package to use"}, "loc": ["services", "zookeeper", "package"], "readOnly": false, "type": "package"}, "services.zookeeper.port": {"declarations": ["nixos/modules/services/misc/zookeeper.nix"], "default": {"_type": "literalExpression", "text": "2181"}, "description": {"_type": "mdDoc", "text": "Zookeeper Client port."}, "loc": ["services", "zookeeper", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.zookeeper.preferIPv4": {"declarations": ["nixos/modules/services/misc/zookeeper.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Add the -Djava.net.preferIPv4Stack=true flag to the Zookeeper server.\n"}, "loc": ["services", "zookeeper", "preferIPv4"], "readOnly": false, "type": "boolean"}, "services.zookeeper.purgeInterval": {"declarations": ["nixos/modules/services/misc/zookeeper.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "The time interval in hours for which the purge task has to be triggered. Set to a positive integer (1 and above) to enable the auto purging.\n"}, "loc": ["services", "zookeeper", "purgeInterval"], "readOnly": false, "type": "signed integer"}, "services.zookeeper.servers": {"declarations": ["nixos/modules/services/misc/zookeeper.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "All Zookeeper Servers."}, "example": {"_type": "literalExpression", "text": "''\n  server.0=host0:2888:3888\n  server.1=host1:2888:3888\n  server.2=host2:2888:3888\n''"}, "loc": ["services", "zookeeper", "servers"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.zope2.instances": {"declarations": ["nixos/modules/services/web-servers/zope2.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "zope2 instances to be created automatically by the system."}, "example": {"_type": "literalExpression", "text": "{\n  plone01 = {\n    http_address = \"127.0.0.1:8080\";\n    extra =\n      ''\n      <zodb_db main>\n        mount-point /\n        cache-size 30000\n        <blobstorage>\n            blob-dir /var/lib/zope2/plone01/blobstorage\n            <filestorage>\n            path /var/lib/zope2/plone01/filestorage/Data.fs\n            </filestorage>\n        </blobstorage>\n      </zodb_db>\n      '';\n  };\n}\n"}, "loc": ["services", "zope2", "instances"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.zope2.instances.<name>.clientHome": {"declarations": ["nixos/modules/services/web-servers/zope2.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/zope2/\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Home directory of zope2 instance."}, "loc": ["services", "zope2", "instances", "<name>", "clientHome"], "readOnly": false, "type": "path"}, "services.zope2.instances.<name>.extra": {"declarations": ["nixos/modules/services/web-servers/zope2.nix"], "default": {"_type": "literalExpression", "text": "''\n  <zodb_db main>\n    mount-point /\n    cache-size 30000\n    <blobstorage>\n        blob-dir /var/lib/zope2/\u2039name\u203a/blobstorage\n        <filestorage>\n        path /var/lib/zope2/\u2039name\u203a/filestorage/Data.fs\n        </filestorage>\n    </blobstorage>\n  </zodb_db>\n''"}, "description": {"_type": "mdDoc", "text": "Extra zope.conf"}, "loc": ["services", "zope2", "instances", "<name>", "extra"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.zope2.instances.<name>.http_address": {"declarations": ["nixos/modules/services/web-servers/zope2.nix"], "default": {"_type": "literalExpression", "text": "\"localhost:8080\""}, "description": {"_type": "mdDoc", "text": "Give a port and address for the HTTP server."}, "loc": ["services", "zope2", "instances", "<name>", "http_address"], "readOnly": false, "type": "string"}, "services.zope2.instances.<name>.name": {"declarations": ["nixos/modules/services/web-servers/zope2.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "The name of the zope2 instance. If undefined, the name of the attribute set will be used."}, "loc": ["services", "zope2", "instances", "<name>", "name"], "readOnly": false, "type": "string"}, "services.zope2.instances.<name>.packages": {"declarations": ["nixos/modules/services/web-servers/zope2.nix"], "description": {"_type": "mdDoc", "text": "The list of packages you want to make available to the zope2 instance."}, "loc": ["services", "zope2", "instances", "<name>", "packages"], "readOnly": false, "type": "list of package"}, "services.zope2.instances.<name>.threads": {"declarations": ["nixos/modules/services/web-servers/zope2.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Specify the number of threads that Zope's ZServer web server will use to service requests. "}, "loc": ["services", "zope2", "instances", "<name>", "threads"], "readOnly": false, "type": "signed integer"}, "services.zope2.instances.<name>.user": {"declarations": ["nixos/modules/services/web-servers/zope2.nix"], "default": {"_type": "literalExpression", "text": "\"zope2\""}, "description": {"_type": "mdDoc", "text": "The name of the effective user for the Zope process."}, "loc": ["services", "zope2", "instances", "<name>", "user"], "readOnly": false, "type": "string"}, "services.zrepl.enable": {"declarations": ["nixos/modules/services/backup/zrepl.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable zrepl."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "zrepl", "enable"], "readOnly": false, "type": "boolean"}, "services.zrepl.package": {"declarations": ["nixos/modules/services/backup/zrepl.nix"], "default": {"_type": "literalExpression", "text": "pkgs.zrepl"}, "description": {"_type": "mdDoc", "text": "Which package to use for zrepl"}, "loc": ["services", "zrepl", "package"], "readOnly": false, "type": "package"}, "services.zrepl.settings": {"declarations": ["nixos/modules/services/backup/zrepl.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for zrepl. See <https://zrepl.github.io/configuration.html>\nfor more information.\n"}, "loc": ["services", "zrepl", "settings"], "readOnly": false, "type": "YAML value"}, "snapraid.contentFiles": {"declarations": ["nixos/modules/tasks/snapraid.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "SnapRAID content list files."}, "example": {"_type": "literalExpression", "text": "[\n  \"/var/snapraid.content\"\n  \"/mnt/disk1/snapraid.content\"\n  \"/mnt/disk2/snapraid.content\"\n]"}, "loc": ["snapraid", "contentFiles"], "readOnly": false, "type": "list of string"}, "snapraid.dataDisks": {"declarations": ["nixos/modules/tasks/snapraid.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "SnapRAID data disks."}, "example": {"_type": "literalExpression", "text": "{\n  d1 = \"/mnt/disk1/\";\n  d2 = \"/mnt/disk2/\";\n  d3 = \"/mnt/disk3/\";\n}"}, "loc": ["snapraid", "dataDisks"], "readOnly": false, "type": "attribute set of string"}, "snapraid.enable": {"declarations": ["nixos/modules/tasks/snapraid.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable SnapRAID."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["snapraid", "enable"], "readOnly": false, "type": "boolean"}, "snapraid.exclude": {"declarations": ["nixos/modules/tasks/snapraid.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "SnapRAID exclude directives."}, "example": {"_type": "literalExpression", "text": "[\n  \"*.unrecoverable\"\n  \"/tmp/\"\n  \"/lost+found/\"\n]"}, "loc": ["snapraid", "exclude"], "readOnly": false, "type": "list of string"}, "snapraid.extraConfig": {"declarations": ["nixos/modules/tasks/snapraid.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config options for SnapRAID."}, "example": {"_type": "literalExpression", "text": "''\n  nohidden\n  blocksize 256\n  hashsize 16\n  autosave 500\n  pool /pool\n''"}, "loc": ["snapraid", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "snapraid.parityFiles": {"declarations": ["nixos/modules/tasks/snapraid.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "SnapRAID parity files."}, "example": {"_type": "literalExpression", "text": "[\n  \"/mnt/diskp/snapraid.parity\"\n  \"/mnt/diskq/snapraid.2-parity\"\n  \"/mnt/diskr/snapraid.3-parity\"\n  \"/mnt/disks/snapraid.4-parity\"\n  \"/mnt/diskt/snapraid.5-parity\"\n  \"/mnt/disku/snapraid.6-parity\"\n]"}, "loc": ["snapraid", "parityFiles"], "readOnly": false, "type": "list of string"}, "snapraid.scrub.interval": {"declarations": ["nixos/modules/tasks/snapraid.nix"], "default": {"_type": "literalExpression", "text": "\"Mon *-*-* 02:00:00\""}, "description": {"_type": "mdDoc", "text": "How often to run {command}`snapraid scrub`."}, "example": {"_type": "literalExpression", "text": "\"weekly\""}, "loc": ["snapraid", "scrub", "interval"], "readOnly": false, "type": "string"}, "snapraid.scrub.olderThan": {"declarations": ["nixos/modules/tasks/snapraid.nix"], "default": {"_type": "literalExpression", "text": "10"}, "description": {"_type": "mdDoc", "text": "Number of days since data was last scrubbed before it can be scrubbed again."}, "example": {"_type": "literalExpression", "text": "20"}, "loc": ["snapraid", "scrub", "olderThan"], "readOnly": false, "type": "signed integer"}, "snapraid.scrub.plan": {"declarations": ["nixos/modules/tasks/snapraid.nix"], "default": {"_type": "literalExpression", "text": "8"}, "description": {"_type": "mdDoc", "text": "Percent of the array that should be checked by {command}`snapraid scrub`."}, "example": {"_type": "literalExpression", "text": "5"}, "loc": ["snapraid", "scrub", "plan"], "readOnly": false, "type": "signed integer"}, "snapraid.sync.interval": {"declarations": ["nixos/modules/tasks/snapraid.nix"], "default": {"_type": "literalExpression", "text": "\"01:00\""}, "description": {"_type": "mdDoc", "text": "How often to run {command}`snapraid sync`."}, "example": {"_type": "literalExpression", "text": "\"daily\""}, "loc": ["snapraid", "sync", "interval"], "readOnly": false, "type": "string"}, "snapraid.touchBeforeSync": {"declarations": ["nixos/modules/tasks/snapraid.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether {command}`snapraid touch` should be run before {command}`snapraid sync`."}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["snapraid", "touchBeforeSync"], "readOnly": false, "type": "boolean"}, "sound.enable": {"declarations": ["nixos/modules/services/audio/alsa.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ALSA sound.\n"}, "loc": ["sound", "enable"], "readOnly": false, "type": "boolean"}, "sound.enableOSSEmulation": {"declarations": ["nixos/modules/services/audio/alsa.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable ALSA OSS emulation (with certain cards sound mixing may not work!).\n"}, "loc": ["sound", "enableOSSEmulation"], "readOnly": false, "type": "boolean"}, "sound.extraConfig": {"declarations": ["nixos/modules/services/audio/alsa.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Set addition configuration for system-wide alsa.\n"}, "example": {"_type": "literalExpression", "text": "''\n  defaults.pcm.!card 3\n''"}, "loc": ["sound", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "sound.mediaKeys.enable": {"declarations": ["nixos/modules/services/audio/alsa.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable volume and capture control with keyboard media keys.\n\nYou want to leave this disabled if you run a desktop environment\nlike KDE, Gnome, Xfce, etc, as those handle such things themselves.\nYou might want to enable this if you run a minimalistic desktop\nenvironment or work from bare linux ttys/framebuffers.\n\nEnabling this will turn on {option}`services.actkbd`.\n"}, "loc": ["sound", "mediaKeys", "enable"], "readOnly": false, "type": "boolean"}, "sound.mediaKeys.volumeStep": {"declarations": ["nixos/modules/services/audio/alsa.nix"], "default": {"_type": "literalExpression", "text": "\"1\""}, "description": {"_type": "mdDoc", "text": "The value by which to increment/decrement volume on media keys.\n\nSee amixer(1) for allowed values.\n"}, "example": {"_type": "literalExpression", "text": "\"1%\""}, "loc": ["sound", "mediaKeys", "volumeStep"], "readOnly": false, "type": "string"}, "swapDevices": {"declarations": ["nixos/modules/tasks/encrypted-devices.nix", "nixos/modules/config/swap.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The swap devices and swap files.  These must have been\ninitialised using {command}`mkswap`.  Each element\nshould be an attribute set specifying either the path of the\nswap device or file (`device`) or the label\nof the swap device (`label`, see\n{command}`mkswap -L`).  Using a label is\nrecommended.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    device = \"/dev/hda7\";\n  }\n  {\n    device = \"/var/swapfile\";\n  }\n  {\n    label = \"bigswap\";\n  }\n]"}, "loc": ["swapDevices"], "readOnly": false, "type": "list of (submodule)"}, "swapDevices.*.device": {"declarations": ["nixos/modules/config/swap.nix"], "description": {"_type": "mdDoc", "text": "Path of the device or swap file."}, "example": {"_type": "literalExpression", "text": "\"/dev/sda3\""}, "loc": ["swapDevices", "*", "device"], "readOnly": false, "type": "non-empty string"}, "swapDevices.*.discardPolicy": {"declarations": ["nixos/modules/config/swap.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the discard policy for the swap device. If \"once\", then the\nwhole swap space is discarded at swapon invocation. If \"pages\",\nasynchronous discard on freed pages is performed, before returning to\nthe available pages pool. With \"both\", both policies are activated.\nSee swapon(8) for more information.\n"}, "example": {"_type": "literalExpression", "text": "\"once\""}, "loc": ["swapDevices", "*", "discardPolicy"], "readOnly": false, "type": "null or one of \"once\", \"pages\", \"both\""}, "swapDevices.*.encrypted.blkDev": {"declarations": ["nixos/modules/tasks/encrypted-devices.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Location of the backing encrypted device."}, "example": {"_type": "literalExpression", "text": "\"/dev/sda1\""}, "loc": ["swapDevices", "*", "encrypted", "blkDev"], "readOnly": false, "type": "null or string"}, "swapDevices.*.encrypted.enable": {"declarations": ["nixos/modules/tasks/encrypted-devices.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "The block device is backed by an encrypted one, adds this device as a initrd luks entry."}, "loc": ["swapDevices", "*", "encrypted", "enable"], "readOnly": false, "type": "boolean"}, "swapDevices.*.encrypted.keyFile": {"declarations": ["nixos/modules/tasks/encrypted-devices.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a keyfile used to unlock the backing encrypted\ndevice. At the time this keyfile is accessed, the\n`neededForBoot` filesystems (see\n`fileSystems.<name?>.neededForBoot`)\nwill have been mounted under `/mnt-root`,\nso the keyfile path should usually start with \"/mnt-root/\".\n"}, "example": {"_type": "literalExpression", "text": "\"/mnt-root/root/.swapkey\""}, "loc": ["swapDevices", "*", "encrypted", "keyFile"], "readOnly": false, "type": "null or string"}, "swapDevices.*.encrypted.label": {"declarations": ["nixos/modules/tasks/encrypted-devices.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Label of the unlocked encrypted device. Set `fileSystems.<name?>.device` to `/dev/mapper/<label>` to mount the unlocked device."}, "example": {"_type": "literalExpression", "text": "\"rootfs\""}, "loc": ["swapDevices", "*", "encrypted", "label"], "readOnly": false, "type": "null or string"}, "swapDevices.*.label": {"declarations": ["nixos/modules/config/swap.nix"], "description": {"_type": "mdDoc", "text": "Label of the device.  Can be used instead of {var}`device`.\n"}, "example": {"_type": "literalExpression", "text": "\"swap\""}, "loc": ["swapDevices", "*", "label"], "readOnly": false, "type": "string"}, "swapDevices.*.options": {"declarations": ["nixos/modules/config/swap.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"defaults\"\n]"}, "description": {"_type": "mdDoc", "text": "Options used to mount the swap.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"nofail\"\n]"}, "loc": ["swapDevices", "*", "options"], "readOnly": false, "type": "list of non-empty string"}, "swapDevices.*.priority": {"declarations": ["nixos/modules/config/swap.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specify the priority of the swap device. Priority is a value between 0 and 32767.\nHigher numbers indicate higher priority.\nnull lets the kernel choose a priority, which will show up as a negative value.\n"}, "example": {"_type": "literalExpression", "text": "2048"}, "loc": ["swapDevices", "*", "priority"], "readOnly": false, "type": "null or signed integer"}, "swapDevices.*.randomEncryption": {"declarations": ["nixos/modules/config/swap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Encrypt swap device with a random key. This way you won't have a persistent swap device.\n\nHINT: run \"cryptsetup benchmark\" to test cipher performance on your machine.\n\nWARNING: Don't try to hibernate when you have at least one swap partition with\nthis option enabled! We have no way to set the partition into which hibernation image\nis saved, so if your image ends up on an encrypted one you would lose it!\n\nWARNING #2: Do not use /dev/disk/by-uuid/\u2026 or /dev/disk/by-label/\u2026 as your swap device\nwhen using randomEncryption as the UUIDs and labels will get erased on every boot when\nthe partition is encrypted. Best to use /dev/disk/by-partuuid/\u2026\n"}, "example": {"_type": "literalExpression", "text": "{\n  cipher = \"serpent-xts-plain64\";\n  enable = true;\n  source = \"/dev/random\";\n}"}, "loc": ["swapDevices", "*", "randomEncryption"], "readOnly": false, "type": "(submodule) or boolean convertible to it"}, "swapDevices.*.randomEncryption.allowDiscards": {"declarations": ["nixos/modules/config/swap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow TRIM requests to the underlying device. This option\nhas security implications; please read the LUKS documentation before\nactivating it.\n"}, "loc": ["swapDevices", "*", "randomEncryption", "allowDiscards"], "readOnly": false, "type": "boolean"}, "swapDevices.*.randomEncryption.cipher": {"declarations": ["nixos/modules/config/swap.nix"], "default": {"_type": "literalExpression", "text": "\"aes-xts-plain64\""}, "description": {"_type": "mdDoc", "text": "Use specified cipher for randomEncryption.\n\nHint: Run \"cryptsetup benchmark\" to see which one is fastest on your machine.\n"}, "example": {"_type": "literalExpression", "text": "\"serpent-xts-plain64\""}, "loc": ["swapDevices", "*", "randomEncryption", "cipher"], "readOnly": false, "type": "string"}, "swapDevices.*.randomEncryption.enable": {"declarations": ["nixos/modules/config/swap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Encrypt swap device with a random key. This way you won't have a persistent swap device.\n\nWARNING: Don't try to hibernate when you have at least one swap partition with\nthis option enabled! We have no way to set the partition into which hibernation image\nis saved, so if your image ends up on an encrypted one you would lose it!\n\nWARNING #2: Do not use /dev/disk/by-uuid/\u2026 or /dev/disk/by-label/\u2026 as your swap device\nwhen using randomEncryption as the UUIDs and labels will get erased on every boot when\nthe partition is encrypted. Best to use /dev/disk/by-partuuid/\u2026\n"}, "loc": ["swapDevices", "*", "randomEncryption", "enable"], "readOnly": false, "type": "boolean"}, "swapDevices.*.randomEncryption.keySize": {"declarations": ["nixos/modules/config/swap.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the encryption key size for the plain device.\n\nIf not specified, the amount of data to read from `source` will be\ndetermined by cryptsetup.\n\nSee `cryptsetup-open(8)` for details.\n"}, "example": {"_type": "literalExpression", "text": "\"512\""}, "loc": ["swapDevices", "*", "randomEncryption", "keySize"], "readOnly": false, "type": "null or signed integer"}, "swapDevices.*.randomEncryption.sectorSize": {"declarations": ["nixos/modules/config/swap.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the sector size for the plain encrypted device type.\n\nIf not specified, the default sector size is determined from the\nunderlying block device.\n\nSee `cryptsetup-open(8)` for details.\n"}, "example": {"_type": "literalExpression", "text": "\"4096\""}, "loc": ["swapDevices", "*", "randomEncryption", "sectorSize"], "readOnly": false, "type": "null or signed integer"}, "swapDevices.*.randomEncryption.source": {"declarations": ["nixos/modules/config/swap.nix"], "default": {"_type": "literalExpression", "text": "\"/dev/urandom\""}, "description": {"_type": "mdDoc", "text": "Define the source of randomness to obtain a random key for encryption.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/random\""}, "loc": ["swapDevices", "*", "randomEncryption", "source"], "readOnly": false, "type": "string"}, "swapDevices.*.size": {"declarations": ["nixos/modules/config/swap.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If this option is set, \u2018device\u2019 is interpreted as the\npath of a swapfile that will be created automatically\nwith the indicated size (in megabytes).\n"}, "example": {"_type": "literalExpression", "text": "2048"}, "loc": ["swapDevices", "*", "size"], "readOnly": false, "type": "null or signed integer"}, "system.activationScripts": {"declarations": ["nixos/modules/system/activation/activation-script.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of shell script fragments that are executed when a NixOS\nsystem configuration is activated.  Examples are updating\n/etc, creating accounts, and so on.  Since these are executed\nevery time you boot the system or run\n{command}`nixos-rebuild`, it's important that they are\nidempotent and fast.\n"}, "example": {"_type": "literalExpression", "text": "{ stdio.text =\n  ''\n    # Needed by some programs.\n    ln -sfn /proc/self/fd /dev/fd\n    ln -sfn /proc/self/fd/0 /dev/stdin\n    ln -sfn /proc/self/fd/1 /dev/stdout\n    ln -sfn /proc/self/fd/2 /dev/stderr\n  '';\n}\n"}, "loc": ["system", "activationScripts"], "readOnly": false, "type": "attribute set of (string or (submodule))"}, "system.autoUpgrade.allowReboot": {"declarations": ["nixos/modules/tasks/auto-upgrade.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Reboot the system into the new generation instead of a switch\nif the new generation uses a different kernel, kernel modules\nor initrd than the booted system.\nSee {option}`rebootWindow` for configuring the times at which a reboot is allowed.\n"}, "loc": ["system", "autoUpgrade", "allowReboot"], "readOnly": false, "type": "boolean"}, "system.autoUpgrade.channel": {"declarations": ["nixos/modules/tasks/auto-upgrade.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The URI of the NixOS channel to use for automatic\nupgrades. By default, this is the channel set using\n{command}`nix-channel` (run `nix-channel --list`\nto see the current value).\n"}, "example": {"_type": "literalExpression", "text": "\"https://nixos.org/channels/nixos-14.12-small\""}, "loc": ["system", "autoUpgrade", "channel"], "readOnly": false, "type": "null or string"}, "system.autoUpgrade.dates": {"declarations": ["nixos/modules/tasks/auto-upgrade.nix"], "default": {"_type": "literalExpression", "text": "\"04:40\""}, "description": {"_type": "mdDoc", "text": "How often or when upgrade occurs. For most desktop and server systems\na sufficient upgrade frequency is once a day.\n\nThe format is described in\n{manpage}`systemd.time(7)`.\n"}, "example": {"_type": "literalExpression", "text": "\"daily\""}, "loc": ["system", "autoUpgrade", "dates"], "readOnly": false, "type": "string"}, "system.autoUpgrade.enable": {"declarations": ["nixos/modules/tasks/auto-upgrade.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to periodically upgrade NixOS to the latest\nversion. If enabled, a systemd timer will run\n`nixos-rebuild switch --upgrade` once a\nday.\n"}, "loc": ["system", "autoUpgrade", "enable"], "readOnly": false, "type": "boolean"}, "system.autoUpgrade.flags": {"declarations": ["nixos/modules/tasks/auto-upgrade.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Any additional flags passed to {command}`nixos-rebuild`.\n\nIf you are using flakes and use a local repo you can add\n{command}`[ \"--update-input\" \"nixpkgs\" \"--commit-lock-file\" ]`\nto update nixpkgs.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-I\"\n  \"stuff=/home/alice/nixos-stuff\"\n  \"--option\"\n  \"extra-binary-caches\"\n  \"http://my-cache.example.org/\"\n]"}, "loc": ["system", "autoUpgrade", "flags"], "readOnly": false, "type": "list of string"}, "system.autoUpgrade.flake": {"declarations": ["nixos/modules/tasks/auto-upgrade.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The Flake URI of the NixOS configuration to build.\nDisables the option {option}`system.autoUpgrade.channel`.\n"}, "example": {"_type": "literalExpression", "text": "\"github:kloenk/nix\""}, "loc": ["system", "autoUpgrade", "flake"], "readOnly": false, "type": "null or string"}, "system.autoUpgrade.operation": {"declarations": ["nixos/modules/tasks/auto-upgrade.nix"], "default": {"_type": "literalExpression", "text": "\"switch\""}, "description": {"_type": "mdDoc", "text": "Whether to run\n`nixos-rebuild switch --upgrade` or run\n`nixos-rebuild boot --upgrade`\n"}, "example": {"_type": "literalExpression", "text": "\"boot\""}, "loc": ["system", "autoUpgrade", "operation"], "readOnly": false, "type": "one of \"switch\", \"boot\""}, "system.autoUpgrade.persistent": {"declarations": ["nixos/modules/tasks/auto-upgrade.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Takes a boolean argument. If true, the time when the service\nunit was last triggered is stored on disk. When the timer is\nactivated, the service unit is triggered immediately if it\nwould have been triggered at least once during the time when\nthe timer was inactive. Such triggering is nonetheless\nsubject to the delay imposed by RandomizedDelaySec=. This is\nuseful to catch up on missed runs of the service when the\nsystem was powered down.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["system", "autoUpgrade", "persistent"], "readOnly": false, "type": "boolean"}, "system.autoUpgrade.randomizedDelaySec": {"declarations": ["nixos/modules/tasks/auto-upgrade.nix"], "default": {"_type": "literalExpression", "text": "\"0\""}, "description": {"_type": "mdDoc", "text": "Add a randomized delay before each automatic upgrade.\nThe delay will be chosen between zero and this value.\nThis value must be a time span in the format specified by\n{manpage}`systemd.time(7)`\n"}, "example": {"_type": "literalExpression", "text": "\"45min\""}, "loc": ["system", "autoUpgrade", "randomizedDelaySec"], "readOnly": false, "type": "string"}, "system.autoUpgrade.rebootWindow": {"declarations": ["nixos/modules/tasks/auto-upgrade.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Define a lower and upper time value (in HH:MM format) which\nconstitute a time window during which reboots are allowed after an upgrade.\nThis option only has an effect when {option}`allowReboot` is enabled.\nThe default value of `null` means that reboots are allowed at any time.\n"}, "example": {"_type": "literalExpression", "text": "{\n  lower = \"01:00\";\n  upper = \"05:00\";\n}"}, "loc": ["system", "autoUpgrade", "rebootWindow"], "readOnly": false, "type": "null or (submodule)"}, "system.autoUpgrade.rebootWindow.lower": {"declarations": ["nixos/modules/tasks/auto-upgrade.nix"], "description": {"_type": "mdDoc", "text": "Lower limit of the reboot window"}, "example": {"_type": "literalExpression", "text": "\"01:00\""}, "loc": ["system", "autoUpgrade", "rebootWindow", "lower"], "readOnly": false, "type": "string matching the pattern [[:digit:]]{2}:[[:digit:]]{2}"}, "system.autoUpgrade.rebootWindow.upper": {"declarations": ["nixos/modules/tasks/auto-upgrade.nix"], "description": {"_type": "mdDoc", "text": "Upper limit of the reboot window"}, "example": {"_type": "literalExpression", "text": "\"05:00\""}, "loc": ["system", "autoUpgrade", "rebootWindow", "upper"], "readOnly": false, "type": "string matching the pattern [[:digit:]]{2}:[[:digit:]]{2}"}, "system.build": {"declarations": ["nixos/modules/system/build.nix", "nixos/modules/system/activation/top-level.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attribute set of derivations used to set up the system.\n"}, "loc": ["system", "build"], "readOnly": false, "type": "lazy attribute set of unspecified value"}, "system.build.toplevel": {"declarations": ["nixos/modules/system/activation/top-level.nix"], "description": {"_type": "mdDoc", "text": "This option contains the store path that typically represents a NixOS system.\n\nYou can read this path in a custom deployment tool for example.\n"}, "loc": ["system", "build", "toplevel"], "readOnly": true, "type": "package"}, "system.checks": {"declarations": ["nixos/modules/system/activation/top-level.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages that are added as dependencies of the system's build, usually\nfor the purpose of validating some part of the configuration.\n\nUnlike `system.extraDependencies`, these store paths do not\nbecome part of the built system configuration.\n"}, "loc": ["system", "checks"], "readOnly": false, "type": "list of package"}, "system.copySystemConfiguration": {"declarations": ["nixos/modules/system/activation/top-level.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, copies the NixOS configuration file\n(usually {file}`/etc/nixos/configuration.nix`)\nand links it from the resulting system\n(getting to {file}`/run/current-system/configuration.nix`).\nNote that only this single file is copied, even if it imports others.\n"}, "loc": ["system", "copySystemConfiguration"], "readOnly": false, "type": "boolean"}, "system.extraDependencies": {"declarations": ["nixos/modules/system/activation/top-level.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of paths that should be included in the system\nclosure but generally not visible to users.\n\nThis option has also been used for build-time checks, but the\n`system.checks` option is more appropriate for that purpose as checks\nshould not leave a trace in the built system configuration.\n"}, "loc": ["system", "extraDependencies"], "readOnly": false, "type": "list of path in the Nix store"}, "system.forbiddenDependenciesRegex": {"declarations": ["nixos/modules/system/activation/top-level.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "A POSIX Extended Regular Expression that matches store paths that\nshould not appear in the system closure, with the exception of {option}`system.extraDependencies`, which is not checked.\n"}, "example": {"_type": "literalExpression", "text": "\"-dev$\""}, "loc": ["system", "forbiddenDependenciesRegex"], "readOnly": false, "type": "string"}, "system.includeBuildDependencies": {"declarations": ["nixos/modules/system/activation/top-level.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to include the build closure of the whole system in\nits runtime closure.  This can be useful for making changes\nfully offline, as it includes all sources, patches, and\nintermediate outputs required to build all the derivations\nthat the system depends on.\n\nNote that this includes _all_ the derivations, down from the\nincluded applications to their sources, the compilers used to\nbuild them, and even the bootstrap compiler used to compile\nthe compilers. This increases the size of the system and the\ntime needed to download its dependencies drastically: a\nminimal configuration with no extra services enabled grows\nfrom ~670MiB in size to 13.5GiB, and takes proportionally\nlonger to download.\n"}, "loc": ["system", "includeBuildDependencies"], "readOnly": false, "type": "boolean"}, "system.name": {"declarations": ["nixos/modules/system/activation/top-level.nix"], "default": {"_type": "literalExpression", "text": "if config.networking.hostName == \"\"\nthen \"unnamed\"\nelse config.networking.hostName;\n"}, "description": {"_type": "mdDoc", "text": "The name of the system used in the {option}`system.build.toplevel` derivation.\n\nThat derivation has the following name:\n`\"nixos-system-${config.system.name}-${config.system.nixos.label}\"`\n"}, "loc": ["system", "name"], "readOnly": false, "type": "string"}, "system.nixos.label": {"declarations": ["nixos/modules/misc/label.nix"], "description": {"_type": "mdDoc", "text": "NixOS version name to be used in the names of generated\noutputs and boot labels.\n\nIf you ever wanted to influence the labels in your GRUB menu,\nthis is the option for you.\n\nIt can only contain letters, numbers and the following symbols:\n`:`, `_`, `.` and `-`.\n\nThe default is {option}`system.nixos.tags` separated by\n\"-\" + \"-\" + {env}`NIXOS_LABEL_VERSION` environment\nvariable (defaults to the value of\n{option}`system.nixos.version`).\n\nCan be overridden by setting {env}`NIXOS_LABEL`.\n\nUseful for not loosing track of configurations built from different\nnixos branches/revisions, e.g.:\n\n```\n#!/bin/sh\ntoday=`date +%Y%m%d`\nbranch=`(cd nixpkgs ; git branch 2>/dev/null | sed -n '/^\\* / { s|^\\* ||; p; }')`\nrevision=`(cd nixpkgs ; git rev-parse HEAD)`\nexport NIXOS_LABEL_VERSION=\"$today.$branch-${revision:0:7}\"\nnixos-rebuild switch\n```\n"}, "loc": ["system", "nixos", "label"], "readOnly": false, "type": "string matching the pattern [a-zA-Z0-9:_\\.-]*"}, "system.nixos.tags": {"declarations": ["nixos/modules/misc/label.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Strings to prefix to the default\n{option}`system.nixos.label`.\n\nUseful for not loosing track of configurations built with\ndifferent options, e.g.:\n\n```\n{\n  system.nixos.tags = [ \"with-xen\" ];\n  virtualisation.xen.enable = true;\n}\n```\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"with-xen\"\n]"}, "loc": ["system", "nixos", "tags"], "readOnly": false, "type": "list of string"}, "system.nssDatabases.group": {"declarations": ["nixos/modules/config/nsswitch.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of group entries to configure in {file}`/etc/nsswitch.conf`.\n\nNote that \"files\" is always prepended while \"systemd\" is appended if nscd is enabled.\n\nThis option only takes effect if nscd is enabled.\n"}, "loc": ["system", "nssDatabases", "group"], "readOnly": false, "type": "list of string"}, "system.nssDatabases.hosts": {"declarations": ["nixos/modules/config/nsswitch.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of hosts entries to configure in {file}`/etc/nsswitch.conf`.\n\nNote that \"files\" is always prepended, and \"dns\" and \"myhostname\" are always appended.\n\nThis option only takes effect if nscd is enabled.\n"}, "loc": ["system", "nssDatabases", "hosts"], "readOnly": false, "type": "list of string"}, "system.nssDatabases.passwd": {"declarations": ["nixos/modules/config/nsswitch.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of passwd entries to configure in {file}`/etc/nsswitch.conf`.\n\nNote that \"files\" is always prepended while \"systemd\" is appended if nscd is enabled.\n\nThis option only takes effect if nscd is enabled.\n"}, "loc": ["system", "nssDatabases", "passwd"], "readOnly": false, "type": "list of string"}, "system.nssDatabases.services": {"declarations": ["nixos/modules/config/nsswitch.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of services entries to configure in {file}`/etc/nsswitch.conf`.\n\nNote that \"files\" is always prepended.\n\nThis option only takes effect if nscd is enabled.\n"}, "loc": ["system", "nssDatabases", "services"], "readOnly": false, "type": "list of string"}, "system.nssDatabases.shadow": {"declarations": ["nixos/modules/config/nsswitch.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of shadow entries to configure in {file}`/etc/nsswitch.conf`.\n\nNote that \"files\" is always prepended.\n\nThis option only takes effect if nscd is enabled.\n"}, "loc": ["system", "nssDatabases", "shadow"], "readOnly": false, "type": "list of string"}, "system.replaceRuntimeDependencies": {"declarations": ["nixos/modules/system/activation/top-level.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of packages to override without doing a full rebuild.\nThe original derivation and replacement derivation must have the same\nname length, and ideally should have close-to-identical directory layout.\n"}, "example": {"_type": "literalExpression", "text": "[ ({ original = pkgs.openssl; replacement = pkgs.callPackage /path/to/openssl { }; }) ]"}, "loc": ["system", "replaceRuntimeDependencies"], "readOnly": false, "type": "list of (submodule)"}, "system.replaceRuntimeDependencies.*.original": {"declarations": ["nixos/modules/system/activation/top-level.nix"], "description": {"_type": "mdDoc", "text": "The original package to override."}, "loc": ["system", "replaceRuntimeDependencies", "*", "original"], "readOnly": false, "type": "package"}, "system.replaceRuntimeDependencies.*.replacement": {"declarations": ["nixos/modules/system/activation/top-level.nix"], "description": {"_type": "mdDoc", "text": "The replacement package."}, "loc": ["system", "replaceRuntimeDependencies", "*", "replacement"], "readOnly": false, "type": "package"}, "system.userActivationScripts": {"declarations": ["nixos/modules/system/activation/activation-script.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "A set of shell script fragments that are executed by a systemd user\nservice when a NixOS system configuration is activated. Examples are\nrebuilding the .desktop file cache for showing applications in the menu.\nSince these are executed every time you run\n{command}`nixos-rebuild`, it's important that they are\nidempotent and fast.\n"}, "example": {"_type": "literalExpression", "text": "{ plasmaSetup = {\n    text = ''\n      ${pkgs.libsForQt5.kservice}/bin/kbuildsycoca5\"\n    '';\n    deps = [];\n  };\n}\n"}, "loc": ["system", "userActivationScripts"], "readOnly": false, "type": "attribute set of (string or (submodule))"}, "systemd.additionalUpstreamSystemUnits": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional units shipped with systemd that shall be enabled.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"debug-shell.service\"\n  \"systemd-quotacheck.service\"\n]"}, "loc": ["systemd", "additionalUpstreamSystemUnits"], "readOnly": false, "type": "list of string"}, "systemd.automounts": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Definition of systemd automount units.\nThis is a list instead of an attrSet, because systemd mandates the names to be derived from\nthe 'where' attribute.\n"}, "loc": ["systemd", "automounts"], "readOnly": false, "type": "list of (submodule)"}, "systemd.automounts.*.after": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "automounts", "*", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.automounts.*.aliases": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "automounts", "*", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.automounts.*.automountConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Automount]` section of the unit.  See\n{manpage}`systemd.automount(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  DirectoryMode = \"0775\";\n}"}, "loc": ["systemd", "automounts", "*", "automountConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.automounts.*.before": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "automounts", "*", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.automounts.*.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "automounts", "*", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.automounts.*.conflicts": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "automounts", "*", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.automounts.*.description": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "automounts", "*", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.automounts.*.documentation": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "automounts", "*", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.automounts.*.enable": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "automounts", "*", "enable"], "readOnly": false, "type": "boolean"}, "systemd.automounts.*.onFailure": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "automounts", "*", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.automounts.*.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "automounts", "*", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.automounts.*.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "automounts", "*", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.automounts.*.partOf": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "automounts", "*", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.automounts.*.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "automounts", "*", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.automounts.*.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "automounts", "*", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.automounts.*.requires": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "automounts", "*", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.automounts.*.requisite": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "automounts", "*", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.automounts.*.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "automounts", "*", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.automounts.*.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "automounts", "*", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.automounts.*.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "automounts", "*", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.automounts.*.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "automounts", "*", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.automounts.*.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "automounts", "*", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.automounts.*.wants": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "automounts", "*", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.automounts.*.where": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Absolute path of a directory of the mount point.\nWill be created if it doesn't exist. (Mandatory)\n"}, "example": {"_type": "literalExpression", "text": "\"/mnt\""}, "loc": ["systemd", "automounts", "*", "where"], "readOnly": false, "type": "string"}, "systemd.coredump.enable": {"declarations": ["nixos/modules/system/boot/systemd/coredump.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether core dumps should be processed by\n{command}`systemd-coredump`. If disabled, core dumps\nappear in the current directory of the crashing process.\n"}, "loc": ["systemd", "coredump", "enable"], "readOnly": false, "type": "boolean"}, "systemd.coredump.extraConfig": {"declarations": ["nixos/modules/system/boot/systemd/coredump.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config options for systemd-coredump. See coredump.conf(5) man page\nfor available options.\n"}, "example": {"_type": "literalExpression", "text": "\"Storage=journal\""}, "loc": ["systemd", "coredump", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.ctrlAltDelUnit": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"reboot.target\""}, "description": {"_type": "mdDoc", "text": "Target that should be started when Ctrl-Alt-Delete is pressed.\n"}, "example": {"_type": "literalExpression", "text": "\"poweroff.target\""}, "loc": ["systemd", "ctrlAltDelUnit"], "readOnly": false, "type": "string"}, "systemd.defaultUnit": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"multi-user.target\""}, "description": {"_type": "mdDoc", "text": "Default unit started when the system boots."}, "loc": ["systemd", "defaultUnit"], "readOnly": false, "type": "string"}, "systemd.enableCgroupAccounting": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable cgroup accounting.\n"}, "loc": ["systemd", "enableCgroupAccounting"], "readOnly": false, "type": "boolean"}, "systemd.enableEmergencyMode": {"declarations": ["nixos/modules/system/boot/emergency-mode.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable emergency mode, which is an\n{command}`sulogin` shell started on the console if\nmounting a filesystem fails.  Since some machines (like EC2\ninstances) have no console of any kind, emergency mode doesn't\nmake sense, and it's better to continue with the boot insofar\nas possible.\n"}, "loc": ["systemd", "enableEmergencyMode"], "readOnly": false, "type": "boolean"}, "systemd.enableUnifiedCgroupHierarchy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the unified cgroup hierarchy (cgroupsv2).\n"}, "loc": ["systemd", "enableUnifiedCgroupHierarchy"], "readOnly": false, "type": "boolean"}, "systemd.extraConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config options for systemd. See systemd-system.conf(5) man page\nfor available options.\n"}, "example": {"_type": "literalExpression", "text": "\"DefaultLimitCORE=infinity\""}, "loc": ["systemd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.generators": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd generators.\nFor each `NAME = VALUE` pair of the attrSet, a link is generated from\n`/etc/systemd/system-generators/NAME` to `VALUE`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  systemd-gpt-auto-generator = \"/dev/null\";\n}"}, "loc": ["systemd", "generators"], "readOnly": false, "type": "attribute set of path"}, "systemd.globalEnvironment": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables passed to *all* systemd units.\n"}, "example": {"_type": "literalExpression", "text": "{\n  TZ = \"CET\";\n}"}, "loc": ["systemd", "globalEnvironment"], "readOnly": false, "type": "attribute set of (null or string or path or package)"}, "systemd.managerEnvironment": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables of PID 1. These variables are\n*not* passed to started units.\n"}, "example": {"_type": "literalExpression", "text": "{\n  SYSTEMD_LOG_LEVEL = \"debug\";\n}"}, "loc": ["systemd", "managerEnvironment"], "readOnly": false, "type": "attribute set of (null or string or path or package)"}, "systemd.mounts": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Definition of systemd mount units.\nThis is a list instead of an attrSet, because systemd mandates the names to be derived from\nthe 'where' attribute.\n"}, "loc": ["systemd", "mounts"], "readOnly": false, "type": "list of (submodule)"}, "systemd.mounts.*.after": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "mounts", "*", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.mounts.*.aliases": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "mounts", "*", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.mounts.*.before": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "mounts", "*", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.mounts.*.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "mounts", "*", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.mounts.*.conflicts": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "mounts", "*", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.mounts.*.description": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "mounts", "*", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.mounts.*.documentation": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "mounts", "*", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.mounts.*.enable": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "mounts", "*", "enable"], "readOnly": false, "type": "boolean"}, "systemd.mounts.*.mountConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Mount]` section of the unit.  See\n{manpage}`systemd.mount(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  DirectoryMode = \"0775\";\n}"}, "loc": ["systemd", "mounts", "*", "mountConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.mounts.*.onFailure": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "mounts", "*", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.mounts.*.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "mounts", "*", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.mounts.*.options": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Options used to mount the file system."}, "example": {"_type": "literalExpression", "text": "\"noatime\""}, "loc": ["systemd", "mounts", "*", "options"], "readOnly": false, "type": "strings concatenated with \",\""}, "systemd.mounts.*.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "mounts", "*", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.mounts.*.partOf": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "mounts", "*", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.mounts.*.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "mounts", "*", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.mounts.*.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "mounts", "*", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.mounts.*.requires": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "mounts", "*", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.mounts.*.requisite": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "mounts", "*", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.mounts.*.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "mounts", "*", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.mounts.*.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "mounts", "*", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.mounts.*.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "mounts", "*", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.mounts.*.type": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "File system type."}, "example": {"_type": "literalExpression", "text": "\"ext4\""}, "loc": ["systemd", "mounts", "*", "type"], "readOnly": false, "type": "string"}, "systemd.mounts.*.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "mounts", "*", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.mounts.*.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "mounts", "*", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.mounts.*.wants": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "mounts", "*", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.mounts.*.what": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Absolute path of device node, file or other resource. (Mandatory)"}, "example": {"_type": "literalExpression", "text": "\"/dev/sda1\""}, "loc": ["systemd", "mounts", "*", "what"], "readOnly": false, "type": "string"}, "systemd.mounts.*.where": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Absolute path of a directory of the mount point.\nWill be created if it doesn't exist. (Mandatory)\n"}, "example": {"_type": "literalExpression", "text": "\"/mnt\""}, "loc": ["systemd", "mounts", "*", "where"], "readOnly": false, "type": "string"}, "systemd.network.config": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of global systemd network config."}, "loc": ["systemd", "network", "config"], "readOnly": false, "type": "submodule"}, "systemd.network.config.addRouteTablesToIPRoute2": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If true and routeTables are set, then the specified route tables\nwill also be installed into /etc/iproute2/rt_tables.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["systemd", "network", "config", "addRouteTablesToIPRoute2"], "readOnly": false, "type": "boolean"}, "systemd.network.config.dhcpV4Config": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[DHCPv4]` section of the networkd config.\nSee {manpage}`networkd.conf(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  DUIDType = \"vendor\";\n}"}, "loc": ["systemd", "network", "config", "dhcpV4Config"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.config.dhcpV6Config": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[DHCPv6]` section of the networkd config.\nSee {manpage}`networkd.conf(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  DUIDType = \"vendor\";\n}"}, "loc": ["systemd", "network", "config", "dhcpV6Config"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.config.networkConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Network]` section of the networkd config.\nSee {manpage}`networkd.conf(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ManageForeignRoutingPolicyRules = false;\n  SpeedMeter = true;\n}"}, "loc": ["systemd", "network", "config", "networkConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.config.routeTables": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Defines route table names as an attrset of name to number.\nSee {manpage}`networkd.conf(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  foo = 27;\n}"}, "loc": ["systemd", "network", "config", "routeTables"], "readOnly": false, "type": "attribute set of signed integer"}, "systemd.network.enable": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable networkd or not.\n"}, "loc": ["systemd", "network", "enable"], "readOnly": false, "type": "boolean"}, "systemd.network.links": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd network links."}, "loc": ["systemd", "network", "links"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.network.links.<name>.enable": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable this .link unit. It's handled by udev no matter if {command}`systemd-networkd` is enabled or not\n"}, "loc": ["systemd", "network", "links", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.network.links.<name>.extraConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration append to unit"}, "loc": ["systemd", "network", "links", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.network.links.<name>.linkConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Link]` section of the unit.  See\n{manpage}`systemd.link(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  MACAddress = \"00:ff:ee:aa:cc:dd\";\n}"}, "loc": ["systemd", "network", "links", "<name>", "linkConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.links.<name>.matchConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Match]` section of the unit.  See\n{manpage}`systemd.link(5)`\n{manpage}`systemd.netdev(5)`\n{manpage}`systemd.network(5)`\nfor details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Name = \"eth0\";\n}"}, "loc": ["systemd", "network", "links", "<name>", "matchConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd network devices."}, "loc": ["systemd", "network", "netdevs"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.network.netdevs.<name>.batmanAdvancedConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[BatmanAdvanced]` section of the unit. See\n{manpage}`systemd.netdev(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  GatewayMode = \"server\";\n  RoutingAlgorithm = \"batman-v\";\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "batmanAdvancedConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.bondConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Bond]` section of the unit.  See\n{manpage}`systemd.netdev(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Mode = \"802.3ad\";\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "bondConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.enable": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to manage network configuration using {command}`systemd-network`.\n\nThis also enables {option}`systemd.networkd.enable`.\n"}, "loc": ["systemd", "network", "netdevs", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.network.netdevs.<name>.extraConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration append to unit"}, "loc": ["systemd", "network", "netdevs", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.network.netdevs.<name>.fooOverUDPConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[FooOverUDP]` section of the unit.  See\n{manpage}`systemd.netdev(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Port = 9001;\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "fooOverUDPConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.l2tpConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[L2TP]` section of the unit. See\n{manpage}`systemd.netdev(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  EncapsulationType = \"ip\";\n  Local = \"static\";\n  PeerTunnelId = 12;\n  Remote = \"192.168.30.101\";\n  TunnelId = 10;\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "l2tpConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.l2tpSessions": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Each item in this array specifies an option in the\n`[L2TPSession]` section of the unit. See\n{manpage}`systemd.netdev(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    l2tpSessionConfig = {\n      Name = \"l2tp-sess\";\n      PeerSessionId = 26;\n      SessionId = 25;\n    };\n  }\n]"}, "loc": ["systemd", "network", "netdevs", "<name>", "l2tpSessions"], "readOnly": false, "type": "list of (submodule)"}, "systemd.network.netdevs.<name>.l2tpSessions.*.l2tpSessionConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[L2TPSession]` section of the unit.  See\n{manpage}`systemd.netdev(5)` for details.\n"}, "loc": ["systemd", "network", "netdevs", "<name>", "l2tpSessions", "*", "l2tpSessionConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.macvlanConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[MACVLAN]` section of the unit.  See\n{manpage}`systemd.netdev(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Mode = \"private\";\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "macvlanConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.matchConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Match]` section of the unit.  See\n{manpage}`systemd.link(5)`\n{manpage}`systemd.netdev(5)`\n{manpage}`systemd.network(5)`\nfor details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Name = \"eth0\";\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "matchConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.netdevConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Netdev]` section of the unit.  See\n{manpage}`systemd.netdev(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Kind = \"bridge\";\n  Name = \"mybridge\";\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "netdevConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.peerConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Peer]` section of the unit.  See\n{manpage}`systemd.netdev(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Name = \"veth2\";\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "peerConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.tapConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Tap]` section of the unit.  See\n{manpage}`systemd.netdev(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  User = \"openvpn\";\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "tapConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.tunConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Tun]` section of the unit.  See\n{manpage}`systemd.netdev(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  User = \"openvpn\";\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "tunConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.tunnelConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Tunnel]` section of the unit.  See\n{manpage}`systemd.netdev(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Remote = \"192.168.1.1\";\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "tunnelConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.vlanConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[VLAN]` section of the unit.  See\n{manpage}`systemd.netdev(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Id = 4;\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "vlanConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.vrfConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[VRF]` section of the unit. See\n{manpage}`systemd.netdev(5)` for details.\nA detailed explanation about how VRFs work can be found in the\n[kernel docs](https://www.kernel.org/doc/Documentation/networking/vrf.txt).\n"}, "example": {"_type": "literalExpression", "text": "{\n  Table = 2342;\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "vrfConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.vxlanConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[VXLAN]` section of the unit.  See\n{manpage}`systemd.netdev(5)` for details.\n"}, "loc": ["systemd", "network", "netdevs", "<name>", "vxlanConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.wireguardConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[WireGuard]` section of the unit. See\n{manpage}`systemd.netdev(5)` for details.\nUse `PrivateKeyFile` instead of\n`PrivateKey`: the nix store is\nworld-readable.\n"}, "example": {"_type": "literalExpression", "text": "{\n  FirewallMark = 42;\n  ListenPort = 51820;\n  PrivateKeyFile = \"/etc/wireguard/secret.key\";\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "wireguardConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.wireguardPeers": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Each item in this array specifies an option in the\n`[WireGuardPeer]` section of the unit. See\n{manpage}`systemd.netdev(5)` for details.\nUse `PresharedKeyFile` instead of\n`PresharedKey`: the nix store is\nworld-readable.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    wireguardPeerConfig = {\n      AllowedIPs = [\n        \"10.0.0.1/32\"\n      ];\n      Endpoint = \"192.168.1.1:51820\";\n      PersistentKeepalive = 15;\n      PresharedKeyFile = \"/etc/wireguard/psk.key\";\n      PublicKey = \"27s0OvaBBdHoJYkH9osZpjpgSOVNw+RaKfboT/Sfq0g=\";\n    };\n  }\n]"}, "loc": ["systemd", "network", "netdevs", "<name>", "wireguardPeers"], "readOnly": false, "type": "list of (submodule)"}, "systemd.network.netdevs.<name>.wireguardPeers.*.wireguardPeerConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[WireGuardPeer]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "netdevs", "<name>", "wireguardPeers", "*", "wireguardPeerConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.netdevs.<name>.xfrmConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Xfrm]` section of the unit.  See\n{manpage}`systemd.netdev(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  InterfaceId = 1;\n}"}, "loc": ["systemd", "network", "netdevs", "<name>", "xfrmConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd networks."}, "loc": ["systemd", "network", "networks"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.network.networks.<name>.DHCP": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Whether to enable DHCP on the interfaces matched.\n"}, "loc": ["systemd", "network", "networks", "<name>", "DHCP"], "readOnly": false, "type": "null or string"}, "systemd.network.networks.<name>.address": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of addresses to be added to the network section of the\nunit.  See {manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "address"], "readOnly": false, "type": "list of string"}, "systemd.network.networks.<name>.addresses": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of address sections to be added to the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "addresses"], "readOnly": false, "type": "list of (submodule)"}, "systemd.network.networks.<name>.addresses.*.addressConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Address]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Address = \"192.168.0.100/24\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "addresses", "*", "addressConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.bfifoConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[BFIFO]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  LimitBytes = \"20K\";\n  Parent = \"ingress\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "bfifoConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.bond": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of bond interfaces to be added to the network section of the\nunit.  See {manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "bond"], "readOnly": false, "type": "list of string"}, "systemd.network.networks.<name>.bridge": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of bridge interfaces to be added to the network section of the\nunit.  See {manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "bridge"], "readOnly": false, "type": "list of string"}, "systemd.network.networks.<name>.bridgeConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Bridge]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Cost = 20;\n  MulticastFlood = false;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "bridgeConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.bridgeFDBs": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of BridgeFDB sections to be added to the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    bridgeFDBConfig = {\n      Destination = \"192.168.100.4\";\n      MACAddress = \"90:e2:ba:43:fc:71\";\n      VNI = 3600;\n    };\n  }\n]"}, "loc": ["systemd", "network", "networks", "<name>", "bridgeFDBs"], "readOnly": false, "type": "list of (submodule)"}, "systemd.network.networks.<name>.bridgeFDBs.*.bridgeFDBConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[BridgeFDB]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Destination = \"192.168.1.42\";\n  MACAddress = \"65:43:4a:5b:d8:5f\";\n  VNI = 20;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "bridgeFDBs", "*", "bridgeFDBConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.bridgeMDBs": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of BridgeMDB sections to be added to the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    bridgeMDBConfig = {\n      MulticastGroupAddress = \"ff02::1:2:3:4\";\n      VLANId = 10;\n    };\n  }\n]"}, "loc": ["systemd", "network", "networks", "<name>", "bridgeMDBs"], "readOnly": false, "type": "list of (submodule)"}, "systemd.network.networks.<name>.bridgeMDBs.*.bridgeMDBConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[BridgeMDB]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  MulticastGroupAddress = \"ff02::1:2:3:4\";\n  VLANId = 10;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "bridgeMDBs", "*", "bridgeMDBConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.bridgeVLANs": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of BridgeVLAN sections to be added to the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    bridgeVLANConfig = {\n      VLAN = \"10-20\";\n    };\n  }\n]"}, "loc": ["systemd", "network", "networks", "<name>", "bridgeVLANs"], "readOnly": false, "type": "list of (submodule)"}, "systemd.network.networks.<name>.bridgeVLANs.*.bridgeVLANConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[BridgeVLAN]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  VLAN = 20;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "bridgeVLANs", "*", "bridgeVLANConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.cakeConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[CAKE]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Bandwidth = \"40M\";\n  CompensationMode = \"ptm\";\n  OverheadBytes = 8;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "cakeConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.canConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[CAN]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{ }"}, "loc": ["systemd", "network", "networks", "<name>", "canConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.controlledDelayConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[ControlledDelay]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Parent = \"ingress\";\n  TargetSec = \"20msec\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "controlledDelayConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.deficitRoundRobinSchedulerClassConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[DeficitRoundRobinSchedulerClass]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Parent = \"root\";\n  QuantumBytes = \"300k\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "deficitRoundRobinSchedulerClassConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.deficitRoundRobinSchedulerConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[DeficitRoundRobinScheduler]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Parent = \"root\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "deficitRoundRobinSchedulerConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.dhcpPrefixDelegationConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[DHCPPrefixDelegation]` section of the unit. See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Announce = true;\n  SubnetId = \"auto\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "dhcpPrefixDelegationConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.dhcpServerConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[DHCPServer]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  EmitDNS = false;\n  PoolOffset = 50;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "dhcpServerConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.dhcpServerStaticLeases": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of DHCPServerStaticLease sections to be added to the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    dhcpServerStaticLeaseConfig = {\n      Address = \"192.168.1.42\";\n      MACAddress = \"65:43:4a:5b:d8:5f\";\n    };\n  }\n]"}, "loc": ["systemd", "network", "networks", "<name>", "dhcpServerStaticLeases"], "readOnly": false, "type": "list of (submodule)"}, "systemd.network.networks.<name>.dhcpServerStaticLeases.*.dhcpServerStaticLeaseConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[DHCPServerStaticLease]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n\nMake sure to configure the corresponding client interface to use\n`ClientIdentifier=mac`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Address = \"192.168.1.42\";\n  MACAddress = \"65:43:4a:5b:d8:5f\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "dhcpServerStaticLeases", "*", "dhcpServerStaticLeaseConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.dhcpV4Config": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[DHCPv4]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  UseDNS = true;\n  UseRoutes = true;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "dhcpV4Config"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.dhcpV6Config": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[DHCPv6]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  UseDNS = true;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "dhcpV6Config"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.dns": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of dns servers to be added to the network section of the\nunit.  See {manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "dns"], "readOnly": false, "type": "list of string"}, "systemd.network.networks.<name>.domains": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A list of domains to pass to the network config.\n"}, "loc": ["systemd", "network", "networks", "<name>", "domains"], "readOnly": false, "type": "null or (list of string)"}, "systemd.network.networks.<name>.enable": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to manage network configuration using {command}`systemd-network`.\n\nThis also enables {option}`systemd.networkd.enable`.\n"}, "loc": ["systemd", "network", "networks", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.network.networks.<name>.enhancedTransmissionSelectionConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[EnhancedTransmissionSelection]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Bands = 3;\n  Parent = \"root\";\n  PriorityMap = \"100 200 300\";\n  QuantumBytes = \"300k\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "enhancedTransmissionSelectionConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.extraConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration append to unit"}, "loc": ["systemd", "network", "networks", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.network.networks.<name>.fairQueueingConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[FairQueueing]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  FlowLimit = 5;\n  Parent = \"root\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "fairQueueingConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.fairQueueingControlledDelayConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[FairQueueingControlledDelay]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Flows = 5;\n  Parent = \"root\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "fairQueueingControlledDelayConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.flowQueuePIEConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[FlowQueuePIE]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  PacketLimit = \"3847\";\n  Parent = \"ingress\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "flowQueuePIEConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.gateway": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of gateways to be added to the network section of the\nunit.  See {manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "gateway"], "readOnly": false, "type": "list of string"}, "systemd.network.networks.<name>.genericRandomEarlyDetectionConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[GenericRandomEarlyDetection]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  DefaultVirtualQueue = 3;\n  Parent = \"root\";\n  VirtualQueues = 5;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "genericRandomEarlyDetectionConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.heavyHitterFilterConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[HeavyHitterFilter]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  PacketLimit = 10000;\n  Parent = \"root\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "heavyHitterFilterConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.hierarchyTokenBucketClassConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[HierarchyTokenBucketClass]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Parent = \"root\";\n  Rate = \"10M\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "hierarchyTokenBucketClassConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.hierarchyTokenBucketConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[HierarchyTokenBucket]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Parent = \"root\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "hierarchyTokenBucketConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.ipoIBConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[IPoIB]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{ }"}, "loc": ["systemd", "network", "networks", "<name>", "ipoIBConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.ipv6AcceptRAConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[IPv6AcceptRA]` section of the unit. See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  DHCPv6Client = \"always\";\n  UseDNS = true;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "ipv6AcceptRAConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.ipv6Prefixes": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of ipv6Prefix sections to be added to the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    ipv6PrefixConfig = {\n      AddressAutoconfiguration = true;\n      OnLink = true;\n    };\n  }\n]"}, "loc": ["systemd", "network", "networks", "<name>", "ipv6Prefixes"], "readOnly": false, "type": "list of (submodule)"}, "systemd.network.networks.<name>.ipv6Prefixes.*.ipv6PrefixConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[IPv6Prefix]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Prefix = \"fd00::/64\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "ipv6Prefixes", "*", "ipv6PrefixConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.ipv6RoutePrefixes": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of ipv6RoutePrefix sections to be added to the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    ipv6RoutePrefixConfig = {\n      LifetimeSec = 3600;\n      Route = \"fd00::/64\";\n    };\n  }\n]"}, "loc": ["systemd", "network", "networks", "<name>", "ipv6RoutePrefixes"], "readOnly": false, "type": "list of (submodule)"}, "systemd.network.networks.<name>.ipv6RoutePrefixes.*.ipv6RoutePrefixConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[IPv6RoutePrefix]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Route = \"fd00::/64\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "ipv6RoutePrefixes", "*", "ipv6RoutePrefixConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.ipv6SendRAConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[IPv6SendRA]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  EmitDNS = true;\n  Managed = true;\n  OtherInformation = true;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "ipv6SendRAConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.linkConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Link]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Unmanaged = true;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "linkConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.lldpConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[LLDP]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  MUDURL = \"https://things.example.org/product_abc123/v5\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "lldpConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.macvlan": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of macvlan interfaces to be added to the network section of the\nunit.  See {manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "macvlan"], "readOnly": false, "type": "list of string"}, "systemd.network.networks.<name>.matchConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Match]` section of the unit.  See\n{manpage}`systemd.link(5)`\n{manpage}`systemd.netdev(5)`\n{manpage}`systemd.network(5)`\nfor details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Name = \"eth0\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "matchConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.name": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the network interface to match against.\n"}, "loc": ["systemd", "network", "networks", "<name>", "name"], "readOnly": false, "type": "null or string"}, "systemd.network.networks.<name>.networkConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Network]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Description = \"My Network\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "networkConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.networkEmulatorConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[NetworkEmulator]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  DelaySec = \"20msec\";\n  Parent = \"ingress\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "networkEmulatorConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.ntp": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of ntp servers to be added to the network section of the\nunit.  See {manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "ntp"], "readOnly": false, "type": "list of string"}, "systemd.network.networks.<name>.pfifoConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[PFIFO]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  PacketLimit = \"300\";\n  Parent = \"ingress\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "pfifoConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.pfifoFastConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[PFIFOFast]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Parent = \"ingress\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "pfifoFastConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.pfifoHeadDropConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[PFIFOHeadDrop]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  PacketLimit = \"300\";\n  Parent = \"ingress\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "pfifoHeadDropConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.pieConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[PIE]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  PacketLimit = \"3847\";\n  Parent = \"ingress\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "pieConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.qdiscConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[QDisc]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Parent = \"ingress\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "qdiscConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.quickFairQueueingConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[QuickFairQueueing]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Parent = \"root\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "quickFairQueueingConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.quickFairQueueingConfigClass": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[QuickFairQueueingClass]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Parent = \"root\";\n  Weight = 133;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "quickFairQueueingConfigClass"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.routes": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of route sections to be added to the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "routes"], "readOnly": false, "type": "list of (submodule)"}, "systemd.network.networks.<name>.routes.*.routeConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Route]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Gateway = \"192.168.0.1\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "routes", "*", "routeConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.routingPolicyRules": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of routing policy rules sections to be added to the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "routingPolicyRules"], "readOnly": false, "type": "list of (submodule)"}, "systemd.network.networks.<name>.routingPolicyRules.*.routingPolicyRuleConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[RoutingPolicyRule]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Family = \"both\";\n  IncomingInterface = \"eth1\";\n  Table = 10;\n}"}, "loc": ["systemd", "network", "networks", "<name>", "routingPolicyRules", "*", "routingPolicyRuleConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.stochasticFairBlueConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[StochasticFairBlue]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  PacketLimit = \"3847\";\n  Parent = \"ingress\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "stochasticFairBlueConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.stochasticFairnessQueueingConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[StochasticFairnessQueueing]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Parent = \"ingress\";\n  PerturbPeriodSec = \"30\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "stochasticFairnessQueueingConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.tokenBucketFilterConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[TokenBucketFilter]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Parent = \"ingress\";\n  Rate = \"100k\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "tokenBucketFilterConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.trivialLinkEqualizerConfig": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[TrivialLinkEqualizer]` section of the unit.  See\n{manpage}`systemd.network(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Id = 0;\n  Parent = \"root\";\n}"}, "loc": ["systemd", "network", "networks", "<name>", "trivialLinkEqualizerConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.network.networks.<name>.tunnel": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of tunnel interfaces to be added to the network section of the\nunit.  See {manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "tunnel"], "readOnly": false, "type": "list of string"}, "systemd.network.networks.<name>.vlan": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of vlan interfaces to be added to the network section of the\nunit.  See {manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "vlan"], "readOnly": false, "type": "list of string"}, "systemd.network.networks.<name>.vrf": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of vrf interfaces to be added to the network section of the\nunit.  See {manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "vrf"], "readOnly": false, "type": "list of string"}, "systemd.network.networks.<name>.vxlan": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of vxlan interfaces to be added to the network section of the\nunit.  See {manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "vxlan"], "readOnly": false, "type": "list of string"}, "systemd.network.networks.<name>.xfrm": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of xfrm interfaces to be added to the network section of the\nunit.  See {manpage}`systemd.network(5)` for details.\n"}, "loc": ["systemd", "network", "networks", "<name>", "xfrm"], "readOnly": false, "type": "list of string"}, "systemd.network.wait-online.anyInterface": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to consider the network online when any interface is online, as opposed to all of them.\nThis is useful on portable machines with a wired and a wireless interface, for example.\n"}, "loc": ["systemd", "network", "wait-online", "anyInterface"], "readOnly": false, "type": "boolean"}, "systemd.network.wait-online.enable": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the systemd-networkd-wait-online service.\n\nsystemd-networkd-wait-online can timeout and fail if there are no network interfaces\navailable for it to manage. When systemd-networkd is enabled but a different service is\nresponsible for managing the system's internet connection (for example, NetworkManager or\nconnman are used to manage WiFi connections), this service is unnecessary and can be\ndisabled.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["systemd", "network", "wait-online", "enable"], "readOnly": false, "type": "boolean"}, "systemd.network.wait-online.extraArgs": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command-line arguments to pass to systemd-networkd-wait-online.\nThese also affect per-interface `systemd-network-wait-online@` services.\n\nSee {manpage}`systemd-networkd-wait-online.service(8)` for all available options.\n"}, "loc": ["systemd", "network", "wait-online", "extraArgs"], "readOnly": false, "type": "list of string"}, "systemd.network.wait-online.ignoredInterfaces": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Network interfaces to be ignored when deciding if the system is online.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"wg0\"\n]"}, "loc": ["systemd", "network", "wait-online", "ignoredInterfaces"], "readOnly": false, "type": "list of string"}, "systemd.network.wait-online.timeout": {"declarations": ["nixos/modules/system/boot/networkd.nix"], "default": {"_type": "literalExpression", "text": "120"}, "description": {"_type": "mdDoc", "text": "Time to wait for the network to come online, in seconds. Set to 0 to disable.\n"}, "example": {"_type": "literalExpression", "text": "0"}, "loc": ["systemd", "network", "wait-online", "timeout"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "systemd.nspawn": {"declarations": ["nixos/modules/system/boot/systemd/nspawn.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd-nspawn configurations."}, "loc": ["systemd", "nspawn"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.nspawn.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd/nspawn.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "nspawn", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.nspawn.<name>.execConfig": {"declarations": ["nixos/modules/system/boot/systemd/nspawn.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Exec]` section of this unit. See\n{manpage}`systemd.nspawn(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Parameters = \"/bin/sh\";\n}"}, "loc": ["systemd", "nspawn", "<name>", "execConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.nspawn.<name>.filesConfig": {"declarations": ["nixos/modules/system/boot/systemd/nspawn.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Files]` section of this unit. See\n{manpage}`systemd.nspawn(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Bind = [\n    \"/home/alice\"\n  ];\n}"}, "loc": ["systemd", "nspawn", "<name>", "filesConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.nspawn.<name>.networkConfig": {"declarations": ["nixos/modules/system/boot/systemd/nspawn.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Network]` section of this unit. See\n{manpage}`systemd.nspawn(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  Private = false;\n}"}, "loc": ["systemd", "nspawn", "<name>", "networkConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.oomd.enable": {"declarations": ["nixos/modules/system/boot/systemd/oomd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the `systemd-oomd` OOM killer."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["systemd", "oomd", "enable"], "readOnly": false, "type": "boolean"}, "systemd.oomd.enableRootSlice": {"declarations": ["nixos/modules/system/boot/systemd/oomd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable oomd on the root slice (`-.slice`)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["systemd", "oomd", "enableRootSlice"], "readOnly": false, "type": "boolean"}, "systemd.oomd.enableSystemSlice": {"declarations": ["nixos/modules/system/boot/systemd/oomd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable oomd on the system slice (`system.slice`)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["systemd", "oomd", "enableSystemSlice"], "readOnly": false, "type": "boolean"}, "systemd.oomd.enableUserServices": {"declarations": ["nixos/modules/system/boot/systemd/oomd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable oomd on all user services (`user@.service`)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["systemd", "oomd", "enableUserServices"], "readOnly": false, "type": "boolean"}, "systemd.oomd.extraConfig": {"declarations": ["nixos/modules/system/boot/systemd/oomd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra config options for `systemd-oomd`. See {command}`man oomd.conf`\nfor available options.\n"}, "example": {"_type": "literalExpression", "text": "{ DefaultMemoryPressureDurationSec = \"20s\"; }"}, "loc": ["systemd", "oomd", "extraConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "systemd.package": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.systemd"}, "description": {"_type": "mdDoc", "text": "The systemd package."}, "loc": ["systemd", "package"], "readOnly": false, "type": "package"}, "systemd.packages": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages providing systemd units and hooks."}, "example": {"_type": "literalExpression", "text": "[ pkgs.systemd-cryptsetup-generator ]"}, "loc": ["systemd", "packages"], "readOnly": false, "type": "list of package"}, "systemd.paths": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd path units."}, "loc": ["systemd", "paths"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.paths.<name>.after": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "paths", "<name>", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.paths.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "paths", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.paths.<name>.before": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "paths", "<name>", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.paths.<name>.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "paths", "<name>", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.paths.<name>.conflicts": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "paths", "<name>", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.paths.<name>.description": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "paths", "<name>", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.paths.<name>.documentation": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "paths", "<name>", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.paths.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "paths", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.paths.<name>.onFailure": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "paths", "<name>", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.paths.<name>.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "paths", "<name>", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.paths.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "paths", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.paths.<name>.partOf": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "paths", "<name>", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.paths.<name>.pathConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Path]` section of the unit.  See\n{manpage}`systemd.path(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  PathChanged = \"/some/path\";\n  Unit = \"changedpath.service\";\n}"}, "loc": ["systemd", "paths", "<name>", "pathConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.paths.<name>.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "paths", "<name>", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.paths.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "paths", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.paths.<name>.requires": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "paths", "<name>", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.paths.<name>.requisite": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "paths", "<name>", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.paths.<name>.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "paths", "<name>", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.paths.<name>.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "paths", "<name>", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.paths.<name>.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "paths", "<name>", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.paths.<name>.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "paths", "<name>", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.paths.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "paths", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.paths.<name>.wants": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "paths", "<name>", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.repart.enable": {"declarations": ["nixos/modules/system/boot/systemd/repart.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Grow and add partitions to a partition table.\nsystemd-repart only works with GPT partition tables.\n\nTo run systemd-repart while in the initrd, see\n`options.boot.initrd.systemd.repart.enable`.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["systemd", "repart", "enable"], "readOnly": false, "type": "boolean"}, "systemd.repart.partitions": {"declarations": ["nixos/modules/system/boot/systemd/repart.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Specify partitions as a set of the names of the definition files as the\nkey and the partition configuration as its value. The partition\nconfiguration can use all upstream options. See <link\nxlink:href=\"https://www.freedesktop.org/software/systemd/man/repart.d.html\"/>\nfor all available options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"10-root\" = {\n    Type = \"root\";\n  };\n  \"20-home\" = {\n    SizeMaxBytes = \"2G\";\n    SizeMinBytes = \"512M\";\n    Type = \"home\";\n  };\n}"}, "loc": ["systemd", "repart", "partitions"], "readOnly": false, "type": "attribute set of attribute set of (string or signed integer or boolean)"}, "systemd.services": {"declarations": ["nixos/modules/testing/service-runner.nix", "nixos/modules/system/boot/systemd.nix", "nixos/modules/security/systemd-confinement.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd service units."}, "loc": ["systemd", "services"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.services.<name>.after": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "services", "<name>", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.services.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "services", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.services.<name>.before": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "services", "<name>", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.services.<name>.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "services", "<name>", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.services.<name>.confinement.binSh": {"declarations": ["nixos/modules/security/systemd-confinement.nix"], "default": {"_type": "literalExpression", "text": "config.environment.binsh"}, "description": {"_type": "mdDoc", "text": "The program to make available as {file}`/bin/sh` inside\nthe chroot. If this is set to `null`, no\n{file}`/bin/sh` is provided at all.\n\nThis is useful for some applications, which for example use the\n{manpage}`system(3)` library function to execute commands.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.dash}/bin/dash\""}, "loc": ["systemd", "services", "<name>", "confinement", "binSh"], "readOnly": false, "type": "null or path"}, "systemd.services.<name>.confinement.enable": {"declarations": ["nixos/modules/security/systemd-confinement.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, all the required runtime store paths for this service are\nbind-mounted into a `tmpfs`-based\n{manpage}`chroot(2)`.\n"}, "loc": ["systemd", "services", "<name>", "confinement", "enable"], "readOnly": false, "type": "boolean"}, "systemd.services.<name>.confinement.fullUnit": {"declarations": ["nixos/modules/security/systemd-confinement.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to include the full closure of the systemd unit file into the\nchroot, instead of just the dependencies for the executables.\n\n::: {.warning}\nWhile it may be tempting to just enable this option to\nmake things work quickly, please be aware that this might add paths\nto the closure of the chroot that you didn't anticipate. It's better\nto use {option}`confinement.packages` to **explicitly** add additional store paths to the\nchroot.\n:::\n"}, "loc": ["systemd", "services", "<name>", "confinement", "fullUnit"], "readOnly": false, "type": "boolean"}, "systemd.services.<name>.confinement.mode": {"declarations": ["nixos/modules/security/systemd-confinement.nix"], "default": {"_type": "literalExpression", "text": "\"full-apivfs\""}, "description": {"_type": "mdDoc", "text": "The value `full-apivfs` (the default) sets up\nprivate {file}`/dev`, {file}`/proc`,\n{file}`/sys` and {file}`/tmp` file systems in a separate user\nname space.\n\nIf this is set to `chroot-only`, only the file\nsystem name space is set up along with the call to\n{manpage}`chroot(2)`.\n\n::: {.note}\nThis doesn't cover network namespaces and is solely for\nfile system level isolation.\n:::\n"}, "loc": ["systemd", "services", "<name>", "confinement", "mode"], "readOnly": false, "type": "one of \"full-apivfs\", \"chroot-only\""}, "systemd.services.<name>.confinement.packages": {"declarations": ["nixos/modules/security/systemd-confinement.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional packages or strings with context to add to the closure of\nthe chroot. By default, this includes all the packages from the\n{option}`serviceConfig.ExecReload`, {option}`serviceConfig.ExecStartPost`, {option}`serviceConfig.ExecStartPre`, {option}`serviceConfig.ExecStop`, {option}`serviceConfig.ExecStopPost` and {option}`serviceConfig.ExecStart` options. If you want to have all the\ndependencies of this systemd unit, you can use\n{option}`confinement.fullUnit`.\n\n::: {.note}\nThe store paths listed in {option}`path` are\n**not** included in the closure as\nwell as paths from other options except those listed\nabove.\n:::\n"}, "loc": ["systemd", "services", "<name>", "confinement", "packages"], "readOnly": false, "type": "list of (string or package)"}, "systemd.services.<name>.conflicts": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "services", "<name>", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.services.<name>.description": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "services", "<name>", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.services.<name>.documentation": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "services", "<name>", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.services.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "services", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.services.<name>.environment": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables passed to the service's processes."}, "example": {"_type": "literalExpression", "text": "{\n  LANG = \"nl_NL.UTF-8\";\n  PATH = \"/foo/bar/bin\";\n}"}, "loc": ["systemd", "services", "<name>", "environment"], "readOnly": false, "type": "attribute set of (null or string or path or package)"}, "systemd.services.<name>.onFailure": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "services", "<name>", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.services.<name>.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "services", "<name>", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.services.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "services", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.services.<name>.partOf": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "services", "<name>", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.services.<name>.path": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages added to the service's {env}`PATH`\nenvironment variable.  Both the {file}`bin`\nand {file}`sbin` subdirectories of each\npackage are added.\n"}, "loc": ["systemd", "services", "<name>", "path"], "readOnly": false, "type": "list of (package or string)"}, "systemd.services.<name>.postStart": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed after the service's main process\nis started.\n"}, "loc": ["systemd", "services", "<name>", "postStart"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.services.<name>.postStop": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed after the service's main process\nhas exited.\n"}, "loc": ["systemd", "services", "<name>", "postStop"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.services.<name>.preStart": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed before the service's main process\nis started.\n"}, "loc": ["systemd", "services", "<name>", "preStart"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.services.<name>.preStop": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed to stop the service.\n"}, "loc": ["systemd", "services", "<name>", "preStop"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.services.<name>.reload": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed when the service's main process\nis reloaded.\n"}, "loc": ["systemd", "services", "<name>", "reload"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.services.<name>.reloadIfChanged": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the service should be reloaded during a NixOS\nconfiguration switch if its definition has changed.  If\nenabled, the value of {option}`restartIfChanged` is\nignored.\n\nThis option should not be used anymore in favor of\n{option}`reloadTriggers` which allows more granular\ncontrol of when a service is reloaded and when a service\nis restarted.\n"}, "loc": ["systemd", "services", "<name>", "reloadIfChanged"], "readOnly": false, "type": "boolean"}, "systemd.services.<name>.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "services", "<name>", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.services.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "services", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.services.<name>.requires": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "services", "<name>", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.services.<name>.requisite": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "services", "<name>", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.services.<name>.restartIfChanged": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the service should be restarted during a NixOS\nconfiguration switch if its definition has changed.\n"}, "loc": ["systemd", "services", "<name>", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "systemd.services.<name>.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "services", "<name>", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.services.<name>.script": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed as the service's main process."}, "loc": ["systemd", "services", "<name>", "script"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.services.<name>.scriptArgs": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Arguments passed to the main process script.\nCan contain specifiers (`%` placeholders expanded by systemd, see {manpage}`systemd.unit(5)`).\n"}, "example": {"_type": "literalExpression", "text": "\"%i\""}, "loc": ["systemd", "services", "<name>", "scriptArgs"], "readOnly": false, "type": "string"}, "systemd.services.<name>.serviceConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Service]` section of the unit.  See\n{manpage}`systemd.service(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RestartSec = 5;\n}"}, "loc": ["systemd", "services", "<name>", "serviceConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.services.<name>.startAt": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Automatically start this unit at the given date/time, which\nmust be in the format described in\n{manpage}`systemd.time(7)`.  This is equivalent\nto adding a corresponding timer unit with\n{option}`OnCalendar` set to the value given here.\n"}, "example": {"_type": "literalExpression", "text": "\"Sun 14:00:00\""}, "loc": ["systemd", "services", "<name>", "startAt"], "readOnly": false, "type": "string or list of string"}, "systemd.services.<name>.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "services", "<name>", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.services.<name>.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "services", "<name>", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.services.<name>.stopIfChanged": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set, a changed unit is restarted by calling\n{command}`systemctl stop` in the old configuration,\nthen {command}`systemctl start` in the new one.\nOtherwise, it is restarted in a single step using\n{command}`systemctl restart` in the new configuration.\nThe latter is less correct because it runs the\n`ExecStop` commands from the new\nconfiguration.\n"}, "loc": ["systemd", "services", "<name>", "stopIfChanged"], "readOnly": false, "type": "boolean"}, "systemd.services.<name>.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "services", "<name>", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.services.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "services", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.services.<name>.wants": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "services", "<name>", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.shutdown": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd shutdown executables.\nFor each `NAME = VALUE` pair of the attrSet, a link is generated from\n`/etc/systemd/system-shutdown/NAME` to `VALUE`.\n"}, "loc": ["systemd", "shutdown"], "readOnly": false, "type": "attribute set of path"}, "systemd.shutdownRamfs.contents": {"declarations": ["nixos/modules/system/boot/systemd/shutdown.nix"], "description": {"_type": "mdDoc", "text": "Set of files that have to be linked into the shutdown ramfs"}, "example": {"_type": "literalExpression", "text": "{\n  \"/lib/systemd/system-shutdown/zpool-sync-shutdown\".source = writeShellScript \"zpool\" \"exec ${zfs}/bin/zpool sync\"\n}\n"}, "loc": ["systemd", "shutdownRamfs", "contents"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.shutdownRamfs.contents.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd/shutdown.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable copying of this file and symlinking it."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["systemd", "shutdownRamfs", "contents", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.shutdownRamfs.contents.<name>.source": {"declarations": ["nixos/modules/system/boot/systemd/shutdown.nix"], "description": {"_type": "mdDoc", "text": "Path of the source file."}, "loc": ["systemd", "shutdownRamfs", "contents", "<name>", "source"], "readOnly": false, "type": "path"}, "systemd.shutdownRamfs.contents.<name>.target": {"declarations": ["nixos/modules/system/boot/systemd/shutdown.nix"], "default": {"_type": "literalExpression", "text": "\"\u2039name\u203a\""}, "description": {"_type": "mdDoc", "text": "Path of the symlink.\n"}, "loc": ["systemd", "shutdownRamfs", "contents", "<name>", "target"], "readOnly": false, "type": "path"}, "systemd.shutdownRamfs.contents.<name>.text": {"declarations": ["nixos/modules/system/boot/systemd/shutdown.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Text of the file."}, "loc": ["systemd", "shutdownRamfs", "contents", "<name>", "text"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "systemd.shutdownRamfs.enable": {"declarations": ["nixos/modules/system/boot/systemd/shutdown.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable pivoting back to an initramfs for shutdown."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["systemd", "shutdownRamfs", "enable"], "readOnly": false, "type": "boolean"}, "systemd.shutdownRamfs.storePaths": {"declarations": ["nixos/modules/system/boot/systemd/shutdown.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Store paths to copy into the shutdown ramfs as well.\n"}, "loc": ["systemd", "shutdownRamfs", "storePaths"], "readOnly": false, "type": "list of (optionally newline-terminated) single-line string"}, "systemd.sleep.extraConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config options for systemd sleep state logic.\nSee sleep.conf.d(5) man page for available options.\n"}, "example": {"_type": "literalExpression", "text": "\"HibernateDelaySec=1h\""}, "loc": ["systemd", "sleep", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.slices": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of slice configurations."}, "loc": ["systemd", "slices"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.slices.<name>.after": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "slices", "<name>", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.slices.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "slices", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.slices.<name>.before": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "slices", "<name>", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.slices.<name>.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "slices", "<name>", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.slices.<name>.conflicts": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "slices", "<name>", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.slices.<name>.description": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "slices", "<name>", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.slices.<name>.documentation": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "slices", "<name>", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.slices.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "slices", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.slices.<name>.onFailure": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "slices", "<name>", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.slices.<name>.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "slices", "<name>", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.slices.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "slices", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.slices.<name>.partOf": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "slices", "<name>", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.slices.<name>.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "slices", "<name>", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.slices.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "slices", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.slices.<name>.requires": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "slices", "<name>", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.slices.<name>.requisite": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "slices", "<name>", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.slices.<name>.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "slices", "<name>", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.slices.<name>.sliceConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Slice]` section of the unit.  See\n{manpage}`systemd.slice(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  MemoryMax = \"2G\";\n}"}, "loc": ["systemd", "slices", "<name>", "sliceConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.slices.<name>.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "slices", "<name>", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.slices.<name>.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "slices", "<name>", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.slices.<name>.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "slices", "<name>", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.slices.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "slices", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.slices.<name>.wants": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "slices", "<name>", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.sockets": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd socket units."}, "loc": ["systemd", "sockets"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.sockets.<name>.after": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "sockets", "<name>", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.sockets.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "sockets", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.sockets.<name>.before": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "sockets", "<name>", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.sockets.<name>.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "sockets", "<name>", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.sockets.<name>.conflicts": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "sockets", "<name>", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.sockets.<name>.description": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "sockets", "<name>", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.sockets.<name>.documentation": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "sockets", "<name>", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.sockets.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "sockets", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.sockets.<name>.listenDatagrams": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "For each item in this list, a `ListenDatagram`\noption in the `[Socket]` section will be created.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0:993\"\n  \"/run/my-socket\"\n]"}, "loc": ["systemd", "sockets", "<name>", "listenDatagrams"], "readOnly": false, "type": "list of string"}, "systemd.sockets.<name>.listenStreams": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "For each item in this list, a `ListenStream`\noption in the `[Socket]` section will be created.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0:993\"\n  \"/run/my-socket\"\n]"}, "loc": ["systemd", "sockets", "<name>", "listenStreams"], "readOnly": false, "type": "list of string"}, "systemd.sockets.<name>.onFailure": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "sockets", "<name>", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.sockets.<name>.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "sockets", "<name>", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.sockets.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "sockets", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.sockets.<name>.partOf": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "sockets", "<name>", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.sockets.<name>.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "sockets", "<name>", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.sockets.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "sockets", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.sockets.<name>.requires": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "sockets", "<name>", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.sockets.<name>.requisite": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "sockets", "<name>", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.sockets.<name>.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "sockets", "<name>", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.sockets.<name>.socketConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Socket]` section of the unit.  See\n{manpage}`systemd.socket(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ListenStream = \"/run/my-socket\";\n}"}, "loc": ["systemd", "sockets", "<name>", "socketConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.sockets.<name>.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "sockets", "<name>", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.sockets.<name>.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "sockets", "<name>", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.sockets.<name>.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "sockets", "<name>", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.sockets.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "sockets", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.sockets.<name>.wants": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "sockets", "<name>", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.suppressedSystemUnits": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of units to skip when generating system systemd configuration directory. This has\npriority over upstream units, {option}`systemd.units`, and\n{option}`systemd.additionalUpstreamSystemUnits`. The main purpose of this is to\nprevent a upstream systemd unit from being added to the initrd with any modifications made to it\nby other NixOS modules.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"systemd-backlight@.service\"\n]"}, "loc": ["systemd", "suppressedSystemUnits"], "readOnly": false, "type": "list of string"}, "systemd.targets": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd target units."}, "loc": ["systemd", "targets"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.targets.<name>.after": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "targets", "<name>", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.targets.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "targets", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.targets.<name>.before": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "targets", "<name>", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.targets.<name>.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "targets", "<name>", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.targets.<name>.conflicts": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "targets", "<name>", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.targets.<name>.description": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "targets", "<name>", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.targets.<name>.documentation": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "targets", "<name>", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.targets.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "targets", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.targets.<name>.onFailure": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "targets", "<name>", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.targets.<name>.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "targets", "<name>", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.targets.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "targets", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.targets.<name>.partOf": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "targets", "<name>", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.targets.<name>.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "targets", "<name>", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.targets.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "targets", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.targets.<name>.requires": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "targets", "<name>", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.targets.<name>.requisite": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "targets", "<name>", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.targets.<name>.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "targets", "<name>", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.targets.<name>.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "targets", "<name>", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.targets.<name>.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "targets", "<name>", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.targets.<name>.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "targets", "<name>", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.targets.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "targets", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.targets.<name>.wants": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "targets", "<name>", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.timers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd timer units."}, "loc": ["systemd", "timers"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.timers.<name>.after": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "timers", "<name>", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.timers.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "timers", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.timers.<name>.before": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "timers", "<name>", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.timers.<name>.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "timers", "<name>", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.timers.<name>.conflicts": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "timers", "<name>", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.timers.<name>.description": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "timers", "<name>", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.timers.<name>.documentation": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "timers", "<name>", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.timers.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "timers", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.timers.<name>.onFailure": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "timers", "<name>", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.timers.<name>.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "timers", "<name>", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.timers.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "timers", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.timers.<name>.partOf": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "timers", "<name>", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.timers.<name>.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "timers", "<name>", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.timers.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "timers", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.timers.<name>.requires": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "timers", "<name>", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.timers.<name>.requisite": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "timers", "<name>", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.timers.<name>.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "timers", "<name>", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.timers.<name>.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "timers", "<name>", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.timers.<name>.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "timers", "<name>", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.timers.<name>.timerConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Timer]` section of the unit.  See\n{manpage}`systemd.timer(5)` and\n{manpage}`systemd.time(7)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  OnCalendar = \"Sun 14:00:00\";\n  Unit = \"foo.service\";\n}"}, "loc": ["systemd", "timers", "<name>", "timerConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.timers.<name>.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "timers", "<name>", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.timers.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "timers", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.timers.<name>.wants": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "timers", "<name>", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.tmpfiles.packages": {"declarations": ["nixos/modules/system/boot/systemd/tmpfiles.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of packages containing {command}`systemd-tmpfiles` rules.\n\nAll files ending in .conf found in\n{file}`\u00abpkg\u00bb/lib/tmpfiles.d`\nwill be included.\nIf this folder does not exist or does not contain any files an error will be returned instead.\n\nIf a {file}`lib` output is available, rules are searched there and only there.\nIf there is no {file}`lib` output it will fall back to {file}`out`\nand if that does not exist either, the default output will be used.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.lvm2 ]"}, "loc": ["systemd", "tmpfiles", "packages"], "readOnly": false, "type": "list of package"}, "systemd.tmpfiles.rules": {"declarations": ["nixos/modules/system/boot/systemd/tmpfiles.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Rules for creation, deletion and cleaning of volatile and temporary files\nautomatically. See\n{manpage}`tmpfiles.d(5)`\nfor the exact format.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"d /tmp 1777 root root 10d\"\n]"}, "loc": ["systemd", "tmpfiles", "rules"], "readOnly": false, "type": "list of string"}, "systemd.units": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd units."}, "loc": ["systemd", "units"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.units.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "units", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.units.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "units", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.units.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "units", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.units.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "units", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.units.<name>.text": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Text of this systemd unit."}, "loc": ["systemd", "units", "<name>", "text"], "readOnly": false, "type": "null or string"}, "systemd.units.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "units", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.extraConfig": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra config options for systemd user instances. See {manpage}`systemd-user.conf(5)` for\navailable options.\n"}, "example": {"_type": "literalExpression", "text": "\"DefaultCPUAccounting=yes\""}, "loc": ["systemd", "user", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.user.paths": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd per-user path units."}, "loc": ["systemd", "user", "paths"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.user.paths.<name>.after": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "user", "paths", "<name>", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.paths.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "user", "paths", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.paths.<name>.before": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "user", "paths", "<name>", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.paths.<name>.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "user", "paths", "<name>", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.paths.<name>.conflicts": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "user", "paths", "<name>", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.paths.<name>.description": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "user", "paths", "<name>", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.user.paths.<name>.documentation": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "user", "paths", "<name>", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.user.paths.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "user", "paths", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.user.paths.<name>.onFailure": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "user", "paths", "<name>", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.paths.<name>.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "user", "paths", "<name>", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.paths.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "user", "paths", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.user.paths.<name>.partOf": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "user", "paths", "<name>", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.paths.<name>.pathConfig": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Path]` section of the unit.  See\n{manpage}`systemd.path(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  PathChanged = \"/some/path\";\n  Unit = \"changedpath.service\";\n}"}, "loc": ["systemd", "user", "paths", "<name>", "pathConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.user.paths.<name>.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "user", "paths", "<name>", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.user.paths.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "user", "paths", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.paths.<name>.requires": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "user", "paths", "<name>", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.paths.<name>.requisite": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "user", "paths", "<name>", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.paths.<name>.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "user", "paths", "<name>", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.user.paths.<name>.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "user", "paths", "<name>", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.user.paths.<name>.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "user", "paths", "<name>", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.user.paths.<name>.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "user", "paths", "<name>", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.user.paths.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "user", "paths", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.paths.<name>.wants": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "user", "paths", "<name>", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.services": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd per-user service units."}, "loc": ["systemd", "user", "services"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.user.services.<name>.after": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "user", "services", "<name>", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.services.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "user", "services", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.services.<name>.before": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "user", "services", "<name>", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.services.<name>.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "user", "services", "<name>", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.services.<name>.conflicts": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "user", "services", "<name>", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.services.<name>.description": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "user", "services", "<name>", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.user.services.<name>.documentation": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "user", "services", "<name>", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.user.services.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "user", "services", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.user.services.<name>.environment": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables passed to the service's processes."}, "example": {"_type": "literalExpression", "text": "{\n  LANG = \"nl_NL.UTF-8\";\n  PATH = \"/foo/bar/bin\";\n}"}, "loc": ["systemd", "user", "services", "<name>", "environment"], "readOnly": false, "type": "attribute set of (null or string or path or package)"}, "systemd.user.services.<name>.onFailure": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "user", "services", "<name>", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.services.<name>.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "user", "services", "<name>", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.services.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "user", "services", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.user.services.<name>.partOf": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "user", "services", "<name>", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.services.<name>.path": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages added to the service's {env}`PATH`\nenvironment variable.  Both the {file}`bin`\nand {file}`sbin` subdirectories of each\npackage are added.\n"}, "loc": ["systemd", "user", "services", "<name>", "path"], "readOnly": false, "type": "list of (package or string)"}, "systemd.user.services.<name>.postStart": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed after the service's main process\nis started.\n"}, "loc": ["systemd", "user", "services", "<name>", "postStart"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.user.services.<name>.postStop": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed after the service's main process\nhas exited.\n"}, "loc": ["systemd", "user", "services", "<name>", "postStop"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.user.services.<name>.preStart": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed before the service's main process\nis started.\n"}, "loc": ["systemd", "user", "services", "<name>", "preStart"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.user.services.<name>.preStop": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed to stop the service.\n"}, "loc": ["systemd", "user", "services", "<name>", "preStop"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.user.services.<name>.reload": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed when the service's main process\nis reloaded.\n"}, "loc": ["systemd", "user", "services", "<name>", "reload"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.user.services.<name>.reloadIfChanged": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the service should be reloaded during a NixOS\nconfiguration switch if its definition has changed.  If\nenabled, the value of {option}`restartIfChanged` is\nignored.\n\nThis option should not be used anymore in favor of\n{option}`reloadTriggers` which allows more granular\ncontrol of when a service is reloaded and when a service\nis restarted.\n"}, "loc": ["systemd", "user", "services", "<name>", "reloadIfChanged"], "readOnly": false, "type": "boolean"}, "systemd.user.services.<name>.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "user", "services", "<name>", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.user.services.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "user", "services", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.services.<name>.requires": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "user", "services", "<name>", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.services.<name>.requisite": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "user", "services", "<name>", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.services.<name>.restartIfChanged": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether the service should be restarted during a NixOS\nconfiguration switch if its definition has changed.\n"}, "loc": ["systemd", "user", "services", "<name>", "restartIfChanged"], "readOnly": false, "type": "boolean"}, "systemd.user.services.<name>.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "user", "services", "<name>", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.user.services.<name>.script": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Shell commands executed as the service's main process."}, "loc": ["systemd", "user", "services", "<name>", "script"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "systemd.user.services.<name>.scriptArgs": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Arguments passed to the main process script.\nCan contain specifiers (`%` placeholders expanded by systemd, see {manpage}`systemd.unit(5)`).\n"}, "example": {"_type": "literalExpression", "text": "\"%i\""}, "loc": ["systemd", "user", "services", "<name>", "scriptArgs"], "readOnly": false, "type": "string"}, "systemd.user.services.<name>.serviceConfig": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Service]` section of the unit.  See\n{manpage}`systemd.service(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RestartSec = 5;\n}"}, "loc": ["systemd", "user", "services", "<name>", "serviceConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.user.services.<name>.startAt": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Automatically start this unit at the given date/time, which\nmust be in the format described in\n{manpage}`systemd.time(7)`.  This is equivalent\nto adding a corresponding timer unit with\n{option}`OnCalendar` set to the value given here.\n"}, "example": {"_type": "literalExpression", "text": "\"Sun 14:00:00\""}, "loc": ["systemd", "user", "services", "<name>", "startAt"], "readOnly": false, "type": "string or list of string"}, "systemd.user.services.<name>.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "user", "services", "<name>", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.user.services.<name>.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "user", "services", "<name>", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.user.services.<name>.stopIfChanged": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set, a changed unit is restarted by calling\n{command}`systemctl stop` in the old configuration,\nthen {command}`systemctl start` in the new one.\nOtherwise, it is restarted in a single step using\n{command}`systemctl restart` in the new configuration.\nThe latter is less correct because it runs the\n`ExecStop` commands from the new\nconfiguration.\n"}, "loc": ["systemd", "user", "services", "<name>", "stopIfChanged"], "readOnly": false, "type": "boolean"}, "systemd.user.services.<name>.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "user", "services", "<name>", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.user.services.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "user", "services", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.services.<name>.wants": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "user", "services", "<name>", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.slices": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd per-user slice units."}, "loc": ["systemd", "user", "slices"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.user.slices.<name>.after": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "user", "slices", "<name>", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.slices.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "user", "slices", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.slices.<name>.before": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "user", "slices", "<name>", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.slices.<name>.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "user", "slices", "<name>", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.slices.<name>.conflicts": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "user", "slices", "<name>", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.slices.<name>.description": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "user", "slices", "<name>", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.user.slices.<name>.documentation": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "user", "slices", "<name>", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.user.slices.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "user", "slices", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.user.slices.<name>.onFailure": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "user", "slices", "<name>", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.slices.<name>.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "user", "slices", "<name>", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.slices.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "user", "slices", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.user.slices.<name>.partOf": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "user", "slices", "<name>", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.slices.<name>.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "user", "slices", "<name>", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.user.slices.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "user", "slices", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.slices.<name>.requires": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "user", "slices", "<name>", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.slices.<name>.requisite": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "user", "slices", "<name>", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.slices.<name>.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "user", "slices", "<name>", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.user.slices.<name>.sliceConfig": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Slice]` section of the unit.  See\n{manpage}`systemd.slice(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  MemoryMax = \"2G\";\n}"}, "loc": ["systemd", "user", "slices", "<name>", "sliceConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.user.slices.<name>.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "user", "slices", "<name>", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.user.slices.<name>.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "user", "slices", "<name>", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.user.slices.<name>.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "user", "slices", "<name>", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.user.slices.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "user", "slices", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.slices.<name>.wants": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "user", "slices", "<name>", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.sockets": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd per-user socket units."}, "loc": ["systemd", "user", "sockets"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.user.sockets.<name>.after": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.sockets.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "user", "sockets", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.sockets.<name>.before": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.sockets.<name>.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.sockets.<name>.conflicts": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.sockets.<name>.description": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "user", "sockets", "<name>", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.user.sockets.<name>.documentation": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "user", "sockets", "<name>", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.user.sockets.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.user.sockets.<name>.listenDatagrams": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "For each item in this list, a `ListenDatagram`\noption in the `[Socket]` section will be created.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0:993\"\n  \"/run/my-socket\"\n]"}, "loc": ["systemd", "user", "sockets", "<name>", "listenDatagrams"], "readOnly": false, "type": "list of string"}, "systemd.user.sockets.<name>.listenStreams": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "For each item in this list, a `ListenStream`\noption in the `[Socket]` section will be created.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0:993\"\n  \"/run/my-socket\"\n]"}, "loc": ["systemd", "user", "sockets", "<name>", "listenStreams"], "readOnly": false, "type": "list of string"}, "systemd.user.sockets.<name>.onFailure": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.sockets.<name>.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.sockets.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.user.sockets.<name>.partOf": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.sockets.<name>.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.user.sockets.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.sockets.<name>.requires": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.sockets.<name>.requisite": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.sockets.<name>.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.user.sockets.<name>.socketConfig": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Socket]` section of the unit.  See\n{manpage}`systemd.socket(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ListenStream = \"/run/my-socket\";\n}"}, "loc": ["systemd", "user", "sockets", "<name>", "socketConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.user.sockets.<name>.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.user.sockets.<name>.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.user.sockets.<name>.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "user", "sockets", "<name>", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.user.sockets.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.sockets.<name>.wants": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "user", "sockets", "<name>", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.targets": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd per-user target units."}, "loc": ["systemd", "user", "targets"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.user.targets.<name>.after": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "user", "targets", "<name>", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.targets.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "user", "targets", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.targets.<name>.before": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "user", "targets", "<name>", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.targets.<name>.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "user", "targets", "<name>", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.targets.<name>.conflicts": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "user", "targets", "<name>", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.targets.<name>.description": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "user", "targets", "<name>", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.user.targets.<name>.documentation": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "user", "targets", "<name>", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.user.targets.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "user", "targets", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.user.targets.<name>.onFailure": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "user", "targets", "<name>", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.targets.<name>.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "user", "targets", "<name>", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.targets.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "user", "targets", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.user.targets.<name>.partOf": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "user", "targets", "<name>", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.targets.<name>.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "user", "targets", "<name>", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.user.targets.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "user", "targets", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.targets.<name>.requires": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "user", "targets", "<name>", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.targets.<name>.requisite": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "user", "targets", "<name>", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.targets.<name>.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "user", "targets", "<name>", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.user.targets.<name>.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "user", "targets", "<name>", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.user.targets.<name>.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "user", "targets", "<name>", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.user.targets.<name>.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "user", "targets", "<name>", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.user.targets.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "user", "targets", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.targets.<name>.wants": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "user", "targets", "<name>", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.timers": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd per-user timer units."}, "loc": ["systemd", "user", "timers"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.user.timers.<name>.after": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay this unit until they have started.\n"}, "loc": ["systemd", "user", "timers", "<name>", "after"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.timers.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "user", "timers", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.timers.<name>.before": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started at the same time as\nthis unit, delay them until this unit has started.\n"}, "loc": ["systemd", "user", "timers", "<name>", "before"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.timers.<name>.bindsTo": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Like \u2018requires\u2019, but in addition, if the specified units\nunexpectedly disappear, this unit will be stopped as well.\n"}, "loc": ["systemd", "user", "timers", "<name>", "bindsTo"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.timers.<name>.conflicts": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are started, then this unit is stopped\nand vice versa.\n"}, "loc": ["systemd", "user", "timers", "<name>", "conflicts"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.timers.<name>.description": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Description of this unit used in systemd messages and progress indicators."}, "loc": ["systemd", "user", "timers", "<name>", "description"], "readOnly": false, "type": "(optionally newline-terminated) single-line string"}, "systemd.user.timers.<name>.documentation": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of URIs referencing documentation for this unit or its configuration."}, "loc": ["systemd", "user", "timers", "<name>", "documentation"], "readOnly": false, "type": "list of string"}, "systemd.user.timers.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "user", "timers", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.user.timers.<name>.onFailure": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"failed\" state.\n"}, "loc": ["systemd", "user", "timers", "<name>", "onFailure"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.timers.<name>.onSuccess": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of one or more units that are activated when\nthis unit enters the \"inactive\" state.\n"}, "loc": ["systemd", "user", "timers", "<name>", "onSuccess"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.timers.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "user", "timers", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.user.timers.<name>.partOf": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "If the specified units are stopped or restarted, then this\nunit is stopped or restarted as well.\n"}, "loc": ["systemd", "user", "timers", "<name>", "partOf"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.timers.<name>.reloadTriggers": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe reloaded.  If anything but a reload trigger changes in the\nunit file, the unit will be restarted instead.\n"}, "loc": ["systemd", "user", "timers", "<name>", "reloadTriggers"], "readOnly": false, "type": "list of (systemd option)"}, "systemd.user.timers.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "user", "timers", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.timers.<name>.requires": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started, and stop\nthis unit when the specified units are stopped or fail.\n"}, "loc": ["systemd", "user", "timers", "<name>", "requires"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.timers.<name>.requisite": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Similar to requires. However if the units listed are not started,\nthey will not be started and the transaction will fail.\n"}, "loc": ["systemd", "user", "timers", "<name>", "requisite"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.timers.<name>.restartTriggers": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "An arbitrary list of items such as derivations.  If any item\nin the list changes between reconfigurations, the service will\nbe restarted.\n"}, "loc": ["systemd", "user", "timers", "<name>", "restartTriggers"], "readOnly": false, "type": "list of unspecified value"}, "systemd.user.timers.<name>.startLimitBurst": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "user", "timers", "<name>", "startLimitBurst"], "readOnly": false, "type": "signed integer"}, "systemd.user.timers.<name>.startLimitIntervalSec": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "description": {"_type": "mdDoc", "text": "Configure unit start rate limiting. Units which are started\nmore than startLimitBurst times within an interval time\ninterval are not permitted to start any more.\n"}, "loc": ["systemd", "user", "timers", "<name>", "startLimitIntervalSec"], "readOnly": false, "type": "signed integer"}, "systemd.user.timers.<name>.timerConfig": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Timer]` section of the unit.  See\n{manpage}`systemd.timer(5)` and\n{manpage}`systemd.time(7)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  OnCalendar = \"Sun 14:00:00\";\n  Unit = \"foo.service\";\n}"}, "loc": ["systemd", "user", "timers", "<name>", "timerConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.user.timers.<name>.unitConfig": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Each attribute in this set specifies an option in the\n`[Unit]` section of the unit.  See\n{manpage}`systemd.unit(5)` for details.\n"}, "example": {"_type": "literalExpression", "text": "{\n  RequiresMountsFor = \"/data\";\n}"}, "loc": ["systemd", "user", "timers", "<name>", "unitConfig"], "readOnly": false, "type": "attribute set of (systemd option)"}, "systemd.user.timers.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "user", "timers", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.timers.<name>.wants": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Start the specified units when this unit is started.\n"}, "loc": ["systemd", "user", "timers", "<name>", "wants"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.tmpfiles.rules": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Global user rules for creation, deletion and cleaning of volatile and\ntemporary files automatically. See\n{manpage}`tmpfiles.d(5)`\nfor the exact format.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"D %C - - - 7d\"\n]"}, "loc": ["systemd", "user", "tmpfiles", "rules"], "readOnly": false, "type": "list of string"}, "systemd.user.tmpfiles.users": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Per-user rules for creation, deletion and cleaning of volatile and\ntemporary files automatically.\n"}, "loc": ["systemd", "user", "tmpfiles", "users"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.user.tmpfiles.users.<name>.rules": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Per-user rules for creation, deletion and cleaning of volatile and\ntemporary files automatically. See\n{manpage}`tmpfiles.d(5)`\nfor the exact format.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"D %C - - - 7d\"\n]"}, "loc": ["systemd", "user", "tmpfiles", "users", "<name>", "rules"], "readOnly": false, "type": "list of string"}, "systemd.user.units": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Definition of systemd per-user units."}, "loc": ["systemd", "user", "units"], "readOnly": false, "type": "attribute set of (submodule)"}, "systemd.user.units.<name>.aliases": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Aliases of that unit."}, "loc": ["systemd", "user", "units", "<name>", "aliases"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.units.<name>.enable": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to false, this unit will be a symlink to\n/dev/null. This is primarily useful to prevent specific\ntemplate instances\n(e.g. `serial-getty@ttyS0`) from being\nstarted. Note that `enable=true` does not\nmake a unit start by default at boot; if you want that, see\n`wantedBy`.\n"}, "loc": ["systemd", "user", "units", "<name>", "enable"], "readOnly": false, "type": "boolean"}, "systemd.user.units.<name>.overrideStrategy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "\"asDropinIfExists\""}, "description": {"_type": "mdDoc", "text": "Defines how unit configuration is provided for systemd:\n\n`asDropinIfExists` creates a unit file when no unit file is provided by the package\notherwise a drop-in file name `overrides.conf`.\n\n`asDropin` creates a drop-in file named `overrides.conf`.\nMainly needed to define instances for systemd template units (e.g. `systemd-nspawn@mycontainer.service`).\n\nSee also {manpage}`systemd.unit(5)`.\n"}, "loc": ["systemd", "user", "units", "<name>", "overrideStrategy"], "readOnly": false, "type": "one of \"asDropinIfExists\", \"asDropin\""}, "systemd.user.units.<name>.requiredBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that require (i.e. depend on and need to go down with) this unit.\nAs discussed in the `wantedBy` option description this also creates\n`.requires` symlinks automatically.\n"}, "loc": ["systemd", "user", "units", "<name>", "requiredBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.user.units.<name>.text": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Text of this systemd unit."}, "loc": ["systemd", "user", "units", "<name>", "text"], "readOnly": false, "type": "null or string"}, "systemd.user.units.<name>.wantedBy": {"declarations": ["nixos/modules/system/boot/systemd/user.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Units that want (i.e. depend on) this unit. The default method for\nstarting a unit by default at boot time is to set this option to\n`[\"multi-user.target\"]` for system services. Likewise for user units\n(`systemd.user.<name>.*`) set it to `[\"default.target\"]` to make a unit\nstart by default when the user `<name>` logs on.\n\nThis option creates a `.wants` symlink in the given target that exists\nstatelessly without the need for running `systemctl enable`.\nThe `[Install]` section described in {manpage}`systemd.unit(5)` however is\nnot supported because it is a stateful process that does not fit well\ninto the NixOS design.\n"}, "loc": ["systemd", "user", "units", "<name>", "wantedBy"], "readOnly": false, "type": "list of string matching the pattern [a-zA-Z0-9@%:_.\\-]+[.](service|socket|device|mount|automount|swap|target|path|timer|scope|slice)"}, "systemd.watchdog.device": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path to a hardware watchdog device which will be managed by systemd.\nIf not specified, systemd will default to /dev/watchdog.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/watchdog\""}, "loc": ["systemd", "watchdog", "device"], "readOnly": false, "type": "null or path"}, "systemd.watchdog.kexecTime": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The amount of time which can elapse when kexec is being executed before\na watchdog hardware device will automatically reboot the system. This\noption should only be enabled if reloadTime is also enabled. Valid\ntime units include \"ms\", \"s\", \"min\", \"h\", \"d\", and \"w\".\n"}, "example": {"_type": "literalExpression", "text": "\"10m\""}, "loc": ["systemd", "watchdog", "kexecTime"], "readOnly": false, "type": "null or string"}, "systemd.watchdog.rebootTime": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The amount of time which can elapse after a reboot has been triggered\nbefore a watchdog hardware device will automatically reboot the system.\nValid time units include \"ms\", \"s\", \"min\", \"h\", \"d\", and \"w\".\n"}, "example": {"_type": "literalExpression", "text": "\"10m\""}, "loc": ["systemd", "watchdog", "rebootTime"], "readOnly": false, "type": "null or string"}, "systemd.watchdog.runtimeTime": {"declarations": ["nixos/modules/system/boot/systemd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The amount of time which can elapse before a watchdog hardware device\nwill automatically reboot the system. Valid time units include \"ms\",\n\"s\", \"min\", \"h\", \"d\", and \"w\".\n"}, "example": {"_type": "literalExpression", "text": "\"30s\""}, "loc": ["systemd", "watchdog", "runtimeTime"], "readOnly": false, "type": "null or string"}, "time.hardwareClockInLocalTime": {"declarations": ["nixos/modules/config/locale.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, keep the hardware clock in local time instead of UTC."}, "loc": ["time", "hardwareClockInLocalTime"], "readOnly": false, "type": "boolean"}, "time.timeZone": {"declarations": ["nixos/modules/config/locale.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The time zone used when displaying times and dates. See <https://en.wikipedia.org/wiki/List_of_tz_database_time_zones>\nfor a comprehensive list of possible values for this setting.\n\nIf null, the timezone will default to UTC and can be set imperatively\nusing timedatectl.\n"}, "example": {"_type": "literalExpression", "text": "\"America/New_York\""}, "loc": ["time", "timeZone"], "readOnly": false, "type": "null or string without spaces"}, "users.allowNoPasswordLogin": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable checking that at least the `root` user or a user in the `wheel` group can log in using\na password or an SSH key.\n\nWARNING: enabling this can lock you out of your system. Enable this only if you know what are you doing.\n"}, "loc": ["users", "allowNoPasswordLogin"], "readOnly": false, "type": "boolean"}, "users.defaultUserShell": {"declarations": ["nixos/modules/programs/shadow.nix"], "description": {"_type": "mdDoc", "text": "This option defines the default shell assigned to user\naccounts. This can be either a full system path or a shell package.\n\nThis must not be a store path, since the path is\nused outside the store (in particular in /etc/passwd).\n"}, "example": {"_type": "literalExpression", "text": "pkgs.zsh"}, "loc": ["users", "defaultUserShell"], "readOnly": false, "type": "path or package"}, "users.enforceIdUniqueness": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to require that no two users/groups share the same uid/gid.\n"}, "loc": ["users", "enforceIdUniqueness"], "readOnly": false, "type": "boolean"}, "users.extraGroups": {"declarations": ["nixos/modules/config/users-groups.nix"], "description": {"_type": "mdDoc", "text": "Alias of {option}`users.groups`."}, "loc": ["users", "extraGroups"], "readOnly": false, "type": "attribute set of (submodule)"}, "users.extraGroups.<name>.gid": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The group GID. If the GID is null, a free GID is picked on\nactivation.\n"}, "loc": ["users", "extraGroups", "<name>", "gid"], "readOnly": false, "type": "null or signed integer"}, "users.extraGroups.<name>.members": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The user names of the group members, added to the\n`/etc/group` file.\n"}, "loc": ["users", "extraGroups", "<name>", "members"], "readOnly": false, "type": "list of string, not containing newlines or colons"}, "users.extraGroups.<name>.name": {"declarations": ["nixos/modules/config/users-groups.nix"], "description": {"_type": "mdDoc", "text": "The name of the group. If undefined, the name of the attribute set\nwill be used.\n"}, "loc": ["users", "extraGroups", "<name>", "name"], "readOnly": false, "type": "string, not containing newlines or colons"}, "users.extraUsers": {"declarations": ["nixos/modules/config/users-groups.nix"], "description": {"_type": "mdDoc", "text": "Alias of {option}`users.users`."}, "loc": ["users", "extraUsers"], "readOnly": false, "type": "attribute set of (submodule)"}, "users.extraUsers.<name>.autoSubUidGidRange": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically allocate subordinate user and group ids for this user.\nAllocated range is currently always of size 65536.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["users", "extraUsers", "<name>", "autoSubUidGidRange"], "readOnly": false, "type": "boolean"}, "users.extraUsers.<name>.createHome": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to create the home directory and ensure ownership as well as\npermissions to match the user.\n"}, "loc": ["users", "extraUsers", "<name>", "createHome"], "readOnly": false, "type": "boolean"}, "users.extraUsers.<name>.cryptHomeLuks": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to encrypted luks device that contains\nthe user's home directory.\n"}, "loc": ["users", "extraUsers", "<name>", "cryptHomeLuks"], "readOnly": false, "type": "null or string"}, "users.extraUsers.<name>.description": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "A short description of the user account, typically the\nuser's full name.  This is actually the \u201cGECOS\u201d or \u201ccomment\u201d\nfield in {file}`/etc/passwd`.\n"}, "example": {"_type": "literalExpression", "text": "\"Alice Q. User\""}, "loc": ["users", "extraUsers", "<name>", "description"], "readOnly": false, "type": "string, not containing newlines or colons"}, "users.extraUsers.<name>.extraGroups": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The user's auxiliary groups."}, "loc": ["users", "extraUsers", "<name>", "extraGroups"], "readOnly": false, "type": "list of string"}, "users.extraUsers.<name>.group": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The user's primary group."}, "loc": ["users", "extraUsers", "<name>", "group"], "readOnly": false, "type": "string"}, "users.extraUsers.<name>.hashedPassword": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the hashed password for the user.\nThe options {option}`hashedPassword`,\n{option}`password` and {option}`passwordFile`\ncontrols what password is set for the user.\n{option}`hashedPassword` overrides both\n{option}`password` and {option}`passwordFile`.\n{option}`password` overrides {option}`passwordFile`.\nIf none of these three options are set, no password is assigned to\nthe user, and the user will not be able to do password logins.\nIf the option {option}`users.mutableUsers` is true, the\npassword defined in one of the three options will only be set when\nthe user is created for the first time. After that, you are free to\nchange the password with the ordinary user management commands. If\n{option}`users.mutableUsers` is false, you cannot change\nuser passwords, they will always be set according to the password\noptions.\n\nTo generate a hashed password run `mkpasswd`.\n\nIf set to an empty string (`\"\"`), this user will\nbe able to log in without being asked for a password (but not via remote\nservices such as SSH, or indirectly via {command}`su` or\n{command}`sudo`). This should only be used for e.g. bootable\nlive systems. Note: this is different from setting an empty password,\nwhich can be achieved using {option}`users.users.<name?>.password`.\n\nIf set to `null` (default) this user will not\nbe able to log in using a password (i.e. via {command}`login`\ncommand).\n\n"}, "loc": ["users", "extraUsers", "<name>", "hashedPassword"], "readOnly": false, "type": "null or string, not containing newlines or colons"}, "users.extraUsers.<name>.home": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "\"/var/empty\""}, "description": {"_type": "mdDoc", "text": "The user's home directory."}, "loc": ["users", "extraUsers", "<name>", "home"], "readOnly": false, "type": "path, not containing newlines or colons"}, "users.extraUsers.<name>.homeMode": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "\"700\""}, "description": {"_type": "mdDoc", "text": "The user's home directory mode in numeric format. See chmod(1). The mode is only applied if {option}`users.users.<name>.createHome` is true."}, "loc": ["users", "extraUsers", "<name>", "homeMode"], "readOnly": false, "type": "string matching the pattern [0-7]{1,5}"}, "users.extraUsers.<name>.initialHashedPassword": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the initial hashed password for the user, i.e. the\nhashed password assigned if the user does not already\nexist. If {option}`users.mutableUsers` is true, the\npassword can be changed subsequently using the\n{command}`passwd` command. Otherwise, it's\nequivalent to setting the {option}`hashedPassword` option.\n\nNote that the {option}`hashedPassword` option will override\nthis option if both are set.\n\nTo generate a hashed password run `mkpasswd`.\n\nIf set to an empty string (`\"\"`), this user will\nbe able to log in without being asked for a password (but not via remote\nservices such as SSH, or indirectly via {command}`su` or\n{command}`sudo`). This should only be used for e.g. bootable\nlive systems. Note: this is different from setting an empty password,\nwhich can be achieved using {option}`users.users.<name?>.password`.\n\nIf set to `null` (default) this user will not\nbe able to log in using a password (i.e. via {command}`login`\ncommand).\n\n"}, "loc": ["users", "extraUsers", "<name>", "initialHashedPassword"], "readOnly": false, "type": "null or string, not containing newlines or colons"}, "users.extraUsers.<name>.initialPassword": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the initial password for the user, i.e. the\npassword assigned if the user does not already exist. If\n{option}`users.mutableUsers` is true, the password\ncan be changed subsequently using the\n{command}`passwd` command. Otherwise, it's\nequivalent to setting the {option}`password`\noption. The same caveat applies: the password specified here\nis world-readable in the Nix store, so it should only be\nused for guest accounts or passwords that will be changed\npromptly.\n\nNote that the {option}`password` option will override this\noption if both are set.\n"}, "loc": ["users", "extraUsers", "<name>", "initialPassword"], "readOnly": false, "type": "null or string"}, "users.extraUsers.<name>.isNormalUser": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Indicates whether this is an account for a \u201creal\u201d user.\nThis automatically sets {option}`group` to `users`,\n{option}`createHome` to `true`,\n{option}`home` to {file}`/home/\u00abusername\u00bb`,\n{option}`useDefaultShell` to `true`,\nand {option}`isSystemUser` to `false`.\nExactly one of `isNormalUser` and `isSystemUser` must be true.\n"}, "loc": ["users", "extraUsers", "<name>", "isNormalUser"], "readOnly": false, "type": "boolean"}, "users.extraUsers.<name>.isSystemUser": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Indicates if the user is a system user or not. This option\nonly has an effect if {option}`uid` is\n{option}`null`, in which case it determines whether\nthe user's UID is allocated in the range for system users\n(below 1000) or in the range for normal users (starting at\n1000).\nExactly one of `isNormalUser` and\n`isSystemUser` must be true.\n"}, "loc": ["users", "extraUsers", "<name>", "isSystemUser"], "readOnly": false, "type": "boolean"}, "users.extraUsers.<name>.name": {"declarations": ["nixos/modules/config/users-groups.nix"], "description": {"_type": "mdDoc", "text": "The name of the user account. If undefined, the name of the\nattribute set will be used.\n"}, "loc": ["users", "extraUsers", "<name>", "name"], "readOnly": false, "type": "string, not containing newlines or colons"}, "users.extraUsers.<name>.openssh.authorizedKeys.keyFiles": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of files each containing one OpenSSH public key that should be\nadded to the user's authorized keys. The contents of the files are\nread at build time and added to a file that the SSH daemon reads in\naddition to the the user's authorized_keys file. You can combine the\n`keyFiles` and `keys` options.\n"}, "loc": ["users", "extraUsers", "<name>", "openssh", "authorizedKeys", "keyFiles"], "readOnly": false, "type": "list of path"}, "users.extraUsers.<name>.openssh.authorizedKeys.keys": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of verbatim OpenSSH public keys that should be added to the\nuser's authorized keys. The keys are added to a file that the SSH\ndaemon reads in addition to the the user's authorized_keys file.\nYou can combine the `keys` and\n`keyFiles` options.\nWarning: If you are using `NixOps` then don't use this\noption since it will replace the key required for deployment via ssh.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"ssh-rsa AAAAB3NzaC1yc2etc/etc/etcjwrsh8e596z6J0l7 example@host\"\n  \"ssh-ed25519 AAAAC3NzaCetcetera/etceteraJZMfk3QPfQ foo@bar\"\n]"}, "loc": ["users", "extraUsers", "<name>", "openssh", "authorizedKeys", "keys"], "readOnly": false, "type": "list of (optionally newline-terminated) single-line string"}, "users.extraUsers.<name>.packages": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The set of packages that should be made available to the user.\nThis is in contrast to {option}`environment.systemPackages`,\nwhich adds packages to all users.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.firefox pkgs.thunderbird ]"}, "loc": ["users", "extraUsers", "<name>", "packages"], "readOnly": false, "type": "list of package"}, "users.extraUsers.<name>.pamMount": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attributes for user's entry in\n{file}`pam_mount.conf.xml`.\nUseful attributes might include `path`,\n`options`, `fstype`, and `server`.\nSee <http://pam-mount.sourceforge.net/pam_mount.conf.5.html>\nfor more information.\n"}, "loc": ["users", "extraUsers", "<name>", "pamMount"], "readOnly": false, "type": "attribute set of string"}, "users.extraUsers.<name>.password": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the (clear text) password for the user.\nWarning: do not set confidential information here\nbecause it is world-readable in the Nix store. This option\nshould only be used for public accounts.\nThe options {option}`hashedPassword`,\n{option}`password` and {option}`passwordFile`\ncontrols what password is set for the user.\n{option}`hashedPassword` overrides both\n{option}`password` and {option}`passwordFile`.\n{option}`password` overrides {option}`passwordFile`.\nIf none of these three options are set, no password is assigned to\nthe user, and the user will not be able to do password logins.\nIf the option {option}`users.mutableUsers` is true, the\npassword defined in one of the three options will only be set when\nthe user is created for the first time. After that, you are free to\nchange the password with the ordinary user management commands. If\n{option}`users.mutableUsers` is false, you cannot change\nuser passwords, they will always be set according to the password\noptions.\n\n"}, "loc": ["users", "extraUsers", "<name>", "password"], "readOnly": false, "type": "null or string"}, "users.extraUsers.<name>.passwordFile": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The full path to a file that contains the user's password. The password\nfile is read on each system activation. The file should contain\nexactly one line, which should be the password in an encrypted form\nthat is suitable for the `chpasswd -e` command.\nThe options {option}`hashedPassword`,\n{option}`password` and {option}`passwordFile`\ncontrols what password is set for the user.\n{option}`hashedPassword` overrides both\n{option}`password` and {option}`passwordFile`.\n{option}`password` overrides {option}`passwordFile`.\nIf none of these three options are set, no password is assigned to\nthe user, and the user will not be able to do password logins.\nIf the option {option}`users.mutableUsers` is true, the\npassword defined in one of the three options will only be set when\nthe user is created for the first time. After that, you are free to\nchange the password with the ordinary user management commands. If\n{option}`users.mutableUsers` is false, you cannot change\nuser passwords, they will always be set according to the password\noptions.\n\n"}, "loc": ["users", "extraUsers", "<name>", "passwordFile"], "readOnly": false, "type": "null or string"}, "users.extraUsers.<name>.shell": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "pkgs.shadow"}, "description": {"_type": "mdDoc", "text": "The path to the user's shell. Can use shell derivations,\nlike `pkgs.bashInteractive`. Don\u2019t\nforget to enable your shell in\n`programs` if necessary,\nlike `programs.zsh.enable = true;`.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.bashInteractive"}, "loc": ["users", "extraUsers", "<name>", "shell"], "readOnly": false, "type": "null or package or path, not containing newlines or colons"}, "users.extraUsers.<name>.subGidRanges": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Subordinate group ids that user is allowed to use.\nThey are set into {file}`/etc/subgid` and are used\nby `newgidmap` for user namespaces.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    count = 1;\n    startGid = 100;\n  }\n  {\n    count = 999;\n    startGid = 1001;\n  }\n]"}, "loc": ["users", "extraUsers", "<name>", "subGidRanges"], "readOnly": false, "type": "list of (submodule)"}, "users.extraUsers.<name>.subGidRanges.*.count": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Count of subordinate group ids"}, "loc": ["users", "extraUsers", "<name>", "subGidRanges", "*", "count"], "readOnly": false, "type": "signed integer"}, "users.extraUsers.<name>.subGidRanges.*.startGid": {"declarations": ["nixos/modules/config/users-groups.nix"], "description": {"_type": "mdDoc", "text": "Start of the range of subordinate group ids that user is\nallowed to use.\n"}, "loc": ["users", "extraUsers", "<name>", "subGidRanges", "*", "startGid"], "readOnly": false, "type": "signed integer"}, "users.extraUsers.<name>.subUidRanges": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Subordinate user ids that user is allowed to use.\nThey are set into {file}`/etc/subuid` and are used\nby `newuidmap` for user namespaces.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    count = 1;\n    startUid = 1000;\n  }\n  {\n    count = 65534;\n    startUid = 100001;\n  }\n]"}, "loc": ["users", "extraUsers", "<name>", "subUidRanges"], "readOnly": false, "type": "list of (submodule)"}, "users.extraUsers.<name>.subUidRanges.*.count": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Count of subordinate user ids"}, "loc": ["users", "extraUsers", "<name>", "subUidRanges", "*", "count"], "readOnly": false, "type": "signed integer"}, "users.extraUsers.<name>.subUidRanges.*.startUid": {"declarations": ["nixos/modules/config/users-groups.nix"], "description": {"_type": "mdDoc", "text": "Start of the range of subordinate user ids that user is\nallowed to use.\n"}, "loc": ["users", "extraUsers", "<name>", "subUidRanges", "*", "startUid"], "readOnly": false, "type": "signed integer"}, "users.extraUsers.<name>.uid": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The account UID. If the UID is null, a free UID is picked on\nactivation.\n"}, "loc": ["users", "extraUsers", "<name>", "uid"], "readOnly": false, "type": "null or signed integer"}, "users.extraUsers.<name>.useDefaultShell": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If true, the user's shell will be set to\n{option}`users.defaultUserShell`.\n"}, "loc": ["users", "extraUsers", "<name>", "useDefaultShell"], "readOnly": false, "type": "boolean"}, "users.groups": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional groups to be created automatically by the system.\n"}, "example": {"_type": "literalExpression", "text": "{\n  hackers = { };\n  students = {\n    gid = 1001;\n  };\n}"}, "loc": ["users", "groups"], "readOnly": false, "type": "attribute set of (submodule)"}, "users.groups.<name>.gid": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The group GID. If the GID is null, a free GID is picked on\nactivation.\n"}, "loc": ["users", "groups", "<name>", "gid"], "readOnly": false, "type": "null or signed integer"}, "users.groups.<name>.members": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The user names of the group members, added to the\n`/etc/group` file.\n"}, "loc": ["users", "groups", "<name>", "members"], "readOnly": false, "type": "list of string, not containing newlines or colons"}, "users.groups.<name>.name": {"declarations": ["nixos/modules/config/users-groups.nix"], "description": {"_type": "mdDoc", "text": "The name of the group. If undefined, the name of the attribute set\nwill be used.\n"}, "loc": ["users", "groups", "<name>", "name"], "readOnly": false, "type": "string, not containing newlines or colons"}, "users.ldap.base": {"declarations": ["nixos/modules/config/ldap.nix"], "description": {"_type": "mdDoc", "text": "The distinguished name of the search base."}, "example": {"_type": "literalExpression", "text": "\"dc=example,dc=org\""}, "loc": ["users", "ldap", "base"], "readOnly": false, "type": "string"}, "users.ldap.bind.distinguishedName": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The distinguished name to bind to the LDAP server with. If this\nis not specified, an anonymous bind will be done.\n"}, "example": {"_type": "literalExpression", "text": "\"cn=admin,dc=example,dc=com\""}, "loc": ["users", "ldap", "bind", "distinguishedName"], "readOnly": false, "type": "string"}, "users.ldap.bind.passwordFile": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/ldap/bind.password\""}, "description": {"_type": "mdDoc", "text": "The path to a file containing the credentials to use when binding\nto the LDAP server (if not binding anonymously).\n"}, "loc": ["users", "ldap", "bind", "passwordFile"], "readOnly": false, "type": "string"}, "users.ldap.bind.policy": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "\"hard_open\""}, "description": {"_type": "mdDoc", "text": "Specifies the policy to use for reconnecting to an unavailable\nLDAP server. The default is `hard_open`, which\nreconnects if opening the connection to the directory server\nfailed. By contrast, `hard_init` reconnects if\ninitializing the connection failed. Initializing may not\nactually contact the directory server, and it is possible that\na malformed configuration file will trigger reconnection. If\n`soft` is specified, then\n`nss_ldap` will return immediately on server\nfailure. All hard reconnect policies block with exponential\nbackoff before retrying.\n"}, "loc": ["users", "ldap", "bind", "policy"], "readOnly": false, "type": "one of \"hard_open\", \"hard_init\", \"soft\""}, "users.ldap.bind.timeLimit": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "Specifies the time limit (in seconds) to use when connecting\nto the directory server. This is distinct from the time limit\nspecified in {option}`users.ldap.timeLimit` and affects\nthe initial server connection only.\n"}, "loc": ["users", "ldap", "bind", "timeLimit"], "readOnly": false, "type": "signed integer"}, "users.ldap.daemon.enable": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to let the nslcd daemon (nss-pam-ldapd) handle the\nLDAP lookups for NSS and PAM. This can improve performance,\nand if you need to bind to the LDAP server with a password,\nit increases security, since only the nslcd user needs to\nhave access to the bindpw file, not everyone that uses NSS\nand/or PAM. If this option is enabled, a local nscd user is\ncreated automatically, and the nslcd service is started\nautomatically when the network get up.\n"}, "loc": ["users", "ldap", "daemon", "enable"], "readOnly": false, "type": "boolean"}, "users.ldap.daemon.extraConfig": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options that will be added verbatim at\nthe end of the nslcd configuration file (`nslcd.conf(5)`).\n"}, "loc": ["users", "ldap", "daemon", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "users.ldap.daemon.rootpwmoddn": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The distinguished name to use to bind to the LDAP server\nwhen the root user tries to modify a user's password.\n"}, "example": {"_type": "literalExpression", "text": "\"cn=admin,dc=example,dc=com\""}, "loc": ["users", "ldap", "daemon", "rootpwmoddn"], "readOnly": false, "type": "string"}, "users.ldap.daemon.rootpwmodpwFile": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The path to a file containing the credentials with which to bind to\nthe LDAP server if the root user tries to change a user's password.\n"}, "example": {"_type": "literalExpression", "text": "\"/run/keys/nslcd.rootpwmodpw\""}, "loc": ["users", "ldap", "daemon", "rootpwmodpwFile"], "readOnly": false, "type": "string"}, "users.ldap.enable": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable authentication against an LDAP server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["users", "ldap", "enable"], "readOnly": false, "type": "boolean"}, "users.ldap.extraConfig": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options that will be added verbatim at\nthe end of the ldap configuration file (`ldap.conf(5)`).\nIf {option}`users.ldap.daemon` is enabled, this\nconfiguration will not be used. In that case, use\n{option}`users.ldap.daemon.extraConfig` instead.\n"}, "loc": ["users", "ldap", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "users.ldap.loginPam": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to include authentication against LDAP in login PAM."}, "loc": ["users", "ldap", "loginPam"], "readOnly": false, "type": "boolean"}, "users.ldap.nsswitch": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to include lookup against LDAP in NSS."}, "loc": ["users", "ldap", "nsswitch"], "readOnly": false, "type": "boolean"}, "users.ldap.server": {"declarations": ["nixos/modules/config/ldap.nix"], "description": {"_type": "mdDoc", "text": "The URL of the LDAP server."}, "example": {"_type": "literalExpression", "text": "\"ldap://ldap.example.org/\""}, "loc": ["users", "ldap", "server"], "readOnly": false, "type": "string"}, "users.ldap.timeLimit": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Specifies the time limit (in seconds) to use when performing\nsearches. A value of zero (0), which is the default, is to\nwait indefinitely for searches to be completed.\n"}, "loc": ["users", "ldap", "timeLimit"], "readOnly": false, "type": "signed integer"}, "users.ldap.useTLS": {"declarations": ["nixos/modules/config/ldap.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, use TLS (encryption) over an LDAP (port 389)\nconnection.  The alternative is to specify an LDAPS server (port\n636) in {option}`users.ldap.server` or to forego\nsecurity.\n"}, "loc": ["users", "ldap", "useTLS"], "readOnly": false, "type": "boolean"}, "users.motd": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Message of the day shown to users when they log in."}, "example": {"_type": "literalExpression", "text": "\"Today is Sweetmorn, the 4th day of The Aftermath in the YOLD 3178.\""}, "loc": ["users", "motd"], "readOnly": false, "type": "null or strings concatenated with \"\\n\""}, "users.motdFile": {"declarations": ["nixos/modules/security/pam.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A file containing the message of the day shown to users when they log in."}, "example": {"_type": "literalExpression", "text": "\"/etc/motd\""}, "loc": ["users", "motdFile"], "readOnly": false, "type": "null or path"}, "users.mutableUsers": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If set to `true`, you are free to add new users and groups to the system\nwith the ordinary `useradd` and\n`groupadd` commands. On system activation, the\nexisting contents of the `/etc/passwd` and\n`/etc/group` files will be merged with the\ncontents generated from the `users.users` and\n`users.groups` options.\nThe initial password for a user will be set\naccording to `users.users`, but existing passwords\nwill not be changed.\n\n::: {.warning}\nIf set to `false`, the contents of the user and\ngroup files will simply be replaced on system activation. This also\nholds for the user passwords; all changed\npasswords will be reset according to the\n`users.users` configuration on activation.\n:::\n"}, "loc": ["users", "mutableUsers"], "readOnly": false, "type": "boolean"}, "users.mysql.database": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The name of the database containing the users"}, "example": {"_type": "literalExpression", "text": "\"auth\""}, "loc": ["users", "mysql", "database"], "readOnly": false, "type": "string"}, "users.mysql.enable": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Authentication against a MySQL/MariaDB database."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["users", "mysql", "enable"], "readOnly": false, "type": "boolean"}, "users.mysql.host": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The hostname of the MySQL/MariaDB server"}, "example": {"_type": "literalExpression", "text": "\"localhost\""}, "loc": ["users", "mysql", "host"], "readOnly": false, "type": "string"}, "users.mysql.nss": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "Settings for `libnss-mysql`.\n\nAll examples are from the [minimal example](https://github.com/saknopper/libnss-mysql/tree/master/sample/minimal)\nof `libnss-mysql`, but they are modified with NixOS paths for bash.\n"}, "loc": ["users", "mysql", "nss"], "readOnly": false, "type": "submodule"}, "users.mysql.nss.getgrent": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SQL query for the [getgrent](https://man7.org/linux/man-pages/man3/getgrent.3.html)\nsyscall.\n"}, "example": {"_type": "literalExpression", "text": "SELECT name,password,gid FROM groups\n"}, "loc": ["users", "mysql", "nss", "getgrent"], "readOnly": false, "type": "null or string"}, "users.mysql.nss.getgrgid": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SQL query for the [getgrgid](https://man7.org/linux/man-pages/man3/getgrgid.3.html)\nsyscall.\n"}, "example": {"_type": "literalExpression", "text": "SELECT name,password,gid FROM groups WHERE gid='%1$u' LIMIT 1\n"}, "loc": ["users", "mysql", "nss", "getgrgid"], "readOnly": false, "type": "null or string"}, "users.mysql.nss.getgrnam": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SQL query for the [getgrnam](https://man7.org/linux/man-pages/man3/getgrnam.3.html)\nsyscall.\n"}, "example": {"_type": "literalExpression", "text": "SELECT name,password,gid FROM groups WHERE name='%1$s' LIMIT 1\n"}, "loc": ["users", "mysql", "nss", "getgrnam"], "readOnly": false, "type": "null or string"}, "users.mysql.nss.getpwent": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SQL query for the [getpwent](https://man7.org/linux/man-pages/man3/getpwent.3.html)\nsyscall.\n"}, "example": {"_type": "literalExpression", "text": "SELECT username,'x',uid,'5000','MySQL User', CONCAT('/home/',username),'/run/sw/current-system/bin/bash' FROM users\n"}, "loc": ["users", "mysql", "nss", "getpwent"], "readOnly": false, "type": "null or string"}, "users.mysql.nss.getpwnam": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SQL query for the [getpwnam](https://man7.org/linux/man-pages/man3/getpwnam.3.html)\nsyscall.\n"}, "example": {"_type": "literalExpression", "text": "SELECT username,'x',uid,'5000','MySQL User', CONCAT('/home/',username),'/run/sw/current-system/bin/bash' \\\nFROM users \\\nWHERE username='%1$s' \\\nLIMIT 1\n"}, "loc": ["users", "mysql", "nss", "getpwnam"], "readOnly": false, "type": "null or string"}, "users.mysql.nss.getpwuid": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SQL query for the [getpwuid](https://man7.org/linux/man-pages/man3/getpwuid.3.html)\nsyscall.\n"}, "example": {"_type": "literalExpression", "text": "SELECT username,'x',uid,'5000','MySQL User', CONCAT('/home/',username),'/run/sw/current-system/bin/bash' \\\nFROM users \\\nWHERE uid='%1$u' \\\nLIMIT 1\n"}, "loc": ["users", "mysql", "nss", "getpwuid"], "readOnly": false, "type": "null or string"}, "users.mysql.nss.getspent": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SQL query for the [getspent](https://man7.org/linux/man-pages/man3/getspent.3.html)\nsyscall.\n"}, "example": {"_type": "literalExpression", "text": "SELECT username,password,'1','0','99999','0','0','-1','0' FROM users\n"}, "loc": ["users", "mysql", "nss", "getspent"], "readOnly": false, "type": "null or string"}, "users.mysql.nss.getspnam": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SQL query for the [getspnam](https://man7.org/linux/man-pages/man3/getspnam.3.html)\nsyscall.\n"}, "example": {"_type": "literalExpression", "text": "SELECT username,password,'1','0','99999','0','0','-1','0' \\\nFROM users \\\nWHERE username='%1$s' \\\nLIMIT 1\n"}, "loc": ["users", "mysql", "nss", "getspnam"], "readOnly": false, "type": "null or string"}, "users.mysql.nss.gidsbymem": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SQL query for the [gidsbymem](https://man7.org/linux/man-pages/man3/gidsbymem.3.html)\nsyscall.\n"}, "example": {"_type": "literalExpression", "text": "SELECT gid FROM grouplist WHERE username='%1$s'\n"}, "loc": ["users", "mysql", "nss", "gidsbymem"], "readOnly": false, "type": "null or string"}, "users.mysql.nss.memsbygid": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "SQL query for the [memsbygid](https://man7.org/linux/man-pages/man3/memsbygid.3.html)\nsyscall.\n"}, "example": {"_type": "literalExpression", "text": "SELECT username FROM grouplist WHERE gid='%1$u'\n"}, "loc": ["users", "mysql", "nss", "memsbygid"], "readOnly": false, "type": "null or string"}, "users.mysql.pam": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "Settings for `pam_mysql`"}, "loc": ["users", "mysql", "pam"], "readOnly": false, "type": "submodule"}, "users.mysql.pam.cryptDefault": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The default encryption method to use for `passwordCrypt = 1`."}, "example": {"_type": "literalExpression", "text": "\"blowfish\""}, "loc": ["users", "mysql", "pam", "cryptDefault"], "readOnly": false, "type": "null or one of \"md5\", \"sha256\", \"sha512\", \"blowfish\""}, "users.mysql.pam.disconnectEveryOperation": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "By default, `pam_mysql` keeps the connection to the MySQL\ndatabase until the session is closed. If this option is set to true it\ndisconnects every time the PAM operation has finished. This option may\nbe useful in case the session lasts quite long.\n"}, "loc": ["users", "mysql", "pam", "disconnectEveryOperation"], "readOnly": false, "type": "boolean"}, "users.mysql.pam.logging.enable": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables logging of authentication attempts in the MySQL database."}, "loc": ["users", "mysql", "pam", "logging", "enable"], "readOnly": false, "type": "boolean"}, "users.mysql.pam.logging.hostColumn": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The name of the column in the log table to which the name of the user\nbeing authenticated is stored.\n"}, "example": {"_type": "literalExpression", "text": "\"host\""}, "loc": ["users", "mysql", "pam", "logging", "hostColumn"], "readOnly": false, "type": "string"}, "users.mysql.pam.logging.msgColumn": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The name of the column in the log table to which the description\nof the performed operation is stored.\n"}, "example": {"_type": "literalExpression", "text": "\"msg\""}, "loc": ["users", "mysql", "pam", "logging", "msgColumn"], "readOnly": false, "type": "string"}, "users.mysql.pam.logging.pidColumn": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The name of the column in the log table to which the pid of the\nprocess utilising the `pam_mysql` authentication\nservice is stored.\n"}, "example": {"_type": "literalExpression", "text": "\"pid\""}, "loc": ["users", "mysql", "pam", "logging", "pidColumn"], "readOnly": false, "type": "string"}, "users.mysql.pam.logging.rHostColumn": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The name of the column in the log table to which the name of the remote\nhost that initiates the session is stored. The value is supposed to be\nset by the PAM-aware application with `pam_set_item(PAM_RHOST)`.\n"}, "example": {"_type": "literalExpression", "text": "\"rhost\""}, "loc": ["users", "mysql", "pam", "logging", "rHostColumn"], "readOnly": false, "type": "string"}, "users.mysql.pam.logging.table": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The name of the table to which logs are written."}, "example": {"_type": "literalExpression", "text": "\"logs\""}, "loc": ["users", "mysql", "pam", "logging", "table"], "readOnly": false, "type": "string"}, "users.mysql.pam.logging.timeColumn": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The name of the column in the log table to which the timestamp of the\nlog entry is stored.\n"}, "example": {"_type": "literalExpression", "text": "\"timestamp\""}, "loc": ["users", "mysql", "pam", "logging", "timeColumn"], "readOnly": false, "type": "string"}, "users.mysql.pam.logging.userColumn": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The name of the column in the log table to which the name of the\nuser being authenticated is stored.\n"}, "example": {"_type": "literalExpression", "text": "\"user\""}, "loc": ["users", "mysql", "pam", "logging", "userColumn"], "readOnly": false, "type": "string"}, "users.mysql.pam.passwordColumn": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The name of the column that contains a (encrypted) password string."}, "example": {"_type": "literalExpression", "text": "\"password\""}, "loc": ["users", "mysql", "pam", "passwordColumn"], "readOnly": false, "type": "string"}, "users.mysql.pam.passwordCrypt": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The method to encrypt the user's password:\n\n- `0` (or `\"plain\"`):\n  No encryption. Passwords are stored in plaintext. HIGHLY DISCOURAGED.\n- `1` (or `\"Y\"`):\n  Use crypt(3) function.\n- `2` (or `\"mysql\"`):\n  Use the MySQL PASSWORD() function. It is possible that the encryption function used\n  by `pam_mysql` is different from that of the MySQL server, as\n  `pam_mysql` uses the function defined in MySQL's C-client API\n  instead of using PASSWORD() SQL function in the query.\n- `3` (or `\"md5\"`):\n  Use plain hex MD5.\n- `4` (or `\"sha1\"`):\n  Use plain hex SHA1.\n- `5` (or `\"drupal7\"`):\n  Use Drupal7 salted passwords.\n- `6` (or `\"joomla15\"`):\n  Use Joomla15 salted passwords.\n- `7` (or `\"ssha\"`):\n  Use ssha hashed passwords.\n- `8` (or `\"sha512\"`):\n  Use sha512 hashed passwords.\n- `9` (or `\"sha256\"`):\n  Use sha256 hashed passwords.\n"}, "example": {"_type": "literalExpression", "text": "\"2\""}, "loc": ["users", "mysql", "pam", "passwordCrypt"], "readOnly": false, "type": "one of \"0\", \"plain\", \"1\", \"Y\", \"2\", \"mysql\", \"3\", \"md5\", \"4\", \"sha1\", \"5\", \"drupal7\", \"6\", \"joomla15\", \"7\", \"ssha\", \"8\", \"sha512\", \"9\", \"sha256\""}, "users.mysql.pam.statusColumn": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the column or an SQL expression that indicates the status of\nthe user. The status is expressed by the combination of two bitfields\nshown below:\n\n- `bit 0 (0x01)`:\n   if flagged, `pam_mysql` deems the account to be expired and\n   returns `PAM_ACCT_EXPIRED`. That is, the account is supposed\n   to no longer be available. Note this doesn't mean that `pam_mysql`\n   rejects further authentication operations.\n-  `bit 1 (0x02)`:\n   if flagged, `pam_mysql` deems the authentication token\n   (password) to be expired and returns `PAM_NEW_AUTHTOK_REQD`.\n   This ends up requiring that the user enter a new password.\n"}, "example": {"_type": "literalExpression", "text": "\"status\""}, "loc": ["users", "mysql", "pam", "statusColumn"], "readOnly": false, "type": "null or string"}, "users.mysql.pam.table": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The name of table that maps unique login names to the passwords."}, "example": {"_type": "literalExpression", "text": "\"users\""}, "loc": ["users", "mysql", "pam", "table"], "readOnly": false, "type": "string"}, "users.mysql.pam.updateTable": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the table used for password alteration. If not defined, the value\nof the `table` option will be used instead.\n"}, "example": {"_type": "literalExpression", "text": "\"users_updates\""}, "loc": ["users", "mysql", "pam", "updateTable"], "readOnly": false, "type": "null or string"}, "users.mysql.pam.userColumn": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The name of the column that contains a unix login name."}, "example": {"_type": "literalExpression", "text": "\"username\""}, "loc": ["users", "mysql", "pam", "userColumn"], "readOnly": false, "type": "string"}, "users.mysql.pam.verbose": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, produces logs with detailed messages that describes what\n`pam_mysql` is doing. May be useful for debugging.\n"}, "loc": ["users", "mysql", "pam", "verbose"], "readOnly": false, "type": "boolean"}, "users.mysql.pam.where": {"declarations": ["nixos/modules/config/mysql.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Additional criteria for the query."}, "example": {"_type": "literalExpression", "text": "\"host.name='web' AND user.active=1\""}, "loc": ["users", "mysql", "pam", "where"], "readOnly": false, "type": "null or string"}, "users.mysql.passwordFile": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The path to the file containing the password for the user"}, "example": {"_type": "literalExpression", "text": "\"/run/secrets/mysql-auth-db-passwd\""}, "loc": ["users", "mysql", "passwordFile"], "readOnly": false, "type": "path"}, "users.mysql.user": {"declarations": ["nixos/modules/config/mysql.nix"], "description": {"_type": "mdDoc", "text": "The username to use when connecting to the database"}, "example": {"_type": "literalExpression", "text": "\"nss-user\""}, "loc": ["users", "mysql", "user"], "readOnly": false, "type": "string"}, "users.users": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix", "nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional user accounts to be created automatically by the system.\nThis can also be used to set options for root.\n"}, "example": {"_type": "literalExpression", "text": "{\n  alice = {\n    createHome = true;\n    description = \"Alice Q. User\";\n    extraGroups = [\n      \"wheel\"\n    ];\n    group = \"users\";\n    home = \"/home/alice\";\n    shell = \"/bin/sh\";\n    uid = 1234;\n  };\n}"}, "loc": ["users", "users"], "readOnly": false, "type": "attribute set of (submodule)"}, "users.users.<name>.autoSubUidGidRange": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically allocate subordinate user and group ids for this user.\nAllocated range is currently always of size 65536.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["users", "users", "<name>", "autoSubUidGidRange"], "readOnly": false, "type": "boolean"}, "users.users.<name>.createHome": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to create the home directory and ensure ownership as well as\npermissions to match the user.\n"}, "loc": ["users", "users", "<name>", "createHome"], "readOnly": false, "type": "boolean"}, "users.users.<name>.cryptHomeLuks": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to encrypted luks device that contains\nthe user's home directory.\n"}, "loc": ["users", "users", "<name>", "cryptHomeLuks"], "readOnly": false, "type": "null or string"}, "users.users.<name>.description": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "A short description of the user account, typically the\nuser's full name.  This is actually the \u201cGECOS\u201d or \u201ccomment\u201d\nfield in {file}`/etc/passwd`.\n"}, "example": {"_type": "literalExpression", "text": "\"Alice Q. User\""}, "loc": ["users", "users", "<name>", "description"], "readOnly": false, "type": "string, not containing newlines or colons"}, "users.users.<name>.extraGroups": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The user's auxiliary groups."}, "loc": ["users", "users", "<name>", "extraGroups"], "readOnly": false, "type": "list of string"}, "users.users.<name>.group": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The user's primary group."}, "loc": ["users", "users", "<name>", "group"], "readOnly": false, "type": "string"}, "users.users.<name>.hashedPassword": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the hashed password for the user.\nThe options {option}`hashedPassword`,\n{option}`password` and {option}`passwordFile`\ncontrols what password is set for the user.\n{option}`hashedPassword` overrides both\n{option}`password` and {option}`passwordFile`.\n{option}`password` overrides {option}`passwordFile`.\nIf none of these three options are set, no password is assigned to\nthe user, and the user will not be able to do password logins.\nIf the option {option}`users.mutableUsers` is true, the\npassword defined in one of the three options will only be set when\nthe user is created for the first time. After that, you are free to\nchange the password with the ordinary user management commands. If\n{option}`users.mutableUsers` is false, you cannot change\nuser passwords, they will always be set according to the password\noptions.\n\nTo generate a hashed password run `mkpasswd`.\n\nIf set to an empty string (`\"\"`), this user will\nbe able to log in without being asked for a password (but not via remote\nservices such as SSH, or indirectly via {command}`su` or\n{command}`sudo`). This should only be used for e.g. bootable\nlive systems. Note: this is different from setting an empty password,\nwhich can be achieved using {option}`users.users.<name?>.password`.\n\nIf set to `null` (default) this user will not\nbe able to log in using a password (i.e. via {command}`login`\ncommand).\n\n"}, "loc": ["users", "users", "<name>", "hashedPassword"], "readOnly": false, "type": "null or string, not containing newlines or colons"}, "users.users.<name>.home": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "\"/var/empty\""}, "description": {"_type": "mdDoc", "text": "The user's home directory."}, "loc": ["users", "users", "<name>", "home"], "readOnly": false, "type": "path, not containing newlines or colons"}, "users.users.<name>.homeMode": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "\"700\""}, "description": {"_type": "mdDoc", "text": "The user's home directory mode in numeric format. See chmod(1). The mode is only applied if {option}`users.users.<name>.createHome` is true."}, "loc": ["users", "users", "<name>", "homeMode"], "readOnly": false, "type": "string matching the pattern [0-7]{1,5}"}, "users.users.<name>.initialHashedPassword": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the initial hashed password for the user, i.e. the\nhashed password assigned if the user does not already\nexist. If {option}`users.mutableUsers` is true, the\npassword can be changed subsequently using the\n{command}`passwd` command. Otherwise, it's\nequivalent to setting the {option}`hashedPassword` option.\n\nNote that the {option}`hashedPassword` option will override\nthis option if both are set.\n\nTo generate a hashed password run `mkpasswd`.\n\nIf set to an empty string (`\"\"`), this user will\nbe able to log in without being asked for a password (but not via remote\nservices such as SSH, or indirectly via {command}`su` or\n{command}`sudo`). This should only be used for e.g. bootable\nlive systems. Note: this is different from setting an empty password,\nwhich can be achieved using {option}`users.users.<name?>.password`.\n\nIf set to `null` (default) this user will not\nbe able to log in using a password (i.e. via {command}`login`\ncommand).\n\n"}, "loc": ["users", "users", "<name>", "initialHashedPassword"], "readOnly": false, "type": "null or string, not containing newlines or colons"}, "users.users.<name>.initialPassword": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the initial password for the user, i.e. the\npassword assigned if the user does not already exist. If\n{option}`users.mutableUsers` is true, the password\ncan be changed subsequently using the\n{command}`passwd` command. Otherwise, it's\nequivalent to setting the {option}`password`\noption. The same caveat applies: the password specified here\nis world-readable in the Nix store, so it should only be\nused for guest accounts or passwords that will be changed\npromptly.\n\nNote that the {option}`password` option will override this\noption if both are set.\n"}, "loc": ["users", "users", "<name>", "initialPassword"], "readOnly": false, "type": "null or string"}, "users.users.<name>.isNormalUser": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Indicates whether this is an account for a \u201creal\u201d user.\nThis automatically sets {option}`group` to `users`,\n{option}`createHome` to `true`,\n{option}`home` to {file}`/home/\u00abusername\u00bb`,\n{option}`useDefaultShell` to `true`,\nand {option}`isSystemUser` to `false`.\nExactly one of `isNormalUser` and `isSystemUser` must be true.\n"}, "loc": ["users", "users", "<name>", "isNormalUser"], "readOnly": false, "type": "boolean"}, "users.users.<name>.isSystemUser": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Indicates if the user is a system user or not. This option\nonly has an effect if {option}`uid` is\n{option}`null`, in which case it determines whether\nthe user's UID is allocated in the range for system users\n(below 1000) or in the range for normal users (starting at\n1000).\nExactly one of `isNormalUser` and\n`isSystemUser` must be true.\n"}, "loc": ["users", "users", "<name>", "isSystemUser"], "readOnly": false, "type": "boolean"}, "users.users.<name>.name": {"declarations": ["nixos/modules/config/users-groups.nix"], "description": {"_type": "mdDoc", "text": "The name of the user account. If undefined, the name of the\nattribute set will be used.\n"}, "loc": ["users", "users", "<name>", "name"], "readOnly": false, "type": "string, not containing newlines or colons"}, "users.users.<name>.openssh.authorizedKeys.keyFiles": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of files each containing one OpenSSH public key that should be\nadded to the user's authorized keys. The contents of the files are\nread at build time and added to a file that the SSH daemon reads in\naddition to the the user's authorized_keys file. You can combine the\n`keyFiles` and `keys` options.\n"}, "loc": ["users", "users", "<name>", "openssh", "authorizedKeys", "keyFiles"], "readOnly": false, "type": "list of path"}, "users.users.<name>.openssh.authorizedKeys.keys": {"declarations": ["nixos/modules/services/networking/ssh/sshd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of verbatim OpenSSH public keys that should be added to the\nuser's authorized keys. The keys are added to a file that the SSH\ndaemon reads in addition to the the user's authorized_keys file.\nYou can combine the `keys` and\n`keyFiles` options.\nWarning: If you are using `NixOps` then don't use this\noption since it will replace the key required for deployment via ssh.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"ssh-rsa AAAAB3NzaC1yc2etc/etc/etcjwrsh8e596z6J0l7 example@host\"\n  \"ssh-ed25519 AAAAC3NzaCetcetera/etceteraJZMfk3QPfQ foo@bar\"\n]"}, "loc": ["users", "users", "<name>", "openssh", "authorizedKeys", "keys"], "readOnly": false, "type": "list of (optionally newline-terminated) single-line string"}, "users.users.<name>.packages": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The set of packages that should be made available to the user.\nThis is in contrast to {option}`environment.systemPackages`,\nwhich adds packages to all users.\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.firefox pkgs.thunderbird ]"}, "loc": ["users", "users", "<name>", "packages"], "readOnly": false, "type": "list of package"}, "users.users.<name>.pamMount": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attributes for user's entry in\n{file}`pam_mount.conf.xml`.\nUseful attributes might include `path`,\n`options`, `fstype`, and `server`.\nSee <http://pam-mount.sourceforge.net/pam_mount.conf.5.html>\nfor more information.\n"}, "loc": ["users", "users", "<name>", "pamMount"], "readOnly": false, "type": "attribute set of string"}, "users.users.<name>.password": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Specifies the (clear text) password for the user.\nWarning: do not set confidential information here\nbecause it is world-readable in the Nix store. This option\nshould only be used for public accounts.\nThe options {option}`hashedPassword`,\n{option}`password` and {option}`passwordFile`\ncontrols what password is set for the user.\n{option}`hashedPassword` overrides both\n{option}`password` and {option}`passwordFile`.\n{option}`password` overrides {option}`passwordFile`.\nIf none of these three options are set, no password is assigned to\nthe user, and the user will not be able to do password logins.\nIf the option {option}`users.mutableUsers` is true, the\npassword defined in one of the three options will only be set when\nthe user is created for the first time. After that, you are free to\nchange the password with the ordinary user management commands. If\n{option}`users.mutableUsers` is false, you cannot change\nuser passwords, they will always be set according to the password\noptions.\n\n"}, "loc": ["users", "users", "<name>", "password"], "readOnly": false, "type": "null or string"}, "users.users.<name>.passwordFile": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The full path to a file that contains the user's password. The password\nfile is read on each system activation. The file should contain\nexactly one line, which should be the password in an encrypted form\nthat is suitable for the `chpasswd -e` command.\nThe options {option}`hashedPassword`,\n{option}`password` and {option}`passwordFile`\ncontrols what password is set for the user.\n{option}`hashedPassword` overrides both\n{option}`password` and {option}`passwordFile`.\n{option}`password` overrides {option}`passwordFile`.\nIf none of these three options are set, no password is assigned to\nthe user, and the user will not be able to do password logins.\nIf the option {option}`users.mutableUsers` is true, the\npassword defined in one of the three options will only be set when\nthe user is created for the first time. After that, you are free to\nchange the password with the ordinary user management commands. If\n{option}`users.mutableUsers` is false, you cannot change\nuser passwords, they will always be set according to the password\noptions.\n\n"}, "loc": ["users", "users", "<name>", "passwordFile"], "readOnly": false, "type": "null or string"}, "users.users.<name>.shell": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "pkgs.shadow"}, "description": {"_type": "mdDoc", "text": "The path to the user's shell. Can use shell derivations,\nlike `pkgs.bashInteractive`. Don\u2019t\nforget to enable your shell in\n`programs` if necessary,\nlike `programs.zsh.enable = true;`.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.bashInteractive"}, "loc": ["users", "users", "<name>", "shell"], "readOnly": false, "type": "null or package or path, not containing newlines or colons"}, "users.users.<name>.subGidRanges": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Subordinate group ids that user is allowed to use.\nThey are set into {file}`/etc/subgid` and are used\nby `newgidmap` for user namespaces.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    count = 1;\n    startGid = 100;\n  }\n  {\n    count = 999;\n    startGid = 1001;\n  }\n]"}, "loc": ["users", "users", "<name>", "subGidRanges"], "readOnly": false, "type": "list of (submodule)"}, "users.users.<name>.subGidRanges.*.count": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Count of subordinate group ids"}, "loc": ["users", "users", "<name>", "subGidRanges", "*", "count"], "readOnly": false, "type": "signed integer"}, "users.users.<name>.subGidRanges.*.startGid": {"declarations": ["nixos/modules/config/users-groups.nix"], "description": {"_type": "mdDoc", "text": "Start of the range of subordinate group ids that user is\nallowed to use.\n"}, "loc": ["users", "users", "<name>", "subGidRanges", "*", "startGid"], "readOnly": false, "type": "signed integer"}, "users.users.<name>.subUidRanges": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Subordinate user ids that user is allowed to use.\nThey are set into {file}`/etc/subuid` and are used\nby `newuidmap` for user namespaces.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    count = 1;\n    startUid = 1000;\n  }\n  {\n    count = 65534;\n    startUid = 100001;\n  }\n]"}, "loc": ["users", "users", "<name>", "subUidRanges"], "readOnly": false, "type": "list of (submodule)"}, "users.users.<name>.subUidRanges.*.count": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Count of subordinate user ids"}, "loc": ["users", "users", "<name>", "subUidRanges", "*", "count"], "readOnly": false, "type": "signed integer"}, "users.users.<name>.subUidRanges.*.startUid": {"declarations": ["nixos/modules/config/users-groups.nix"], "description": {"_type": "mdDoc", "text": "Start of the range of subordinate user ids that user is\nallowed to use.\n"}, "loc": ["users", "users", "<name>", "subUidRanges", "*", "startUid"], "readOnly": false, "type": "signed integer"}, "users.users.<name>.uid": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The account UID. If the UID is null, a free UID is picked on\nactivation.\n"}, "loc": ["users", "users", "<name>", "uid"], "readOnly": false, "type": "null or signed integer"}, "users.users.<name>.useDefaultShell": {"declarations": ["nixos/modules/config/users-groups.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If true, the user's shell will be set to\n{option}`users.defaultUserShell`.\n"}, "loc": ["users", "users", "<name>", "useDefaultShell"], "readOnly": false, "type": "boolean"}, "virtualisation.anbox.enable": {"declarations": ["nixos/modules/virtualisation/anbox.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Anbox."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["virtualisation", "anbox", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.anbox.extraInit": {"declarations": ["nixos/modules/virtualisation/anbox.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra shell commands to be run inside the container image during init.\n"}, "loc": ["virtualisation", "anbox", "extraInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "virtualisation.anbox.image": {"declarations": ["nixos/modules/virtualisation/anbox.nix"], "default": {"_type": "literalExpression", "text": "pkgs.anbox.image"}, "description": {"_type": "mdDoc", "text": "Base android image for Anbox.\n"}, "loc": ["virtualisation", "anbox", "image"], "readOnly": false, "type": "package"}, "virtualisation.anbox.ipv4.container.address": {"declarations": ["nixos/modules/virtualisation/anbox.nix"], "default": {"_type": "literalExpression", "text": "\"192.168.250.2\""}, "description": {"_type": "mdDoc", "text": "IPv4 Container address.\n"}, "loc": ["virtualisation", "anbox", "ipv4", "container", "address"], "readOnly": false, "type": "string"}, "virtualisation.anbox.ipv4.container.prefixLength": {"declarations": ["nixos/modules/virtualisation/anbox.nix"], "default": {"_type": "literalExpression", "text": "24"}, "description": {"_type": "mdDoc", "text": "Subnet mask of the Container address, specified as the number of\nbits in the prefix (`24`).\n"}, "loc": ["virtualisation", "anbox", "ipv4", "container", "prefixLength"], "readOnly": false, "type": "signed integer"}, "virtualisation.anbox.ipv4.dns": {"declarations": ["nixos/modules/virtualisation/anbox.nix"], "default": {"_type": "literalExpression", "text": "\"1.1.1.1\""}, "description": {"_type": "mdDoc", "text": "Container DNS server.\n"}, "loc": ["virtualisation", "anbox", "ipv4", "dns"], "readOnly": false, "type": "string"}, "virtualisation.anbox.ipv4.gateway.address": {"declarations": ["nixos/modules/virtualisation/anbox.nix"], "default": {"_type": "literalExpression", "text": "\"192.168.250.1\""}, "description": {"_type": "mdDoc", "text": "IPv4 Host address.\n"}, "loc": ["virtualisation", "anbox", "ipv4", "gateway", "address"], "readOnly": false, "type": "string"}, "virtualisation.anbox.ipv4.gateway.prefixLength": {"declarations": ["nixos/modules/virtualisation/anbox.nix"], "default": {"_type": "literalExpression", "text": "24"}, "description": {"_type": "mdDoc", "text": "Subnet mask of the Host address, specified as the number of\nbits in the prefix (`24`).\n"}, "loc": ["virtualisation", "anbox", "ipv4", "gateway", "prefixLength"], "readOnly": false, "type": "signed integer"}, "virtualisation.appvm.enable": {"declarations": ["nixos/modules/virtualisation/appvm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This enables AppVMs and related virtualisation settings.\n"}, "loc": ["virtualisation", "appvm", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.appvm.user": {"declarations": ["nixos/modules/virtualisation/appvm.nix"], "description": {"_type": "mdDoc", "text": "AppVM user login. Currently only AppVMs are supported for a single user only.\n"}, "loc": ["virtualisation", "appvm", "user"], "readOnly": false, "type": "string"}, "virtualisation.containerd.args": {"declarations": ["nixos/modules/virtualisation/containerd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "extra args to append to the containerd cmdline"}, "loc": ["virtualisation", "containerd", "args"], "readOnly": false, "type": "attribute set of string"}, "virtualisation.containerd.configFile": {"declarations": ["nixos/modules/virtualisation/containerd.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to containerd config file.\nSetting this option will override any configuration applied by the settings option.\n"}, "loc": ["virtualisation", "containerd", "configFile"], "readOnly": false, "type": "null or path"}, "virtualisation.containerd.enable": {"declarations": ["nixos/modules/virtualisation/containerd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable containerd container runtime."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["virtualisation", "containerd", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.containerd.settings": {"declarations": ["nixos/modules/virtualisation/containerd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Verbatim lines to add to containerd.toml\n"}, "loc": ["virtualisation", "containerd", "settings"], "readOnly": false, "type": "TOML value"}, "virtualisation.containers.containersConf.cniPlugins": {"declarations": ["nixos/modules/virtualisation/containers.nix"], "default": {"_type": "literalExpression", "text": "[\n  pkgs.cni-plugins\n]\n"}, "description": {"_type": "mdDoc", "text": "CNI plugins to install on the system.\n"}, "example": {"_type": "literalExpression", "text": "[\n  pkgs.cniPlugins.dnsname\n]\n"}, "loc": ["virtualisation", "containers", "containersConf", "cniPlugins"], "readOnly": false, "type": "list of package"}, "virtualisation.containers.containersConf.settings": {"declarations": ["nixos/modules/virtualisation/containers.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "containers.conf configuration"}, "loc": ["virtualisation", "containers", "containersConf", "settings"], "readOnly": false, "type": "TOML value"}, "virtualisation.containers.enable": {"declarations": ["nixos/modules/virtualisation/containers.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This option enables the common /etc/containers configuration module.\n"}, "loc": ["virtualisation", "containers", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.containers.ociSeccompBpfHook.enable": {"declarations": ["nixos/modules/virtualisation/containers.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable the OCI seccomp BPF hook"}, "loc": ["virtualisation", "containers", "ociSeccompBpfHook", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.containers.policy": {"declarations": ["nixos/modules/virtualisation/containers.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Signature verification policy file.\nIf this option is empty the default policy file from\n`skopeo` will be used.\n"}, "example": {"_type": "literalExpression", "text": "{\n  default = [ { type = \"insecureAcceptAnything\"; } ];\n  transports = {\n    docker-daemon = {\n      \"\" = [ { type = \"insecureAcceptAnything\"; } ];\n    };\n  };\n}\n"}, "loc": ["virtualisation", "containers", "policy"], "readOnly": false, "type": "attribute set"}, "virtualisation.containers.registries.block": {"declarations": ["nixos/modules/virtualisation/containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of blocked repositories.\n"}, "loc": ["virtualisation", "containers", "registries", "block"], "readOnly": false, "type": "list of string"}, "virtualisation.containers.registries.insecure": {"declarations": ["nixos/modules/virtualisation/containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of insecure repositories.\n"}, "loc": ["virtualisation", "containers", "registries", "insecure"], "readOnly": false, "type": "list of string"}, "virtualisation.containers.registries.search": {"declarations": ["nixos/modules/virtualisation/containers.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"docker.io\"\n  \"quay.io\"\n]"}, "description": {"_type": "mdDoc", "text": "List of repositories to search.\n"}, "loc": ["virtualisation", "containers", "registries", "search"], "readOnly": false, "type": "list of string"}, "virtualisation.containers.storage.settings": {"declarations": ["nixos/modules/virtualisation/containers.nix"], "default": {"_type": "literalExpression", "text": "{\n  storage = {\n    driver = \"overlay\";\n    graphroot = \"/var/lib/containers/storage\";\n    runroot = \"/run/containers/storage\";\n  };\n}"}, "description": {"_type": "mdDoc", "text": "storage.conf configuration"}, "loc": ["virtualisation", "containers", "storage", "settings"], "readOnly": false, "type": "TOML value"}, "virtualisation.cri-o.enable": {"declarations": ["nixos/modules/virtualisation/cri-o.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Container Runtime Interface for OCI (CRI-O)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["virtualisation", "cri-o", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.cri-o.extraPackages": {"declarations": ["nixos/modules/virtualisation/cri-o.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra packages to be installed in the CRI-O wrapper.\n"}, "example": {"_type": "literalExpression", "text": "[\n  pkgs.gvisor\n]\n"}, "loc": ["virtualisation", "cri-o", "extraPackages"], "readOnly": false, "type": "list of package"}, "virtualisation.cri-o.logLevel": {"declarations": ["nixos/modules/virtualisation/cri-o.nix"], "default": {"_type": "literalExpression", "text": "\"info\""}, "description": {"_type": "mdDoc", "text": "Log level to be used"}, "loc": ["virtualisation", "cri-o", "logLevel"], "readOnly": false, "type": "one of \"trace\", \"debug\", \"info\", \"warn\", \"error\", \"fatal\""}, "virtualisation.cri-o.pauseCommand": {"declarations": ["nixos/modules/virtualisation/cri-o.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Override the default pause command"}, "example": {"_type": "literalExpression", "text": "\"/pause\""}, "loc": ["virtualisation", "cri-o", "pauseCommand"], "readOnly": false, "type": "null or string"}, "virtualisation.cri-o.pauseImage": {"declarations": ["nixos/modules/virtualisation/cri-o.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Override the default pause image for pod sandboxes"}, "example": {"_type": "literalExpression", "text": "\"k8s.gcr.io/pause:3.2\""}, "loc": ["virtualisation", "cri-o", "pauseImage"], "readOnly": false, "type": "null or string"}, "virtualisation.cri-o.runtime": {"declarations": ["nixos/modules/virtualisation/cri-o.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Override the default runtime"}, "example": {"_type": "literalExpression", "text": "\"crun\""}, "loc": ["virtualisation", "cri-o", "runtime"], "readOnly": false, "type": "null or string"}, "virtualisation.cri-o.settings": {"declarations": ["nixos/modules/virtualisation/cri-o.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for cri-o, see\n<https://github.com/cri-o/cri-o/blob/master/docs/crio.conf.5.md>.\n"}, "loc": ["virtualisation", "cri-o", "settings"], "readOnly": false, "type": "TOML value"}, "virtualisation.cri-o.storageDriver": {"declarations": ["nixos/modules/virtualisation/cri-o.nix"], "default": {"_type": "literalExpression", "text": "\"overlay\""}, "description": {"_type": "mdDoc", "text": "Storage driver to be used"}, "loc": ["virtualisation", "cri-o", "storageDriver"], "readOnly": false, "type": "one of \"aufs\", \"btrfs\", \"devmapper\", \"overlay\", \"vfs\", \"zfs\""}, "virtualisation.docker.autoPrune.dates": {"declarations": ["nixos/modules/virtualisation/docker.nix"], "default": {"_type": "literalExpression", "text": "\"weekly\""}, "description": {"_type": "mdDoc", "text": "Specification (in the format described by\n{manpage}`systemd.time(7)`) of the time at\nwhich the prune will occur.\n"}, "loc": ["virtualisation", "docker", "autoPrune", "dates"], "readOnly": false, "type": "string"}, "virtualisation.docker.autoPrune.enable": {"declarations": ["nixos/modules/virtualisation/docker.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to periodically prune Docker resources. If enabled, a\nsystemd timer will run `docker system prune -f`\nas specified by the `dates` option.\n"}, "loc": ["virtualisation", "docker", "autoPrune", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.docker.autoPrune.flags": {"declarations": ["nixos/modules/virtualisation/docker.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Any additional flags passed to {command}`docker system prune`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--all\"\n]"}, "loc": ["virtualisation", "docker", "autoPrune", "flags"], "readOnly": false, "type": "list of string"}, "virtualisation.docker.daemon.settings": {"declarations": ["nixos/modules/virtualisation/docker.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for docker daemon. The attributes are serialized to JSON used as daemon.conf.\nSee https://docs.docker.com/engine/reference/commandline/dockerd/#daemon-configuration-file\n"}, "example": {"_type": "literalExpression", "text": "{\n  fixed-cidr-v6 = \"fd00::/80\";\n  ipv6 = true;\n}"}, "loc": ["virtualisation", "docker", "daemon", "settings"], "readOnly": false, "type": "JSON value"}, "virtualisation.docker.enable": {"declarations": ["nixos/modules/virtualisation/docker.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This option enables docker, a daemon that manages\nlinux containers. Users in the \"docker\" group can interact with\nthe daemon (e.g. to start or stop containers) using the\n{command}`docker` command line tool.\n"}, "loc": ["virtualisation", "docker", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.docker.enableNvidia": {"declarations": ["nixos/modules/virtualisation/docker.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable nvidia-docker wrapper, supporting NVIDIA GPUs inside docker containers.\n"}, "loc": ["virtualisation", "docker", "enableNvidia"], "readOnly": false, "type": "boolean"}, "virtualisation.docker.enableOnBoot": {"declarations": ["nixos/modules/virtualisation/docker.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "When enabled dockerd is started on boot. This is required for\ncontainers which are created with the\n`--restart=always` flag to work. If this option is\ndisabled, docker might be started on demand by socket activation.\n"}, "loc": ["virtualisation", "docker", "enableOnBoot"], "readOnly": false, "type": "boolean"}, "virtualisation.docker.extraOptions": {"declarations": ["nixos/modules/virtualisation/docker.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The extra command-line options to pass to\n{command}`docker` daemon.\n"}, "loc": ["virtualisation", "docker", "extraOptions"], "readOnly": false, "type": "strings concatenated with \" \""}, "virtualisation.docker.listenOptions": {"declarations": ["nixos/modules/virtualisation/docker.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"/run/docker.sock\"\n]"}, "description": {"_type": "mdDoc", "text": "A list of unix and tcp docker should listen to. The format follows\nListenStream as described in systemd.socket(5).\n"}, "loc": ["virtualisation", "docker", "listenOptions"], "readOnly": false, "type": "list of string"}, "virtualisation.docker.liveRestore": {"declarations": ["nixos/modules/virtualisation/docker.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allow dockerd to be restarted without affecting running container.\nThis option is incompatible with docker swarm.\n"}, "loc": ["virtualisation", "docker", "liveRestore"], "readOnly": false, "type": "boolean"}, "virtualisation.docker.logDriver": {"declarations": ["nixos/modules/virtualisation/docker.nix"], "default": {"_type": "literalExpression", "text": "\"journald\""}, "description": {"_type": "mdDoc", "text": "This option determines which Docker log driver to use.\n"}, "loc": ["virtualisation", "docker", "logDriver"], "readOnly": false, "type": "one of \"none\", \"json-file\", \"syslog\", \"journald\", \"gelf\", \"fluentd\", \"awslogs\", \"splunk\", \"etwlogs\", \"gcplogs\", \"local\""}, "virtualisation.docker.package": {"declarations": ["nixos/modules/virtualisation/docker.nix"], "default": {"_type": "literalExpression", "text": "pkgs.docker"}, "description": {"_type": "mdDoc", "text": "Docker package to be used in the module.\n"}, "loc": ["virtualisation", "docker", "package"], "readOnly": false, "type": "package"}, "virtualisation.docker.rootless.daemon.settings": {"declarations": ["nixos/modules/virtualisation/docker-rootless.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for docker daemon. The attributes are serialized to JSON used as daemon.conf.\nSee https://docs.docker.com/engine/reference/commandline/dockerd/#daemon-configuration-file\n"}, "example": {"_type": "literalExpression", "text": "{\n  fixed-cidr-v6 = \"fd00::/80\";\n  ipv6 = true;\n}"}, "loc": ["virtualisation", "docker", "rootless", "daemon", "settings"], "readOnly": false, "type": "JSON value"}, "virtualisation.docker.rootless.enable": {"declarations": ["nixos/modules/virtualisation/docker-rootless.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This option enables docker in a rootless mode, a daemon that manages\nlinux containers. To interact with the daemon, one needs to set\n{command}`DOCKER_HOST=unix://$XDG_RUNTIME_DIR/docker.sock`.\n"}, "loc": ["virtualisation", "docker", "rootless", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.docker.rootless.package": {"declarations": ["nixos/modules/virtualisation/docker-rootless.nix"], "default": {"_type": "literalExpression", "text": "pkgs.docker"}, "description": {"_type": "mdDoc", "text": "Docker package to be used in the module.\n"}, "loc": ["virtualisation", "docker", "rootless", "package"], "readOnly": false, "type": "package"}, "virtualisation.docker.rootless.setSocketVariable": {"declarations": ["nixos/modules/virtualisation/docker-rootless.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Point {command}`DOCKER_HOST` to rootless Docker instance for\nnormal users by default.\n"}, "loc": ["virtualisation", "docker", "rootless", "setSocketVariable"], "readOnly": false, "type": "boolean"}, "virtualisation.docker.storageDriver": {"declarations": ["nixos/modules/virtualisation/docker.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "This option determines which Docker storage driver to use. By default\nit let's docker automatically choose preferred storage driver.\n"}, "loc": ["virtualisation", "docker", "storageDriver"], "readOnly": false, "type": "null or one of \"aufs\", \"btrfs\", \"devicemapper\", \"overlay\", \"overlay2\", \"zfs\""}, "virtualisation.hypervGuest.enable": {"declarations": ["nixos/modules/virtualisation/hyperv-guest.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Hyper-V Guest Support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["virtualisation", "hypervGuest", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.hypervGuest.videoMode": {"declarations": ["nixos/modules/virtualisation/hyperv-guest.nix"], "default": {"_type": "literalExpression", "text": "\"1152x864\""}, "description": {"_type": "mdDoc", "text": "Resolution at which to initialize the video adapter.\n\nSupports screen resolution up to Full HD 1920x1080 with 32 bit color\non Windows Server 2012, and 1600x1200 with 16 bit color on Windows\nServer 2008 R2 or earlier.\n"}, "example": {"_type": "literalExpression", "text": "\"1024x768\""}, "loc": ["virtualisation", "hypervGuest", "videoMode"], "readOnly": false, "type": "string"}, "virtualisation.kvmgt.device": {"declarations": ["nixos/modules/virtualisation/kvmgt.nix"], "default": {"_type": "literalExpression", "text": "\"0000:00:02.0\""}, "description": {"_type": "mdDoc", "text": "PCI ID of graphics card. You can figure it with {command}`ls /sys/class/mdev_bus`."}, "loc": ["virtualisation", "kvmgt", "device"], "readOnly": false, "type": "string"}, "virtualisation.kvmgt.enable": {"declarations": ["nixos/modules/virtualisation/kvmgt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable KVMGT (iGVT-g) VGPU support. Allows Qemu/KVM guests to share host's Intel integrated graphics card.\nCurrently only one graphical device can be shared. To allow users to access the device without root add them\nto the kvm group: `users.extraUsers.<yourusername>.extraGroups = [ \"kvm\" ];`\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["virtualisation", "kvmgt", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.kvmgt.vgpus": {"declarations": ["nixos/modules/virtualisation/kvmgt.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Virtual GPUs to be used in Qemu. You can find devices via {command}`ls /sys/bus/pci/devices/*/mdev_supported_types`\nand find info about device via {command}`cat /sys/bus/pci/devices/*/mdev_supported_types/i915-GVTg_V5_4/description`\n"}, "example": {"_type": "literalExpression", "text": "{\n  i915-GVTg_V5_8 = {\n    uuid = [\n      \"a297db4a-f4c2-11e6-90f6-d3b88d6c9525\"\n    ];\n  };\n}"}, "loc": ["virtualisation", "kvmgt", "vgpus"], "readOnly": false, "type": "attribute set of (submodule)"}, "virtualisation.kvmgt.vgpus.<name>.uuid": {"declarations": ["nixos/modules/virtualisation/kvmgt.nix"], "description": {"_type": "mdDoc", "text": "UUID(s) of VGPU device. You can generate one with `libossp_uuid`."}, "loc": ["virtualisation", "kvmgt", "vgpus", "<name>", "uuid"], "readOnly": false, "type": "list of string"}, "virtualisation.libvirtd.allowedBridges": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"virbr0\"\n]"}, "description": {"_type": "mdDoc", "text": "List of bridge devices that can be used by qemu:///session\n"}, "loc": ["virtualisation", "libvirtd", "allowedBridges"], "readOnly": false, "type": "list of string"}, "virtualisation.libvirtd.enable": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This option enables libvirtd, a daemon that manages\nvirtual machines. Users in the \"libvirtd\" group can interact with\nthe daemon (e.g. to start or stop VMs) using the\n{command}`virsh` command line tool, among others.\n"}, "loc": ["virtualisation", "libvirtd", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.libvirtd.extraConfig": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra contents appended to the libvirtd configuration file,\nlibvirtd.conf.\n"}, "loc": ["virtualisation", "libvirtd", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "virtualisation.libvirtd.extraOptions": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra command line arguments passed to libvirtd on startup.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--verbose\"\n]"}, "loc": ["virtualisation", "libvirtd", "extraOptions"], "readOnly": false, "type": "list of string"}, "virtualisation.libvirtd.onBoot": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "\"start\""}, "description": {"_type": "mdDoc", "text": "Specifies the action to be done to / on the guests when the host boots.\nThe \"start\" option starts all guests that were running prior to shutdown\nregardless of their autostart settings. The \"ignore\" option will not\nstart the formerly running guest on boot. However, any guest marked as\nautostart will still be automatically started by libvirtd.\n"}, "loc": ["virtualisation", "libvirtd", "onBoot"], "readOnly": false, "type": "one of \"start\", \"ignore\""}, "virtualisation.libvirtd.onShutdown": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "\"suspend\""}, "description": {"_type": "mdDoc", "text": "When shutting down / restarting the host what method should\nbe used to gracefully halt the guests. Setting to \"shutdown\"\nwill cause an ACPI shutdown of each guest. \"suspend\" will\nattempt to save the state of the guests ready to restore on boot.\n"}, "loc": ["virtualisation", "libvirtd", "onShutdown"], "readOnly": false, "type": "one of \"shutdown\", \"suspend\""}, "virtualisation.libvirtd.package": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.libvirt"}, "description": {"_type": "mdDoc", "text": "libvirt package to use.\n"}, "loc": ["virtualisation", "libvirtd", "package"], "readOnly": false, "type": "package"}, "virtualisation.libvirtd.parallelShutdown": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Number of guests that will be shutdown concurrently, taking effect when onShutdown\nis set to \"shutdown\". If set to 0, guests will be shutdown one after another.\nNumber of guests on shutdown at any time will not exceed number set in this\nvariable.\n"}, "loc": ["virtualisation", "libvirtd", "parallelShutdown"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "virtualisation.libvirtd.qemu": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "QEMU related options.\n"}, "loc": ["virtualisation", "libvirtd", "qemu"], "readOnly": false, "type": "submodule"}, "virtualisation.libvirtd.qemu.ovmf": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "QEMU's OVMF options.\n"}, "loc": ["virtualisation", "libvirtd", "qemu", "ovmf"], "readOnly": false, "type": "submodule"}, "virtualisation.libvirtd.qemu.ovmf.enable": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Allows libvirtd to take advantage of OVMF when creating new\nQEMU VMs with UEFI boot.\n"}, "loc": ["virtualisation", "libvirtd", "qemu", "ovmf", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.libvirtd.qemu.ovmf.packages": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "[ pkgs.OVMF.fd ]"}, "description": {"_type": "mdDoc", "text": "List of OVMF packages to use. Each listed package must contain files names FV/OVMF_CODE.fd and FV/OVMF_VARS.fd or FV/AAVMF_CODE.fd and FV/AAVMF_VARS.fd\n"}, "example": {"_type": "literalExpression", "text": "[ pkgs.OVMFFull.fd pkgs.pkgsCross.aarch64-multiplatform.OVMF.fd ]"}, "loc": ["virtualisation", "libvirtd", "qemu", "ovmf", "packages"], "readOnly": false, "type": "list of package"}, "virtualisation.libvirtd.qemu.package": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.qemu"}, "description": {"_type": "mdDoc", "text": "Qemu package to use with libvirt.\n`pkgs.qemu` can emulate alien architectures (e.g. aarch64 on x86)\n`pkgs.qemu_kvm` saves disk space allowing to emulate only host architectures.\n"}, "loc": ["virtualisation", "libvirtd", "qemu", "package"], "readOnly": false, "type": "package"}, "virtualisation.libvirtd.qemu.runAsRoot": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If true,  libvirtd runs qemu as root.\nIf false, libvirtd runs qemu as unprivileged user qemu-libvirtd.\nChanging this option to false may cause file permission issues\nfor existing guests. To fix these, manually change ownership\nof affected files in /var/lib/libvirt/qemu to qemu-libvirtd.\n"}, "loc": ["virtualisation", "libvirtd", "qemu", "runAsRoot"], "readOnly": false, "type": "boolean"}, "virtualisation.libvirtd.qemu.swtpm": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "QEMU's swtpm options.\n"}, "loc": ["virtualisation", "libvirtd", "qemu", "swtpm"], "readOnly": false, "type": "submodule"}, "virtualisation.libvirtd.qemu.swtpm.enable": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Allows libvirtd to use swtpm to create an emulated TPM.\n"}, "loc": ["virtualisation", "libvirtd", "qemu", "swtpm", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.libvirtd.qemu.swtpm.package": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.swtpm"}, "description": {"_type": "mdDoc", "text": "swtpm package to use.\n"}, "loc": ["virtualisation", "libvirtd", "qemu", "swtpm", "package"], "readOnly": false, "type": "package"}, "virtualisation.libvirtd.qemu.verbatimConfig": {"declarations": ["nixos/modules/virtualisation/libvirtd.nix"], "default": {"_type": "literalExpression", "text": "''\n  namespaces = []\n''"}, "description": {"_type": "mdDoc", "text": "Contents written to the qemu configuration file, qemu.conf.\nMake sure to include a proper namespace configuration when\nsupplying custom configuration.\n"}, "loc": ["virtualisation", "libvirtd", "qemu", "verbatimConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "virtualisation.lxc.defaultConfig": {"declarations": ["nixos/modules/virtualisation/lxc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Default config (default.conf) for new containers, i.e. for\nnetwork config. See {manpage}`lxc.container.conf(5)`.\n"}, "loc": ["virtualisation", "lxc", "defaultConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "virtualisation.lxc.enable": {"declarations": ["nixos/modules/virtualisation/lxc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This enables Linux Containers (LXC), which provides tools\nfor creating and managing system or application containers\non Linux.\n"}, "loc": ["virtualisation", "lxc", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.lxc.lxcfs.enable": {"declarations": ["nixos/modules/virtualisation/lxcfs.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This enables LXCFS, a FUSE filesystem for LXC.\nTo use lxcfs in include the following configuration in your\ncontainer configuration:\n```\nvirtualisation.lxc.defaultConfig = \"lxc.include = ${pkgs.lxcfs}/share/lxc/config/common.conf.d/00-lxcfs.conf\";\n```\n"}, "loc": ["virtualisation", "lxc", "lxcfs", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.lxc.systemConfig": {"declarations": ["nixos/modules/virtualisation/lxc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "This is the system-wide LXC config. See\n{manpage}`lxc.system.conf(5)`.\n"}, "loc": ["virtualisation", "lxc", "systemConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "virtualisation.lxc.usernetConfig": {"declarations": ["nixos/modules/virtualisation/lxc.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "This is the config file for managing unprivileged user network\nadministration access in LXC. See {manpage}`lxc-usernet(5)`.\n"}, "loc": ["virtualisation", "lxc", "usernetConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "virtualisation.lxd.enable": {"declarations": ["nixos/modules/virtualisation/lxd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This option enables lxd, a daemon that manages\ncontainers. Users in the \"lxd\" group can interact with\nthe daemon (e.g. to start or stop containers) using the\n{command}`lxc` command line tool, among others.\n\nMost of the time, you'll also want to start lxcfs, so\nthat containers can \"see\" the limits:\n```\nvirtualisation.lxc.lxcfs.enable = true;\n```\n"}, "loc": ["virtualisation", "lxd", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.lxd.lxcPackage": {"declarations": ["nixos/modules/virtualisation/lxd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.lxc"}, "description": {"_type": "mdDoc", "text": "The LXC package to use with LXD (required for AppArmor profiles).\n"}, "loc": ["virtualisation", "lxd", "lxcPackage"], "readOnly": false, "type": "package"}, "virtualisation.lxd.package": {"declarations": ["nixos/modules/virtualisation/lxd.nix"], "default": {"_type": "literalExpression", "text": "pkgs.lxd"}, "description": {"_type": "mdDoc", "text": "The LXD package to use.\n"}, "loc": ["virtualisation", "lxd", "package"], "readOnly": false, "type": "package"}, "virtualisation.lxd.recommendedSysctlSettings": {"declarations": ["nixos/modules/virtualisation/lxd.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables various settings to avoid common pitfalls when\nrunning containers requiring many file operations.\nFixes errors like \"Too many open files\" or\n\"neighbour: ndisc_cache: neighbor table overflow!\".\nSee https://lxd.readthedocs.io/en/latest/production-setup/\nfor details.\n"}, "loc": ["virtualisation", "lxd", "recommendedSysctlSettings"], "readOnly": false, "type": "boolean"}, "virtualisation.lxd.startTimeout": {"declarations": ["nixos/modules/virtualisation/lxd.nix"], "default": {"_type": "literalExpression", "text": "600"}, "description": {"_type": "mdDoc", "text": "Time to wait (in seconds) for LXD to become ready to process requests.\nIf LXD does not reply within the configured time, lxd.service will be\nconsidered failed and systemd will attempt to restart it.\n"}, "loc": ["virtualisation", "lxd", "startTimeout"], "readOnly": false, "type": "signed integer"}, "virtualisation.lxd.zfsSupport": {"declarations": ["nixos/modules/virtualisation/lxd.nix"], "default": {"_type": "literalExpression", "text": "config.boot.zfs.enabled"}, "description": {"_type": "mdDoc", "text": "Enables lxd to use zfs as a storage for containers.\n\nThis option is enabled by default if a zfs pool is configured\nwith nixos.\n"}, "loc": ["virtualisation", "lxd", "zfsSupport"], "readOnly": false, "type": "boolean"}, "virtualisation.multipass.enable": {"declarations": ["nixos/modules/virtualisation/multipass.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Multipass, a simple manager for virtualised Ubuntu instances.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["virtualisation", "multipass", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.multipass.logLevel": {"declarations": ["nixos/modules/virtualisation/multipass.nix"], "default": {"_type": "literalExpression", "text": "\"debug\""}, "description": {"_type": "mdDoc", "text": "The logging verbosity of the multipassd binary.\n"}, "loc": ["virtualisation", "multipass", "logLevel"], "readOnly": false, "type": "one of \"error\", \"warning\", \"info\", \"debug\", \"trace\""}, "virtualisation.multipass.package": {"declarations": ["nixos/modules/virtualisation/multipass.nix"], "default": {"_type": "literalExpression", "text": "pkgs.multipass"}, "description": {"_type": "mdDoc", "text": "The multipass package to use."}, "loc": ["virtualisation", "multipass", "package"], "readOnly": false, "type": "package"}, "virtualisation.oci-containers.backend": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "\"podman\""}, "description": {"_type": "mdDoc", "text": "The underlying Docker implementation to use."}, "loc": ["virtualisation", "oci-containers", "backend"], "readOnly": false, "type": "one of \"podman\", \"docker\""}, "virtualisation.oci-containers.containers": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "OCI (Docker) containers to run as systemd services."}, "loc": ["virtualisation", "oci-containers", "containers"], "readOnly": false, "type": "attribute set of (submodule)"}, "virtualisation.oci-containers.containers.<name>.autoStart": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "When enabled, the container is automatically started on boot.\nIf this option is set to false, the container has to be started on-demand via its service.\n"}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "autoStart"], "readOnly": false, "type": "boolean"}, "virtualisation.oci-containers.containers.<name>.cmd": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Commandline arguments to pass to the image's entrypoint."}, "example": {"_type": "literalExpression", "text": "[\"--port=9000\"]\n"}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "cmd"], "readOnly": false, "type": "list of string"}, "virtualisation.oci-containers.containers.<name>.dependsOn": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Define which other containers this one depends on. They will be added to both After and Requires for the unit.\n\nUse the same name as the attribute under `virtualisation.oci-containers.containers`.\n"}, "example": {"_type": "literalExpression", "text": "virtualisation.oci-containers.containers = {\n  node1 = {};\n  node2 = {\n    dependsOn = [ \"node1\" ];\n  }\n}\n"}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "dependsOn"], "readOnly": false, "type": "list of string"}, "virtualisation.oci-containers.containers.<name>.entrypoint": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Override the default entrypoint of the image."}, "example": {"_type": "literalExpression", "text": "\"/bin/my-app\""}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "entrypoint"], "readOnly": false, "type": "null or string"}, "virtualisation.oci-containers.containers.<name>.environment": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Environment variables to set for this container."}, "example": {"_type": "literalExpression", "text": "{\n  DATABASE_HOST = \"db.example.com\";\n  DATABASE_PORT = \"3306\";\n}\n"}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "environment"], "readOnly": false, "type": "attribute set of string"}, "virtualisation.oci-containers.containers.<name>.environmentFiles": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Environment files for this container."}, "example": {"_type": "literalExpression", "text": "[\n  /path/to/.env\n  /path/to/.env.secret\n]\n"}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "environmentFiles"], "readOnly": false, "type": "list of path"}, "virtualisation.oci-containers.containers.<name>.extraOptions": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for {command}`podman run`."}, "example": {"_type": "literalExpression", "text": "[\"--network=host\"]\n"}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "extraOptions"], "readOnly": false, "type": "list of string"}, "virtualisation.oci-containers.containers.<name>.image": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "description": {"_type": "mdDoc", "text": "OCI image to run."}, "example": {"_type": "literalExpression", "text": "\"library/hello-world\""}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "image"], "readOnly": false, "type": "string"}, "virtualisation.oci-containers.containers.<name>.imageFile": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to an image file to load before running the image. This can\nbe used to bypass pulling the image from the registry.\n\nThe `image` attribute must match the name and\ntag of the image contained in this file, as they will be used to\nrun the container with that image. If they do not match, the\nimage will be pulled from the registry as usual.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.dockerTools.buildImage {...};"}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "imageFile"], "readOnly": false, "type": "null or package"}, "virtualisation.oci-containers.containers.<name>.log-driver": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "\"journald\""}, "description": {"_type": "mdDoc", "text": "Logging driver for the container.  The default of\n`\"journald\"` means that the container's logs will be\nhandled as part of the systemd unit.\n\nFor more details and a full list of logging drivers, refer to respective backends documentation.\n\nFor Docker:\n[Docker engine documentation](https://docs.docker.com/engine/reference/run/#logging-drivers---log-driver)\n\nFor Podman:\nRefer to the docker-run(1) man page.\n"}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "log-driver"], "readOnly": false, "type": "string"}, "virtualisation.oci-containers.containers.<name>.login.passwordFile": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to file containing password."}, "example": {"_type": "literalExpression", "text": "\"/etc/nixos/dockerhub-password.txt\""}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "login", "passwordFile"], "readOnly": false, "type": "null or string"}, "virtualisation.oci-containers.containers.<name>.login.registry": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Registry where to login to."}, "example": {"_type": "literalExpression", "text": "\"https://docker.pkg.github.com\""}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "login", "registry"], "readOnly": false, "type": "null or string"}, "virtualisation.oci-containers.containers.<name>.login.username": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Username for login."}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "login", "username"], "readOnly": false, "type": "null or string"}, "virtualisation.oci-containers.containers.<name>.ports": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Network ports to publish from the container to the outer host.\n\nValid formats:\n- `<ip>:<hostPort>:<containerPort>`\n- `<ip>::<containerPort>`\n- `<hostPort>:<containerPort>`\n- `<containerPort>`\n\nBoth `hostPort` and `containerPort` can be specified as a range of\nports.  When specifying ranges for both, the number of container\nports in the range must match the number of host ports in the\nrange.  Example: `1234-1236:1234-1236/tcp`\n\nWhen specifying a range for `hostPort` only, the `containerPort`\nmust *not* be a range.  In this case, the container port is published\nsomewhere within the specified `hostPort` range.\nExample: `1234-1236:1234/tcp`\n\nRefer to the\n[Docker engine documentation](https://docs.docker.com/engine/reference/run/#expose-incoming-ports) for full details.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"8080:9000\"\n]\n"}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "ports"], "readOnly": false, "type": "list of string"}, "virtualisation.oci-containers.containers.<name>.user": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Override the username or UID (and optionally groupname or GID) used\nin the container.\n"}, "example": {"_type": "literalExpression", "text": "\"nobody:nogroup\""}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "user"], "readOnly": false, "type": "null or string"}, "virtualisation.oci-containers.containers.<name>.volumes": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of volumes to attach to this container.\n\nNote that this is a list of `\"src:dst\"` strings to\nallow for `src` to refer to `/nix/store` paths, which\nwould be difficult with an attribute set.  There are\nalso a variety of mount options available as a third\nfield; please refer to the\n[docker engine documentation](https://docs.docker.com/engine/reference/run/#volume-shared-filesystems) for details.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"volume_name:/path/inside/container\"\n  \"/path/on/host:/path/inside/container\"\n]\n"}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "volumes"], "readOnly": false, "type": "list of string"}, "virtualisation.oci-containers.containers.<name>.workdir": {"declarations": ["nixos/modules/virtualisation/oci-containers.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Override the default working directory for the container."}, "example": {"_type": "literalExpression", "text": "\"/var/lib/hello_world\""}, "loc": ["virtualisation", "oci-containers", "containers", "<name>", "workdir"], "readOnly": false, "type": "null or string"}, "virtualisation.podman.autoPrune.dates": {"declarations": ["nixos/modules/virtualisation/podman/default.nix"], "default": {"_type": "literalExpression", "text": "\"weekly\""}, "description": {"_type": "mdDoc", "text": "Specification (in the format described by\n{manpage}`systemd.time(7)`) of the time at\nwhich the prune will occur.\n"}, "loc": ["virtualisation", "podman", "autoPrune", "dates"], "readOnly": false, "type": "string"}, "virtualisation.podman.autoPrune.enable": {"declarations": ["nixos/modules/virtualisation/podman/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to periodically prune Podman resources. If enabled, a\nsystemd timer will run `podman system prune -f`\nas specified by the `dates` option.\n"}, "loc": ["virtualisation", "podman", "autoPrune", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.podman.autoPrune.flags": {"declarations": ["nixos/modules/virtualisation/podman/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Any additional flags passed to {command}`podman system prune`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"--all\"\n]"}, "loc": ["virtualisation", "podman", "autoPrune", "flags"], "readOnly": false, "type": "list of string"}, "virtualisation.podman.defaultNetwork.settings": {"declarations": ["nixos/modules/virtualisation/podman/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings for podman's default network.\n"}, "example": {"_type": "literalExpression", "text": "{ dns_enabled = true; }"}, "loc": ["virtualisation", "podman", "defaultNetwork", "settings"], "readOnly": false, "type": "JSON value"}, "virtualisation.podman.dockerCompat": {"declarations": ["nixos/modules/virtualisation/podman/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create an alias mapping {command}`docker` to {command}`podman`.\n"}, "loc": ["virtualisation", "podman", "dockerCompat"], "readOnly": false, "type": "boolean"}, "virtualisation.podman.dockerSocket.enable": {"declarations": ["nixos/modules/virtualisation/podman/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Make the Podman socket available in place of the Docker socket, so\nDocker tools can find the Podman socket.\n\nPodman implements the Docker API.\n\nUsers must be in the `podman` group in order to connect. As\nwith Docker, members of this group can gain root access.\n"}, "loc": ["virtualisation", "podman", "dockerSocket", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.podman.enable": {"declarations": ["nixos/modules/virtualisation/podman/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This option enables Podman, a daemonless container engine for\ndeveloping, managing, and running OCI Containers on your Linux System.\n\nIt is a drop-in replacement for the {command}`docker` command.\n"}, "loc": ["virtualisation", "podman", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.podman.enableNvidia": {"declarations": ["nixos/modules/virtualisation/podman/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable use of NVidia GPUs from within podman containers.\n"}, "loc": ["virtualisation", "podman", "enableNvidia"], "readOnly": false, "type": "boolean"}, "virtualisation.podman.extraPackages": {"declarations": ["nixos/modules/virtualisation/podman/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra packages to be installed in the Podman wrapper.\n"}, "example": {"_type": "literalExpression", "text": "[\n  pkgs.gvisor\n]\n"}, "loc": ["virtualisation", "podman", "extraPackages"], "readOnly": false, "type": "list of package"}, "virtualisation.podman.networkSocket.enable": {"declarations": ["nixos/modules/virtualisation/podman/network-socket.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Make the Podman and Docker compatibility API available over the network\nwith TLS client certificate authentication.\n\nThis allows Docker clients to connect with the equivalents of the Docker\nCLI `-H` and `--tls*` family of options.\n\nFor certificate setup, see https://docs.docker.com/engine/security/protect-access/\n\nThis option is independent of [](#opt-virtualisation.podman.dockerSocket.enable).\n"}, "loc": ["virtualisation", "podman", "networkSocket", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.podman.networkSocket.listenAddress": {"declarations": ["nixos/modules/virtualisation/podman/network-socket.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Interface address for receiving TLS connections.\n"}, "loc": ["virtualisation", "podman", "networkSocket", "listenAddress"], "readOnly": false, "type": "string"}, "virtualisation.podman.networkSocket.openFirewall": {"declarations": ["nixos/modules/virtualisation/podman/network-socket.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the port in the firewall.\n"}, "loc": ["virtualisation", "podman", "networkSocket", "openFirewall"], "readOnly": false, "type": "boolean"}, "virtualisation.podman.networkSocket.port": {"declarations": ["nixos/modules/virtualisation/podman/network-socket.nix"], "default": {"_type": "literalExpression", "text": "2376"}, "description": {"_type": "mdDoc", "text": "TCP port number for receiving TLS connections.\n"}, "loc": ["virtualisation", "podman", "networkSocket", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "virtualisation.podman.networkSocket.server": {"declarations": ["nixos/modules/virtualisation/podman/network-socket-ghostunnel.nix", "nixos/modules/virtualisation/podman/network-socket.nix"], "description": {"_type": "mdDoc", "text": "Choice of TLS proxy server.\n"}, "example": {"_type": "literalExpression", "text": "\"ghostunnel\""}, "loc": ["virtualisation", "podman", "networkSocket", "server"], "readOnly": false, "type": "value \"ghostunnel\" (singular enum)"}, "virtualisation.podman.networkSocket.tls.cacert": {"declarations": ["nixos/modules/virtualisation/podman/network-socket.nix"], "description": {"_type": "mdDoc", "text": "Path to CA certificate to use for client authentication.\n"}, "loc": ["virtualisation", "podman", "networkSocket", "tls", "cacert"], "readOnly": false, "type": "path"}, "virtualisation.podman.networkSocket.tls.cert": {"declarations": ["nixos/modules/virtualisation/podman/network-socket.nix"], "description": {"_type": "mdDoc", "text": "Path to certificate describing the server.\n"}, "loc": ["virtualisation", "podman", "networkSocket", "tls", "cert"], "readOnly": false, "type": "path"}, "virtualisation.podman.networkSocket.tls.key": {"declarations": ["nixos/modules/virtualisation/podman/network-socket.nix"], "description": {"_type": "mdDoc", "text": "Path to the private key corresponding to the server certificate.\n\nUse a string for this setting. Otherwise it will be copied to the Nix\nstore first, where it is readable by any system process.\n"}, "loc": ["virtualisation", "podman", "networkSocket", "tls", "key"], "readOnly": false, "type": "path"}, "virtualisation.rosetta.enable": {"declarations": ["nixos/modules/virtualisation/rosetta.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable [Rosetta](https://developer.apple.com/documentation/apple-silicon/about-the-rosetta-translation-environment) support.\n\nThis feature requires the system to be a virtualised guest on an Apple silicon host.\n\nThe default settings are suitable for the [UTM](https://docs.getutm.app/) virtualisation [package](https://search.nixos.org/packages?channel=unstable&show=utm&from=0&size=1&sort=relevance&type=packages&query=utm).\nMake sure to select 'Apple Virtualization' as the virtualisation engine and then tick the 'Enable Rosetta' option.\n"}, "loc": ["virtualisation", "rosetta", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.rosetta.mountTag": {"declarations": ["nixos/modules/virtualisation/rosetta.nix"], "default": {"_type": "literalExpression", "text": "\"rosetta\""}, "description": {"_type": "mdDoc", "text": "The VirtioFS mount tag for the Rosetta runtime, exposed by the host's virtualisation software.\n\nIf supported, your virtualisation software should provide instructions on how register the Rosetta runtime inside Linux guests.\nThese instructions should mention the name of the mount tag used for the VirtioFS directory share that contains the Rosetta runtime.\n"}, "loc": ["virtualisation", "rosetta", "mountTag"], "readOnly": false, "type": "string"}, "virtualisation.spiceUSBRedirection.enable": {"declarations": ["nixos/modules/virtualisation/spice-usb-redirection.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Install the SPICE USB redirection helper with setuid\nprivileges. This allows unprivileged users to pass USB devices\nconnected to this machine to libvirt VMs, both local and\nremote. Note that this allows users arbitrary access to USB\ndevices.\n"}, "loc": ["virtualisation", "spiceUSBRedirection", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.virtualbox.guest.enable": {"declarations": ["nixos/modules/virtualisation/virtualbox-guest.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the VirtualBox service and other guest additions."}, "loc": ["virtualisation", "virtualbox", "guest", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.virtualbox.guest.x11": {"declarations": ["nixos/modules/virtualisation/virtualbox-guest.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable x11 graphics"}, "loc": ["virtualisation", "virtualbox", "guest", "x11"], "readOnly": false, "type": "boolean"}, "virtualisation.virtualbox.host.addNetworkInterface": {"declarations": ["nixos/modules/virtualisation/virtualbox-host.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Automatically set up a vboxnet0 host-only network interface.\n"}, "loc": ["virtualisation", "virtualbox", "host", "addNetworkInterface"], "readOnly": false, "type": "boolean"}, "virtualisation.virtualbox.host.enable": {"declarations": ["nixos/modules/virtualisation/virtualbox-host.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable VirtualBox.\n\n::: {.note}\nIn order to pass USB devices from the host to the guests, the user\nneeds to be in the `vboxusers` group.\n:::\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["virtualisation", "virtualbox", "host", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.virtualbox.host.enableExtensionPack": {"declarations": ["nixos/modules/virtualisation/virtualbox-host.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to install the Oracle Extension Pack for VirtualBox.\n\n::: {.important}\nYou must set `nixpkgs.config.allowUnfree = true` in\norder to use this.  This requires you accept the VirtualBox PUEL.\n:::\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["virtualisation", "virtualbox", "host", "enableExtensionPack"], "readOnly": false, "type": "boolean"}, "virtualisation.virtualbox.host.enableHardening": {"declarations": ["nixos/modules/virtualisation/virtualbox-host.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable hardened VirtualBox, which ensures that only the binaries in the\nsystem path get access to the devices exposed by the kernel modules\ninstead of all users in the vboxusers group.\n\n::: {.important}\nDisabling this can put your system's security at risk, as local users\nin the vboxusers group can tamper with the VirtualBox device files.\n:::\n"}, "loc": ["virtualisation", "virtualbox", "host", "enableHardening"], "readOnly": false, "type": "boolean"}, "virtualisation.virtualbox.host.enableWebService": {"declarations": ["nixos/modules/virtualisation/virtualbox-host.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Build VirtualBox web service tool (vboxwebsrv) to allow managing VMs via other webpage frontend tools. Useful for headless servers.\n"}, "loc": ["virtualisation", "virtualbox", "host", "enableWebService"], "readOnly": false, "type": "boolean"}, "virtualisation.virtualbox.host.headless": {"declarations": ["nixos/modules/virtualisation/virtualbox-host.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use VirtualBox installation without GUI and Qt dependency. Useful to enable on servers\nand when virtual machines are controlled only via SSH.\n"}, "loc": ["virtualisation", "virtualbox", "host", "headless"], "readOnly": false, "type": "boolean"}, "virtualisation.virtualbox.host.package": {"declarations": ["nixos/modules/virtualisation/virtualbox-host.nix"], "default": {"_type": "literalExpression", "text": "pkgs.virtualbox"}, "description": {"_type": "mdDoc", "text": "Which VirtualBox package to use.\n"}, "loc": ["virtualisation", "virtualbox", "host", "package"], "readOnly": false, "type": "package"}, "virtualisation.vmware.guest.enable": {"declarations": ["nixos/modules/virtualisation/vmware-guest.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable VMWare Guest Support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["virtualisation", "vmware", "guest", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.vmware.guest.headless": {"declarations": ["nixos/modules/virtualisation/vmware-guest.nix"], "default": {"_type": "literalExpression", "text": "\"!config.services.xserver.enable\""}, "description": {"_type": "mdDoc", "text": "Whether to disable X11-related features."}, "loc": ["virtualisation", "vmware", "guest", "headless"], "readOnly": false, "type": "boolean"}, "virtualisation.vmware.host.enable": {"declarations": ["nixos/modules/virtualisation/vmware-host.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This enables VMware host virtualisation for running VMs.\n\n::: {.important}\n`vmware-vmx` will cause kcompactd0 due to\n`Transparent Hugepages` feature in kernel.\nApply `[ \"transparent_hugepage=never\" ]` in\noption {option}`boot.kernelParams` to disable them.\n:::\n\n::: {.note}\nIf that didn't work disable `TRANSPARENT_HUGEPAGE`,\n`COMPACTION` configs and recompile kernel.\n:::\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["virtualisation", "vmware", "host", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.vmware.host.extraConfig": {"declarations": ["nixos/modules/virtualisation/vmware-host.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Add extra config to /etc/vmware/config"}, "example": {"_type": "literalExpression", "text": "''\n  # Allow unsupported device's OpenGL and Vulkan acceleration for guest vGPU\n  mks.gl.allowUnsupportedDrivers = \"TRUE\"\n  mks.vk.allowUnsupportedDevices = \"TRUE\"\n''"}, "loc": ["virtualisation", "vmware", "host", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "virtualisation.vmware.host.extraPackages": {"declarations": ["nixos/modules/virtualisation/vmware-host.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra packages to be used with VMware host."}, "example": {"_type": "literalExpression", "text": "\"with pkgs; [ ntfs3g ]\""}, "loc": ["virtualisation", "vmware", "host", "extraPackages"], "readOnly": false, "type": "list of package"}, "virtualisation.vmware.host.package": {"declarations": ["nixos/modules/virtualisation/vmware-host.nix"], "default": {"_type": "literalExpression", "text": "pkgs.vmware-workstation"}, "description": {"_type": "mdDoc", "text": "VMware host virtualisation package to use"}, "loc": ["virtualisation", "vmware", "host", "package"], "readOnly": false, "type": "package"}, "virtualisation.vswitch.enable": {"declarations": ["nixos/modules/virtualisation/openvswitch.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Open vSwitch. A configuration daemon (ovs-server)\nwill be started.\n"}, "loc": ["virtualisation", "vswitch", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.vswitch.package": {"declarations": ["nixos/modules/virtualisation/openvswitch.nix"], "default": {"_type": "literalExpression", "text": "pkgs.openvswitch"}, "description": {"_type": "mdDoc", "text": "Open vSwitch package to use.\n"}, "loc": ["virtualisation", "vswitch", "package"], "readOnly": false, "type": "package"}, "virtualisation.vswitch.resetOnStart": {"declarations": ["nixos/modules/virtualisation/openvswitch.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to reset the Open vSwitch configuration database to a default\nconfiguration on every start of the systemd `ovsdb.service`.\n"}, "loc": ["virtualisation", "vswitch", "resetOnStart"], "readOnly": false, "type": "boolean"}, "virtualisation.waydroid.enable": {"declarations": ["nixos/modules/virtualisation/waydroid.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Waydroid."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["virtualisation", "waydroid", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.xen.bootParams": {"declarations": ["nixos/modules/virtualisation/xen-dom0.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Parameters passed to the Xen hypervisor at boot time.\n"}, "loc": ["virtualisation", "xen", "bootParams"], "readOnly": false, "type": "list of string"}, "virtualisation.xen.bridge.address": {"declarations": ["nixos/modules/virtualisation/xen-dom0.nix"], "default": {"_type": "literalExpression", "text": "\"172.16.0.1\""}, "description": {"_type": "mdDoc", "text": "IPv4 address of the bridge.\n"}, "loc": ["virtualisation", "xen", "bridge", "address"], "readOnly": false, "type": "string"}, "virtualisation.xen.bridge.forwardDns": {"declarations": ["nixos/modules/virtualisation/xen-dom0.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set to `true`, the DNS queries from the\nhosts connected to the bridge will be forwarded to the DNS\nservers specified in /etc/resolv.conf .\n"}, "loc": ["virtualisation", "xen", "bridge", "forwardDns"], "readOnly": false, "type": "boolean"}, "virtualisation.xen.bridge.name": {"declarations": ["nixos/modules/virtualisation/xen-dom0.nix"], "default": {"_type": "literalExpression", "text": "\"xenbr0\""}, "description": {"_type": "mdDoc", "text": "Name of bridge the Xen domUs connect to.\n"}, "loc": ["virtualisation", "xen", "bridge", "name"], "readOnly": false, "type": "string"}, "virtualisation.xen.bridge.prefixLength": {"declarations": ["nixos/modules/virtualisation/xen-dom0.nix"], "default": {"_type": "literalExpression", "text": "16"}, "description": {"_type": "mdDoc", "text": "Subnet mask of the bridge interface, specified as the number of\nbits in the prefix (`24`).\nA DHCP server will provide IP addresses for the whole, remaining\nsubnet.\n"}, "loc": ["virtualisation", "xen", "bridge", "prefixLength"], "readOnly": false, "type": "signed integer"}, "virtualisation.xen.domain0MemorySize": {"declarations": ["nixos/modules/virtualisation/xen-dom0.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Amount of memory (in MiB) allocated to Domain 0 on boot.\nIf set to 0, all memory is assigned to Domain 0.\n"}, "example": {"_type": "literalExpression", "text": "512"}, "loc": ["virtualisation", "xen", "domain0MemorySize"], "readOnly": false, "type": "signed integer"}, "virtualisation.xen.domains.extraConfig": {"declarations": ["nixos/modules/virtualisation/xen-dom0.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Options defined here will override the defaults for xendomains.\nThe default options can be seen in the file included from\n/etc/default/xendomains.\n"}, "loc": ["virtualisation", "xen", "domains", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "virtualisation.xen.enable": {"declarations": ["nixos/modules/virtualisation/xen-dom0.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Setting this option enables the Xen hypervisor, a\nvirtualisation technology that allows multiple virtual\nmachines, known as *domains*, to run\nconcurrently on the physical machine.  NixOS runs as the\nprivileged *Domain 0*.  This option\nrequires a reboot to take effect.\n"}, "loc": ["virtualisation", "xen", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.xen.package": {"declarations": ["nixos/modules/virtualisation/xen-dom0.nix"], "default": {"_type": "literalExpression", "text": "pkgs.xen"}, "description": {"_type": "mdDoc", "text": "The package used for Xen binary.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.xen-light"}, "loc": ["virtualisation", "xen", "package"], "readOnly": false, "relatedPackages": "- [`pkgs.xen`](\n    https://search.nixos.org/packages?show=xen&sort=relevance&query=xen\n  )\n- [`pkgs.xen-light`](\n    https://search.nixos.org/packages?show=xen-light&sort=relevance&query=xen-light\n  )\n", "type": "package"}, "virtualisation.xen.package-qemu": {"declarations": ["nixos/modules/virtualisation/xen-dom0.nix"], "default": {"_type": "literalExpression", "text": "pkgs.xen"}, "description": {"_type": "mdDoc", "text": "The package with qemu binaries for dom0 qemu and xendomains.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.qemu_xen-light"}, "loc": ["virtualisation", "xen", "package-qemu"], "readOnly": false, "relatedPackages": "- [`pkgs.xen`](\n    https://search.nixos.org/packages?show=xen&sort=relevance&query=xen\n  )\n- [`pkgs.qemu_xen-light`](\n    https://search.nixos.org/packages?show=qemu_xen-light&sort=relevance&query=qemu_xen-light\n  )\n\n  For use with pkgs.xen-light.\n", "type": "package"}, "virtualisation.xen.stored": {"declarations": ["nixos/modules/virtualisation/xen-dom0.nix"], "description": {"_type": "mdDoc", "text": "Xen Store daemon to use. Defaults to oxenstored of the xen package.\n"}, "loc": ["virtualisation", "xen", "stored"], "readOnly": false, "type": "path"}, "virtualisation.xen.trace": {"declarations": ["nixos/modules/virtualisation/xen-dom0.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Xen tracing."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["virtualisation", "xen", "trace"], "readOnly": false, "type": "boolean"}, "xdg.autostart.enable": {"declarations": ["nixos/modules/config/xdg/autostart.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install files to support the\n[XDG Autostart specification](https://specifications.freedesktop.org/autostart-spec/autostart-spec-latest.html).\n"}, "loc": ["xdg", "autostart", "enable"], "readOnly": false, "type": "boolean"}, "xdg.icons.enable": {"declarations": ["nixos/modules/config/xdg/icons.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install files to support the\n[XDG Icon Theme specification](https://specifications.freedesktop.org/icon-theme-spec/icon-theme-spec-latest.html).\n"}, "loc": ["xdg", "icons", "enable"], "readOnly": false, "type": "boolean"}, "xdg.menus.enable": {"declarations": ["nixos/modules/config/xdg/menus.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install files to support the\n[XDG Desktop Menu specification](https://specifications.freedesktop.org/menu-spec/menu-spec-latest.html).\n"}, "loc": ["xdg", "menus", "enable"], "readOnly": false, "type": "boolean"}, "xdg.mime.addedAssociations": {"declarations": ["nixos/modules/config/xdg/mime.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Adds associations between mimetypes and applications. See the\n[\nspecifications](https://specifications.freedesktop.org/mime-apps-spec/mime-apps-spec-latest.html#associations) for more information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"application/pdf\" = \"firefox.desktop\";\n  \"text/xml\" = [\n    \"nvim.desktop\"\n    \"codium.desktop\"\n  ];\n}"}, "loc": ["xdg", "mime", "addedAssociations"], "readOnly": false, "type": "attribute set of (string or ((list of string) or string) convertible to it)"}, "xdg.mime.defaultApplications": {"declarations": ["nixos/modules/config/xdg/mime.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Sets the default applications for given mimetypes. See the\n[\nspecifications](https://specifications.freedesktop.org/mime-apps-spec/mime-apps-spec-latest.html#default) for more information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"application/pdf\" = \"firefox.desktop\";\n  \"image/png\" = [\n    \"sxiv.desktop\"\n    \"gimp.desktop\"\n  ];\n}"}, "loc": ["xdg", "mime", "defaultApplications"], "readOnly": false, "type": "attribute set of (string or ((list of string) or string) convertible to it)"}, "xdg.mime.enable": {"declarations": ["nixos/modules/config/xdg/mime.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install files to support the\n[XDG Shared MIME-info specification](https://specifications.freedesktop.org/shared-mime-info-spec/shared-mime-info-spec-latest.html) and the\n[XDG MIME Applications specification](https://specifications.freedesktop.org/mime-apps-spec/mime-apps-spec-latest.html).\n"}, "loc": ["xdg", "mime", "enable"], "readOnly": false, "type": "boolean"}, "xdg.mime.removedAssociations": {"declarations": ["nixos/modules/config/xdg/mime.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Removes associations between mimetypes and applications. See the\n[\nspecifications](https://specifications.freedesktop.org/mime-apps-spec/mime-apps-spec-latest.html#associations) for more information.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"audio/mp3\" = [\n    \"mpv.desktop\"\n    \"umpv.desktop\"\n  ];\n  \"inode/directory\" = \"codium.desktop\";\n}"}, "loc": ["xdg", "mime", "removedAssociations"], "readOnly": false, "type": "attribute set of (string or ((list of string) or string) convertible to it)"}, "xdg.portal.enable": {"declarations": ["nixos/modules/config/xdg/portal.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable [xdg desktop integration](https://github.com/flatpak/xdg-desktop-portal)."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["xdg", "portal", "enable"], "readOnly": false, "type": "boolean"}, "xdg.portal.extraPortals": {"declarations": ["nixos/modules/config/xdg/portal.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of additional portals to add to path. Portals allow interaction\nwith system, like choosing files or taking screenshots. At minimum,\na desktop portal implementation should be listed. GNOME and KDE already\nadds `xdg-desktop-portal-gtk`; and\n`xdg-desktop-portal-kde` respectively. On other desktop\nenvironments you probably want to add them yourself.\n"}, "loc": ["xdg", "portal", "extraPortals"], "readOnly": false, "type": "list of package"}, "xdg.portal.lxqt.enable": {"declarations": ["nixos/modules/config/xdg/portals/lxqt.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the desktop portal for the LXQt desktop environment.\n\nThis will add the `lxqt.xdg-desktop-portal-lxqt`\npackage (with the extra Qt styles) into the\n{option}`xdg.portal.extraPortals` option\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["xdg", "portal", "lxqt", "enable"], "readOnly": false, "type": "boolean"}, "xdg.portal.lxqt.styles": {"declarations": ["nixos/modules/config/xdg/portals/lxqt.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra Qt styles that will be available to the\n`lxqt.xdg-desktop-portal-lxqt`.\n"}, "example": {"_type": "literalExpression", "text": "[\n        pkgs.libsForQt5.qtstyleplugin-kvantum\n        pkgs.breeze-qt5\n        pkgs.qtcurve\n      ];\n"}, "loc": ["xdg", "portal", "lxqt", "styles"], "readOnly": false, "type": "list of package"}, "xdg.portal.wlr.enable": {"declarations": ["nixos/modules/config/xdg/portals/wlr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable desktop portal for wlroots-based desktops\n\nThis will add the `xdg-desktop-portal-wlr` package into\nthe {option}`xdg.portal.extraPortals` option, and provide the\nconfiguration file\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["xdg", "portal", "wlr", "enable"], "readOnly": false, "type": "boolean"}, "xdg.portal.wlr.settings": {"declarations": ["nixos/modules/config/xdg/portals/wlr.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for `xdg-desktop-portal-wlr`.\n\nSee `xdg-desktop-portal-wlr(5)` for supported\nvalues.\n"}, "example": {"_type": "literalExpression", "text": "{\n  screencast = {\n    output_name = \"HDMI-A-1\";\n    max_fps = 30;\n    exec_before = \"disable_notifications.sh\";\n    exec_after = \"enable_notifications.sh\";\n    chooser_type = \"simple\";\n    chooser_cmd = \"${pkgs.slurp}/bin/slurp -f %o -or\";\n  };\n}\n"}, "loc": ["xdg", "portal", "wlr", "settings"], "readOnly": false, "type": "attribute set of attribute set of (INI atom (null, bool, int, float or string))"}, "xdg.portal.xdgOpenUsePortal": {"declarations": ["nixos/modules/config/xdg/portal.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Sets environment variable `NIXOS_XDG_OPEN_USE_PORTAL` to `1`\nThis will make `xdg-open` use the portal to open programs, which resolves bugs involving\nprograms opening inside FHS envs or with unexpected env vars set from wrappers.\nSee [#160923](https://github.com/NixOS/nixpkgs/issues/160923) for more info.\n"}, "loc": ["xdg", "portal", "xdgOpenUsePortal"], "readOnly": false, "type": "boolean"}, "xdg.sounds.enable": {"declarations": ["nixos/modules/config/xdg/sounds.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to install files to support the\n[XDG Sound Theme specification](https://www.freedesktop.org/wiki/Specifications/sound-theme-spec/).\n"}, "loc": ["xdg", "sounds", "enable"], "readOnly": false, "type": "boolean"}, "zramSwap.algorithm": {"declarations": ["nixos/modules/config/zram.nix"], "default": {"_type": "literalExpression", "text": "\"zstd\""}, "description": {"_type": "mdDoc", "text": "Compression algorithm. `lzo` has good compression,\nbut is slow. `lz4` has bad compression, but is fast.\n`zstd` is both good compression and fast, but requires newer kernel.\nYou can check what other algorithms are supported by your zram device with\n{command}`cat /sys/class/block/zram*/comp_algorithm`\n"}, "example": {"_type": "literalExpression", "text": "\"lz4\""}, "loc": ["zramSwap", "algorithm"], "readOnly": false, "type": "one of \"lzo\", \"lz4\", \"zstd\" or string"}, "zramSwap.enable": {"declarations": ["nixos/modules/config/zram.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable in-memory compressed devices and swap space provided by the zram\nkernel module.\nSee [\n  https://www.kernel.org/doc/Documentation/blockdev/zram.txt\n](https://www.kernel.org/doc/Documentation/blockdev/zram.txt).\n"}, "loc": ["zramSwap", "enable"], "readOnly": false, "type": "boolean"}, "zramSwap.memoryMax": {"declarations": ["nixos/modules/config/zram.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Maximum total amount of memory (in bytes) that can be stored in the zram\nswap devices.\nThis doesn't define how much memory will be used by the zram swap devices.\n"}, "loc": ["zramSwap", "memoryMax"], "readOnly": false, "type": "null or signed integer"}, "zramSwap.memoryPercent": {"declarations": ["nixos/modules/config/zram.nix"], "default": {"_type": "literalExpression", "text": "50"}, "description": {"_type": "mdDoc", "text": "Maximum total amount of memory that can be stored in the zram swap devices\n(as a percentage of your total memory). Defaults to 1/2 of your total\nRAM. Run `zramctl` to check how good memory is compressed.\nThis doesn't define how much memory will be used by the zram swap devices.\n"}, "loc": ["zramSwap", "memoryPercent"], "readOnly": false, "type": "signed integer"}, "zramSwap.priority": {"declarations": ["nixos/modules/config/zram.nix"], "default": {"_type": "literalExpression", "text": "5"}, "description": {"_type": "mdDoc", "text": "Priority of the zram swap devices. It should be a number higher than\nthe priority of your disk-based swap devices (so that the system will\nfill the zram swap devices before falling back to disk swap).\n"}, "loc": ["zramSwap", "priority"], "readOnly": false, "type": "signed integer"}, "zramSwap.swapDevices": {"declarations": ["nixos/modules/config/zram.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Number of zram devices to be used as swap, recommended is 1.\n"}, "loc": ["zramSwap", "swapDevices"], "readOnly": false, "type": "signed integer"}, "zramSwap.writebackDevice": {"declarations": ["nixos/modules/config/zram.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Write incompressible pages to this device,\nas there's no gain from keeping them in RAM.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/zvol/tarta-zoot/swap-writeback\""}, "loc": ["zramSwap", "writebackDevice"], "readOnly": false, "type": "null or path"}, "environment.checkConfigurationOptions": {"declarations": ["nixos/modules/rename.nix"], "description": {"_type": "mdDoc", "text": "Alias of {option}`_module.check`."}, "loc": ["environment", "checkConfigurationOptions"], "readOnly": false, "type": "boolean"}, "i18n.inputMethod.ibus.engines": {"declarations": ["nixos/modules/i18n/input-method/ibus.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Enabled IBus engines. Available engines are: `anthy`, `bamboo`, `hangul`, `kkc`, `libpinyin`, `libthai`, `m17n`, `mozc`, `rime`, `table`, `table-chinese`, `table-others`, `typing-booster`, `typing-booster-unwrapped`, `uniemoji`."}, "example": {"_type": "literalExpression", "text": "with pkgs.ibus-engines; [ mozc hangul ]"}, "loc": ["i18n", "inputMethod", "ibus", "engines"], "readOnly": false, "type": "list of package"}, "i18n.inputMethod.ibus.panel": {"declarations": ["nixos/modules/i18n/input-method/ibus.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Replace the IBus panel with another panel."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.plasma5Packages.plasma-desktop}/lib/libexec/kimpanel-ibus-panel\""}, "loc": ["i18n", "inputMethod", "ibus", "panel"], "readOnly": false, "type": "null or path"}, "i18n.inputMethod.kime.daemonModules": {"declarations": ["nixos/modules/i18n/input-method/kime.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"Xim\"\n  \"Wayland\"\n  \"Indicator\"\n]"}, "description": {"_type": "mdDoc", "text": "List of enabled daemon modules\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"Xim\"\n  \"Indicator\"\n]"}, "loc": ["i18n", "inputMethod", "kime", "daemonModules"], "readOnly": false, "type": "list of (one of \"Xim\", \"Wayland\", \"Indicator\")"}, "i18n.inputMethod.kime.extraConfig": {"declarations": ["nixos/modules/i18n/input-method/kime.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "extra kime configuration. Refer to <https://github.com/Riey/kime/blob/v3.0.2/docs/CONFIGURATION.md> for details on supported values.\n"}, "loc": ["i18n", "inputMethod", "kime", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "i18n.inputMethod.kime.iconColor": {"declarations": ["nixos/modules/i18n/input-method/kime.nix"], "default": {"_type": "literalExpression", "text": "\"Black\""}, "description": {"_type": "mdDoc", "text": "Color of the indicator icon\n"}, "example": {"_type": "literalExpression", "text": "\"White\""}, "loc": ["i18n", "inputMethod", "kime", "iconColor"], "readOnly": false, "type": "one of \"Black\", \"White\""}, "nixpkgs.buildPlatform": {"declarations": ["nixos/modules/misc/nixpkgs.nix"], "default": {"_type": "literalExpression", "text": "config.nixpkgs.hostPlatform"}, "description": {"_type": "mdDoc", "text": "Specifies the platform on which NixOS should be built.\nBy default, NixOS is built on the system where it runs, but you can\nchange where it's built. Setting this option will cause NixOS to be\ncross-compiled.\n\nFor instance, if you're doing distributed multi-platform deployment,\nor if you're building machines, you can set this to match your\ndevelopment system and/or build farm.\n\nIgnored when `nixpkgs.pkgs` is set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  config = \"x86_64-unknown-linux-gnu\";\n  system = \"x86_64-linux\";\n}"}, "loc": ["nixpkgs", "buildPlatform"], "readOnly": false, "type": "string or (attribute set)"}, "nixpkgs.config": {"declarations": ["nixos/modules/misc/nixpkgs.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The configuration of the Nix Packages collection.  (For\ndetails, see the Nixpkgs documentation.)  It allows you to set\npackage configuration options.\n\nIgnored when `nixpkgs.pkgs` is set.\n"}, "example": {"_type": "literalExpression", "text": "{ allowBroken = true; allowUnfree = true; }\n"}, "loc": ["nixpkgs", "config"], "readOnly": false, "type": "nixpkgs config"}, "nixpkgs.crossSystem": {"declarations": ["nixos/modules/misc/nixpkgs.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Systems with a recently generated `hardware-configuration.nix`\nmay instead specify *only* {option}`nixpkgs.buildPlatform`,\nor fall back to removing the {option}`nixpkgs.hostPlatform` line from the generated config.\n\nSpecifies the platform for which NixOS should be\nbuilt. Specify this only if it is different from\n`nixpkgs.localSystem`, the platform\n*on* which NixOS should be built. In other\nwords, specify this to cross-compile NixOS. Otherwise it\nshould be set as null, the default. See its description in the\nNixpkgs manual for more details.\n\nIgnored when `nixpkgs.pkgs` or `hostPlatform` is set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  config = \"aarch64-unknown-linux-gnu\";\n  system = \"aarch64-linux\";\n}"}, "loc": ["nixpkgs", "crossSystem"], "readOnly": false, "type": "null or (attribute set)"}, "nixpkgs.hostPlatform": {"declarations": ["nixos/modules/misc/nixpkgs.nix"], "default": {"_type": "literalExpression", "text": "(import \"${nixos}/../lib\").lib.systems.examples.aarch64-multiplatform"}, "description": {"_type": "mdDoc", "text": "Specifies the platform where the NixOS configuration will run.\n\nTo cross-compile, set also `nixpkgs.buildPlatform`.\n\nIgnored when `nixpkgs.pkgs` is set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  config = \"aarch64-unknown-linux-gnu\";\n  system = \"aarch64-linux\";\n}"}, "loc": ["nixpkgs", "hostPlatform"], "readOnly": false, "type": "string or (attribute set)"}, "nixpkgs.localSystem": {"declarations": ["nixos/modules/misc/nixpkgs.nix"], "default": {"_type": "literalExpression", "text": "(import \"${nixos}/../lib\").lib.systems.examples.aarch64-multiplatform"}, "description": {"_type": "mdDoc", "text": "Systems with a recently generated `hardware-configuration.nix`\ndo not need to specify this option, unless cross-compiling, in which case\nyou should set *only* {option}`nixpkgs.buildPlatform`.\n\nIf this is somehow not feasible, you may fall back to removing the\n{option}`nixpkgs.hostPlatform` line from the generated config and\nuse the old options.\n\nSpecifies the platform on which NixOS should be built. When\n`nixpkgs.crossSystem` is unset, it also specifies\nthe platform *for* which NixOS should be\nbuilt.  If this option is unset, it defaults to the platform\ntype of the machine where evaluation happens. Specifying this\noption is useful when doing distributed multi-platform\ndeployment, or when building virtual machines. See its\ndescription in the Nixpkgs manual for more details.\n\nIgnored when `nixpkgs.pkgs` or `hostPlatform` is set.\n"}, "example": {"_type": "literalExpression", "text": "{\n  config = \"aarch64-unknown-linux-gnu\";\n  system = \"aarch64-linux\";\n}"}, "loc": ["nixpkgs", "localSystem"], "readOnly": false, "type": "attribute set"}, "nixpkgs.overlays": {"declarations": ["nixos/modules/misc/nixpkgs.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of overlays to use with the Nix Packages collection.\n(For details, see the Nixpkgs documentation.)  It allows\nyou to override packages globally. Each function in the list\ntakes as an argument the *original* Nixpkgs.\nThe first argument should be used for finding dependencies, and\nthe second should be used for overriding recipes.\n\nIf `nixpkgs.pkgs` is set, overlays specified here\nwill be applied after the overlays that were already present\nin `nixpkgs.pkgs`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  (self: super: {\n    openssh = super.openssh.override {\n      hpnSupport = true;\n      kerberos = self.libkrb5;\n    };\n  })\n]\n"}, "loc": ["nixpkgs", "overlays"], "readOnly": false, "type": "list of (nixpkgs overlay)"}, "nixpkgs.pkgs": {"declarations": ["nixos/modules/misc/nixpkgs.nix"], "default": {"_type": "literalExpression", "text": "import \"${nixos}/..\" {\n  inherit (cfg) config overlays localSystem crossSystem;\n}\n"}, "description": {"_type": "mdDoc", "text": "If set, the pkgs argument to all NixOS modules is the value of\nthis option, extended with `nixpkgs.overlays`, if\nthat is also set. Either `nixpkgs.crossSystem` or\n`nixpkgs.localSystem` will be used in an assertion\nto check that the NixOS and Nixpkgs architectures match. Any\nother options in `nixpkgs.*`, notably `config`,\nwill be ignored.\n\nIf unset, the pkgs argument to all NixOS modules is determined\nas shown in the default value for this option.\n\nThe default value imports the Nixpkgs source files\nrelative to the location of this NixOS module, because\nNixOS and Nixpkgs are distributed together for consistency,\nso the `nixos` in the default value is in fact a\nrelative path. The `config`, `overlays`,\n`localSystem`, and `crossSystem` come\nfrom this option's siblings.\n\nThis option can be used by applications like NixOps to increase\nthe performance of evaluation, or to create packages that depend\non a container that should be built with the exact same evaluation\nof Nixpkgs, for example. Applications like this should set\ntheir default value using `lib.mkDefault`, so\nuser-provided configuration can override it without using\n`lib`.\n\nNote that using a distinct version of Nixpkgs with NixOS may\nbe an unexpected source of problems. Use this option with care.\n"}, "example": {"_type": "literalExpression", "text": "import <nixpkgs> {}"}, "loc": ["nixpkgs", "pkgs"], "readOnly": false, "type": "An evaluation of Nixpkgs; the top level attribute set of packages"}, "nixpkgs.system": {"declarations": ["nixos/modules/misc/nixpkgs.nix"], "default": {"_type": "literalMD", "text": "Traditionally `builtins.currentSystem`, but unset when invoking NixOS through `lib.nixosSystem`.\n"}, "description": {"_type": "mdDoc", "text": "This option does not need to be specified for NixOS configurations\nwith a recently generated `hardware-configuration.nix`.\n\nSpecifies the Nix platform type on which NixOS should be built.\nIt is better to specify `nixpkgs.localSystem` instead.\n```\n{\n  nixpkgs.system = ..;\n}\n```\nis the same as\n```\n{\n  nixpkgs.localSystem.system = ..;\n}\n```\nSee `nixpkgs.localSystem` for more information.\n\nIgnored when `nixpkgs.pkgs`, `nixpkgs.localSystem` or `nixpkgs.hostPlatform` is set.\n"}, "example": {"_type": "literalExpression", "text": "\"i686-linux\""}, "loc": ["nixpkgs", "system"], "readOnly": false, "type": "string"}, "programs.gnupg.agent.enable": {"declarations": ["nixos/modules/programs/gnupg.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables GnuPG agent with socket-activation for every user session.\n"}, "loc": ["programs", "gnupg", "agent", "enable"], "readOnly": false, "type": "boolean"}, "programs.gnupg.agent.enableBrowserSocket": {"declarations": ["nixos/modules/programs/gnupg.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable browser socket for GnuPG agent.\n"}, "loc": ["programs", "gnupg", "agent", "enableBrowserSocket"], "readOnly": false, "type": "boolean"}, "programs.gnupg.agent.enableExtraSocket": {"declarations": ["nixos/modules/programs/gnupg.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable extra socket for GnuPG agent.\n"}, "loc": ["programs", "gnupg", "agent", "enableExtraSocket"], "readOnly": false, "type": "boolean"}, "programs.gnupg.agent.enableSSHSupport": {"declarations": ["nixos/modules/programs/gnupg.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SSH agent support in GnuPG agent. Also sets SSH_AUTH_SOCK\nenvironment variable correctly. This will disable socket-activation\nand thus always start a GnuPG agent per user session.\n"}, "loc": ["programs", "gnupg", "agent", "enableSSHSupport"], "readOnly": false, "type": "boolean"}, "programs.gnupg.agent.pinentryFlavor": {"declarations": ["nixos/modules/programs/gnupg.nix"], "default": {"_type": "literalMD", "text": "matching the configured desktop environment"}, "description": {"_type": "mdDoc", "text": "Which pinentry interface to use. If not null, the path to the\npinentry binary will be passed to gpg-agent via commandline and\nthus overrides the pinentry option in gpg-agent.conf in the user's\nhome directory.\nIf not set at all, it'll pick an appropriate flavor depending on the\nsystem configuration (qt flavor for lxqt and plasma5, gtk2 for xfce\n4.12, gnome3 on all other systems with X enabled, ncurses otherwise).\n"}, "example": {"_type": "literalExpression", "text": "\"gnome3\""}, "loc": ["programs", "gnupg", "agent", "pinentryFlavor"], "readOnly": false, "type": "null or one of \"curses\", \"tty\", \"gtk2\", \"emacs\", \"gnome3\", \"qt\""}, "programs.gnupg.dirmngr.enable": {"declarations": ["nixos/modules/programs/gnupg.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enables GnuPG network certificate management daemon with socket-activation for every user session.\n"}, "loc": ["programs", "gnupg", "dirmngr", "enable"], "readOnly": false, "type": "boolean"}, "programs.gnupg.package": {"declarations": ["nixos/modules/programs/gnupg.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gnupg"}, "description": {"_type": "mdDoc", "text": "The gpg package that should be used.\n"}, "loc": ["programs", "gnupg", "package"], "readOnly": false, "type": "package"}, "services.archisteamfarm.bots": {"declarations": ["nixos/modules/services/games/asf.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Bots name and configuration.\n"}, "example": {"_type": "literalExpression", "text": "{\n  exampleBot = {\n    passwordFile = \"/var/lib/asf/secrets/password\";\n    settings = {\n      SteamParentalCode = \"1234\";\n    };\n    username = \"alice\";\n  };\n}"}, "loc": ["services", "archisteamfarm", "bots"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.archisteamfarm.bots.<name>.enabled": {"declarations": ["nixos/modules/services/games/asf.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the bot on startup."}, "loc": ["services", "archisteamfarm", "bots", "<name>", "enabled"], "readOnly": false, "type": "boolean"}, "services.archisteamfarm.bots.<name>.passwordFile": {"declarations": ["nixos/modules/services/games/asf.nix"], "description": {"_type": "mdDoc", "text": "Path to a file containing the password. The file must be readable by the `asf` user/group."}, "loc": ["services", "archisteamfarm", "bots", "<name>", "passwordFile"], "readOnly": false, "type": "path"}, "services.archisteamfarm.bots.<name>.settings": {"declarations": ["nixos/modules/services/games/asf.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional settings that are documented [here](https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#bot-config).\n"}, "loc": ["services", "archisteamfarm", "bots", "<name>", "settings"], "readOnly": false, "type": "attribute set"}, "services.archisteamfarm.bots.<name>.username": {"declarations": ["nixos/modules/services/games/asf.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Name of the user to log in. Default is attribute name."}, "loc": ["services", "archisteamfarm", "bots", "<name>", "username"], "readOnly": false, "type": "string"}, "services.archisteamfarm.dataDir": {"declarations": ["nixos/modules/services/games/asf.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/asf\""}, "description": {"_type": "mdDoc", "text": "The ASF home directory used to store all data.\nIf left as the default value this directory will automatically be created before the ASF server starts, otherwise the sysadmin is responsible for ensuring the directory exists with appropriate ownership and permissions."}, "loc": ["services", "archisteamfarm", "dataDir"], "readOnly": false, "type": "path"}, "services.archisteamfarm.enable": {"declarations": ["nixos/modules/services/games/asf.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, starts the ArchisSteamFarm service.\nFor configuring the SteamGuard token you will need to use the web-ui, which is enabled by default over on 127.0.0.1:1242.\nYou cannot configure ASF in any way outside of nix, since all the config files get wiped on restart and replaced with the programnatically set ones by nix.\n"}, "loc": ["services", "archisteamfarm", "enable"], "readOnly": false, "type": "boolean"}, "services.archisteamfarm.ipcPasswordFile": {"declarations": ["nixos/modules/services/games/asf.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a file containing the password. The file must be readable by the `asf` user/group."}, "loc": ["services", "archisteamfarm", "ipcPasswordFile"], "readOnly": false, "type": "null or path"}, "services.archisteamfarm.ipcSettings": {"declarations": ["nixos/modules/services/games/asf.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings to write to IPC.config.\nAll options can be found [here](https://github.com/JustArchiNET/ArchiSteamFarm/wiki/IPC#custom-configuration).\n"}, "example": {"_type": "literalExpression", "text": "{\n  Kestrel = {\n    Endpoints = {\n      HTTP = {\n        Url = \"http://*:1242\";\n      };\n    };\n  };\n}"}, "loc": ["services", "archisteamfarm", "ipcSettings"], "readOnly": false, "type": "JSON value"}, "services.archisteamfarm.package": {"declarations": ["nixos/modules/services/games/asf.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ArchiSteamFarm"}, "description": {"_type": "mdDoc", "text": "Package to use. Should always be the latest version, for security reasons, since this module uses very new features and to not get out of sync with the Steam API."}, "loc": ["services", "archisteamfarm", "package"], "readOnly": false, "type": "package"}, "services.archisteamfarm.settings": {"declarations": ["nixos/modules/services/games/asf.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The ASF.json file, all the options are documented [here](https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#global-config).\nDo note that `AutoRestart`  and `UpdateChannel` is always to `false` respectively `0` because NixOS takes care of updating everything.\n`Headless` is also always set to `true` because there is no way to provide inputs via a systemd service.\nYou should try to keep ASF up to date since upstream does not provide support for anything but the latest version and you're exposing yourself to all kinds of issues - as is outlined [here](https://github.com/JustArchiNET/ArchiSteamFarm/wiki/Configuration#updateperiod).\n"}, "example": {"_type": "literalExpression", "text": "{\n  Statistics = false;\n}"}, "loc": ["services", "archisteamfarm", "settings"], "readOnly": false, "type": "JSON value"}, "services.archisteamfarm.web-ui": {"declarations": ["nixos/modules/services/games/asf.nix"], "default": {"_type": "literalExpression", "text": "{\n  enable = true;\n}"}, "description": {"_type": "mdDoc", "text": "The Web-UI hosted on 127.0.0.1:1242."}, "example": {"_type": "literalExpression", "text": "{\n  enable = false;\n}"}, "loc": ["services", "archisteamfarm", "web-ui"], "readOnly": false, "type": "submodule"}, "services.archisteamfarm.web-ui.enable": {"declarations": ["nixos/modules/services/games/asf.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to start the web-ui. This is the preferred way of configuring things such as the steam guard token."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "archisteamfarm", "web-ui", "enable"], "readOnly": false, "type": "boolean"}, "services.archisteamfarm.web-ui.package": {"declarations": ["nixos/modules/services/games/asf.nix"], "default": {"_type": "literalExpression", "text": "pkgs.ArchiSteamFarm.ui"}, "description": {"_type": "mdDoc", "text": "Web-UI package to use. Contents must be in lib/dist."}, "loc": ["services", "archisteamfarm", "web-ui", "package"], "readOnly": false, "type": "package"}, "services.dex.enable": {"declarations": ["nixos/modules/services/web-apps/dex.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the OpenID Connect and OAuth2 identity provider."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dex", "enable"], "readOnly": false, "type": "boolean"}, "services.dex.environmentFile": {"declarations": ["nixos/modules/services/web-apps/dex.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Environment file (see `systemd.exec(5)`\n\"EnvironmentFile=\" section for the syntax) to define variables for dex.\nThis option can be used to safely include secret keys into the dex configuration.\n"}, "loc": ["services", "dex", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.dex.settings": {"declarations": ["nixos/modules/services/web-apps/dex.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The available options can be found in\n[the example configuration](https://github.com/dexidp/dex/blob/v2.36.0/config.yaml.dist).\n\nIt's also possible to refer to environment variables (defined in [services.dex.environmentFile](#opt-services.dex.environmentFile))\nusing the syntax `$VARIABLE_NAME`.\n"}, "example": {"_type": "literalExpression", "text": "{\n  # External url\n  issuer = \"http://127.0.0.1:5556/dex\";\n  storage = {\n    type = \"postgres\";\n    config.host = \"/var/run/postgres\";\n  };\n  web = {\n    http = \"127.0.0.1:5556\";\n  };\n  enablePasswordDB = true;\n  staticClients = [\n    {\n      id = \"oidcclient\";\n      name = \"Client\";\n      redirectURIs = [ \"https://example.com/callback\" ];\n      secretFile = \"/etc/dex/oidcclient\"; # The content of `secretFile` will be written into to the config as `secret`.\n    }\n  ];\n}\n"}, "loc": ["services", "dex", "settings"], "readOnly": false, "type": "YAML value"}, "services.dnscrypt-proxy2.configFile": {"declarations": ["nixos/modules/services/networking/dnscrypt-proxy2.nix"], "default": {"_type": "literalMD", "text": "TOML file generated from {option}`services.dnscrypt-proxy2.settings`"}, "description": {"_type": "mdDoc", "text": "Path to TOML config file. See: <https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml>\nIf this option is set, it will override any configuration done in options.services.dnscrypt-proxy2.settings.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/dnscrypt-proxy/dnscrypt-proxy.toml\""}, "loc": ["services", "dnscrypt-proxy2", "configFile"], "readOnly": false, "type": "path"}, "services.dnscrypt-proxy2.enable": {"declarations": ["nixos/modules/services/networking/dnscrypt-proxy2.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable dnscrypt-proxy2."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "dnscrypt-proxy2", "enable"], "readOnly": false, "type": "boolean"}, "services.dnscrypt-proxy2.settings": {"declarations": ["nixos/modules/services/networking/dnscrypt-proxy2.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Attrset that is converted and passed as TOML config file.\nFor available params, see: <https://github.com/DNSCrypt/dnscrypt-proxy/blob/2.1.4/dnscrypt-proxy/example-dnscrypt-proxy.toml>\n"}, "example": {"_type": "literalExpression", "text": "{\n  sources.public-resolvers = {\n    urls = [ \"https://download.dnscrypt.info/resolvers-list/v2/public-resolvers.md\" ];\n    cache_file = \"public-resolvers.md\";\n    minisign_key = \"RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3\";\n    refresh_delay = 72;\n  };\n}\n"}, "loc": ["services", "dnscrypt-proxy2", "settings"], "readOnly": false, "type": "attribute set"}, "services.dnscrypt-proxy2.upstreamDefaults": {"declarations": ["nixos/modules/services/networking/dnscrypt-proxy2.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to base the config declared in {option}`services.dnscrypt-proxy2.settings` on the upstream example config (<https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml>)\n\nDisable this if you want to declare your dnscrypt config from scratch.\n"}, "loc": ["services", "dnscrypt-proxy2", "upstreamDefaults"], "readOnly": false, "type": "boolean"}, "services.evcc.enable": {"declarations": ["nixos/modules/services/home-automation/evcc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable EVCC, the extensible EV Charge Controller with PV integration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "evcc", "enable"], "readOnly": false, "type": "boolean"}, "services.evcc.extraArgs": {"declarations": ["nixos/modules/services/home-automation/evcc.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra arguments to pass to the evcc executable.\n"}, "loc": ["services", "evcc", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.evcc.settings": {"declarations": ["nixos/modules/services/home-automation/evcc.nix"], "description": {"_type": "mdDoc", "text": "evcc configuration as a Nix attribute set.\n\nCheck for possible options in the sample [evcc.dist.yaml](https://github.com/andig/evcc/blob/0.117.4/evcc.dist.yaml].\n"}, "loc": ["services", "evcc", "settings"], "readOnly": false, "type": "YAML value"}, "services.frigate.enable": {"declarations": ["nixos/modules/services/video/frigate.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Frigate NVR."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frigate", "enable"], "readOnly": false, "type": "boolean"}, "services.frigate.hostname": {"declarations": ["nixos/modules/services/video/frigate.nix"], "description": {"_type": "mdDoc", "text": "Hostname of the nginx vhost to configure.\n\nOnly nginx is supported by upstream for direct reverse proxying.\n"}, "example": {"_type": "literalExpression", "text": "\"frigate.exampe.com\""}, "loc": ["services", "frigate", "hostname"], "readOnly": false, "type": "string"}, "services.frigate.package": {"declarations": ["nixos/modules/services/video/frigate.nix"], "default": {"_type": "literalExpression", "text": "<derivation frigate-0.12.0>"}, "description": {"_type": "mdDoc", "text": "The frigate package to use.\n"}, "loc": ["services", "frigate", "package"], "readOnly": false, "type": "package"}, "services.frigate.settings": {"declarations": ["nixos/modules/services/video/frigate.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Frigate configuration as a nix attribute set.\n\nSee the project documentation for how to configure frigate.\n- [Creating a config file](https://docs.frigate.video/guides/getting_started)\n- [Configuration reference](https://docs.frigate.video/configuration/index)\n"}, "loc": ["services", "frigate", "settings"], "readOnly": false, "type": "YAML value"}, "services.frigate.settings.cameras": {"declarations": ["nixos/modules/services/video/frigate.nix"], "description": {"_type": "mdDoc", "text": "Attribute set of cameras configurations.\n\nhttps://docs.frigate.video/configuration/cameras\n"}, "loc": ["services", "frigate", "settings", "cameras"], "readOnly": false, "type": "attribute set of (YAML value)"}, "services.frigate.settings.cameras.<name>.ffmpeg.inputs": {"declarations": ["nixos/modules/services/video/frigate.nix"], "description": {"_type": "mdDoc", "text": "List of inputs for this camera.\n"}, "loc": ["services", "frigate", "settings", "cameras", "<name>", "ffmpeg", "inputs"], "readOnly": false, "type": "list of (YAML value)"}, "services.frigate.settings.cameras.<name>.ffmpeg.inputs.*.path": {"declarations": ["nixos/modules/services/video/frigate.nix"], "description": {"_type": "mdDoc", "text": "Stream URL\n"}, "example": {"_type": "literalExpression", "text": "\"rtsp://192.0.2.1:554/rtsp\""}, "loc": ["services", "frigate", "settings", "cameras", "<name>", "ffmpeg", "inputs", "*", "path"], "readOnly": false, "type": "string"}, "services.frigate.settings.cameras.<name>.ffmpeg.inputs.*.roles": {"declarations": ["nixos/modules/services/video/frigate.nix"], "description": {"_type": "mdDoc", "text": "List of roles for this stream\n"}, "example": {"_type": "literalExpression", "text": "[ \"detect\" \"rtmp\" ]\n"}, "loc": ["services", "frigate", "settings", "cameras", "<name>", "ffmpeg", "inputs", "*", "roles"], "readOnly": false, "type": "list of (one of \"detect\", \"record\", \"rtmp\")"}, "services.frigate.settings.database.path": {"declarations": ["nixos/modules/services/video/frigate.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/frigate/frigate.db\""}, "description": {"_type": "mdDoc", "text": "Path to the SQLite database used\n"}, "loc": ["services", "frigate", "settings", "database", "path"], "readOnly": false, "type": "path"}, "services.frigate.settings.mqtt.enabled": {"declarations": ["nixos/modules/services/video/frigate.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable MQTT support."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frigate", "settings", "mqtt", "enabled"], "readOnly": false, "type": "boolean"}, "services.frigate.settings.mqtt.host": {"declarations": ["nixos/modules/services/video/frigate.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "MQTT server hostname\n"}, "example": {"_type": "literalExpression", "text": "\"mqtt.example.com\""}, "loc": ["services", "frigate", "settings", "mqtt", "host"], "readOnly": false, "type": "null or string"}, "services.frr.babel.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "babeld configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "babel", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.babel.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR babeld.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/babeld.conf\""}, "loc": ["services", "frr", "babel", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.babel.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR BABEL routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "babel", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.babel.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "babel", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.babel.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "babel", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.babel.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "babel", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.bfd.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "bfdd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "bfd", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.bfd.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR bfdd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/bfdd.conf\""}, "loc": ["services", "frr", "bfd", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.bfd.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR BFD routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "bfd", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.bfd.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "bfd", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.bfd.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "bfd", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.bfd.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "bfd", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.bgp.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "bgpd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "''\n  router bgp 65001\n    neighbor 10.0.0.1 remote-as 65001\n''"}, "loc": ["services", "frr", "bgp", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.bgp.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR bgpd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/bgpd.conf\""}, "loc": ["services", "frr", "bgp", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.bgp.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR BGP routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "bgp", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.bgp.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "bgp", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.bgp.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "bgp", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.bgp.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "bgp", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.eigrp.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "eigrpd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "eigrp", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.eigrp.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR eigrpd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/eigrpd.conf\""}, "loc": ["services", "frr", "eigrp", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.eigrp.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR EIGRP routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "eigrp", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.eigrp.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "eigrp", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.eigrp.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "eigrp", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.eigrp.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "eigrp", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.fabric.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "fabricd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "fabric", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.fabric.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR fabricd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/fabricd.conf\""}, "loc": ["services", "frr", "fabric", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.fabric.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR FABRIC routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "fabric", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.fabric.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "fabric", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.fabric.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "fabric", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.fabric.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "fabric", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.isis.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "isisd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "isis", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.isis.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR isisd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/isisd.conf\""}, "loc": ["services", "frr", "isis", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.isis.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR ISIS routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "isis", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.isis.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "isis", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.isis.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "isis", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.isis.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "isis", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.ldp.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "ldpd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "ldp", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.ldp.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR ldpd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/ldpd.conf\""}, "loc": ["services", "frr", "ldp", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.ldp.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR LDP routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "ldp", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.ldp.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "ldp", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.ldp.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "ldp", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.ldp.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "ldp", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.nhrp.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "nhrpd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "nhrp", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.nhrp.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR nhrpd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/nhrpd.conf\""}, "loc": ["services", "frr", "nhrp", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.nhrp.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR NHRP routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "nhrp", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.nhrp.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "nhrp", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.nhrp.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "nhrp", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.nhrp.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "nhrp", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.ospf.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "ospfd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "''\n  router ospf\n    network 10.0.0.0/8 area 0\n''"}, "loc": ["services", "frr", "ospf", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.ospf.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR ospfd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/ospfd.conf\""}, "loc": ["services", "frr", "ospf", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.ospf.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR OSPF routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "ospf", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.ospf.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "ospf", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.ospf.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "ospf", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.ospf.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "ospf", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.ospf6.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "ospf6d configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "ospf6", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.ospf6.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR ospf6d.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/ospf6d.conf\""}, "loc": ["services", "frr", "ospf6", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.ospf6.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR OSPF6 routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "ospf6", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.ospf6.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "ospf6", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.ospf6.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "ospf6", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.ospf6.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "ospf6", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.pbr.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "pbrd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "pbr", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.pbr.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR pbrd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/pbrd.conf\""}, "loc": ["services", "frr", "pbr", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.pbr.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR PBR routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "pbr", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.pbr.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "pbr", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.pbr.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "pbr", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.pbr.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "pbr", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.pim.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "pimd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "pim", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.pim.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR pimd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/pimd.conf\""}, "loc": ["services", "frr", "pim", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.pim.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR PIM routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "pim", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.pim.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "pim", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.pim.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "pim", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.pim.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "pim", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.rip.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "ripd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "''\n  router rip\n    network 10.0.0.0/8\n''"}, "loc": ["services", "frr", "rip", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.rip.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR ripd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/ripd.conf\""}, "loc": ["services", "frr", "rip", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.rip.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR RIP routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "rip", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.rip.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "rip", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.rip.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "rip", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.rip.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "rip", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.ripng.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "ripngd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "ripng", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.ripng.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR ripngd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/ripngd.conf\""}, "loc": ["services", "frr", "ripng", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.ripng.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR RIPNG routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "ripng", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.ripng.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "ripng", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.ripng.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "ripng", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.ripng.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "ripng", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.sharp.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "sharpd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "sharp", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.sharp.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR sharpd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/sharpd.conf\""}, "loc": ["services", "frr", "sharp", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.sharp.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR SHARP routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "sharp", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.sharp.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "sharp", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.sharp.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "sharp", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.sharp.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "sharp", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.static.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "staticd configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "static", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.static.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR staticd.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/staticd.conf\""}, "loc": ["services", "frr", "static", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.static.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the FRR STATIC routing protocol."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "frr", "static", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.static.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "static", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.static.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "static", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.static.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "static", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.frr.zebra.config": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "zebra configuration statements.\n"}, "example": {"_type": "literalExpression", "text": "\"\""}, "loc": ["services", "frr", "zebra", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.frr.zebra.configFile": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Configuration file to use for FRR zebra.\nBy default the NixOS generated files are used.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/frr/zebra.conf\""}, "loc": ["services", "frr", "zebra", "configFile"], "readOnly": false, "type": "null or path"}, "services.frr.zebra.enable": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Zebra routing manager.\n\nThe Zebra routing manager is automatically enabled\nif any routing protocols are configured.\n"}, "loc": ["services", "frr", "zebra", "enable"], "readOnly": false, "type": "boolean"}, "services.frr.zebra.extraOptions": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra options for the daemon.\n"}, "loc": ["services", "frr", "zebra", "extraOptions"], "readOnly": false, "type": "list of string"}, "services.frr.zebra.vtyListenAddress": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "Address to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "zebra", "vtyListenAddress"], "readOnly": false, "type": "string"}, "services.frr.zebra.vtyListenPort": {"declarations": ["nixos/modules/services/networking/frr.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TCP Port to bind to for the VTY interface.\n"}, "loc": ["services", "frr", "zebra", "vtyListenPort"], "readOnly": false, "type": "null or signed integer"}, "services.gerrit.builtinPlugins": {"declarations": ["nixos/modules/services/web-apps/gerrit.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of builtins plugins to install. Those are shipped in the\n`gerrit.war` file.\n"}, "loc": ["services", "gerrit", "builtinPlugins"], "readOnly": false, "type": "list of (one of \"codemirror-editor\", \"commit-message-length-validator\", \"delete-project\", \"download-commands\", \"gitiles\", \"hooks\", \"plugin-manager\", \"replication\", \"reviewnotes\", \"singleusergroup\", \"webhooks\")"}, "services.gerrit.enable": {"declarations": ["nixos/modules/services/web-apps/gerrit.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Gerrit service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "gerrit", "enable"], "readOnly": false, "type": "boolean"}, "services.gerrit.jvmHeapLimit": {"declarations": ["nixos/modules/services/web-apps/gerrit.nix"], "default": {"_type": "literalExpression", "text": "\"1024m\""}, "description": {"_type": "mdDoc", "text": "How much memory to allocate to the JVM heap\n"}, "loc": ["services", "gerrit", "jvmHeapLimit"], "readOnly": false, "type": "string"}, "services.gerrit.jvmOpts": {"declarations": ["nixos/modules/services/web-apps/gerrit.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"-Dflogger.backend_factory=com.google.common.flogger.backend.log4j.Log4jBackendFactory#getInstance\"\n  \"-Dflogger.logging_context=com.google.gerrit.server.logging.LoggingContext#getInstance\"\n]"}, "description": {"_type": "mdDoc", "text": "A list of JVM options to start gerrit with."}, "loc": ["services", "gerrit", "jvmOpts"], "readOnly": false, "type": "list of string"}, "services.gerrit.jvmPackage": {"declarations": ["nixos/modules/services/web-apps/gerrit.nix"], "default": {"_type": "literalExpression", "text": "pkgs.jre_headless"}, "description": {"_type": "mdDoc", "text": "Java Runtime Environment package to use"}, "loc": ["services", "gerrit", "jvmPackage"], "readOnly": false, "type": "package"}, "services.gerrit.listenAddress": {"declarations": ["nixos/modules/services/web-apps/gerrit.nix"], "default": {"_type": "literalExpression", "text": "\"[::]:8080\""}, "description": {"_type": "mdDoc", "text": "`hostname:port` to listen for HTTP traffic.\n\nThis is bound using the systemd socket activation.\n"}, "loc": ["services", "gerrit", "listenAddress"], "readOnly": false, "type": "string"}, "services.gerrit.package": {"declarations": ["nixos/modules/services/web-apps/gerrit.nix"], "default": {"_type": "literalExpression", "text": "pkgs.gerrit"}, "description": {"_type": "mdDoc", "text": "Gerrit package to use"}, "loc": ["services", "gerrit", "package"], "readOnly": false, "type": "package"}, "services.gerrit.plugins": {"declarations": ["nixos/modules/services/web-apps/gerrit.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of plugins to add to Gerrit. Each derivation is a jar file\nitself where the name of the derivation is the name of plugin.\n"}, "loc": ["services", "gerrit", "plugins"], "readOnly": false, "type": "list of package"}, "services.gerrit.replicationSettings": {"declarations": ["nixos/modules/services/web-apps/gerrit.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Replication configuration. This will be generated to the\n`etc/replication.config` file.\n"}, "loc": ["services", "gerrit", "replicationSettings"], "readOnly": false, "type": "lazy attribute set of lazy attribute set of (string or boolean or signed integer or list of (string or boolean or signed integer) or lazy attribute set of (string or boolean or signed integer or list of (string or boolean or signed integer)))"}, "services.gerrit.serverId": {"declarations": ["nixos/modules/services/web-apps/gerrit.nix"], "description": {"_type": "mdDoc", "text": "Set a UUID that uniquely identifies the server.\n\nThis can be generated with\n`nix-shell -p util-linux --run uuidgen`.\n"}, "loc": ["services", "gerrit", "serverId"], "readOnly": false, "type": "string"}, "services.gerrit.settings": {"declarations": ["nixos/modules/services/web-apps/gerrit.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Gerrit configuration. This will be generated to the\n`etc/gerrit.config` file.\n"}, "loc": ["services", "gerrit", "settings"], "readOnly": false, "type": "lazy attribute set of lazy attribute set of (string or boolean or signed integer or list of (string or boolean or signed integer) or lazy attribute set of (string or boolean or signed integer or list of (string or boolean or signed integer)))"}, "services.go2rtc.enable": {"declarations": ["nixos/modules/services/video/go2rtc/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable go2rtc streaming server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "go2rtc", "enable"], "readOnly": false, "type": "boolean"}, "services.go2rtc.package": {"declarations": ["nixos/modules/services/video/go2rtc/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.go2rtc"}, "description": {"_type": "mdDoc", "text": "The go2rtc package to use."}, "loc": ["services", "go2rtc", "package"], "readOnly": false, "type": "package"}, "services.go2rtc.settings": {"declarations": ["nixos/modules/services/video/go2rtc/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "go2rtc configuration as a Nix attribute set.\n\nSee the [wiki](https://github.com/AlexxIT/go2rtc/wiki/Configuration) for possible configuration options.\n"}, "loc": ["services", "go2rtc", "settings"], "readOnly": false, "type": "YAML value"}, "services.go2rtc.settings.api.listen": {"declarations": ["nixos/modules/services/video/go2rtc/default.nix"], "default": {"_type": "literalExpression", "text": "\":1984\""}, "description": {"_type": "mdDoc", "text": "API listen address, conforming to a Go address string.\n"}, "example": {"_type": "literalExpression", "text": "\"127.0.0.1:1984\""}, "loc": ["services", "go2rtc", "settings", "api", "listen"], "readOnly": false, "type": "string"}, "services.go2rtc.settings.ffmpeg.bin": {"declarations": ["nixos/modules/services/video/go2rtc/default.nix"], "default": {"_type": "literalExpression", "text": "${lib.getBin pkgs.ffmpeg_6-headless}/bin/ffmpeg"}, "description": {"_type": "mdDoc", "text": "The ffmpeg package to use for transcoding.\n"}, "loc": ["services", "go2rtc", "settings", "ffmpeg", "bin"], "readOnly": false, "type": "path"}, "services.go2rtc.settings.streams": {"declarations": ["nixos/modules/services/video/go2rtc/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Stream source configuration. Multiple source types are supported.\n\nCheck the [configuration reference](https://github.com/AlexxIT/go2rtc/blob/v1.5.0/README.md#module-streams) for possible options.\n"}, "example": {"_type": "literalExpression", "text": "{\n  cam1 = \"onvif://admin:password@192.168.1.123:2020\";\n  cam2 = \"tcp://192.168.1.123:12345\";\n}\n"}, "loc": ["services", "go2rtc", "settings", "streams"], "readOnly": false, "type": "attribute set of (string or list of string)"}, "services.hercules-ci-agent.enable": {"declarations": ["nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable to run Hercules CI Agent as a system service.\n\n[Hercules CI](https://hercules-ci.com) is a\ncontinuous integation service that is centered around Nix.\n\nSupport is available at [help@hercules-ci.com](mailto:help@hercules-ci.com).\n"}, "loc": ["services", "hercules-ci-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.hercules-ci-agent.package": {"declarations": ["nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix"], "default": {"_type": "literalExpression", "text": "pkgs.hercules-ci-agent"}, "description": {"_type": "mdDoc", "text": "Package containing the bin/hercules-ci-agent executable.\n"}, "loc": ["services", "hercules-ci-agent", "package"], "readOnly": false, "type": "package"}, "services.hercules-ci-agent.settings": {"declarations": ["nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix"], "description": {"_type": "mdDoc", "text": "These settings are written to the `agent.toml` file.\n\nNot all settings are listed as options, can be set nonetheless.\n\nFor the exhaustive list of settings, see <https://docs.hercules-ci.com/hercules-ci/reference/agent-config/>.\n"}, "loc": ["services", "hercules-ci-agent", "settings"], "readOnly": false, "type": "TOML value"}, "services.hercules-ci-agent.settings.apiBaseUrl": {"declarations": ["nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix"], "default": {"_type": "literalExpression", "text": "\"https://hercules-ci.com\""}, "description": {"_type": "mdDoc", "text": "API base URL that the agent will connect to.\n\nWhen using Hercules CI Enterprise, set this to the URL where your\nHercules CI server is reachable.\n"}, "loc": ["services", "hercules-ci-agent", "settings", "apiBaseUrl"], "readOnly": false, "type": "string"}, "services.hercules-ci-agent.settings.baseDirectory": {"declarations": ["nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/hercules-ci-agent\""}, "description": {"_type": "mdDoc", "text": "State directory (secrets, work directory, etc) for agent\n"}, "loc": ["services", "hercules-ci-agent", "settings", "baseDirectory"], "readOnly": false, "type": "path"}, "services.hercules-ci-agent.settings.binaryCachesPath": {"declarations": ["nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix"], "default": {"_type": "literalExpression", "text": "staticSecretsDirectory + \"/binary-caches.json\""}, "description": {"_type": "mdDoc", "text": "Path to a JSON file containing binary cache secret keys.\n\nAs these values are confidential, they should not be in the store, but\ncopied over using other means, such as agenix, NixOps\n`deployment.keys`, or manual installation.\n\nThe format is described on <https://docs.hercules-ci.com/hercules-ci-agent/binary-caches-json/>.\n"}, "loc": ["services", "hercules-ci-agent", "settings", "binaryCachesPath"], "readOnly": false, "type": "path"}, "services.hercules-ci-agent.settings.clusterJoinTokenPath": {"declarations": ["nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix"], "default": {"_type": "literalExpression", "text": "staticSecretsDirectory + \"/cluster-join-token.key\""}, "description": {"_type": "mdDoc", "text": "Location of the cluster-join-token.key file.\n\nYou can retrieve the contents of the file when creating a new agent via\n<https://hercules-ci.com/dashboard>.\n\nAs this value is confidential, it should not be in the store, but\ninstalled using other means, such as agenix, NixOps\n`deployment.keys`, or manual installation.\n\nThe contents of the file are used for authentication between the agent and the API.\n"}, "loc": ["services", "hercules-ci-agent", "settings", "clusterJoinTokenPath"], "readOnly": false, "type": "path"}, "services.hercules-ci-agent.settings.concurrentTasks": {"declarations": ["nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix"], "default": {"_type": "literalMD", "text": "`\"auto\"`, meaning equal to the number of CPU cores.\n"}, "description": {"_type": "mdDoc", "text": "Number of tasks to perform simultaneously.\n\nA task is a single derivation build, an evaluation or an effect run.\nAt minimum, you need 2 concurrent tasks for `x86_64-linux`\nin your cluster, to allow for import from derivation.\n\n`concurrentTasks` can be around the CPU core count or lower if memory is\nthe bottleneck.\n\nThe optimal value depends on the resource consumption characteristics of your workload,\nincluding memory usage and in-task parallelism. This is typically determined empirically.\n\nWhen scaling, it is generally better to have a double-size machine than two machines,\nbecause each split of resources causes inefficiencies; particularly with regards\nto build latency because of extra downloads.\n"}, "loc": ["services", "hercules-ci-agent", "settings", "concurrentTasks"], "readOnly": false, "type": "positive integer, meaning >0 or value \"auto\" (singular enum)"}, "services.hercules-ci-agent.settings.labels": {"declarations": ["nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix"], "default": {"_type": "literalExpression", "text": "{\n  agent.source = \"...\"; # One of \"nixpkgs\", \"flake\", \"override\"\n  lib.version = \"...\";\n  pkgs.version = \"...\";\n}\n"}, "description": {"_type": "mdDoc", "text": "A key-value map of user data.\n\nThis data will be available to organization members in the dashboard and API.\n\nThe values can be of any TOML type that corresponds to a JSON type, but arrays\ncan not contain tables/objects due to limitations of the TOML library. Values\ninvolving arrays of non-primitive types may not be representable currently.\n"}, "loc": ["services", "hercules-ci-agent", "settings", "labels"], "readOnly": false, "type": "TOML value"}, "services.hercules-ci-agent.settings.secretsJsonPath": {"declarations": ["nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix"], "default": {"_type": "literalExpression", "text": "staticSecretsDirectory + \"/secrets.json\""}, "description": {"_type": "mdDoc", "text": "Path to a JSON file containing secrets for effects.\n\nAs these values are confidential, they should not be in the store, but\ncopied over using other means, such as agenix, NixOps\n`deployment.keys`, or manual installation.\n\nThe format is described on <https://docs.hercules-ci.com/hercules-ci-agent/secrets-json/>.\n"}, "loc": ["services", "hercules-ci-agent", "settings", "secretsJsonPath"], "readOnly": false, "type": "path"}, "services.hercules-ci-agent.settings.staticSecretsDirectory": {"declarations": ["nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix"], "default": {"_type": "literalExpression", "text": "baseDirectory + \"/secrets\""}, "description": {"_type": "mdDoc", "text": "This is the default directory to look for statically configured secrets like `cluster-join-token.key`.\n\nSee also `clusterJoinTokenPath` and `binaryCachesPath` for fine-grained configuration.\n"}, "loc": ["services", "hercules-ci-agent", "settings", "staticSecretsDirectory"], "readOnly": false, "type": "path"}, "services.hercules-ci-agent.settings.workDirectory": {"declarations": ["nixos/modules/services/continuous-integration/hercules-ci-agent/common.nix"], "default": {"_type": "literalExpression", "text": "baseDirectory + \"/work\""}, "description": {"_type": "mdDoc", "text": "The directory in which temporary subdirectories are created for task state. This includes sources for Nix evaluation.\n"}, "loc": ["services", "hercules-ci-agent", "settings", "workDirectory"], "readOnly": false, "type": "path"}, "services.home-assistant.config": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "description": {"_type": "mdDoc", "text": "Your {file}`configuration.yaml` as a Nix attribute set.\n\nYAML functions like [secrets](https://www.home-assistant.io/docs/configuration/secrets/)\ncan be passed as a string and will be unquoted automatically.\n\nUnless this option is explicitly set to `null`\nwe assume your {file}`configuration.yaml` is\nmanaged through this module and thereby overwritten on startup.\n"}, "example": {"_type": "literalExpression", "text": "{\n  homeassistant = {\n    name = \"Home\";\n    latitude = \"!secret latitude\";\n    longitude = \"!secret longitude\";\n    elevation = \"!secret elevation\";\n    unit_system = \"metric\";\n    time_zone = \"UTC\";\n  };\n  frontend = {\n    themes = \"!include_dir_merge_named themes\";\n  };\n  http = {};\n  feedreader.urls = [ \"https://nixos.org/blogs.xml\" ];\n}\n"}, "loc": ["services", "home-assistant", "config"], "readOnly": false, "type": "null or (YAML value)"}, "services.home-assistant.config.homeassistant.latitude": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Latitude of your location required to calculate the time the sun rises and sets.\n"}, "example": {"_type": "literalExpression", "text": "52.3"}, "loc": ["services", "home-assistant", "config", "homeassistant", "latitude"], "readOnly": false, "type": "null or floating point number or string"}, "services.home-assistant.config.homeassistant.longitude": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Longitude of your location required to calculate the time the sun rises and sets.\n"}, "example": {"_type": "literalExpression", "text": "4.9"}, "loc": ["services", "home-assistant", "config", "homeassistant", "longitude"], "readOnly": false, "type": "null or floating point number or string"}, "services.home-assistant.config.homeassistant.name": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of the location where Home Assistant is running.\n"}, "example": {"_type": "literalExpression", "text": "\"Home\""}, "loc": ["services", "home-assistant", "config", "homeassistant", "name"], "readOnly": false, "type": "null or string"}, "services.home-assistant.config.homeassistant.temperature_unit": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Override temperature unit set by unit_system. `C` for Celsius, `F` for Fahrenheit.\n"}, "example": {"_type": "literalExpression", "text": "\"C\""}, "loc": ["services", "home-assistant", "config", "homeassistant", "temperature_unit"], "readOnly": false, "type": "null or one of \"C\", \"F\""}, "services.home-assistant.config.homeassistant.time_zone": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "config.time.timeZone or null\n"}, "description": {"_type": "mdDoc", "text": "Pick your time zone from the column TZ of Wikipedia\u2019s [list of tz database time zones](https://en.wikipedia.org/wiki/List_of_tz_database_time_zones).\n"}, "example": {"_type": "literalExpression", "text": "\"Europe/Amsterdam\""}, "loc": ["services", "home-assistant", "config", "homeassistant", "time_zone"], "readOnly": false, "type": "null or string"}, "services.home-assistant.config.homeassistant.unit_system": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The unit system to use. This also sets temperature_unit, Celsius for Metric and Fahrenheit for Imperial.\n"}, "example": {"_type": "literalExpression", "text": "\"metric\""}, "loc": ["services", "home-assistant", "config", "homeassistant", "unit_system"], "readOnly": false, "type": "null or one of \"metric\", \"imperial\""}, "services.home-assistant.config.http.server_host": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"0.0.0.0\"\n  \"::\"\n]"}, "description": {"_type": "mdDoc", "text": "Only listen to incoming requests on specific IP/host. The default listed assumes support for IPv4 and IPv6.\n"}, "example": {"_type": "literalExpression", "text": "\"::1\""}, "loc": ["services", "home-assistant", "config", "http", "server_host"], "readOnly": false, "type": "string or list of string"}, "services.home-assistant.config.http.server_port": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "8123"}, "description": {"_type": "mdDoc", "text": "The port on which to listen.\n"}, "loc": ["services", "home-assistant", "config", "http", "server_port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.home-assistant.config.lovelace.mode": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "if cfg.lovelaceConfig != null\n  then \"yaml\"\nelse \"storage\";\n"}, "description": {"_type": "mdDoc", "text": "In what mode should the main Lovelace panel be, `yaml` or `storage` (UI managed).\n"}, "example": {"_type": "literalExpression", "text": "\"yaml\""}, "loc": ["services", "home-assistant", "config", "lovelace", "mode"], "readOnly": false, "type": "one of \"yaml\", \"storage\""}, "services.home-assistant.configDir": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/hass\""}, "description": {"_type": "mdDoc", "text": "The config directory, where your {file}`configuration.yaml` is located."}, "loc": ["services", "home-assistant", "configDir"], "readOnly": false, "type": "path"}, "services.home-assistant.configWritable": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to make {file}`configuration.yaml` writable.\n\nThis will allow you to edit it from Home Assistant's web interface.\n\nThis only has an effect if {option}`config` is set.\nHowever, bear in mind that it will be overwritten at every start of the service.\n"}, "loc": ["services", "home-assistant", "configWritable"], "readOnly": false, "type": "boolean"}, "services.home-assistant.enable": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Home Assistant. Please note that this installation method is unsupported upstream."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "home-assistant", "enable"], "readOnly": false, "type": "boolean"}, "services.home-assistant.extraComponents": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"default_config\"\n  \"met\"\n  \"esphome\"\n]"}, "description": {"_type": "mdDoc", "text": "List of [components](https://www.home-assistant.io/integrations/) that have their dependencies included in the package.\n\nThe component name can be found in the URL, for example `https://www.home-assistant.io/integrations/ffmpeg/` would map to `ffmpeg`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"analytics\"\n  \"default_config\"\n  \"esphome\"\n  \"my\"\n  \"shopping_list\"\n  \"wled\"\n]\n"}, "loc": ["services", "home-assistant", "extraComponents"], "readOnly": false, "type": "list of (one of \"3_day_blinds\", \"abode\", \"accuweather\", \"acer_projector\", \"acmeda\", \"actiontec\", \"adax\", \"adguard\", \"ads\", \"advantage_air\", \"aemet\", \"aftership\", \"agent_dvr\", \"air_quality\", \"airly\", \"airnow\", \"airq\", \"airthings\", \"airthings_ble\", \"airtouch4\", \"airvisual\", \"airvisual_pro\", \"airzone\", \"aladdin_connect\", \"alarm_control_panel\", \"alarmdecoder\", \"alert\", \"alexa\", \"alpha_vantage\", \"amazon_polly\", \"amberelectric\", \"ambiclimate\", \"ambient_station\", \"amcrest\", \"amp_motorization\", \"ampio\", \"analytics\", \"android_ip_webcam\", \"androidtv\", \"androidtv_remote\", \"anel_pwrctrl\", \"anova\", \"anthemav\", \"anwb_energie\", \"apache_kafka\", \"apcupsd\", \"api\", \"apple_tv\", \"application_credentials\", \"apprise\", \"aprs\", \"aqualogic\", \"aquostv\", \"aranet\", \"arcam_fmj\", \"arest\", \"arris_tg2492lg\", \"aruba\", \"arwn\", \"aseko_pool_live\", \"assist_pipeline\", \"asterisk_cdr\", \"asterisk_mbox\", \"asuswrt\", \"atag\", \"aten_pe\", \"atome\", \"august\", \"august_ble\", \"aurora\", \"aurora_abb_powerone\", \"aussie_broadband\", \"auth\", \"automation\", \"avea\", \"avion\", \"awair\", \"aws\", \"axis\", \"azure_devops\", \"azure_event_hub\", \"azure_service_bus\", \"backup\", \"baf\", \"baidu\", \"balboa\", \"bayesian\", \"bbox\", \"beewi_smartclim\", \"binary_sensor\", \"bitcoin\", \"bizkaibus\", \"blackbird\", \"blebox\", \"blink\", \"blinksticklight\", \"bliss_automation\", \"bloc_blinds\", \"blockchain\", \"bloomsky\", \"bluemaestro\", \"blueprint\", \"bluesound\", \"bluetooth\", \"bluetooth_adapters\", \"bluetooth_le_tracker\", \"bluetooth_tracker\", \"bmw_connected_drive\", \"bond\", \"bosch_shc\", \"brandt\", \"braviatv\", \"brel_home\", \"broadlink\", \"brother\", \"brottsplatskartan\", \"browser\", \"brunt\", \"bsblan\", \"bswitch\", \"bt_home_hub_5\", \"bt_smarthub\", \"bthome\", \"bticino\", \"bubendorff\", \"buienradar\", \"button\", \"caldav\", \"calendar\", \"camera\", \"canary\", \"cast\", \"cert_expiry\", \"channels\", \"circuit\", \"cisco_ios\", \"cisco_mobility_express\", \"cisco_webex_teams\", \"citybikes\", \"clementine\", \"clickatell\", \"clicksend\", \"clicksend_tts\", \"climate\", \"cloud\", \"cloudflare\", \"cmus\", \"co2signal\", \"coinbase\", \"color_extractor\", \"comed_hourly_pricing\", \"comfoconnect\", \"command_line\", \"compensation\", \"concord232\", \"config\", \"configurator\", \"control4\", \"conversation\", \"coolmaster\", \"counter\", \"cover\", \"cozytouch\", \"cppm_tracker\", \"cpuspeed\", \"crownstone\", \"cups\", \"currencylayer\", \"dacia\", \"daikin\", \"danfoss_air\", \"datadog\", \"ddwrt\", \"debugpy\", \"deconz\", \"decora\", \"decora_wifi\", \"default_config\", \"delijn\", \"deluge\", \"demo\", \"denon\", \"denonavr\", \"derivative\", \"device_automation\", \"device_sun_light_trigger\", \"device_tracker\", \"devolo_home_control\", \"devolo_home_network\", \"dexcom\", \"dhcp\", \"diagnostics\", \"dialogflow\", \"diaz\", \"digital_loggers\", \"digital_ocean\", \"directv\", \"discogs\", \"discord\", \"discovery\", \"dlib_face_detect\", \"dlib_face_identify\", \"dlink\", \"dlna_dmr\", \"dlna_dms\", \"dnsip\", \"dominos\", \"doods\", \"doorbird\", \"dooya\", \"dormakaba_dkey\", \"dovado\", \"downloader\", \"dsmr\", \"dsmr_reader\", \"dte_energy_bridge\", \"dublin_bus_transport\", \"duckdns\", \"dunehd\", \"dwd_weather_warnings\", \"dweet\", \"dynalite\", \"eafm\", \"easyenergy\", \"ebox\", \"ebusd\", \"ecoal_boiler\", \"ecobee\", \"econet\", \"ecovacs\", \"ecowitt\", \"eddystone_temperature\", \"edimax\", \"edl21\", \"efergy\", \"egardia\", \"eight_sleep\", \"elgato\", \"eliqonline\", \"elkm1\", \"elmax\", \"elv\", \"emby\", \"emoncms\", \"emoncms_history\", \"emonitor\", \"emulated_hue\", \"emulated_kasa\", \"emulated_roku\", \"energie_vanons\", \"energy\", \"energyzero\", \"enigma2\", \"enocean\", \"enphase_envoy\", \"entur_public_transport\", \"environment_canada\", \"envisalink\", \"ephember\", \"epson\", \"epsonworkforce\", \"eq3btsmart\", \"escea\", \"esera_onewire\", \"esphome\", \"etherscan\", \"eufy\", \"eufylife_ble\", \"everlights\", \"evil_genius_labs\", \"evohome\", \"ezviz\", \"faa_delays\", \"facebook\", \"facebox\", \"fail2ban\", \"familyhub\", \"fan\", \"fastdotcom\", \"feedreader\", \"ffmpeg\", \"ffmpeg_motion\", \"ffmpeg_noise\", \"fibaro\", \"fido\", \"file\", \"file_upload\", \"filesize\", \"filter\", \"fints\", \"fire_tv\", \"fireservicerota\", \"firmata\", \"fitbit\", \"fivem\", \"fixer\", \"fjaraskupan\", \"fleetgo\", \"flexit\", \"flexom\", \"flic\", \"flick_electric\", \"flipr\", \"flo\", \"flock\", \"flume\", \"flux\", \"flux_led\", \"folder\", \"folder_watcher\", \"foobot\", \"forecast_solar\", \"forked_daapd\", \"fortios\", \"foscam\", \"foursquare\", \"free_mobile\", \"freebox\", \"freedns\", \"freedompro\", \"fritz\", \"fritzbox\", \"fritzbox_callmonitor\", \"fronius\", \"frontend\", \"frontier_silicon\", \"fully_kiosk\", \"futurenow\", \"garadget\", \"garages_amsterdam\", \"gaviota\", \"gc100\", \"gdacs\", \"generic\", \"generic_hygrostat\", \"generic_thermostat\", \"geniushub\", \"geo_json_events\", \"geo_location\", \"geo_rss_events\", \"geocaching\", \"geofency\", \"geonetnz_quakes\", \"geonetnz_volcano\", \"gios\", \"github\", \"gitlab_ci\", \"gitter\", \"glances\", \"goalfeed\", \"goalzero\", \"gogogate2\", \"goodwe\", \"google\", \"google_assistant\", \"google_assistant_sdk\", \"google_cloud\", \"google_domains\", \"google_mail\", \"google_maps\", \"google_pubsub\", \"google_sheets\", \"google_translate\", \"google_travel_time\", \"google_wifi\", \"govee_ble\", \"gpsd\", \"gpslogger\", \"graphite\", \"gree\", \"greeneye_monitor\", \"greenwave\", \"group\", \"growatt_server\", \"gstreamer\", \"gtfs\", \"guardian\", \"habitica\", \"hardkernel\", \"hardware\", \"harman_kardon_avr\", \"harmony\", \"hassio\", \"havana_shade\", \"haveibeenpwned\", \"hddtemp\", \"hdmi_cec\", \"heatmiser\", \"heiwa\", \"heos\", \"here_travel_time\", \"hexaom\", \"hi_kumo\", \"hikvision\", \"hikvisioncam\", \"hisense_aehw4a1\", \"history\", \"history_stats\", \"hitron_coda\", \"hive\", \"hlk_sw16\", \"home_connect\", \"home_plus_control\", \"homeassistant\", \"homeassistant_alerts\", \"homeassistant_hardware\", \"homeassistant_sky_connect\", \"homeassistant_yellow\", \"homekit\", \"homekit_controller\", \"homematic\", \"homematicip_cloud\", \"homewizard\", \"homeworks\", \"honeywell\", \"horizon\", \"hp_ilo\", \"html5\", \"http\", \"huawei_lte\", \"hue\", \"huisbaasje\", \"humidifier\", \"hunterdouglas_powerview\", \"hurrican_shutters_wholesale\", \"hvv_departures\", \"hydrawise\", \"hyperion\", \"ialarm\", \"iammeter\", \"iaqualink\", \"ibeacon\", \"icloud\", \"idteck_prox\", \"ifttt\", \"iglo\", \"ign_sismologia\", \"ihc\", \"image_processing\", \"image_upload\", \"imap\", \"imap_email_content\", \"incomfort\", \"influxdb\", \"inkbird\", \"input_boolean\", \"input_button\", \"input_datetime\", \"input_number\", \"input_select\", \"input_text\", \"inspired_shades\", \"insteon\", \"integration\", \"intellifire\", \"intent\", \"intent_script\", \"intesishome\", \"ios\", \"iotawatt\", \"iperf3\", \"ipma\", \"ipp\", \"iqvia\", \"irish_rail_transport\", \"islamic_prayer_times\", \"ismartwindow\", \"iss\", \"isy994\", \"itach\", \"itunes\", \"izone\", \"jellyfin\", \"jewish_calendar\", \"joaoapps_join\", \"juicenet\", \"justnimbus\", \"kaiterra\", \"kaleidescape\", \"kankun\", \"keba\", \"keenetic_ndms2\", \"kef\", \"kegtron\", \"keyboard\", \"keyboard_remote\", \"keymitt_ble\", \"kira\", \"kitchen_sink\", \"kiwi\", \"kmtronic\", \"knx\", \"kodi\", \"konnected\", \"kostal_plenticore\", \"kraken\", \"kulersky\", \"kwb\", \"lacrosse\", \"lacrosse_view\", \"lametric\", \"landisgyr_heat_meter\", \"lannouncer\", \"lastfm\", \"launch_library\", \"laundrify\", \"lcn\", \"ld2410_ble\", \"led_ble\", \"legrand\", \"lg_netcast\", \"lg_soundbar\", \"lidarr\", \"life360\", \"lifx\", \"lifx_cloud\", \"light\", \"lightwave\", \"limitlessled\", \"linksys_smart\", \"linode\", \"linux_battery\", \"lirc\", \"litejet\", \"litterrobot\", \"livisi\", \"llamalab_automate\", \"local_calendar\", \"local_file\", \"local_ip\", \"locative\", \"lock\", \"logbook\", \"logentries\", \"logger\", \"logi_circle\", \"london_air\", \"london_underground\", \"lookin\", \"lovelace\", \"luci\", \"luftdaten\", \"lupusec\", \"lutron\", \"lutron_caseta\", \"luxaflex\", \"lw12wifi\", \"lyric\", \"mailbox\", \"mailgun\", \"manual\", \"manual_mqtt\", \"map\", \"marantz\", \"martec\", \"marytts\", \"mastodon\", \"matrix\", \"matter\", \"maxcube\", \"mazda\", \"meater\", \"media_extractor\", \"media_player\", \"media_source\", \"mediaroom\", \"melcloud\", \"melissa\", \"melnor\", \"meraki\", \"message_bird\", \"met\", \"met_eireann\", \"meteo_france\", \"meteoalarm\", \"meteoclimatic\", \"metoffice\", \"mfi\", \"microsoft\", \"microsoft_face\", \"microsoft_face_detect\", \"microsoft_face_identify\", \"miflora\", \"mijndomein_energie\", \"mikrotik\", \"mill\", \"min_max\", \"minecraft_server\", \"minio\", \"mitemp_bt\", \"mjpeg\", \"moat\", \"mobile_app\", \"mochad\", \"modbus\", \"modem_callerid\", \"modern_forms\", \"moehlenhoff_alpha2\", \"mold_indicator\", \"monessen\", \"monoprice\", \"moon\", \"mopeka\", \"motion_blinds\", \"motioneye\", \"mpd\", \"mqtt\", \"mqtt_eventstream\", \"mqtt_json\", \"mqtt_room\", \"mqtt_statestream\", \"msteams\", \"mullvad\", \"mutesync\", \"mvglive\", \"my\", \"mycroft\", \"myq\", \"mysensors\", \"mystrom\", \"mythicbeastsdns\", \"nad\", \"nam\", \"namecheapdns\", \"nanoleaf\", \"neato\", \"nederlandse_spoorwegen\", \"ness_alarm\", \"nest\", \"netatmo\", \"netdata\", \"netgear\", \"netgear_lte\", \"netio\", \"network\", \"neurio_energy\", \"nexia\", \"nexity\", \"nextbus\", \"nextcloud\", \"nextdns\", \"nfandroidtv\", \"nibe_heatpump\", \"nightscout\", \"niko_home_control\", \"nilu\", \"nina\", \"nissan_leaf\", \"nmap_tracker\", \"nmbs\", \"no_ip\", \"noaa_tides\", \"nobo_hub\", \"norway_air\", \"notify\", \"notify_events\", \"notion\", \"nsw_fuel_station\", \"nsw_rural_fire_service_feed\", \"nuheat\", \"nuki\", \"numato\", \"number\", \"nut\", \"nutrichef\", \"nws\", \"nx584\", \"nzbget\", \"oasa_telematics\", \"obihai\", \"octoprint\", \"oem\", \"ohmconnect\", \"ombi\", \"omnilogic\", \"onboarding\", \"oncue\", \"ondilo_ico\", \"onewire\", \"onkyo\", \"onvif\", \"open_meteo\", \"openai_conversation\", \"openalpr_cloud\", \"opencv\", \"openerz\", \"openevse\", \"openexchangerates\", \"opengarage\", \"openhardwaremonitor\", \"openhome\", \"opensensemap\", \"opensky\", \"opentherm_gw\", \"openuv\", \"openweathermap\", \"opnsense\", \"opple\", \"oralb\", \"oru\", \"orvibo\", \"osramlightify\", \"otbr\", \"otp\", \"overkiz\", \"ovo_energy\", \"owntracks\", \"p1_monitor\", \"panasonic_bluray\", \"panasonic_viera\", \"pandora\", \"panel_custom\", \"panel_iframe\", \"pcs_lighting\", \"peco\", \"pencom\", \"persistent_notification\", \"person\", \"philips_js\", \"pi_hole\", \"picnic\", \"picotts\", \"pilight\", \"ping\", \"pioneer\", \"pjlink\", \"plaato\", \"plant\", \"plex\", \"plugwise\", \"plum_lightpad\", \"pocketcasts\", \"point\", \"poolsense\", \"powerwall\", \"profiler\", \"progettihwsw\", \"proliphix\", \"prometheus\", \"prosegur\", \"prowl\", \"proximity\", \"proxmoxve\", \"proxy\", \"prusalink\", \"ps4\", \"pulseaudio_loopback\", \"pure_energie\", \"purpleair\", \"push\", \"pushbullet\", \"pushover\", \"pushsafer\", \"pvoutput\", \"pvpc_hourly_pricing\", \"pyload\", \"python_script\", \"qbittorrent\", \"qingping\", \"qld_bushfire\", \"qnap\", \"qnap_qsw\", \"qrcode\", \"quadrafire\", \"quantum_gateway\", \"qvr_pro\", \"qwikswitch\", \"rachio\", \"radarr\", \"radio_browser\", \"radiotherm\", \"rainbird\", \"raincloud\", \"rainforest_eagle\", \"rainmachine\", \"random\", \"rapt_ble\", \"raspberry_pi\", \"raspyrfm\", \"raven_rock_mfg\", \"rdw\", \"recollect_waste\", \"recorder\", \"recswitch\", \"reddit\", \"rejseplanen\", \"remember_the_milk\", \"remote\", \"remote_rpi_gpio\", \"renault\", \"reolink\", \"repairs\", \"repetier\", \"rest\", \"rest_command\", \"rexel\", \"rflink\", \"rfxtrx\", \"rhasspy\", \"ridwell\", \"ring\", \"ripple\", \"risco\", \"rituals_perfume_genie\", \"rmvtransport\", \"roborock\", \"rocketchat\", \"roku\", \"roomba\", \"roon\", \"route53\", \"rova\", \"rpi_camera\", \"rpi_power\", \"rss_feed_template\", \"rtorrent\", \"rtsp_to_webrtc\", \"ruckus_unleashed\", \"russound_rio\", \"russound_rnet\", \"ruuvi_gateway\", \"ruuvitag_ble\", \"rympro\", \"sabnzbd\", \"safe_mode\", \"saj\", \"samsungtv\", \"satel_integra\", \"scene\", \"schedule\", \"schluter\", \"scrape\", \"screenaway\", \"screenlogic\", \"script\", \"scsgate\", \"search\", \"season\", \"select\", \"sendgrid\", \"sense\", \"senseme\", \"sensibo\", \"sensirion_ble\", \"sensor\", \"sensorblue\", \"sensorpro\", \"sensorpush\", \"sentry\", \"senz\", \"serial\", \"serial_pm\", \"sesame\", \"seven_segments\", \"seventeentrack\", \"sfr_box\", \"sharkiq\", \"shell_command\", \"shelly\", \"shiftr\", \"shodan\", \"shopping_list\", \"sia\", \"sigfox\", \"sighthound\", \"signal_messenger\", \"simplepush\", \"simplisafe\", \"simply_automated\", \"simu\", \"simulated\", \"sinch\", \"siren\", \"sisyphus\", \"sky_hub\", \"skybeacon\", \"skybell\", \"slack\", \"sleepiq\", \"slide\", \"slimproto\", \"sma\", \"smappee\", \"smart_blinds\", \"smart_home\", \"smart_meter_texas\", \"smarther\", \"smartthings\", \"smarttub\", \"smarty\", \"smhi\", \"sms\", \"smtp\", \"snapcast\", \"snips\", \"snmp\", \"snooz\", \"solaredge\", \"solaredge_local\", \"solarlog\", \"solax\", \"soma\", \"somfy\", \"somfy_mylink\", \"sonarr\", \"songpal\", \"sonos\", \"sony_projector\", \"soundtouch\", \"spaceapi\", \"spc\", \"speedtestdotnet\", \"spider\", \"splunk\", \"spotify\", \"sql\", \"squeezebox\", \"srp_energy\", \"ssdp\", \"starline\", \"starlingbank\", \"starlink\", \"startca\", \"statistics\", \"statsd\", \"steam_online\", \"steamist\", \"stiebel_eltron\", \"stookalert\", \"stookwijzer\", \"stream\", \"streamlabswater\", \"stt\", \"subaru\", \"suez_water\", \"sun\", \"supervisord\", \"supla\", \"surepetcare\", \"swiss_hydrological_data\", \"swiss_public_transport\", \"swisscom\", \"switch\", \"switch_as_x\", \"switchbee\", \"switchbot\", \"switcher_kis\", \"switchmate\", \"symfonisk\", \"syncthing\", \"syncthru\", \"synology_chat\", \"synology_dsm\", \"synology_srm\", \"syslog\", \"system_bridge\", \"system_health\", \"system_log\", \"systemmonitor\", \"tado\", \"tag\", \"tailscale\", \"tank_utility\", \"tankerkoenig\", \"tapsaff\", \"tasmota\", \"tautulli\", \"tcp\", \"ted5000\", \"telegram\", \"telegram_bot\", \"tellduslive\", \"tellstick\", \"telnet\", \"temper\", \"template\", \"tensorflow\", \"tesla_wall_connector\", \"text\", \"tfiac\", \"thermobeacon\", \"thermoplus\", \"thermopro\", \"thermoworks_smoke\", \"thethingsnetwork\", \"thingspeak\", \"thinkingcleaner\", \"thomson\", \"thread\", \"threshold\", \"tibber\", \"tikteck\", \"tile\", \"tilt_ble\", \"time_date\", \"timer\", \"tmb\", \"tod\", \"todoist\", \"tolo\", \"tomato\", \"tomorrowio\", \"toon\", \"torque\", \"totalconnect\", \"touchline\", \"tplink\", \"tplink_lte\", \"tplink_omada\", \"traccar\", \"trace\", \"tractive\", \"tradfri\", \"trafikverket_ferry\", \"trafikverket_train\", \"trafikverket_weatherstation\", \"transmission\", \"transport_nsw\", \"travisci\", \"trend\", \"tts\", \"tuya\", \"twentemilieu\", \"twilio\", \"twilio_call\", \"twilio_sms\", \"twinkly\", \"twitch\", \"twitter\", \"ubiwizz\", \"ubus\", \"ue_smart_radio\", \"uk_transport\", \"ukraine_alarm\", \"ultraloq\", \"unifi\", \"unifi_direct\", \"unifiled\", \"unifiprotect\", \"universal\", \"upb\", \"upc_connect\", \"upcloud\", \"update\", \"upnp\", \"uprise_smart_shades\", \"uptime\", \"uptimerobot\", \"usb\", \"usgs_earthquakes_feed\", \"utility_meter\", \"uvc\", \"vacuum\", \"vallox\", \"vasttrafik\", \"velbus\", \"velux\", \"venstar\", \"vera\", \"verisure\", \"vermont_castings\", \"versasense\", \"version\", \"vesync\", \"viaggiatreno\", \"vicare\", \"vilfo\", \"vivotek\", \"vizio\", \"vlc\", \"vlc_telnet\", \"voicerss\", \"voip\", \"volkszaehler\", \"volumio\", \"volvooncall\", \"vulcan\", \"vultr\", \"w800rf32\", \"wake_on_lan\", \"wallbox\", \"waqi\", \"water_heater\", \"waterfurnace\", \"watson_iot\", \"watson_tts\", \"watttime\", \"waze_travel_time\", \"weather\", \"webhook\", \"webostv\", \"websocket_api\", \"wemo\", \"whirlpool\", \"whois\", \"wiffi\", \"wilight\", \"wirelesstag\", \"withings\", \"wiz\", \"wled\", \"wolflink\", \"workday\", \"worldclock\", \"worldtidesinfo\", \"worxlandroid\", \"ws66i\", \"wsdot\", \"wyoming\", \"x10\", \"xbox\", \"xeoma\", \"xiaomi\", \"xiaomi_aqara\", \"xiaomi_ble\", \"xiaomi_miio\", \"xiaomi_tv\", \"xmpp\", \"xs1\", \"yale_smart_alarm\", \"yalexs_ble\", \"yamaha\", \"yamaha_musiccast\", \"yandex_transport\", \"yandextts\", \"yeelight\", \"yeelightsunflower\", \"yi\", \"yolink\", \"youless\", \"zabbix\", \"zamg\", \"zengge\", \"zeroconf\", \"zerproc\", \"zestimate\", \"zeversolar\", \"zha\", \"zhong_hong\", \"ziggo_mediabox_xl\", \"zodiac\", \"zone\", \"zoneminder\", \"zwave_js\", \"zwave_me\")"}, "services.home-assistant.extraPackages": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "python3Packages: with python3Packages; [];\n"}, "description": {"_type": "mdDoc", "text": "List of packages to add to propagatedBuildInputs.\n\nA popular example is `python3Packages.psycopg2`\nfor PostgreSQL support in the recorder component.\n"}, "example": {"_type": "literalExpression", "text": "python3Packages: with python3Packages; [\n  # postgresql support\n  psycopg2\n];\n"}, "loc": ["services", "home-assistant", "extraPackages"], "readOnly": false, "type": "function that evaluates to a(n) list of package"}, "services.home-assistant.lovelaceConfig": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Your {file}`ui-lovelace.yaml` as a Nix attribute set.\nSetting this option will automatically set `lovelace.mode` to `yaml`.\n\nBeware that setting this option will delete your previous {file}`ui-lovelace.yaml`\n"}, "example": {"_type": "literalExpression", "text": "{\n  title = \"My Awesome Home\";\n  views = [ {\n    title = \"Example\";\n    cards = [ {\n      type = \"markdown\";\n      title = \"Lovelace\";\n      content = \"Welcome to your **Lovelace UI**.\";\n    } ];\n  } ];\n}\n"}, "loc": ["services", "home-assistant", "lovelaceConfig"], "readOnly": false, "type": "null or YAML value"}, "services.home-assistant.lovelaceConfigWritable": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to make {file}`ui-lovelace.yaml` writable.\n\nThis will allow you to edit it from Home Assistant's web interface.\n\nThis only has an effect if {option}`lovelaceConfig` is set.\nHowever, bear in mind that it will be overwritten at every start of the service.\n"}, "loc": ["services", "home-assistant", "lovelaceConfigWritable"], "readOnly": false, "type": "boolean"}, "services.home-assistant.openFirewall": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to open the firewall for the specified port."}, "loc": ["services", "home-assistant", "openFirewall"], "readOnly": false, "type": "boolean"}, "services.home-assistant.package": {"declarations": ["nixos/modules/services/home-automation/home-assistant.nix"], "default": {"_type": "literalExpression", "text": "pkgs.home-assistant.overrideAttrs (oldAttrs: {\n  doInstallCheck = false;\n})\n"}, "description": {"_type": "mdDoc", "text": "The Home Assistant package to use.\n"}, "example": {"_type": "literalExpression", "text": "pkgs.home-assistant.override {\n  extraPackages = python3Packages: with python3Packages; [\n    psycopg2\n  ];\n  extraComponents = [\n    \"default_config\"\n    \"esphome\"\n    \"met\"\n  ];\n}\n"}, "loc": ["services", "home-assistant", "package"], "readOnly": false, "type": "package"}, "services.hylafax.areaCode": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Area code for server and all modems."}, "example": {"_type": "literalExpression", "text": "\"30\""}, "loc": ["services", "hylafax", "areaCode"], "readOnly": false, "type": "null or non-empty string"}, "services.hylafax.autostart": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Autostart the HylaFAX queue manager at system start.\nIf this is `false`, the queue manager\nwill still be started if there are pending\njobs or if a user tries to connect to it.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "hylafax", "autostart"], "readOnly": false, "type": "boolean"}, "services.hylafax.commonModemConfig": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "description": {"_type": "mdDoc", "text": "Attribute set of default values for\nmodem config files {file}`etc/config.*`.\nValues can be either strings or integers\n(which will be added to the config file verbatimly)\nor lists thereof\n(which will be translated to multiple\nlines with the same configuration key).\nBoolean values are translated to \"Yes\" or \"No\".\nThe default contains some reasonable\nconfiguration to yield an operational system.\n\nThink twice before changing\npaths of fax-processing scripts.\n"}, "example": {"_type": "literalExpression", "text": "{\n  InternationalPrefix = \"00\";\n  LongDistancePrefix = \"0\";\n}"}, "loc": ["services", "hylafax", "commonModemConfig"], "readOnly": false, "type": "attribute set of ((list of ((string or signed integer convertible to it) or boolean convertible to it)) or ((string or signed integer convertible to it) or boolean convertible to it) convertible to it)"}, "services.hylafax.countryCode": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Country code for server and all modems."}, "example": {"_type": "literalExpression", "text": "\"49\""}, "loc": ["services", "hylafax", "countryCode"], "readOnly": false, "type": "null or non-empty string"}, "services.hylafax.enable": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HylaFAX server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hylafax", "enable"], "readOnly": false, "type": "boolean"}, "services.hylafax.faxcron.enable.frequency": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Purge old files from the spooling area with\n{file}`faxcron` with the given frequency\n(see systemd.time(7)).\n"}, "example": {"_type": "literalExpression", "text": "\"daily\""}, "loc": ["services", "hylafax", "faxcron", "enable", "frequency"], "readOnly": false, "type": "null or non-empty string"}, "services.hylafax.faxcron.enable.spoolInit": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Purge old files from the spooling area with\n{file}`faxcron`\neach time the spooling area is initialized.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hylafax", "faxcron", "enable", "spoolInit"], "readOnly": false, "type": "boolean"}, "services.hylafax.faxcron.infoDays": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "Set the expiration time for data in the\nremote machine information directory in days.\n"}, "loc": ["services", "hylafax", "faxcron", "infoDays"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.hylafax.faxcron.logDays": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "30"}, "description": {"_type": "mdDoc", "text": "Set the expiration time for\nsession trace log files in days.\n"}, "loc": ["services", "hylafax", "faxcron", "logDays"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.hylafax.faxcron.rcvDays": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "7"}, "description": {"_type": "mdDoc", "text": "Set the expiration time for files in\nthe received facsimile queue in days.\n"}, "loc": ["services", "hylafax", "faxcron", "rcvDays"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.hylafax.faxqConfig": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "description": {"_type": "mdDoc", "text": "Attribute set of lines for the global\nfaxq config file {file}`etc/config`.\nValues can be either strings or integers\n(which will be added to the config file verbatimly)\nor lists thereof\n(which will be translated to multiple\nlines with the same configuration key).\nBoolean values are translated to \"Yes\" or \"No\".\nThe default contains some reasonable\nconfiguration to yield an operational system.\n\n"}, "example": {"_type": "literalExpression", "text": "{\n  InternationalPrefix = \"00\";\n  LongDistancePrefix = \"0\";\n}"}, "loc": ["services", "hylafax", "faxqConfig"], "readOnly": false, "type": "attribute set of ((list of ((string or signed integer convertible to it) or boolean convertible to it)) or ((string or signed integer convertible to it) or boolean convertible to it) convertible to it)"}, "services.hylafax.faxqclean.archiving": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "\"as-flagged\""}, "description": {"_type": "mdDoc", "text": "Enable or suppress job archiving:\n`never` disables job archiving,\n`as-flagged` archives jobs that\nhave been flagged for archiving by sendfax,\n`always` forces archiving of all jobs.\nSee also sendfax(1) and faxqclean(8).\n"}, "example": {"_type": "literalExpression", "text": "\"always\""}, "loc": ["services", "hylafax", "faxqclean", "archiving"], "readOnly": false, "type": "one of \"never\", \"as-flagged\", \"always\""}, "services.hylafax.faxqclean.docqMinutes": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "60"}, "description": {"_type": "mdDoc", "text": "Set the document\nage threshold (in minutes) that controls how long\nunreferenced files may reside in the docq directory.\n"}, "example": {"_type": "literalExpression", "text": "24*60"}, "loc": ["services", "hylafax", "faxqclean", "docqMinutes"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.hylafax.faxqclean.doneqMinutes": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "15"}, "description": {"_type": "mdDoc", "text": "Set the job\nage threshold (in minutes) that controls how long\njobs may reside in the doneq directory.\n"}, "example": {"_type": "literalExpression", "text": "24*60"}, "loc": ["services", "hylafax", "faxqclean", "doneqMinutes"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.hylafax.faxqclean.enable.frequency": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Purge old files from the spooling area with\n{file}`faxcron` with the given frequency\n(see systemd.time(7)).\n"}, "example": {"_type": "literalExpression", "text": "\"daily\""}, "loc": ["services", "hylafax", "faxqclean", "enable", "frequency"], "readOnly": false, "type": "null or non-empty string"}, "services.hylafax.faxqclean.enable.spoolInit": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Purge old files from the spooling area with\n{file}`faxqclean`\neach time the spooling area is initialized.\n."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "hylafax", "faxqclean", "enable", "spoolInit"], "readOnly": false, "type": "boolean"}, "services.hylafax.hfaxdConfig": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "description": {"_type": "mdDoc", "text": "Attribute set of lines for the global\nhfaxd config file {file}`etc/hfaxd.conf`.\nValues can be either strings or integers\n(which will be added to the config file verbatimly)\nor lists thereof\n(which will be translated to multiple\nlines with the same configuration key).\nBoolean values are translated to \"Yes\" or \"No\".\nThe default contains some reasonable\nconfiguration to yield an operational system.\n\n"}, "example": {"_type": "literalExpression", "text": "{\n  RecvqProtection = \"0400\";\n}"}, "loc": ["services", "hylafax", "hfaxdConfig"], "readOnly": false, "type": "attribute set of ((list of ((string or signed integer convertible to it) or boolean convertible to it)) or ((string or signed integer convertible to it) or boolean convertible to it) convertible to it)"}, "services.hylafax.internationalPrefix": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "International prefix for server and all modems."}, "example": {"_type": "literalExpression", "text": "\"00\""}, "loc": ["services", "hylafax", "internationalPrefix"], "readOnly": false, "type": "null or string"}, "services.hylafax.longDistancePrefix": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Long distance prefix for server and all modems."}, "example": {"_type": "literalExpression", "text": "\"0\""}, "loc": ["services", "hylafax", "longDistancePrefix"], "readOnly": false, "type": "null or string"}, "services.hylafax.modems": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Description of installed modems.\nAt least on modem must be defined\nto enable the HylaFAX server.\n"}, "example": {"_type": "literalExpression", "text": "{\n  ttyS1 = {\n    config = {\n      FAXNumber = \"123456\";\n      LocalIdentifier = \"Smith\";\n    };\n    type = \"cirrus\";\n  };\n}"}, "loc": ["services", "hylafax", "modems"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.hylafax.modems.<name>.config": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "description": {"_type": "mdDoc", "text": "Attribute set of values for the given modem.\nValues can be either strings or integers\n(which will be added to the config file verbatimly)\nor lists thereof\n(which will be translated to multiple\nlines with the same configuration key).\nBoolean values are translated to \"Yes\" or \"No\".\nThe default contains some reasonable\nconfiguration to yield an operational system.\n\nOptions defined here override options in\n{option}`commonModemConfig` for this modem.\n"}, "example": {"_type": "literalExpression", "text": "{\n  AreaCode = \"49\";\n  FAXNumber = \"123456\";\n  LocalCode = \"30\";\n  LocalIdentifier = \"LostInBerlin\";\n}"}, "loc": ["services", "hylafax", "modems", "<name>", "config"], "readOnly": false, "type": "attribute set of ((list of ((string or signed integer convertible to it) or boolean convertible to it)) or ((string or signed integer convertible to it) or boolean convertible to it) convertible to it)"}, "services.hylafax.modems.<name>.name": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "description": {"_type": "mdDoc", "text": "Name of modem device,\nwill be searched for in {file}`/dev`.\n"}, "example": {"_type": "literalExpression", "text": "\"ttyS1\""}, "loc": ["services", "hylafax", "modems", "<name>", "name"], "readOnly": false, "type": "non-empty string"}, "services.hylafax.modems.<name>.type": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "description": {"_type": "mdDoc", "text": "Name of modem configuration file,\nwill be searched for in {file}`config`\nin the spooling area directory.\n"}, "example": {"_type": "literalExpression", "text": "\"cirrus\""}, "loc": ["services", "hylafax", "modems", "<name>", "type"], "readOnly": false, "type": "non-empty string"}, "services.hylafax.sendmailPath": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "description": {"_type": "mdDoc", "text": "Path to {file}`sendmail` program.\nThe default uses the local sendmail wrapper\n(see {option}`config.services.mail.sendmailSetuidWrapper`),\notherwise the {file}`false`\nbinary to cause an error if used.\n"}, "example": {"_type": "literalExpression", "text": "\"${pkgs.postfix}/bin/sendmail\""}, "loc": ["services", "hylafax", "sendmailPath"], "readOnly": false, "type": "path"}, "services.hylafax.spoolAreaPath": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "\"/var/spool/fax\""}, "description": {"_type": "mdDoc", "text": "The spooling area will be created/maintained\nat the location given here.\n"}, "loc": ["services", "hylafax", "spoolAreaPath"], "readOnly": false, "type": "path"}, "services.hylafax.spoolExtraInit": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional shell code that is executed within the\nspooling area directory right after its setup.\n"}, "example": {"_type": "literalExpression", "text": "\"chmod 0755 .  # everyone may read my faxes\""}, "loc": ["services", "hylafax", "spoolExtraInit"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.hylafax.userAccessFile": {"declarations": ["nixos/modules/services/networking/hylafax/options.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/hosts.hfaxd\""}, "description": {"_type": "mdDoc", "text": "The {file}`hosts.hfaxd`\nfile entry in the spooling area\nwill be symlinked to the location given here.\nThis file must exist and be\nreadable only by the `uucp` user.\nSee hosts.hfaxd(5) for details.\nThis configuration permits access for all users:\n```\n  environment.etc.\"hosts.hfaxd\" = {\n    mode = \"0600\";\n    user = \"uucp\";\n    text = \".*\";\n  };\n```\nNote that host-based access can be controlled with\n{option}`config.systemd.sockets.hylafax-hfaxd.listenStreams`;\nby default, only 127.0.0.1 is permitted to connect.\n"}, "loc": ["services", "hylafax", "userAccessFile"], "readOnly": false, "type": "path"}, "services.jirafeau.adminPasswordSha256": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "SHA-256 of the desired administration password. Leave blank/unset for no password.\n"}, "loc": ["services", "jirafeau", "adminPasswordSha256"], "readOnly": false, "type": "string"}, "services.jirafeau.dataDir": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/jirafeau/data/\""}, "description": {"_type": "mdDoc", "text": "Location of Jirafeau storage directory."}, "loc": ["services", "jirafeau", "dataDir"], "readOnly": false, "type": "path"}, "services.jirafeau.enable": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Jirafeau file upload application."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jirafeau", "enable"], "readOnly": false, "type": "boolean"}, "services.jirafeau.extraConfig": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Jirefeau configuration. Refer to <https://gitlab.com/mojo42/Jirafeau/-/blob/4.4.0/lib/config.original.php> for supported\nvalues.\n"}, "example": {"_type": "literalExpression", "text": "''\n  $cfg['style'] = 'courgette';\n  $cfg['organisation'] = 'ACME';\n''"}, "loc": ["services", "jirafeau", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.jirafeau.hostName": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "\"localhost\""}, "description": {"_type": "mdDoc", "text": "URL of instance. Must have trailing slash."}, "loc": ["services", "jirafeau", "hostName"], "readOnly": false, "type": "string"}, "services.jirafeau.maxUploadSizeMegabytes": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Maximum upload size of accepted files."}, "loc": ["services", "jirafeau", "maxUploadSizeMegabytes"], "readOnly": false, "type": "signed integer"}, "services.jirafeau.maxUploadTimeout": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "\"30m\""}, "description": {"_type": "mdDoc", "text": "Timeout for reading client request bodies and headers. Refer to\n<http://nginx.org/en/docs/http/ngx_http_core_module.html#client_body_timeout> and\n<http://nginx.org/en/docs/http/ngx_http_core_module.html#client_header_timeout> for accepted values.\n"}, "loc": ["services", "jirafeau", "maxUploadTimeout"], "readOnly": false, "type": "string"}, "services.jirafeau.nginxConfig": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra configuration for the nginx virtual host of Jirafeau."}, "example": {"_type": "literalExpression", "text": "{\n  serverAliases = [ \"wiki.${config.networking.domain}\" ];\n}\n"}, "loc": ["services", "jirafeau", "nginxConfig"], "readOnly": false, "type": "submodule"}, "services.jirafeau.nginxConfig.acmeFallbackHost": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Host which to proxy requests to if ACME challenge is not found. Useful\nif you want multiple hosts to be able to verify the same domain name.\n\nWith this option, you could request certificates for the present domain\nwith an ACME client that is running on another host, which you would\nspecify here.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "acmeFallbackHost"], "readOnly": false, "type": "null or string"}, "services.jirafeau.nginxConfig.acmeRoot": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/acme/acme-challenge\""}, "description": {"_type": "mdDoc", "text": "Directory for the ACME challenge, which is **public**. Don't put certs or keys in here.\nSet to null to inherit from config.security.acme.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "acmeRoot"], "readOnly": false, "type": "null or string"}, "services.jirafeau.nginxConfig.addSSL": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS in addition to plain HTTP. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443).\n"}, "loc": ["services", "jirafeau", "nginxConfig", "addSSL"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.basicAuth": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "jirafeau", "nginxConfig", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.jirafeau.nginxConfig.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.jirafeau.nginxConfig.default": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Makes this vhost the default.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "default"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.enableACME": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to ask Let's Encrypt to sign a certificate for this vhost.\nAlternately, you can use an existing certificate through {option}`useACMEHost`.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "enableACME"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.extraConfig": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the vhost verbatim.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.jirafeau.nginxConfig.forceSSL": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to add a separate nginx server block that permanently redirects (301)\nall plain HTTP traffic to HTTPS. This will set defaults for\n`listen` to listen on all interfaces on the respective default\nports (80, 443), where the non-SSL listens are used for the redirect vhosts.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "forceSSL"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.globalRedirect": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, all requests for this host are redirected permanently to\nthe given hostname.\n"}, "example": {"_type": "literalExpression", "text": "\"newserver.example.org\""}, "loc": ["services", "jirafeau", "nginxConfig", "globalRedirect"], "readOnly": false, "type": "null or string"}, "services.jirafeau.nginxConfig.http2": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/2 protocol.\nNote that (as of writing) due to nginx's implementation, to disable\nHTTP/2 you have to disable it on all vhosts that use a given\nIP address / port.\nIf there is one server block configured to enable http2, then it is\nenabled for all server blocks on this IP.\nSee https://stackoverflow.com/a/39466948/263061.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "http2"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.http3": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/3 protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that HTTP/3 support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "jirafeau", "nginxConfig", "http3"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.http3_hq": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the HTTP/0.9 protocol negotiation used in QUIC interoperability tests.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`\nand activate the QUIC transport protocol\n`services.nginx.virtualHosts.<name>.quic = true;`.\nNote that special application protocol support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "jirafeau", "nginxConfig", "http3_hq"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.kTLS": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kTLS support.\nImplementing TLS in the kernel (kTLS) improves performance by significantly\nreducing the need for copying operations between user space and the kernel.\nRequired Nginx version 1.21.4 or later.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "kTLS"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.listen": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses and ports for this virtual host.\nIPv6 addresses must be enclosed in square brackets.\nNote: this option overrides `addSSL`\nand `onlySSL`.\n\nIf you only want to set the addresses manually and not\nthe ports, take a look at `listenAddresses`\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    addr = \"195.154.1.1\";\n    port = 443;\n    ssl = true;\n  }\n  {\n    addr = \"192.154.1.1\";\n    port = 80;\n  }\n]"}, "loc": ["services", "jirafeau", "nginxConfig", "listen"], "readOnly": false, "type": "list of (submodule)"}, "services.jirafeau.nginxConfig.listen.*.addr": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "description": {"_type": "mdDoc", "text": "IP address."}, "loc": ["services", "jirafeau", "nginxConfig", "listen", "*", "addr"], "readOnly": false, "type": "string"}, "services.jirafeau.nginxConfig.listen.*.extraParameters": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra parameters of this listen directive."}, "example": {"_type": "literalExpression", "text": "[\n  \"backlog=1024\"\n  \"deferred\"\n]"}, "loc": ["services", "jirafeau", "nginxConfig", "listen", "*", "extraParameters"], "readOnly": false, "type": "list of string"}, "services.jirafeau.nginxConfig.listen.*.port": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "80"}, "description": {"_type": "mdDoc", "text": "Port number."}, "loc": ["services", "jirafeau", "nginxConfig", "listen", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.jirafeau.nginxConfig.listen.*.ssl": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable SSL."}, "loc": ["services", "jirafeau", "nginxConfig", "listen", "*", "ssl"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.listenAddresses": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Listen addresses for this virtual host.\nCompared to `listen` this only sets the addresses\nand the ports are chosen automatically.\n\nNote: This option overrides `enableIPv6`\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"127.0.0.1\"\n  \"[::1]\"\n]"}, "loc": ["services", "jirafeau", "nginxConfig", "listenAddresses"], "readOnly": false, "type": "list of string"}, "services.jirafeau.nginxConfig.locations": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Declarative location config"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\" = {\n    proxyPass = \"http://localhost:3000\";\n  };\n};\n"}, "loc": ["services", "jirafeau", "nginxConfig", "locations"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.jirafeau.nginxConfig.locations.<name>.alias": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Alias directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/alias/directory\""}, "loc": ["services", "jirafeau", "nginxConfig", "locations", "<name>", "alias"], "readOnly": false, "type": "null or path"}, "services.jirafeau.nginxConfig.locations.<name>.basicAuth": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Basic Auth protection for a vhost.\n\nWARNING: This is implemented to store the password in plain text in the\nNix store.\n"}, "example": {"_type": "literalExpression", "text": "{\n  user = \"password\";\n};\n"}, "loc": ["services", "jirafeau", "nginxConfig", "locations", "<name>", "basicAuth"], "readOnly": false, "type": "attribute set of string"}, "services.jirafeau.nginxConfig.locations.<name>.basicAuthFile": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Basic Auth password file for a vhost.\nCan be created via: {command}`htpasswd -c <filename> <username>`.\n\nWARNING: The generate file contains the users' passwords in a\nnon-cryptographically-securely hashed way.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "locations", "<name>", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.jirafeau.nginxConfig.locations.<name>.extraConfig": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "These lines go to the end of the location verbatim.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "locations", "<name>", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.jirafeau.nginxConfig.locations.<name>.fastcgiParams": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "FastCGI parameters to override.  Unlike in the Nginx\nconfiguration file, overriding only some default parameters\nwon't unset the default values for other parameters.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "locations", "<name>", "fastcgiParams"], "readOnly": false, "type": "attribute set of (string or path)"}, "services.jirafeau.nginxConfig.locations.<name>.index": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds index directive.\n"}, "example": {"_type": "literalExpression", "text": "\"index.php index.html\""}, "loc": ["services", "jirafeau", "nginxConfig", "locations", "<name>", "index"], "readOnly": false, "type": "null or string"}, "services.jirafeau.nginxConfig.locations.<name>.priority": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "1000"}, "description": {"_type": "mdDoc", "text": "Order of this location block in relation to the others in the vhost.\nThe semantics are the same as with `lib.mkOrder`. Smaller values have\na greater priority.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "locations", "<name>", "priority"], "readOnly": false, "type": "signed integer"}, "services.jirafeau.nginxConfig.locations.<name>.proxyPass": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds proxy_pass directive and sets recommended proxy headers if\nrecommendedProxySettings is enabled.\n"}, "example": {"_type": "literalExpression", "text": "\"http://www.example.org/\""}, "loc": ["services", "jirafeau", "nginxConfig", "locations", "<name>", "proxyPass"], "readOnly": false, "type": "null or string"}, "services.jirafeau.nginxConfig.locations.<name>.proxyWebsockets": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to support proxying websocket connections with HTTP/1.1.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "jirafeau", "nginxConfig", "locations", "<name>", "proxyWebsockets"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.locations.<name>.recommendedProxySettings": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "config.services.nginx.recommendedProxySettings"}, "description": {"_type": "mdDoc", "text": "Enable recommended proxy settings.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "locations", "<name>", "recommendedProxySettings"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.locations.<name>.return": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds a return directive, for e.g. redirections.\n"}, "example": {"_type": "literalExpression", "text": "\"301 http://example.com$request_uri\""}, "loc": ["services", "jirafeau", "nginxConfig", "locations", "<name>", "return"], "readOnly": false, "type": "null or string"}, "services.jirafeau.nginxConfig.locations.<name>.root": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Root directory for requests.\n"}, "example": {"_type": "literalExpression", "text": "\"/your/root/directory\""}, "loc": ["services", "jirafeau", "nginxConfig", "locations", "<name>", "root"], "readOnly": false, "type": "null or path"}, "services.jirafeau.nginxConfig.locations.<name>.tryFiles": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Adds try_files directive.\n"}, "example": {"_type": "literalExpression", "text": "\"$uri =404\""}, "loc": ["services", "jirafeau", "nginxConfig", "locations", "<name>", "tryFiles"], "readOnly": false, "type": "null or string"}, "services.jirafeau.nginxConfig.onlySSL": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable HTTPS and reject plain HTTP connections. This will set\ndefaults for `listen` to listen on all interfaces on port 443.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "onlySSL"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.quic": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the QUIC transport protocol.\nThis requires using `pkgs.nginxQuic` package\nwhich can be achieved by setting `services.nginx.package = pkgs.nginxQuic;`.\nNote that QUIC support is experimental and\n*not* yet recommended for production.\nRead more at https://quic.nginx.org/\n"}, "loc": ["services", "jirafeau", "nginxConfig", "quic"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.rejectSSL": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to listen for and reject all HTTPS connections to this vhost. Useful in\n[default](#opt-services.nginx.virtualHosts._name_.default)\nserver blocks to avoid serving the certificate for another vhost. Uses the\n`ssl_reject_handshake` directive available in nginx versions\n1.19.4 and above.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "rejectSSL"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.reuseport": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Create an individual listening socket .\nIt is required to specify only once on one of the hosts.\n"}, "loc": ["services", "jirafeau", "nginxConfig", "reuseport"], "readOnly": false, "type": "boolean"}, "services.jirafeau.nginxConfig.root": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The path of the web root directory.\n"}, "example": {"_type": "literalExpression", "text": "\"/data/webserver/docs\""}, "loc": ["services", "jirafeau", "nginxConfig", "root"], "readOnly": false, "type": "null or path"}, "services.jirafeau.nginxConfig.serverAliases": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional names of virtual hosts served by this virtual host configuration.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"www.example.org\"\n  \"example.org\"\n]"}, "loc": ["services", "jirafeau", "nginxConfig", "serverAliases"], "readOnly": false, "type": "list of string"}, "services.jirafeau.nginxConfig.serverName": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Name of this virtual host. Defaults to attribute name in virtualHosts.\n"}, "example": {"_type": "literalExpression", "text": "\"example.org\""}, "loc": ["services", "jirafeau", "nginxConfig", "serverName"], "readOnly": false, "type": "null or string"}, "services.jirafeau.nginxConfig.sslCertificate": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate."}, "example": {"_type": "literalExpression", "text": "\"/var/host.cert\""}, "loc": ["services", "jirafeau", "nginxConfig", "sslCertificate"], "readOnly": false, "type": "path"}, "services.jirafeau.nginxConfig.sslCertificateKey": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "description": {"_type": "mdDoc", "text": "Path to server SSL certificate key."}, "example": {"_type": "literalExpression", "text": "\"/var/host.key\""}, "loc": ["services", "jirafeau", "nginxConfig", "sslCertificateKey"], "readOnly": false, "type": "path"}, "services.jirafeau.nginxConfig.sslTrustedCertificate": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to root SSL certificate for stapling and client certificates."}, "example": {"_type": "literalExpression", "text": "\"${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt\""}, "loc": ["services", "jirafeau", "nginxConfig", "sslTrustedCertificate"], "readOnly": false, "type": "null or path"}, "services.jirafeau.nginxConfig.useACMEHost": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A host of an existing Let's Encrypt certificate to use.\nThis is useful if you have many subdomains and want to avoid hitting the\n[rate limit](https://letsencrypt.org/docs/rate-limits).\nAlternately, you can generate a certificate through {option}`enableACME`.\n*Note that this option does not create any certificates, nor it does add subdomains to existing ones \u2013 you will need to create them manually using [](#opt-security.acme.certs).*\n"}, "loc": ["services", "jirafeau", "nginxConfig", "useACMEHost"], "readOnly": false, "type": "null or string"}, "services.jirafeau.package": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "pkgs.jirafeau"}, "description": {"_type": "mdDoc", "text": "Jirafeau package to use"}, "loc": ["services", "jirafeau", "package"], "readOnly": false, "type": "package"}, "services.jirafeau.poolConfig": {"declarations": ["nixos/modules/services/web-apps/jirafeau.nix"], "default": {"_type": "literalExpression", "text": "{\n  pm = \"dynamic\";\n  \"pm.max_children\" = 32;\n  \"pm.max_requests\" = 500;\n  \"pm.max_spare_servers\" = 4;\n  \"pm.min_spare_servers\" = 2;\n  \"pm.start_servers\" = 2;\n}"}, "description": {"_type": "mdDoc", "text": "Options for Jirafeau PHP pool. See documentation on `php-fpm.conf` for\ndetails on configuration directives.\n"}, "loc": ["services", "jirafeau", "poolConfig"], "readOnly": false, "type": "attribute set of (string or signed integer or boolean)"}, "services.kanidm.clientSettings": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "description": {"_type": "mdDoc", "text": "Configure Kanidm clients, needed for the PAM daemon. See\n[the documentation](https://kanidm.github.io/kanidm/stable/client_tools.html#kanidm-configuration)\nand [example configuration](https://github.com/kanidm/kanidm/blob/master/examples/config)\nfor possible values.\n"}, "loc": ["services", "kanidm", "clientSettings"], "readOnly": false, "type": "TOML value"}, "services.kanidm.clientSettings.uri": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "description": {"_type": "mdDoc", "text": "Address of the Kanidm server."}, "example": {"_type": "literalExpression", "text": "\"http://127.0.0.1:8080\""}, "loc": ["services", "kanidm", "clientSettings", "uri"], "readOnly": false, "type": "string"}, "services.kanidm.enableClient": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Kanidm client."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kanidm", "enableClient"], "readOnly": false, "type": "boolean"}, "services.kanidm.enablePam": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Kanidm PAM and NSS integration."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kanidm", "enablePam"], "readOnly": false, "type": "boolean"}, "services.kanidm.enableServer": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Kanidm server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kanidm", "enableServer"], "readOnly": false, "type": "boolean"}, "services.kanidm.serverSettings": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Settings for Kanidm, see\n[the documentation](https://kanidm.github.io/kanidm/stable/server_configuration.html)\nand [example configuration](https://github.com/kanidm/kanidm/blob/master/examples/server.toml)\nfor possible values.\n"}, "loc": ["services", "kanidm", "serverSettings"], "readOnly": false, "type": "TOML value"}, "services.kanidm.serverSettings.bindaddress": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "description": {"_type": "mdDoc", "text": "Address/port combination the webserver binds to."}, "example": {"_type": "literalExpression", "text": "\"[::1]:8443\""}, "loc": ["services", "kanidm", "serverSettings", "bindaddress"], "readOnly": false, "type": "string"}, "services.kanidm.serverSettings.db_path": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/kanidm/kanidm.db\""}, "description": {"_type": "mdDoc", "text": "Path to Kanidm database."}, "loc": ["services", "kanidm", "serverSettings", "db_path"], "readOnly": true, "type": "path"}, "services.kanidm.serverSettings.domain": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The `domain` that Kanidm manages. Must be below or equal to the domain\nspecified in `serverSettings.origin`.\nThis can be left at `null`, only if your instance has the role `ReadOnlyReplica`.\nWhile it is possible to change the domain later on, it requires extra steps!\nPlease consider the warnings and execute the steps described\n[in the documentation](https://kanidm.github.io/kanidm/stable/administrivia.html#rename-the-domain).\n"}, "example": {"_type": "literalExpression", "text": "\"example.org\""}, "loc": ["services", "kanidm", "serverSettings", "domain"], "readOnly": false, "type": "null or string"}, "services.kanidm.serverSettings.ldapbindaddress": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Address and port the LDAP server is bound to. Setting this to `null` disables the LDAP interface.\n"}, "example": {"_type": "literalExpression", "text": "\"[::1]:636\""}, "loc": ["services", "kanidm", "serverSettings", "ldapbindaddress"], "readOnly": false, "type": "null or string"}, "services.kanidm.serverSettings.log_level": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "default": {"_type": "literalExpression", "text": "\"default\""}, "description": {"_type": "mdDoc", "text": "Log level of the server."}, "loc": ["services", "kanidm", "serverSettings", "log_level"], "readOnly": false, "type": "one of \"default\", \"verbose\", \"perfbasic\", \"perffull\""}, "services.kanidm.serverSettings.origin": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "description": {"_type": "mdDoc", "text": "The origin of your Kanidm instance. Must have https as protocol."}, "example": {"_type": "literalExpression", "text": "\"https://idm.example.org\""}, "loc": ["services", "kanidm", "serverSettings", "origin"], "readOnly": false, "type": "string matching the pattern ^https://.*"}, "services.kanidm.serverSettings.role": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "default": {"_type": "literalExpression", "text": "\"WriteReplica\""}, "description": {"_type": "mdDoc", "text": "The role of this server. This affects the replication relationship and thereby available features."}, "loc": ["services", "kanidm", "serverSettings", "role"], "readOnly": false, "type": "one of \"WriteReplica\", \"WriteReplicaNoUI\", \"ReadOnlyReplica\""}, "services.kanidm.serverSettings.tls_chain": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "description": {"_type": "mdDoc", "text": "TLS chain in pem format."}, "loc": ["services", "kanidm", "serverSettings", "tls_chain"], "readOnly": false, "type": "path"}, "services.kanidm.serverSettings.tls_key": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "description": {"_type": "mdDoc", "text": "TLS key in pem format."}, "loc": ["services", "kanidm", "serverSettings", "tls_key"], "readOnly": false, "type": "path"}, "services.kanidm.unixSettings": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "description": {"_type": "mdDoc", "text": "Configure Kanidm unix daemon.\nSee [the documentation](https://kanidm.github.io/kanidm/stable/integrations/pam_and_nsswitch.html#the-unix-daemon)\nand [example configuration](https://github.com/kanidm/kanidm/blob/master/examples/unixd)\nfor possible values.\n"}, "loc": ["services", "kanidm", "unixSettings"], "readOnly": false, "type": "TOML value"}, "services.kanidm.unixSettings.pam_allowed_login_groups": {"declarations": ["nixos/modules/services/security/kanidm.nix"], "description": {"_type": "mdDoc", "text": "Kanidm groups that are allowed to login using PAM."}, "example": {"_type": "literalExpression", "text": "\"my_pam_group\""}, "loc": ["services", "kanidm", "unixSettings", "pam_allowed_login_groups"], "readOnly": false, "type": "list of string"}, "services.kea.ctrl-agent": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Kea Control Agent configuration\n"}, "loc": ["services", "kea", "ctrl-agent"], "readOnly": false, "type": "submodule"}, "services.kea.ctrl-agent.configFile": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kea Control Agent configuration as a path, see <https://kea.readthedocs.io/en/kea-2.2.0/arm/agent.html>.\n\nTakes preference over [settings](#opt-services.kea.ctrl-agent.settings).\nMost users should prefer using [settings](#opt-services.kea.ctrl-agent.settings) instead.\n"}, "loc": ["services", "kea", "ctrl-agent", "configFile"], "readOnly": false, "type": "null or path"}, "services.kea.ctrl-agent.enable": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Kea Control Agent."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kea", "ctrl-agent", "enable"], "readOnly": false, "type": "boolean"}, "services.kea.ctrl-agent.extraArgs": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of additional arguments to pass to the daemon.\n"}, "loc": ["services", "kea", "ctrl-agent", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.kea.ctrl-agent.settings": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kea Control Agent configuration as an attribute set, see <https://kea.readthedocs.io/en/kea-2.2.0/arm/agent.html>.\n"}, "loc": ["services", "kea", "ctrl-agent", "settings"], "readOnly": false, "type": "JSON value"}, "services.kea.dhcp-ddns": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Kea DHCP-DDNS configuration\n"}, "loc": ["services", "kea", "dhcp-ddns"], "readOnly": false, "type": "submodule"}, "services.kea.dhcp-ddns.configFile": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kea DHCP-DDNS configuration as a path, see <https://kea.readthedocs.io/en/kea-2.2.0/arm/ddns.html>.\n\nTakes preference over [settings](#opt-services.kea.dhcp-ddns.settings).\nMost users should prefer using [settings](#opt-services.kea.dhcp-ddns.settings) instead.\n"}, "loc": ["services", "kea", "dhcp-ddns", "configFile"], "readOnly": false, "type": "null or path"}, "services.kea.dhcp-ddns.enable": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Kea DDNS server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kea", "dhcp-ddns", "enable"], "readOnly": false, "type": "boolean"}, "services.kea.dhcp-ddns.extraArgs": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of additional arguments to pass to the daemon.\n"}, "loc": ["services", "kea", "dhcp-ddns", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.kea.dhcp-ddns.settings": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kea DHCP-DDNS configuration as an attribute set, see <https://kea.readthedocs.io/en/kea-2.2.0/arm/ddns.html>.\n"}, "example": {"_type": "literalExpression", "text": "{\n  dns-server-timeout = 100;\n  forward-ddns = {\n    ddns-domains = [ ];\n  };\n  ip-address = \"127.0.0.1\";\n  ncr-format = \"JSON\";\n  ncr-protocol = \"UDP\";\n  port = 53001;\n  reverse-ddns = {\n    ddns-domains = [ ];\n  };\n  tsig-keys = [ ];\n}"}, "loc": ["services", "kea", "dhcp-ddns", "settings"], "readOnly": false, "type": "JSON value"}, "services.kea.dhcp4": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "DHCP4 Server configuration\n"}, "loc": ["services", "kea", "dhcp4"], "readOnly": false, "type": "submodule"}, "services.kea.dhcp4.configFile": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kea DHCP4 configuration as a path, see <https://kea.readthedocs.io/en/kea-2.2.0/arm/dhcp4-srv.html>.\n\nTakes preference over [settings](#opt-services.kea.dhcp4.settings).\nMost users should prefer using [settings](#opt-services.kea.dhcp4.settings) instead.\n"}, "loc": ["services", "kea", "dhcp4", "configFile"], "readOnly": false, "type": "null or path"}, "services.kea.dhcp4.enable": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Kea DHCP4 server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kea", "dhcp4", "enable"], "readOnly": false, "type": "boolean"}, "services.kea.dhcp4.extraArgs": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of additional arguments to pass to the daemon.\n"}, "loc": ["services", "kea", "dhcp4", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.kea.dhcp4.settings": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kea DHCP4 configuration as an attribute set, see <https://kea.readthedocs.io/en/kea-2.2.0/arm/dhcp4-srv.html>.\n"}, "example": {"_type": "literalExpression", "text": "{\n  interfaces-config = {\n    interfaces = [\n      \"eth0\"\n    ];\n  };\n  lease-database = {\n    name = \"/var/lib/kea/dhcp4.leases\";\n    persist = true;\n    type = \"memfile\";\n  };\n  rebind-timer = 2000;\n  renew-timer = 1000;\n  subnet4 = [\n    {\n      pools = [\n        {\n          pool = \"192.0.2.100 - 192.0.2.240\";\n        }\n      ];\n      subnet = \"192.0.2.0/24\";\n    }\n  ];\n  valid-lifetime = 4000;\n}"}, "loc": ["services", "kea", "dhcp4", "settings"], "readOnly": false, "type": "JSON value"}, "services.kea.dhcp6": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "DHCP6 Server configuration\n"}, "loc": ["services", "kea", "dhcp6"], "readOnly": false, "type": "submodule"}, "services.kea.dhcp6.configFile": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kea DHCP6 configuration as a path, see <https://kea.readthedocs.io/en/kea-2.2.0/arm/dhcp6-srv.html>.\n\nTakes preference over [settings](#opt-services.kea.dhcp6.settings).\nMost users should prefer using [settings](#opt-services.kea.dhcp6.settings) instead.\n"}, "loc": ["services", "kea", "dhcp6", "configFile"], "readOnly": false, "type": "null or path"}, "services.kea.dhcp6.enable": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Kea DHCP6 server."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kea", "dhcp6", "enable"], "readOnly": false, "type": "boolean"}, "services.kea.dhcp6.extraArgs": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of additional arguments to pass to the daemon.\n"}, "loc": ["services", "kea", "dhcp6", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.kea.dhcp6.settings": {"declarations": ["nixos/modules/services/networking/kea.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kea DHCP6 configuration as an attribute set, see <https://kea.readthedocs.io/en/kea-2.2.0/arm/dhcp6-srv.html>.\n"}, "example": {"_type": "literalExpression", "text": "{\n  interfaces-config = {\n    interfaces = [\n      \"eth0\"\n    ];\n  };\n  lease-database = {\n    name = \"/var/lib/kea/dhcp6.leases\";\n    persist = true;\n    type = \"memfile\";\n  };\n  preferred-lifetime = 3000;\n  rebind-timer = 2000;\n  renew-timer = 1000;\n  subnet6 = [\n    {\n      pools = [\n        {\n          pool = \"2001:db8:1::1-2001:db8:1::ffff\";\n        }\n      ];\n      subnet = \"2001:db8:1::/64\";\n    }\n  ];\n  valid-lifetime = 4000;\n}"}, "loc": ["services", "kea", "dhcp6", "settings"], "readOnly": false, "type": "JSON value"}, "services.kubernetes.addonManager.addons": {"declarations": ["nixos/modules/services/cluster/kubernetes/addon-manager.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Kubernetes addons (any kind of Kubernetes resource can be an addon)."}, "example": {"_type": "literalExpression", "text": "{\n  \"my-service\" = {\n    \"apiVersion\" = \"v1\";\n    \"kind\" = \"Service\";\n    \"metadata\" = {\n      \"name\" = \"my-service\";\n      \"namespace\" = \"default\";\n    };\n    \"spec\" = { ... };\n  };\n}\n// import <nixpkgs/nixos/modules/services/cluster/kubernetes/dns.nix> { cfg = config.services.kubernetes; };\n"}, "loc": ["services", "kubernetes", "addonManager", "addons"], "readOnly": false, "type": "attribute set of ((attribute set) or list of (attribute set))"}, "services.kubernetes.addonManager.bootstrapAddons": {"declarations": ["nixos/modules/services/cluster/kubernetes/addon-manager.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Bootstrap addons are like regular addons, but they are applied with cluster-admin rights.\nThey are applied at addon-manager startup only.\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"my-service\" = {\n    \"apiVersion\" = \"v1\";\n    \"kind\" = \"Service\";\n    \"metadata\" = {\n      \"name\" = \"my-service\";\n      \"namespace\" = \"default\";\n    };\n    \"spec\" = { ... };\n  };\n}\n"}, "loc": ["services", "kubernetes", "addonManager", "bootstrapAddons"], "readOnly": false, "type": "attribute set of (attribute set)"}, "services.kubernetes.addonManager.enable": {"declarations": ["nixos/modules/services/cluster/kubernetes/addon-manager.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Kubernetes addon manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kubernetes", "addonManager", "enable"], "readOnly": false, "type": "boolean"}, "services.kubernetes.addons.dns.clusterDomain": {"declarations": ["nixos/modules/services/cluster/kubernetes/addons/dns.nix"], "default": {"_type": "literalExpression", "text": "\"cluster.local\""}, "description": {"_type": "mdDoc", "text": "Dns cluster domain"}, "loc": ["services", "kubernetes", "addons", "dns", "clusterDomain"], "readOnly": false, "type": "string"}, "services.kubernetes.addons.dns.clusterIp": {"declarations": ["nixos/modules/services/cluster/kubernetes/addons/dns.nix"], "default": {"_type": "literalMD", "text": "The `x.y.z.254` IP of\n`config.services.kubernetes.apiserver.serviceClusterIpRange`.\n"}, "description": {"_type": "mdDoc", "text": "Dns addon clusterIP"}, "loc": ["services", "kubernetes", "addons", "dns", "clusterIp"], "readOnly": false, "type": "string"}, "services.kubernetes.addons.dns.coredns": {"declarations": ["nixos/modules/services/cluster/kubernetes/addons/dns.nix"], "default": {"_type": "literalExpression", "text": "{\n  finalImageTag = \"1.10.1\";\n  imageDigest = \"sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\";\n  imageName = \"coredns/coredns\";\n  sha256 = \"0wg696920smmal7552a2zdhfncndn5kfammfa8bk8l7dz9bhk0y1\";\n}"}, "description": {"_type": "mdDoc", "text": "Docker image to seed for the CoreDNS container."}, "loc": ["services", "kubernetes", "addons", "dns", "coredns"], "readOnly": false, "type": "attribute set"}, "services.kubernetes.addons.dns.corefile": {"declarations": ["nixos/modules/services/cluster/kubernetes/addons/dns.nix"], "default": {"_type": "literalExpression", "text": "''\n  .:10053 {\n    errors\n    health :10054\n    kubernetes ${config.services.kubernetes.addons.dns.clusterDomain} in-addr.arpa ip6.arpa {\n      pods insecure\n      fallthrough in-addr.arpa ip6.arpa\n    }\n    prometheus :10055\n    forward . /etc/resolv.conf\n    cache 30\n    loop\n    reload\n    loadbalance\n  }\n''\n"}, "description": {"_type": "mdDoc", "text": "Custom coredns corefile configuration.\n\nSee: <https://coredns.io/manual/toc/#configuration>.\n"}, "loc": ["services", "kubernetes", "addons", "dns", "corefile"], "readOnly": false, "type": "string"}, "services.kubernetes.addons.dns.enable": {"declarations": ["nixos/modules/services/cluster/kubernetes/addons/dns.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable kubernetes dns addon."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kubernetes", "addons", "dns", "enable"], "readOnly": false, "type": "boolean"}, "services.kubernetes.addons.dns.reconcileMode": {"declarations": ["nixos/modules/services/cluster/kubernetes/addons/dns.nix"], "default": {"_type": "literalExpression", "text": "\"Reconcile\""}, "description": {"_type": "mdDoc", "text": "Controls the addon manager reconciliation mode for the DNS addon.\n\nSetting reconcile mode to EnsureExists makes it possible to tailor DNS behavior by editing the coredns ConfigMap.\n\nSee: <https://github.com/kubernetes/kubernetes/blob/master/cluster/addons/addon-manager/README.md>.\n"}, "loc": ["services", "kubernetes", "addons", "dns", "reconcileMode"], "readOnly": false, "type": "one of \"Reconcile\", \"EnsureExists\""}, "services.kubernetes.addons.dns.replicas": {"declarations": ["nixos/modules/services/cluster/kubernetes/addons/dns.nix"], "default": {"_type": "literalExpression", "text": "2"}, "description": {"_type": "mdDoc", "text": "Number of DNS pod replicas to deploy in the cluster."}, "loc": ["services", "kubernetes", "addons", "dns", "replicas"], "readOnly": false, "type": "signed integer"}, "services.kubernetes.apiserver.advertiseAddress": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver IP address on which to advertise the apiserver\nto members of the cluster. This address must be reachable by the rest\nof the cluster.\n"}, "loc": ["services", "kubernetes", "apiserver", "advertiseAddress"], "readOnly": false, "type": "null or string"}, "services.kubernetes.apiserver.allowPrivileged": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow privileged containers on Kubernetes."}, "loc": ["services", "kubernetes", "apiserver", "allowPrivileged"], "readOnly": false, "type": "boolean"}, "services.kubernetes.apiserver.apiAudiences": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "\"api,https://kubernetes.default.svc\""}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver ServiceAccount issuer.\n"}, "loc": ["services", "kubernetes", "apiserver", "apiAudiences"], "readOnly": false, "type": "string"}, "services.kubernetes.apiserver.authorizationMode": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"RBAC\"\n  \"Node\"\n]"}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver authorization mode (AlwaysAllow/AlwaysDeny/ABAC/Webhook/RBAC/Node). See\n<https://kubernetes.io/docs/reference/access-authn-authz/authorization/>\n"}, "loc": ["services", "kubernetes", "apiserver", "authorizationMode"], "readOnly": false, "type": "list of (one of \"AlwaysAllow\", \"AlwaysDeny\", \"ABAC\", \"Webhook\", \"RBAC\", \"Node\")"}, "services.kubernetes.apiserver.authorizationPolicy": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver authorization policy file. See\n<https://kubernetes.io/docs/reference/access-authn-authz/authorization/>\n"}, "loc": ["services", "kubernetes", "apiserver", "authorizationPolicy"], "readOnly": false, "type": "list of (attribute set)"}, "services.kubernetes.apiserver.basicAuthFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver basic authentication file. See\n<https://kubernetes.io/docs/reference/access-authn-authz/authentication>\n"}, "loc": ["services", "kubernetes", "apiserver", "basicAuthFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserver.bindAddress": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "The IP address on which to listen for the --secure-port port.\nThe associated interface(s) must be reachable by the rest\nof the cluster, and by CLI/web clients.\n"}, "loc": ["services", "kubernetes", "apiserver", "bindAddress"], "readOnly": false, "type": "string"}, "services.kubernetes.apiserver.clientCaFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.caFile"}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver CA file for client auth."}, "loc": ["services", "kubernetes", "apiserver", "clientCaFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserver.disableAdmissionPlugins": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Kubernetes admission control plugins to disable. See\n<https://kubernetes.io/docs/admin/admission-controllers/>\n"}, "loc": ["services", "kubernetes", "apiserver", "disableAdmissionPlugins"], "readOnly": false, "type": "list of string"}, "services.kubernetes.apiserver.enable": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Kubernetes apiserver."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kubernetes", "apiserver", "enable"], "readOnly": false, "type": "boolean"}, "services.kubernetes.apiserver.enableAdmissionPlugins": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"NamespaceLifecycle\"\n  \"LimitRanger\"\n  \"ServiceAccount\"\n  \"ResourceQuota\"\n  \"DefaultStorageClass\"\n  \"DefaultTolerationSeconds\"\n  \"NodeRestriction\"\n]"}, "description": {"_type": "mdDoc", "text": "Kubernetes admission control plugins to enable. See\n<https://kubernetes.io/docs/admin/admission-controllers/>\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"NamespaceLifecycle\"\n  \"NamespaceExists\"\n  \"LimitRanger\"\n  \"SecurityContextDeny\"\n  \"ServiceAccount\"\n  \"ResourceQuota\"\n  \"PodSecurityPolicy\"\n  \"NodeRestriction\"\n  \"DefaultStorageClass\"\n]"}, "loc": ["services", "kubernetes", "apiserver", "enableAdmissionPlugins"], "readOnly": false, "type": "list of string"}, "services.kubernetes.apiserver.etcd.caFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.caFile"}, "description": {"_type": "mdDoc", "text": "Etcd ca file."}, "loc": ["services", "kubernetes", "apiserver", "etcd", "caFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserver.etcd.certFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Etcd cert file."}, "loc": ["services", "kubernetes", "apiserver", "etcd", "certFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserver.etcd.keyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Etcd key file."}, "loc": ["services", "kubernetes", "apiserver", "etcd", "keyFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserver.etcd.servers": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"http://127.0.0.1:2379\"\n]"}, "description": {"_type": "mdDoc", "text": "List of etcd servers."}, "loc": ["services", "kubernetes", "apiserver", "etcd", "servers"], "readOnly": false, "type": "list of string"}, "services.kubernetes.apiserver.extraOpts": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver extra command line options."}, "loc": ["services", "kubernetes", "apiserver", "extraOpts"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.kubernetes.apiserver.extraSANs": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra x509 Subject Alternative Names to be added to the kubernetes apiserver tls cert."}, "loc": ["services", "kubernetes", "apiserver", "extraSANs"], "readOnly": false, "type": "list of string"}, "services.kubernetes.apiserver.featureGates": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.featureGates"}, "description": {"_type": "mdDoc", "text": "List set of feature gates"}, "loc": ["services", "kubernetes", "apiserver", "featureGates"], "readOnly": false, "type": "list of string"}, "services.kubernetes.apiserver.kubeletClientCaFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.caFile"}, "description": {"_type": "mdDoc", "text": "Path to a cert file for connecting to kubelet."}, "loc": ["services", "kubernetes", "apiserver", "kubeletClientCaFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserver.kubeletClientCertFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Client certificate to use for connections to kubelet."}, "loc": ["services", "kubernetes", "apiserver", "kubeletClientCertFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserver.kubeletClientKeyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key to use for connections to kubelet."}, "loc": ["services", "kubernetes", "apiserver", "kubeletClientKeyFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserver.preferredAddressTypes": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "List of the preferred NodeAddressTypes to use for kubelet connections."}, "loc": ["services", "kubernetes", "apiserver", "preferredAddressTypes"], "readOnly": false, "type": "null or string"}, "services.kubernetes.apiserver.proxyClientCertFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Client certificate to use for connections to proxy."}, "loc": ["services", "kubernetes", "apiserver", "proxyClientCertFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserver.proxyClientKeyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Key to use for connections to proxy."}, "loc": ["services", "kubernetes", "apiserver", "proxyClientKeyFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserver.runtimeConfig": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "\"authentication.k8s.io/v1beta1=true\""}, "description": {"_type": "mdDoc", "text": "Api runtime configuration. See\n<https://kubernetes.io/docs/tasks/administer-cluster/cluster-management/>\n"}, "example": {"_type": "literalExpression", "text": "\"api/all=false,api/v1=true\""}, "loc": ["services", "kubernetes", "apiserver", "runtimeConfig"], "readOnly": false, "type": "string"}, "services.kubernetes.apiserver.securePort": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "6443"}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver secure port."}, "loc": ["services", "kubernetes", "apiserver", "securePort"], "readOnly": false, "type": "signed integer"}, "services.kubernetes.apiserver.serviceAccountIssuer": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "\"https://kubernetes.default.svc\""}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver ServiceAccount issuer.\n"}, "loc": ["services", "kubernetes", "apiserver", "serviceAccountIssuer"], "readOnly": false, "type": "string"}, "services.kubernetes.apiserver.serviceAccountKeyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "description": {"_type": "mdDoc", "text": "File containing PEM-encoded x509 RSA or ECDSA private or public keys,\nused to verify ServiceAccount tokens. The specified file can contain\nmultiple keys, and the flag can be specified multiple times with\ndifferent files. If unspecified, --tls-private-key-file is used.\nMust be specified when --service-account-signing-key is provided\n"}, "loc": ["services", "kubernetes", "apiserver", "serviceAccountKeyFile"], "readOnly": false, "type": "path"}, "services.kubernetes.apiserver.serviceAccountSigningKeyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "description": {"_type": "mdDoc", "text": "Path to the file that contains the current private key of the service\naccount token issuer. The issuer will sign issued ID tokens with this\nprivate key.\n"}, "loc": ["services", "kubernetes", "apiserver", "serviceAccountSigningKeyFile"], "readOnly": false, "type": "path"}, "services.kubernetes.apiserver.serviceClusterIpRange": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "\"10.0.0.0/24\""}, "description": {"_type": "mdDoc", "text": "A CIDR notation IP range from which to assign service cluster IPs.\nThis must not overlap with any IP ranges assigned to nodes for pods.\n"}, "loc": ["services", "kubernetes", "apiserver", "serviceClusterIpRange"], "readOnly": false, "type": "string"}, "services.kubernetes.apiserver.storageBackend": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "\"etcd3\""}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver storage backend.\n"}, "loc": ["services", "kubernetes", "apiserver", "storageBackend"], "readOnly": false, "type": "one of \"etcd2\", \"etcd3\""}, "services.kubernetes.apiserver.tlsCertFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver certificate file."}, "loc": ["services", "kubernetes", "apiserver", "tlsCertFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserver.tlsKeyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver private key file."}, "loc": ["services", "kubernetes", "apiserver", "tlsKeyFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserver.tokenAuthFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver token authentication file. See\n<https://kubernetes.io/docs/reference/access-authn-authz/authentication>\n"}, "loc": ["services", "kubernetes", "apiserver", "tokenAuthFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserver.verbosity": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional glog verbosity level for logging statements. See\n<https://github.com/kubernetes/community/blob/master/contributors/devel/logging.md>\n"}, "loc": ["services", "kubernetes", "apiserver", "verbosity"], "readOnly": false, "type": "null or signed integer"}, "services.kubernetes.apiserver.webhookConfig": {"declarations": ["nixos/modules/services/cluster/kubernetes/apiserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver Webhook config file. It uses the kubeconfig file format.\nSee <https://kubernetes.io/docs/reference/access-authn-authz/webhook/>\n"}, "loc": ["services", "kubernetes", "apiserver", "webhookConfig"], "readOnly": false, "type": "null or path"}, "services.kubernetes.apiserverAddress": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "description": {"_type": "mdDoc", "text": "Clusterwide accessible address for the kubernetes apiserver,\nincluding protocol and optional port.\n"}, "example": {"_type": "literalExpression", "text": "\"https://kubernetes-apiserver.example.com:6443\""}, "loc": ["services", "kubernetes", "apiserverAddress"], "readOnly": false, "type": "string"}, "services.kubernetes.caFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Default kubernetes certificate authority"}, "loc": ["services", "kubernetes", "caFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.clusterCidr": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "default": {"_type": "literalExpression", "text": "\"10.1.0.0/16\""}, "description": {"_type": "mdDoc", "text": "Kubernetes controller manager and proxy CIDR Range for Pods in cluster."}, "loc": ["services", "kubernetes", "clusterCidr"], "readOnly": false, "type": "null or string"}, "services.kubernetes.controllerManager.allocateNodeCIDRs": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to automatically allocate CIDR ranges for cluster nodes."}, "loc": ["services", "kubernetes", "controllerManager", "allocateNodeCIDRs"], "readOnly": false, "type": "boolean"}, "services.kubernetes.controllerManager.bindAddress": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Kubernetes controller manager listening address."}, "loc": ["services", "kubernetes", "controllerManager", "bindAddress"], "readOnly": false, "type": "string"}, "services.kubernetes.controllerManager.clusterCidr": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.clusterCidr"}, "description": {"_type": "mdDoc", "text": "Kubernetes CIDR Range for Pods in cluster."}, "loc": ["services", "kubernetes", "controllerManager", "clusterCidr"], "readOnly": false, "type": "string"}, "services.kubernetes.controllerManager.enable": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Kubernetes controller manager."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kubernetes", "controllerManager", "enable"], "readOnly": false, "type": "boolean"}, "services.kubernetes.controllerManager.extraOpts": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Kubernetes controller manager extra command line options."}, "loc": ["services", "kubernetes", "controllerManager", "extraOpts"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.kubernetes.controllerManager.featureGates": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.featureGates"}, "description": {"_type": "mdDoc", "text": "List set of feature gates"}, "loc": ["services", "kubernetes", "controllerManager", "featureGates"], "readOnly": false, "type": "list of string"}, "services.kubernetes.controllerManager.kubeconfig.caFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.caFile"}, "description": {"_type": "mdDoc", "text": "Kubernetes controller manager certificate authority file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "controllerManager", "kubeconfig", "caFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.controllerManager.kubeconfig.certFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes controller manager client certificate file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "controllerManager", "kubeconfig", "certFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.controllerManager.kubeconfig.keyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes controller manager client key file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "controllerManager", "kubeconfig", "keyFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.controllerManager.kubeconfig.server": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "description": {"_type": "mdDoc", "text": "Kubernetes controller manager kube-apiserver server address."}, "loc": ["services", "kubernetes", "controllerManager", "kubeconfig", "server"], "readOnly": false, "type": "string"}, "services.kubernetes.controllerManager.leaderElect": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to start leader election before executing main loop."}, "loc": ["services", "kubernetes", "controllerManager", "leaderElect"], "readOnly": false, "type": "boolean"}, "services.kubernetes.controllerManager.rootCaFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.caFile"}, "description": {"_type": "mdDoc", "text": "Kubernetes controller manager certificate authority file included in\nservice account's token secret.\n"}, "loc": ["services", "kubernetes", "controllerManager", "rootCaFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.controllerManager.securePort": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "10252"}, "description": {"_type": "mdDoc", "text": "Kubernetes controller manager secure listening port."}, "loc": ["services", "kubernetes", "controllerManager", "securePort"], "readOnly": false, "type": "signed integer"}, "services.kubernetes.controllerManager.serviceAccountKeyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes controller manager PEM-encoded private RSA key file used to\nsign service account tokens\n"}, "loc": ["services", "kubernetes", "controllerManager", "serviceAccountKeyFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.controllerManager.tlsCertFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes controller-manager certificate file."}, "loc": ["services", "kubernetes", "controllerManager", "tlsCertFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.controllerManager.tlsKeyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes controller-manager private key file."}, "loc": ["services", "kubernetes", "controllerManager", "tlsKeyFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.controllerManager.verbosity": {"declarations": ["nixos/modules/services/cluster/kubernetes/controller-manager.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional glog verbosity level for logging statements. See\n<https://github.com/kubernetes/community/blob/master/contributors/devel/logging.md>\n"}, "loc": ["services", "kubernetes", "controllerManager", "verbosity"], "readOnly": false, "type": "null or signed integer"}, "services.kubernetes.dataDir": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/kubernetes\""}, "description": {"_type": "mdDoc", "text": "Kubernetes root directory for managing kubelet files."}, "loc": ["services", "kubernetes", "dataDir"], "readOnly": false, "type": "path"}, "services.kubernetes.easyCerts": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Automatically setup x509 certificates and keys for the entire cluster."}, "loc": ["services", "kubernetes", "easyCerts"], "readOnly": false, "type": "boolean"}, "services.kubernetes.featureGates": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List set of feature gates."}, "loc": ["services", "kubernetes", "featureGates"], "readOnly": false, "type": "list of string"}, "services.kubernetes.flannel.enable": {"declarations": ["nixos/modules/services/cluster/kubernetes/flannel.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable flannel networking."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kubernetes", "flannel", "enable"], "readOnly": false, "type": "boolean"}, "services.kubernetes.kubeconfig.caFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.caFile"}, "description": {"_type": "mdDoc", "text": "Default kubeconfig certificate authority file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "kubeconfig", "caFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.kubeconfig.certFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Default kubeconfig client certificate file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "kubeconfig", "certFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.kubeconfig.keyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Default kubeconfig client key file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "kubeconfig", "keyFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.kubeconfig.server": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "description": {"_type": "mdDoc", "text": "Default kubeconfig kube-apiserver server address."}, "loc": ["services", "kubernetes", "kubeconfig", "server"], "readOnly": false, "type": "string"}, "services.kubernetes.kubelet.address": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Kubernetes kubelet info server listening address."}, "loc": ["services", "kubernetes", "kubelet", "address"], "readOnly": false, "type": "string"}, "services.kubernetes.kubelet.clientCaFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.caFile"}, "description": {"_type": "mdDoc", "text": "Kubernetes apiserver CA file for client authentication."}, "loc": ["services", "kubernetes", "kubelet", "clientCaFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.kubelet.clusterDns": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "\"10.1.0.1\""}, "description": {"_type": "mdDoc", "text": "Use alternative DNS."}, "loc": ["services", "kubernetes", "kubelet", "clusterDns"], "readOnly": false, "type": "string"}, "services.kubernetes.kubelet.clusterDomain": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.addons.dns.clusterDomain"}, "description": {"_type": "mdDoc", "text": "Use alternative domain."}, "loc": ["services", "kubernetes", "kubelet", "clusterDomain"], "readOnly": false, "type": "string"}, "services.kubernetes.kubelet.cni.config": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Kubernetes CNI configuration."}, "example": {"_type": "literalExpression", "text": "[{\n  \"cniVersion\": \"0.3.1\",\n  \"name\": \"mynet\",\n  \"type\": \"bridge\",\n  \"bridge\": \"cni0\",\n  \"isGateway\": true,\n  \"ipMasq\": true,\n  \"ipam\": {\n      \"type\": \"host-local\",\n      \"subnet\": \"10.22.0.0/16\",\n      \"routes\": [\n          { \"dst\": \"0.0.0.0/0\" }\n      ]\n  }\n} {\n  \"cniVersion\": \"0.3.1\",\n  \"type\": \"loopback\"\n}]\n"}, "loc": ["services", "kubernetes", "kubelet", "cni", "config"], "readOnly": false, "type": "list of (attribute set)"}, "services.kubernetes.kubelet.cni.configDir": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to Kubernetes CNI configuration directory."}, "loc": ["services", "kubernetes", "kubelet", "cni", "configDir"], "readOnly": false, "type": "null or path"}, "services.kubernetes.kubelet.cni.packages": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of network plugin packages to install."}, "loc": ["services", "kubernetes", "kubelet", "cni", "packages"], "readOnly": false, "type": "list of package"}, "services.kubernetes.kubelet.containerRuntimeEndpoint": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "\"unix:///run/containerd/containerd.sock\""}, "description": {"_type": "mdDoc", "text": "Endpoint at which to find the container runtime api interface/socket"}, "loc": ["services", "kubernetes", "kubelet", "containerRuntimeEndpoint"], "readOnly": false, "type": "string"}, "services.kubernetes.kubelet.enable": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Kubernetes kubelet."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kubernetes", "kubelet", "enable"], "readOnly": false, "type": "boolean"}, "services.kubernetes.kubelet.extraOpts": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Kubernetes kubelet extra command line options."}, "loc": ["services", "kubernetes", "kubelet", "extraOpts"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.kubernetes.kubelet.featureGates": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.featureGates"}, "description": {"_type": "mdDoc", "text": "List set of feature gates"}, "loc": ["services", "kubernetes", "kubelet", "featureGates"], "readOnly": false, "type": "list of string"}, "services.kubernetes.kubelet.healthz.bind": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Kubernetes kubelet healthz listening address."}, "loc": ["services", "kubernetes", "kubelet", "healthz", "bind"], "readOnly": false, "type": "string"}, "services.kubernetes.kubelet.healthz.port": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "10248"}, "description": {"_type": "mdDoc", "text": "Kubernetes kubelet healthz port."}, "loc": ["services", "kubernetes", "kubelet", "healthz", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.kubernetes.kubelet.hostname": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "config.networking.fqdnOrHostName"}, "description": {"_type": "mdDoc", "text": "Kubernetes kubelet hostname override."}, "loc": ["services", "kubernetes", "kubelet", "hostname"], "readOnly": false, "type": "string"}, "services.kubernetes.kubelet.kubeconfig.caFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.caFile"}, "description": {"_type": "mdDoc", "text": "Kubelet certificate authority file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "kubelet", "kubeconfig", "caFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.kubelet.kubeconfig.certFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubelet client certificate file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "kubelet", "kubeconfig", "certFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.kubelet.kubeconfig.keyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubelet client key file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "kubelet", "kubeconfig", "keyFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.kubelet.kubeconfig.server": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "description": {"_type": "mdDoc", "text": "Kubelet kube-apiserver server address."}, "loc": ["services", "kubernetes", "kubelet", "kubeconfig", "server"], "readOnly": false, "type": "string"}, "services.kubernetes.kubelet.manifests": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "List of manifests to bootstrap with kubelet (only pods can be created as manifest entry)"}, "loc": ["services", "kubernetes", "kubelet", "manifests"], "readOnly": false, "type": "attribute set of (attribute set)"}, "services.kubernetes.kubelet.nodeIp": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "IP address of the node. If set, kubelet will use this IP address for the node."}, "loc": ["services", "kubernetes", "kubelet", "nodeIp"], "readOnly": false, "type": "null or string"}, "services.kubernetes.kubelet.port": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "10250"}, "description": {"_type": "mdDoc", "text": "Kubernetes kubelet info server listening port."}, "loc": ["services", "kubernetes", "kubelet", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.kubernetes.kubelet.registerNode": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to auto register kubelet with API server."}, "loc": ["services", "kubernetes", "kubelet", "registerNode"], "readOnly": false, "type": "boolean"}, "services.kubernetes.kubelet.seedDockerImages": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of docker images to preload on system"}, "loc": ["services", "kubernetes", "kubelet", "seedDockerImages"], "readOnly": false, "type": "list of package"}, "services.kubernetes.kubelet.taints": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Node taints (https://kubernetes.io/docs/concepts/configuration/assign-pod-node/)."}, "loc": ["services", "kubernetes", "kubelet", "taints"], "readOnly": false, "type": "attribute set of (submodule)"}, "services.kubernetes.kubelet.taints.<name>.effect": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "description": {"_type": "mdDoc", "text": "Effect of taint."}, "example": {"_type": "literalExpression", "text": "\"NoSchedule\""}, "loc": ["services", "kubernetes", "kubelet", "taints", "<name>", "effect"], "readOnly": false, "type": "one of \"NoSchedule\", \"PreferNoSchedule\", \"NoExecute\""}, "services.kubernetes.kubelet.taints.<name>.key": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalMD", "text": "Name of this submodule."}, "description": {"_type": "mdDoc", "text": "Key of taint."}, "loc": ["services", "kubernetes", "kubelet", "taints", "<name>", "key"], "readOnly": false, "type": "string"}, "services.kubernetes.kubelet.taints.<name>.value": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "description": {"_type": "mdDoc", "text": "Value of taint."}, "loc": ["services", "kubernetes", "kubelet", "taints", "<name>", "value"], "readOnly": false, "type": "string"}, "services.kubernetes.kubelet.tlsCertFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing x509 Certificate for HTTPS."}, "loc": ["services", "kubernetes", "kubelet", "tlsCertFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.kubelet.tlsKeyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "File containing x509 private key matching tlsCertFile."}, "loc": ["services", "kubernetes", "kubelet", "tlsKeyFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.kubelet.unschedulable": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to set node taint to unschedulable=true as it is the case of node that has only master role."}, "loc": ["services", "kubernetes", "kubelet", "unschedulable"], "readOnly": false, "type": "boolean"}, "services.kubernetes.kubelet.verbosity": {"declarations": ["nixos/modules/services/cluster/kubernetes/kubelet.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional glog verbosity level for logging statements. See\n<https://github.com/kubernetes/community/blob/master/contributors/devel/logging.md>\n"}, "loc": ["services", "kubernetes", "kubelet", "verbosity"], "readOnly": false, "type": "null or signed integer"}, "services.kubernetes.lib": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "default": {"_type": "literalExpression", "text": "{\n  mkCert = <function, args: {CN, action?, fields?, hosts?, name, privateKeyOwner?}>;\n  mkKubeConfig = <function>;\n  mkKubeConfigOptions = <function>;\n}"}, "description": {"_type": "mdDoc", "text": "Common functions for the kubernetes modules."}, "loc": ["services", "kubernetes", "lib"], "readOnly": false, "type": "attribute set"}, "services.kubernetes.masterAddress": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "description": {"_type": "mdDoc", "text": "Clusterwide available network address or hostname for the kubernetes master server."}, "example": {"_type": "literalExpression", "text": "\"master.example.com\""}, "loc": ["services", "kubernetes", "masterAddress"], "readOnly": false, "type": "string"}, "services.kubernetes.package": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.kubernetes"}, "description": {"_type": "mdDoc", "text": "Kubernetes package to use."}, "loc": ["services", "kubernetes", "package"], "readOnly": false, "type": "package"}, "services.kubernetes.path": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages added to the services' PATH environment variable. Both the bin and sbin subdirectories of each package are added."}, "loc": ["services", "kubernetes", "path"], "readOnly": false, "type": "list of package"}, "services.kubernetes.pki.caCertPathPrefix": {"declarations": ["nixos/modules/services/cluster/kubernetes/pki.nix"], "default": {"_type": "literalExpression", "text": "\"${config.services.cfssl.dataDir}/ca\""}, "description": {"_type": "mdDoc", "text": "Path-prefrix for the CA-certificate to be used for cfssl signing.\nSuffixes \".pem\" and \"-key.pem\" will be automatically appended for\nthe public and private keys respectively.\n"}, "loc": ["services", "kubernetes", "pki", "caCertPathPrefix"], "readOnly": false, "type": "string"}, "services.kubernetes.pki.caSpec": {"declarations": ["nixos/modules/services/cluster/kubernetes/pki.nix"], "default": {"_type": "literalExpression", "text": "{\n  CN = \"kubernetes-cluster-ca\";\n  L = \"auto-generated\";\n  O = \"NixOS\";\n  OU = \"services.kubernetes.pki.caSpec\";\n}"}, "description": {"_type": "mdDoc", "text": "Certificate specification for the auto-generated CAcert."}, "loc": ["services", "kubernetes", "pki", "caSpec"], "readOnly": false, "type": "attribute set"}, "services.kubernetes.pki.certs": {"declarations": ["nixos/modules/services/cluster/kubernetes/pki.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "List of certificate specs to feed to cert generator."}, "loc": ["services", "kubernetes", "pki", "certs"], "readOnly": false, "type": "attribute set"}, "services.kubernetes.pki.cfsslAPIExtraSANs": {"declarations": ["nixos/modules/services/cluster/kubernetes/pki.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra x509 Subject Alternative Names to be added to the cfssl API webserver TLS cert.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"subdomain.example.com\"\n]"}, "loc": ["services", "kubernetes", "pki", "cfsslAPIExtraSANs"], "readOnly": false, "type": "list of string"}, "services.kubernetes.pki.enable": {"declarations": ["nixos/modules/services/cluster/kubernetes/pki.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable easyCert issuer service."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kubernetes", "pki", "enable"], "readOnly": false, "type": "boolean"}, "services.kubernetes.pki.etcClusterAdminKubeconfig": {"declarations": ["nixos/modules/services/cluster/kubernetes/pki.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Symlink a kubeconfig with cluster-admin privileges to environment path\n(/etc/\\<path\\>).\n"}, "loc": ["services", "kubernetes", "pki", "etcClusterAdminKubeconfig"], "readOnly": false, "type": "null or string"}, "services.kubernetes.pki.genCfsslAPICerts": {"declarations": ["nixos/modules/services/cluster/kubernetes/pki.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to automatically generate cfssl API webserver TLS cert and key,\nif they don't exist.\n"}, "loc": ["services", "kubernetes", "pki", "genCfsslAPICerts"], "readOnly": false, "type": "boolean"}, "services.kubernetes.pki.genCfsslAPIToken": {"declarations": ["nixos/modules/services/cluster/kubernetes/pki.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to automatically generate cfssl API-token secret,\nif they doesn't exist.\n"}, "loc": ["services", "kubernetes", "pki", "genCfsslAPIToken"], "readOnly": false, "type": "boolean"}, "services.kubernetes.pki.genCfsslCACert": {"declarations": ["nixos/modules/services/cluster/kubernetes/pki.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to automatically generate cfssl CA certificate and key,\nif they don't exist.\n"}, "loc": ["services", "kubernetes", "pki", "genCfsslCACert"], "readOnly": false, "type": "boolean"}, "services.kubernetes.pki.pkiTrustOnBootstrap": {"declarations": ["nixos/modules/services/cluster/kubernetes/pki.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to always trust remote cfssl server upon initial PKI bootstrap."}, "loc": ["services", "kubernetes", "pki", "pkiTrustOnBootstrap"], "readOnly": false, "type": "boolean"}, "services.kubernetes.proxy.bindAddress": {"declarations": ["nixos/modules/services/cluster/kubernetes/proxy.nix"], "default": {"_type": "literalExpression", "text": "\"0.0.0.0\""}, "description": {"_type": "mdDoc", "text": "Kubernetes proxy listening address."}, "loc": ["services", "kubernetes", "proxy", "bindAddress"], "readOnly": false, "type": "string"}, "services.kubernetes.proxy.enable": {"declarations": ["nixos/modules/services/cluster/kubernetes/proxy.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Kubernetes proxy."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kubernetes", "proxy", "enable"], "readOnly": false, "type": "boolean"}, "services.kubernetes.proxy.extraOpts": {"declarations": ["nixos/modules/services/cluster/kubernetes/proxy.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Kubernetes proxy extra command line options."}, "loc": ["services", "kubernetes", "proxy", "extraOpts"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.kubernetes.proxy.featureGates": {"declarations": ["nixos/modules/services/cluster/kubernetes/proxy.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.featureGates"}, "description": {"_type": "mdDoc", "text": "List set of feature gates"}, "loc": ["services", "kubernetes", "proxy", "featureGates"], "readOnly": false, "type": "list of string"}, "services.kubernetes.proxy.hostname": {"declarations": ["nixos/modules/services/cluster/kubernetes/proxy.nix"], "default": {"_type": "literalExpression", "text": "config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "Kubernetes proxy hostname override."}, "loc": ["services", "kubernetes", "proxy", "hostname"], "readOnly": false, "type": "string"}, "services.kubernetes.proxy.kubeconfig.caFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/proxy.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.caFile"}, "description": {"_type": "mdDoc", "text": "Kubernetes proxy certificate authority file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "proxy", "kubeconfig", "caFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.proxy.kubeconfig.certFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes proxy client certificate file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "proxy", "kubeconfig", "certFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.proxy.kubeconfig.keyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes proxy client key file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "proxy", "kubeconfig", "keyFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.proxy.kubeconfig.server": {"declarations": ["nixos/modules/services/cluster/kubernetes/proxy.nix"], "description": {"_type": "mdDoc", "text": "Kubernetes proxy kube-apiserver server address."}, "loc": ["services", "kubernetes", "proxy", "kubeconfig", "server"], "readOnly": false, "type": "string"}, "services.kubernetes.proxy.verbosity": {"declarations": ["nixos/modules/services/cluster/kubernetes/proxy.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional glog verbosity level for logging statements. See\n<https://github.com/kubernetes/community/blob/master/contributors/devel/logging.md>\n"}, "loc": ["services", "kubernetes", "proxy", "verbosity"], "readOnly": false, "type": "null or signed integer"}, "services.kubernetes.roles": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Kubernetes role that this machine should take.\n\nMaster role will enable etcd, apiserver, scheduler, controller manager\naddon manager, flannel and proxy services.\nNode role will enable flannel, docker, kubelet and proxy services.\n"}, "loc": ["services", "kubernetes", "roles"], "readOnly": false, "type": "list of (one of \"master\", \"node\")"}, "services.kubernetes.scheduler.address": {"declarations": ["nixos/modules/services/cluster/kubernetes/scheduler.nix"], "default": {"_type": "literalExpression", "text": "\"127.0.0.1\""}, "description": {"_type": "mdDoc", "text": "Kubernetes scheduler listening address."}, "loc": ["services", "kubernetes", "scheduler", "address"], "readOnly": false, "type": "string"}, "services.kubernetes.scheduler.enable": {"declarations": ["nixos/modules/services/cluster/kubernetes/scheduler.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Kubernetes scheduler."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "kubernetes", "scheduler", "enable"], "readOnly": false, "type": "boolean"}, "services.kubernetes.scheduler.extraOpts": {"declarations": ["nixos/modules/services/cluster/kubernetes/scheduler.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Kubernetes scheduler extra command line options."}, "loc": ["services", "kubernetes", "scheduler", "extraOpts"], "readOnly": false, "type": "strings concatenated with \" \""}, "services.kubernetes.scheduler.featureGates": {"declarations": ["nixos/modules/services/cluster/kubernetes/scheduler.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.featureGates"}, "description": {"_type": "mdDoc", "text": "List set of feature gates"}, "loc": ["services", "kubernetes", "scheduler", "featureGates"], "readOnly": false, "type": "list of string"}, "services.kubernetes.scheduler.kubeconfig.caFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/scheduler.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.caFile"}, "description": {"_type": "mdDoc", "text": "Kubernetes scheduler certificate authority file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "scheduler", "kubeconfig", "caFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.scheduler.kubeconfig.certFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes scheduler client certificate file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "scheduler", "kubeconfig", "certFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.scheduler.kubeconfig.keyFile": {"declarations": ["nixos/modules/services/cluster/kubernetes/scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Kubernetes scheduler client key file used to connect to kube-apiserver."}, "loc": ["services", "kubernetes", "scheduler", "kubeconfig", "keyFile"], "readOnly": false, "type": "null or path"}, "services.kubernetes.scheduler.kubeconfig.server": {"declarations": ["nixos/modules/services/cluster/kubernetes/scheduler.nix"], "description": {"_type": "mdDoc", "text": "Kubernetes scheduler kube-apiserver server address."}, "loc": ["services", "kubernetes", "scheduler", "kubeconfig", "server"], "readOnly": false, "type": "string"}, "services.kubernetes.scheduler.leaderElect": {"declarations": ["nixos/modules/services/cluster/kubernetes/scheduler.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to start leader election before executing main loop."}, "loc": ["services", "kubernetes", "scheduler", "leaderElect"], "readOnly": false, "type": "boolean"}, "services.kubernetes.scheduler.port": {"declarations": ["nixos/modules/services/cluster/kubernetes/scheduler.nix"], "default": {"_type": "literalExpression", "text": "10251"}, "description": {"_type": "mdDoc", "text": "Kubernetes scheduler listening port."}, "loc": ["services", "kubernetes", "scheduler", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.kubernetes.scheduler.verbosity": {"declarations": ["nixos/modules/services/cluster/kubernetes/scheduler.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Optional glog verbosity level for logging statements. See\n<https://github.com/kubernetes/community/blob/master/contributors/devel/logging.md>\n"}, "loc": ["services", "kubernetes", "scheduler", "verbosity"], "readOnly": false, "type": "null or signed integer"}, "services.kubernetes.secretsPath": {"declarations": ["nixos/modules/services/cluster/kubernetes/default.nix"], "default": {"_type": "literalExpression", "text": "config.services.kubernetes.dataDir + \"/secrets\"\n"}, "description": {"_type": "mdDoc", "text": "Default location for kubernetes secrets. Not a store location."}, "loc": ["services", "kubernetes", "secretsPath"], "readOnly": false, "type": "path"}, "services.matrix-appservice-irc.enable": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the Matrix/IRC bridge."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "matrix-appservice-irc", "enable"], "readOnly": false, "type": "boolean"}, "services.matrix-appservice-irc.localpart": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "default": {"_type": "literalExpression", "text": "\"appservice-irc\""}, "description": {"_type": "mdDoc", "text": "The user_id localpart to assign to the appservice"}, "loc": ["services", "matrix-appservice-irc", "localpart"], "readOnly": false, "type": "string"}, "services.matrix-appservice-irc.needBindingCap": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether the daemon needs to bind to ports below 1024 (e.g. for the ident service)"}, "loc": ["services", "matrix-appservice-irc", "needBindingCap"], "readOnly": false, "type": "boolean"}, "services.matrix-appservice-irc.passwordEncryptionKeyLength": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "default": {"_type": "literalExpression", "text": "4096"}, "description": {"_type": "mdDoc", "text": "Length of the key to encrypt IRC passwords with"}, "example": {"_type": "literalExpression", "text": "8192"}, "loc": ["services", "matrix-appservice-irc", "passwordEncryptionKeyLength"], "readOnly": false, "type": "unsigned integer, meaning >=0"}, "services.matrix-appservice-irc.port": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "default": {"_type": "literalExpression", "text": "8009"}, "description": {"_type": "mdDoc", "text": "The port to listen on"}, "loc": ["services", "matrix-appservice-irc", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.matrix-appservice-irc.registrationUrl": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "description": {"_type": "mdDoc", "text": "The URL where the application service is listening for homeserver requests,\nfrom the Matrix homeserver perspective.\n"}, "example": {"_type": "literalExpression", "text": "\"http://localhost:8009\""}, "loc": ["services", "matrix-appservice-irc", "registrationUrl"], "readOnly": false, "type": "string"}, "services.matrix-appservice-irc.settings": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for the appservice, see\n<https://github.com/matrix-org/matrix-appservice-irc/blob/1.0.1/config.sample.yaml>\nfor supported values\n"}, "loc": ["services", "matrix-appservice-irc", "settings"], "readOnly": false, "type": "JSON value"}, "services.matrix-appservice-irc.settings.database": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Configuration for the database"}, "loc": ["services", "matrix-appservice-irc", "settings", "database"], "readOnly": false, "type": "JSON value"}, "services.matrix-appservice-irc.settings.database.connectionString": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "default": {"_type": "literalExpression", "text": "\"nedb://var/lib/matrix-appservice-irc/data\""}, "description": {"_type": "mdDoc", "text": "The database connection string"}, "example": {"_type": "literalExpression", "text": "\"postgres://username:password@host:port/databasename\""}, "loc": ["services", "matrix-appservice-irc", "settings", "database", "connectionString"], "readOnly": false, "type": "string"}, "services.matrix-appservice-irc.settings.database.engine": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "default": {"_type": "literalExpression", "text": "\"nedb\""}, "description": {"_type": "mdDoc", "text": "Which database engine to use"}, "example": {"_type": "literalExpression", "text": "\"postgres\""}, "loc": ["services", "matrix-appservice-irc", "settings", "database", "engine"], "readOnly": false, "type": "string"}, "services.matrix-appservice-irc.settings.homeserver": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Homeserver configuration"}, "loc": ["services", "matrix-appservice-irc", "settings", "homeserver"], "readOnly": false, "type": "JSON value"}, "services.matrix-appservice-irc.settings.homeserver.domain": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "description": {"_type": "mdDoc", "text": "The 'domain' part for user IDs on this home server. Usually\n(but not always) is the \"domain name\" part of the homeserver URL.\n"}, "loc": ["services", "matrix-appservice-irc", "settings", "homeserver", "domain"], "readOnly": false, "type": "string"}, "services.matrix-appservice-irc.settings.homeserver.url": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "description": {"_type": "mdDoc", "text": "The URL to the home server for client-server API calls"}, "loc": ["services", "matrix-appservice-irc", "settings", "homeserver", "url"], "readOnly": false, "type": "string"}, "services.matrix-appservice-irc.settings.ircService": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "IRC bridge configuration"}, "loc": ["services", "matrix-appservice-irc", "settings", "ircService"], "readOnly": false, "type": "JSON value"}, "services.matrix-appservice-irc.settings.ircService.passwordEncryptionKeyPath": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/matrix-appservice-irc/passkey.pem\""}, "description": {"_type": "mdDoc", "text": "Location of the key with which IRC passwords are encrypted\nfor storage. Will be generated on first run if not present.\n"}, "loc": ["services", "matrix-appservice-irc", "settings", "ircService", "passwordEncryptionKeyPath"], "readOnly": false, "type": "string"}, "services.matrix-appservice-irc.settings.ircService.servers": {"declarations": ["nixos/modules/services/matrix/appservice-irc.nix"], "description": {"_type": "mdDoc", "text": "IRC servers to connect to"}, "loc": ["services", "matrix-appservice-irc", "settings", "ircService", "servers"], "readOnly": false, "type": "JSON value"}, "services.matrix-synapse.configFile": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "description": {"_type": "mdDoc", "text": "Path to the configuration file on the target system. Useful to configure e.g. workers\nthat also need this.\n"}, "loc": ["services", "matrix-synapse", "configFile"], "readOnly": true, "type": "path"}, "services.matrix-synapse.dataDir": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/matrix-synapse\""}, "description": {"_type": "mdDoc", "text": "The directory where matrix-synapse stores its stateful data such as\ncertificates, media and uploads.\n"}, "loc": ["services", "matrix-synapse", "dataDir"], "readOnly": false, "type": "string"}, "services.matrix-synapse.enable": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable matrix.org synapse."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "matrix-synapse", "enable"], "readOnly": false, "type": "boolean"}, "services.matrix-synapse.extraConfigFiles": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra config files to include.\n\nThe configuration files will be included based on the command line\nargument --config-path. This allows to configure secrets without\nhaving to go through the Nix store, e.g. based on deployment keys if\nNixOps is in use.\n"}, "loc": ["services", "matrix-synapse", "extraConfigFiles"], "readOnly": false, "type": "list of path"}, "services.matrix-synapse.package": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "pkgs.matrix-synapse"}, "description": {"_type": "mdDoc", "text": "Overridable attribute of the matrix synapse server package to use.\n"}, "loc": ["services", "matrix-synapse", "package"], "readOnly": false, "type": "package"}, "services.matrix-synapse.plugins": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of additional Matrix plugins to make available.\n"}, "example": {"_type": "literalExpression", "text": "with config.services.matrix-synapse.package.plugins; [\n  matrix-synapse-ldap3\n  matrix-synapse-pam\n];\n"}, "loc": ["services", "matrix-synapse", "plugins"], "readOnly": false, "type": "list of package"}, "services.matrix-synapse.settings": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The primary synapse configuration. See the\n[sample configuration](https://github.com/matrix-org/synapse/blob/v1.95.0/docs/sample_config.yaml)\nfor possible values.\n\nSecrets should be passed in by using the `extraConfigFiles` option.\n"}, "loc": ["services", "matrix-synapse", "settings"], "readOnly": false, "type": "YAML value"}, "services.matrix-synapse.settings.app_service_config_files": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of application service config file to use\n"}, "loc": ["services", "matrix-synapse", "settings", "app_service_config_files"], "readOnly": false, "type": "list of path"}, "services.matrix-synapse.settings.database.args.database": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "{\n  sqlite3 = \"${services.matrix-synapse.dataDir}/homeserver.db\";\n  psycopg2 = \"matrix-synapse\";\n}.${services.matrix-synapse.settings.database.name};\n"}, "description": {"_type": "mdDoc", "text": "Name of the database when using the psycopg2 backend,\npath to the database location when using sqlite3.\n"}, "loc": ["services", "matrix-synapse", "settings", "database", "args", "database"], "readOnly": false, "type": "string"}, "services.matrix-synapse.settings.database.args.user": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "{\n  sqlite3 = null;\n  psycopg2 = \"matrix-synapse\";\n}.${cfg.settings.database.name};\n"}, "description": {"_type": "mdDoc", "text": "Username to connect with psycopg2, set to null\nwhen using sqlite3.\n"}, "loc": ["services", "matrix-synapse", "settings", "database", "args", "user"], "readOnly": false, "type": "null or string"}, "services.matrix-synapse.settings.database.name": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "if versionAtLeast config.system.stateVersion \"18.03\"\nthen \"psycopg2\"\nelse \"sqlite3\"\n"}, "description": {"_type": "mdDoc", "text": "The database engine name. Can be sqlite3 or psycopg2.\n"}, "loc": ["services", "matrix-synapse", "settings", "database", "name"], "readOnly": false, "type": "one of \"sqlite3\", \"psycopg2\""}, "services.matrix-synapse.settings.dynamic_thumbnails": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to generate new thumbnails on the fly to precisely match\nthe resolution requested by the client. If true then whenever\na new resolution is requested by the client the server will\ngenerate a new thumbnail. If false the server will pick a thumbnail\nfrom a precalculated list.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "matrix-synapse", "settings", "dynamic_thumbnails"], "readOnly": false, "type": "boolean"}, "services.matrix-synapse.settings.enable_metrics": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable collection and rendering of performance metrics\n"}, "loc": ["services", "matrix-synapse", "settings", "enable_metrics"], "readOnly": false, "type": "boolean"}, "services.matrix-synapse.settings.enable_registration": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable registration for new users.\n"}, "loc": ["services", "matrix-synapse", "settings", "enable_registration"], "readOnly": false, "type": "boolean"}, "services.matrix-synapse.settings.listeners": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "[\n  {\n    bind_addresses = [\n      \"127.0.0.1\"\n    ];\n    port = 8008;\n    resources = [\n      {\n        compress = true;\n        names = [\n          \"client\"\n        ];\n      }\n      {\n        compress = false;\n        names = [\n          \"federation\"\n        ];\n      }\n    ];\n    tls = false;\n    type = \"http\";\n    x_forwarded = true;\n  }\n]"}, "description": {"_type": "mdDoc", "text": "List of ports that Synapse should listen on, their purpose and their configuration.\n"}, "loc": ["services", "matrix-synapse", "settings", "listeners"], "readOnly": false, "type": "list of (submodule)"}, "services.matrix-synapse.settings.listeners.*.bind_addresses": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"::1\"\n  \"127.0.0.1\"\n]"}, "description": {"_type": "mdDoc", "text": "IP addresses to bind the listener to.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"::\"\n  \"0.0.0.0\"\n]\n"}, "loc": ["services", "matrix-synapse", "settings", "listeners", "*", "bind_addresses"], "readOnly": false, "type": "list of string"}, "services.matrix-synapse.settings.listeners.*.port": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "description": {"_type": "mdDoc", "text": "The port to listen for HTTP(S) requests on.\n"}, "example": {"_type": "literalExpression", "text": "8448"}, "loc": ["services", "matrix-synapse", "settings", "listeners", "*", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.matrix-synapse.settings.listeners.*.resources": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "description": {"_type": "mdDoc", "text": "List of HTTP resources to serve on this listener.\n"}, "loc": ["services", "matrix-synapse", "settings", "listeners", "*", "resources"], "readOnly": false, "type": "list of (submodule)"}, "services.matrix-synapse.settings.listeners.*.resources.*.compress": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "description": {"_type": "mdDoc", "text": "Should synapse compress HTTP responses to clients that support it?\nThis should be disabled if running synapse behind a load balancer\nthat can do automatic compression.\n"}, "loc": ["services", "matrix-synapse", "settings", "listeners", "*", "resources", "*", "compress"], "readOnly": false, "type": "boolean"}, "services.matrix-synapse.settings.listeners.*.resources.*.names": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "description": {"_type": "mdDoc", "text": "List of resources to host on this listener.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"client\"\n]"}, "loc": ["services", "matrix-synapse", "settings", "listeners", "*", "resources", "*", "names"], "readOnly": false, "type": "list of (one of \"client\", \"consent\", \"federation\", \"keys\", \"media\", \"metrics\", \"openid\", \"replication\", \"static\")"}, "services.matrix-synapse.settings.listeners.*.tls": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable TLS on the listener socket.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "matrix-synapse", "settings", "listeners", "*", "tls"], "readOnly": false, "type": "boolean"}, "services.matrix-synapse.settings.listeners.*.type": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "\"http\""}, "description": {"_type": "mdDoc", "text": "The type of the listener, usually http.\n"}, "example": {"_type": "literalExpression", "text": "\"metrics\""}, "loc": ["services", "matrix-synapse", "settings", "listeners", "*", "type"], "readOnly": false, "type": "one of \"http\", \"manhole\", \"metrics\", \"replication\""}, "services.matrix-synapse.settings.listeners.*.x_forwarded": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Use the X-Forwarded-For (XFF) header as the client IP and not the\nactual client IP.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "matrix-synapse", "settings", "listeners", "*", "x_forwarded"], "readOnly": false, "type": "boolean"}, "services.matrix-synapse.settings.log_config": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "nixos/modules/services/matrix/synapse-log_config.yaml"}, "description": {"_type": "mdDoc", "text": "The file that holds the logging configuration.\n"}, "loc": ["services", "matrix-synapse", "settings", "log_config"], "readOnly": false, "type": "path"}, "services.matrix-synapse.settings.macaroon_secret_key": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Secret key for authentication tokens. If none is specified,\nthe registration_shared_secret is used, if one is given; otherwise,\na secret key is derived from the signing key.\n\nSecrets should be passed in via `extraConfigFiles`!\n"}, "loc": ["services", "matrix-synapse", "settings", "macaroon_secret_key"], "readOnly": false, "type": "null or string"}, "services.matrix-synapse.settings.max_image_pixels": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "\"32M\""}, "description": {"_type": "mdDoc", "text": "Maximum number of pixels that will be thumbnailed\n"}, "example": {"_type": "literalExpression", "text": "\"64M\""}, "loc": ["services", "matrix-synapse", "settings", "max_image_pixels"], "readOnly": false, "type": "string"}, "services.matrix-synapse.settings.max_upload_size": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "\"50M\""}, "description": {"_type": "mdDoc", "text": "The largest allowed upload size in bytes\n"}, "example": {"_type": "literalExpression", "text": "\"100M\""}, "loc": ["services", "matrix-synapse", "settings", "max_upload_size"], "readOnly": false, "type": "string"}, "services.matrix-synapse.settings.media_store_path": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/matrix-synapse/media_store for when system.stateVersion is at least 22.05, /var/lib/matrix-synapse/media when lower than 22.05\""}, "description": {"_type": "mdDoc", "text": "Directory where uploaded images and attachments are stored.\n"}, "loc": ["services", "matrix-synapse", "settings", "media_store_path"], "readOnly": false, "type": "path"}, "services.matrix-synapse.settings.pid_file": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "\"/run/matrix-synapse.pid\""}, "description": {"_type": "mdDoc", "text": "The file to store the PID in.\n"}, "loc": ["services", "matrix-synapse", "settings", "pid_file"], "readOnly": true, "type": "path"}, "services.matrix-synapse.settings.presence.enabled": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to enable presence tracking.\n\nPresence tracking allows users to see the state (e.g online/offline)\nof other local and remote users.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "matrix-synapse", "settings", "presence", "enabled"], "readOnly": false, "type": "boolean"}, "services.matrix-synapse.settings.public_baseurl": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The public-facing base URL for the client API (not including _matrix/...)\n"}, "example": {"_type": "literalExpression", "text": "\"https://example.com:8448/\""}, "loc": ["services", "matrix-synapse", "settings", "public_baseurl"], "readOnly": false, "type": "null or string"}, "services.matrix-synapse.settings.registration_shared_secret": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "If set, allows registration by anyone who also has the shared\nsecret, even if registration is otherwise disabled.\n\nSecrets should be passed in via `extraConfigFiles`!\n"}, "loc": ["services", "matrix-synapse", "settings", "registration_shared_secret"], "readOnly": false, "type": "null or string"}, "services.matrix-synapse.settings.report_stats": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether or not to report anonymized homeserver usage statistics.\n"}, "loc": ["services", "matrix-synapse", "settings", "report_stats"], "readOnly": false, "type": "boolean"}, "services.matrix-synapse.settings.server_name": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "config.networking.hostName"}, "description": {"_type": "mdDoc", "text": "The domain name of the server, with optional explicit port.\nThis is used by remote servers to look up the server address.\nThis is also the last part of your UserID.\n\nThe server_name cannot be changed later so it is important to configure this correctly before you start Synapse.\n"}, "example": {"_type": "literalExpression", "text": "\"example.com\""}, "loc": ["services", "matrix-synapse", "settings", "server_name"], "readOnly": false, "type": "string"}, "services.matrix-synapse.settings.signing_key_path": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "\"/var/lib/matrix-synapse/homeserver.signing.key\""}, "description": {"_type": "mdDoc", "text": "Path to the signing key to sign messages with.\n"}, "loc": ["services", "matrix-synapse", "settings", "signing_key_path"], "readOnly": false, "type": "path"}, "services.matrix-synapse.settings.tls_certificate_path": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "PEM encoded X509 certificate for TLS.\nYou can replace the self-signed certificate that synapse\nautogenerates on launch with your own SSL certificate + key pair\nif you like.  Any required intermediary certificates can be\nappended after the primary certificate in hierarchical order.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/acme/example.com/fullchain.pem\""}, "loc": ["services", "matrix-synapse", "settings", "tls_certificate_path"], "readOnly": false, "type": "null or string"}, "services.matrix-synapse.settings.tls_private_key_path": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "PEM encoded private key for TLS. Specify null if synapse is not\nspeaking TLS directly.\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/acme/example.com/key.pem\""}, "loc": ["services", "matrix-synapse", "settings", "tls_private_key_path"], "readOnly": false, "type": "null or string"}, "services.matrix-synapse.settings.trusted_key_servers": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "[\n  {\n    server_name = \"matrix.org\";\n    verify_keys = {\n      \"ed25519:auto\" = \"Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw\";\n    };\n  }\n]"}, "description": {"_type": "mdDoc", "text": "The trusted servers to download signing keys from.\n"}, "loc": ["services", "matrix-synapse", "settings", "trusted_key_servers"], "readOnly": false, "type": "list of (YAML value)"}, "services.matrix-synapse.settings.trusted_key_servers.*.server_name": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "description": {"_type": "mdDoc", "text": "Hostname of the trusted server.\n"}, "example": {"_type": "literalExpression", "text": "\"matrix.org\""}, "loc": ["services", "matrix-synapse", "settings", "trusted_key_servers", "*", "server_name"], "readOnly": false, "type": "string"}, "services.matrix-synapse.settings.turn_shared_secret": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The shared secret used to compute passwords for the TURN server.\n\nSecrets should be passed in via `extraConfigFiles`!\n"}, "example": {"_type": "literalExpression", "text": "config.services.coturn.static-auth-secret\n"}, "loc": ["services", "matrix-synapse", "settings", "turn_shared_secret"], "readOnly": false, "type": "string"}, "services.matrix-synapse.settings.turn_uris": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The public URIs of the TURN server to give to clients\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"turn:turn.example.com:3487?transport=udp\"\n  \"turn:turn.example.com:3487?transport=tcp\"\n  \"turns:turn.example.com:5349?transport=udp\"\n  \"turns:turn.example.com:5349?transport=tcp\"\n]"}, "loc": ["services", "matrix-synapse", "settings", "turn_uris"], "readOnly": false, "type": "list of string"}, "services.matrix-synapse.settings.url_preview_enabled": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Is the preview URL API enabled?  If enabled, you *must* specify an\nexplicit url_preview_ip_range_blacklist of IPs that the spider is\ndenied from accessing.\n"}, "example": {"_type": "literalExpression", "text": "false"}, "loc": ["services", "matrix-synapse", "settings", "url_preview_enabled"], "readOnly": false, "type": "boolean"}, "services.matrix-synapse.settings.url_preview_ip_range_blacklist": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"10.0.0.0/8\"\n  \"100.64.0.0/10\"\n  \"127.0.0.0/8\"\n  \"169.254.0.0/16\"\n  \"172.16.0.0/12\"\n  \"192.0.0.0/24\"\n  \"192.0.2.0/24\"\n  \"192.168.0.0/16\"\n  \"192.88.99.0/24\"\n  \"198.18.0.0/15\"\n  \"198.51.100.0/24\"\n  \"2001:db8::/32\"\n  \"203.0.113.0/24\"\n  \"224.0.0.0/4\"\n  \"::1/128\"\n  \"fc00::/7\"\n  \"fe80::/10\"\n  \"fec0::/10\"\n  \"ff00::/8\"\n]"}, "description": {"_type": "mdDoc", "text": "List of IP address CIDR ranges that the URL preview spider is denied\nfrom accessing.\n"}, "loc": ["services", "matrix-synapse", "settings", "url_preview_ip_range_blacklist"], "readOnly": false, "type": "list of string"}, "services.matrix-synapse.settings.url_preview_ip_range_whitelist": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of IP address CIDR ranges that the URL preview spider is allowed\nto access even if they are specified in url_preview_ip_range_blacklist.\n"}, "loc": ["services", "matrix-synapse", "settings", "url_preview_ip_range_whitelist"], "readOnly": false, "type": "list of string"}, "services.matrix-synapse.settings.url_preview_url_blacklist": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Optional list of URL matches that the URL preview spider is\ndenied from accessing.\n"}, "example": {"_type": "literalExpression", "text": "[\n  { scheme = \"http\"; } # no http previews\n  { netloc = \"www.acme.com\"; path = \"/foo\"; } # block http(s)://www.acme.com/foo\n]\n"}, "loc": ["services", "matrix-synapse", "settings", "url_preview_url_blacklist"], "readOnly": false, "type": "list of ((attribute set of string) or string convertible to it)"}, "services.matrix-synapse.withJemalloc": {"declarations": ["nixos/modules/services/matrix/synapse.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to preload jemalloc to reduce memory fragmentation and overall usage.\n"}, "loc": ["services", "matrix-synapse", "withJemalloc"], "readOnly": false, "type": "boolean"}, "services.nghttpx.backend-address-family": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "\"auto\""}, "description": {"_type": "mdDoc", "text": "Specify address family of backend connections. If \"auto\" is\ngiven, both IPv4 and IPv6 are considered. If \"IPv4\" is given,\nonly IPv4 address is considered. If \"IPv6\" is given, only IPv6\naddress is considered.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--backend-address-family\n"}, "loc": ["services", "nghttpx", "backend-address-family"], "readOnly": false, "type": "one of \"auto\", \"IPv4\", \"IPv6\""}, "services.nghttpx.backends": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "description": {"_type": "mdDoc", "text": "A list of backend specifications.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    params = {\n      proto = \"http/1.1\";\n      redirect-if-not-tls = true;\n    };\n    patterns = [\n      \"/\"\n    ];\n    server = {\n      host = \"172.16.0.22\";\n      port = 8443;\n    };\n  }\n]"}, "loc": ["services", "nghttpx", "backends"], "readOnly": false, "type": "list of (submodule)"}, "services.nghttpx.backends.*.params": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Parameters to configure a backend.\n"}, "example": {"_type": "literalExpression", "text": "{\n  proto = \"h2\";\n  tls = true;\n}"}, "loc": ["services", "nghttpx", "backends", "*", "params"], "readOnly": false, "type": "null or (submodule)"}, "services.nghttpx.backends.*.params.affinity": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "\"none\""}, "description": {"_type": "mdDoc", "text": "If \"ip\" is given, client IP based session affinity is\nenabled. If \"none\" is given, session affinity is disabled.\n\nSession affinity is enabled (by nghttpx) per-backend\npattern. If at least one backend has a non-\"none\" affinity,\nthen session affinity is enabled for all backend servers\nsharing the same pattern.\n\nIt is advised to set affinity on all backends explicitly if\nsession affinity is desired. The session affinity may break if\none of the backend gets unreachable, or backend settings are\nreloaded or replaced by API.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-b\nfor more detail.\n"}, "loc": ["services", "nghttpx", "backends", "*", "params", "affinity"], "readOnly": false, "type": "one of \"ip\", \"none\""}, "services.nghttpx.backends.*.params.dns": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Name resolution of a backends host name is done at start up,\nor configuration reload. If \"dns\" is true, name resolution\ntakes place dynamically.\n\nThis is useful if a backends address changes frequently. If\n\"dns\" is true, name resolution of a backend's host name at\nstart up, or configuration reload is skipped.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-b\nfor more detail.\n"}, "loc": ["services", "nghttpx", "backends", "*", "params", "dns"], "readOnly": false, "type": "boolean"}, "services.nghttpx.backends.*.params.fall": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "If nghttpx cannot connect to the backend N times in a row, the\nbackend is assumed to be offline and is excluded from load\nbalancing. If N is 0 the backend is never excluded from load\nbalancing.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-b\nfor more detail.\n"}, "loc": ["services", "nghttpx", "backends", "*", "params", "fall"], "readOnly": false, "type": "signed integer"}, "services.nghttpx.backends.*.params.proto": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "\"http/1.1\""}, "description": {"_type": "mdDoc", "text": "This option configures the protocol the backend server expects\nto use.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-b\nfor more detail.\n"}, "loc": ["services", "nghttpx", "backends", "*", "params", "proto"], "readOnly": false, "type": "one of \"h2\", \"http/1.1\""}, "services.nghttpx.backends.*.params.redirect-if-not-tls": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If true, a backend match requires the frontend connection be\nTLS encrypted. If it is not, nghttpx responds to the request\nwith a 308 status code and https URI the client should use\ninstead in the Location header.\n\nThe port number in the redirect URI is 443 by default and can\nbe changed using 'services.nghttpx.redirect-https-port'\noption.\n\nIf at least one backend has \"redirect-if-not-tls\" set to true,\nthis feature is enabled for all backend servers with the same\npattern. It is advised to set \"redirect-if-no-tls\" parameter\nto all backends explicitly if this feature is desired.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-b\nfor more detail.\n"}, "loc": ["services", "nghttpx", "backends", "*", "params", "redirect-if-not-tls"], "readOnly": false, "type": "boolean"}, "services.nghttpx.backends.*.params.rise": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "If the backend is excluded from load balancing, nghttpx will\nperiodically attempt to make a connection to the backend. If\nthe connection is successful N times in a row the backend is\nre-included in load balancing. If N is 0 a backend is never\nreconsidered for load balancing once it falls.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-b\nfor more detail.\n"}, "loc": ["services", "nghttpx", "backends", "*", "params", "rise"], "readOnly": false, "type": "signed integer"}, "services.nghttpx.backends.*.params.sni": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Override the TLS SNI field value. This value (in nghttpx)\ndefaults to the host value of the backend configuration.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-b\nfor more detail.\n"}, "loc": ["services", "nghttpx", "backends", "*", "params", "sni"], "readOnly": false, "type": "null or string"}, "services.nghttpx.backends.*.params.tls": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "This option determines whether nghttpx will negotiate its\nconnection with a backend server using TLS or not. The burden\nis on the backend server to provide the TLS certificate!\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-b\nfor more detail.\n"}, "loc": ["services", "nghttpx", "backends", "*", "params", "tls"], "readOnly": false, "type": "boolean"}, "services.nghttpx.backends.*.patterns": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of nghttpx backend patterns.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-b\nfor more information on the pattern syntax and nghttpxs behavior.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"*.host.net/v1/\"\n  \"host.org/v2/mypath\"\n  \"/somepath\"\n]"}, "loc": ["services", "nghttpx", "backends", "*", "patterns"], "readOnly": false, "type": "list of string"}, "services.nghttpx.backends.*.server": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "{\n  host = \"127.0.0.1\";\n  port = 80;\n}"}, "description": {"_type": "mdDoc", "text": "Backend server location specified as either a host:port pair\nor a unix domain docket.\n"}, "example": {"_type": "literalExpression", "text": "{\n  host = \"127.0.0.1\";\n  port = 8888;\n}"}, "loc": ["services", "nghttpx", "backends", "*", "server"], "readOnly": false, "type": "(submodule) or path"}, "services.nghttpx.backlog": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "65536"}, "description": {"_type": "mdDoc", "text": "Listen backlog size.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--backlog\n"}, "loc": ["services", "nghttpx", "backlog"], "readOnly": false, "type": "signed integer"}, "services.nghttpx.enable": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable nghttpx."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "nghttpx", "enable"], "readOnly": false, "type": "boolean"}, "services.nghttpx.extraConfig": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra configuration options to be appended to the generated\nconfiguration file.\n"}, "loc": ["services", "nghttpx", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.nghttpx.frontends": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "description": {"_type": "mdDoc", "text": "A list of frontend listener specifications.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    params = {\n      tls = \"no-tls\";\n    };\n    server = {\n      host = \"*\";\n      port = 80;\n    };\n  }\n]"}, "loc": ["services", "nghttpx", "frontends"], "readOnly": false, "type": "list of (submodule)"}, "services.nghttpx.frontends.*.params": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Parameters to configure a backend.\n"}, "example": {"_type": "literalExpression", "text": "{\n  tls = \"tls\";\n}"}, "loc": ["services", "nghttpx", "frontends", "*", "params"], "readOnly": false, "type": "null or (submodule)"}, "services.nghttpx.frontends.*.params.api": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable API access for this frontend. This enables you to\ndynamically modify nghttpx at run-time therefore this feature\nis disabled by default and should be turned on with care.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-f\nfor more detail.\n"}, "loc": ["services", "nghttpx", "frontends", "*", "params", "api"], "readOnly": false, "type": "boolean"}, "services.nghttpx.frontends.*.params.healthmon": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Make this frontend a health monitor endpoint. Any request\nreceived on this frontend is responded to with a 200 OK.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-f\nfor more detail.\n"}, "loc": ["services", "nghttpx", "frontends", "*", "params", "healthmon"], "readOnly": false, "type": "boolean"}, "services.nghttpx.frontends.*.params.proxyproto": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Accept PROXY protocol version 1 on frontend connection.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-f\nfor more detail.\n"}, "loc": ["services", "nghttpx", "frontends", "*", "params", "proxyproto"], "readOnly": false, "type": "boolean"}, "services.nghttpx.frontends.*.params.sni-fwd": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "When performing a match to select a backend server, SNI host\nname received from the client is used instead of the request\nhost. See --backend option about the pattern match.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-f\nfor more detail.\n"}, "loc": ["services", "nghttpx", "frontends", "*", "params", "sni-fwd"], "readOnly": false, "type": "boolean"}, "services.nghttpx.frontends.*.params.tls": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "\"tls\""}, "description": {"_type": "mdDoc", "text": "Enable or disable TLS. If true (enabled) the key and\ncertificate must be configured for nghttpx.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-f\nfor more detail.\n"}, "loc": ["services", "nghttpx", "frontends", "*", "params", "tls"], "readOnly": false, "type": "one of \"tls\", \"no-tls\""}, "services.nghttpx.frontends.*.server": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "{\n  host = \"127.0.0.1\";\n  port = 80;\n}"}, "description": {"_type": "mdDoc", "text": "Frontend server interface binding specification as either a\nhost:port pair or a unix domain docket.\n\nNB: a host of \"*\" listens on all interfaces and includes IPv6\naddresses.\n"}, "example": {"_type": "literalExpression", "text": "{\n  host = \"127.0.0.1\";\n  port = 8888;\n}"}, "loc": ["services", "nghttpx", "frontends", "*", "server"], "readOnly": false, "type": "(submodule) or path"}, "services.nghttpx.rlimit-nofile": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Set maximum number of open files (RLIMIT_NOFILE) to \\<N\\>. If 0\nis given, nghttpx does not set the limit.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--rlimit-nofile\n"}, "loc": ["services", "nghttpx", "rlimit-nofile"], "readOnly": false, "type": "signed integer"}, "services.nghttpx.single-process": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Run this program in a single process mode for debugging\npurpose. Without this option, nghttpx creates at least 2\nprocesses: master and worker processes. If this option is\nused, master and worker are unified into a single\nprocess. nghttpx still spawns additional process if neverbleed\nis used. In the single process mode, the signal handling\nfeature is disabled.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--single-process\n"}, "loc": ["services", "nghttpx", "single-process"], "readOnly": false, "type": "boolean"}, "services.nghttpx.single-thread": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Run everything in one thread inside the worker process. This\nfeature is provided for better debugging experience, or for\nthe platforms which lack thread support. If threading is\ndisabled, this option is always enabled.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx--single-thread\n"}, "loc": ["services", "nghttpx", "single-thread"], "readOnly": false, "type": "boolean"}, "services.nghttpx.tls": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "TLS certificate and key paths. Note that this does not enable\nTLS for a frontend listener, to do so, a frontend\nspecification must set `params.tls` to true.\n"}, "example": {"_type": "literalExpression", "text": "{\n  crt = \"/etc/ssl/certs/server.crt\";\n  key = \"/etc/ssl/keys/server.key\";\n}"}, "loc": ["services", "nghttpx", "tls"], "readOnly": false, "type": "null or (submodule)"}, "services.nghttpx.tls.crt": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/ssl/certs/server.crt\""}, "description": {"_type": "mdDoc", "text": "Path to the TLS certificate file.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/ssl/certs/mycert.crt\""}, "loc": ["services", "nghttpx", "tls", "crt"], "readOnly": false, "type": "string"}, "services.nghttpx.tls.key": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "\"/etc/ssl/keys/server.key\""}, "description": {"_type": "mdDoc", "text": "Path to the TLS key file.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/ssl/keys/mykeyfile.key\""}, "loc": ["services", "nghttpx", "tls", "key"], "readOnly": false, "type": "string"}, "services.nghttpx.workers": {"declarations": ["nixos/modules/services/networking/nghttpx/nghttpx-options.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Set the number of worker threads.\n\nPlease see https://nghttp2.org/documentation/nghttpx.1.html#cmdoption-nghttpx-n\n"}, "loc": ["services", "nghttpx", "workers"], "readOnly": false, "type": "signed integer"}, "services.pinnwand.enable": {"declarations": ["nixos/modules/services/misc/pinnwand.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable Pinnwand."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "pinnwand", "enable"], "readOnly": false, "type": "boolean"}, "services.pinnwand.port": {"declarations": ["nixos/modules/services/misc/pinnwand.nix"], "default": {"_type": "literalExpression", "text": "8000"}, "description": {"_type": "mdDoc", "text": "The port to listen on."}, "loc": ["services", "pinnwand", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "services.pinnwand.settings": {"declarations": ["nixos/modules/services/misc/pinnwand.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Your {file}`pinnwand.toml` as a Nix attribute set. Look up\npossible options in the [documentation](https://pinnwand.readthedocs.io/en/v1.4.0/configuration.html).\n"}, "loc": ["services", "pinnwand", "settings"], "readOnly": false, "type": "TOML value"}, "services.pinnwand.settings.database_uri": {"declarations": ["nixos/modules/services/misc/pinnwand.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite:////var/lib/pinnwand/pinnwand.db\""}, "description": {"_type": "mdDoc", "text": "Database URI compatible with [SQLAlchemyhttps://docs.sqlalchemy.org/en/14/core/engines.html#database-urls].\n\nAdditional packages may need to be introduced into the environment for certain databases.\n"}, "example": {"_type": "literalExpression", "text": "\"sqlite:///:memory\""}, "loc": ["services", "pinnwand", "settings", "database_uri"], "readOnly": false, "type": "string"}, "services.pinnwand.settings.footer": {"declarations": ["nixos/modules/services/misc/pinnwand.nix"], "default": {"_type": "literalExpression", "text": "''\n  View <a href=\"//github.com/supakeen/pinnwand\" target=\"_BLANK\">source code</a>, the <a href=\"/removal\">removal</a> or <a href=\"/expiry\">expiry</a> stories, or read the <a href=\"/about\">about</a> page.\n''"}, "description": {"_type": "mdDoc", "text": "The footer in raw HTML.\n"}, "loc": ["services", "pinnwand", "settings", "footer"], "readOnly": false, "type": "string"}, "services.pinnwand.settings.paste_help": {"declarations": ["nixos/modules/services/misc/pinnwand.nix"], "default": {"_type": "literalExpression", "text": "''\n  <p>Welcome to pinnwand, this site is a pastebin. It allows you to share code with others. If you write code in the text area below and press the paste button you will be given a link you can share with others so they can view your code as well.</p><p>People with the link can view your pasted code, only you can remove your paste and it expires automatically. Note that anyone could guess the URI to your paste so don't rely on it being private.</p>\n''"}, "description": {"_type": "mdDoc", "text": "Raw HTML help text shown in the header area.\n"}, "loc": ["services", "pinnwand", "settings", "paste_help"], "readOnly": false, "type": "string"}, "services.pinnwand.settings.paste_size": {"declarations": ["nixos/modules/services/misc/pinnwand.nix"], "default": {"_type": "literalExpression", "text": "262144"}, "description": {"_type": "mdDoc", "text": "Maximum size of a paste in bytes.\n"}, "example": {"_type": "literalExpression", "text": "524288"}, "loc": ["services", "pinnwand", "settings", "paste_size"], "readOnly": false, "type": "positive integer, meaning >0"}, "services.powerdns-admin.config": {"declarations": ["nixos/modules/services/web-apps/powerdns-admin.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Configuration python file.\nSee [the example configuration](https://github.com/ngoduykhanh/PowerDNS-Admin/blob/v0.4.1/configs/development.py)\nfor options.\n"}, "example": {"_type": "literalExpression", "text": "''\n  BIND_ADDRESS = '127.0.0.1'\n  PORT = 8000\n  SQLALCHEMY_DATABASE_URI = 'postgresql://powerdnsadmin@/powerdnsadmin?host=/run/postgresql'\n''"}, "loc": ["services", "powerdns-admin", "config"], "readOnly": false, "type": "string"}, "services.powerdns-admin.enable": {"declarations": ["nixos/modules/services/web-apps/powerdns-admin.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the PowerDNS web interface."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "powerdns-admin", "enable"], "readOnly": false, "type": "boolean"}, "services.powerdns-admin.extraArgs": {"declarations": ["nixos/modules/services/web-apps/powerdns-admin.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Extra arguments passed to powerdns-admin.\n"}, "example": {"_type": "literalExpression", "text": "[ \"-b\" \"127.0.0.1:8000\" ]\n"}, "loc": ["services", "powerdns-admin", "extraArgs"], "readOnly": false, "type": "list of string"}, "services.powerdns-admin.saltFile": {"declarations": ["nixos/modules/services/web-apps/powerdns-admin.nix"], "description": {"_type": "mdDoc", "text": "The salt used for serialization.\nThis should be set, otherwise the default is used.\nSet this to null to ignore this setting and configure it through another way.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/powerdns-admin/salt\""}, "loc": ["services", "powerdns-admin", "saltFile"], "readOnly": false, "type": "null or path"}, "services.powerdns-admin.secretKeyFile": {"declarations": ["nixos/modules/services/web-apps/powerdns-admin.nix"], "description": {"_type": "mdDoc", "text": "The secret used to create cookies.\nThis needs to be set, otherwise the default is used and everyone can forge valid login cookies.\nSet this to null to ignore this setting and configure it through another way.\n"}, "example": {"_type": "literalExpression", "text": "\"/etc/powerdns-admin/secret\""}, "loc": ["services", "powerdns-admin", "secretKeyFile"], "readOnly": false, "type": "null or path"}, "services.vaultwarden.backupDir": {"declarations": ["nixos/modules/services/security/vaultwarden/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The directory under which vaultwarden will backup its persistent data.\n"}, "loc": ["services", "vaultwarden", "backupDir"], "readOnly": false, "type": "null or string"}, "services.vaultwarden.config": {"declarations": ["nixos/modules/services/security/vaultwarden/default.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The configuration of vaultwarden is done through environment variables,\ntherefore it is recommended to use upper snake case (e.g. {env}`DISABLE_2FA_REMEMBER`).\n\nHowever, camel case (e.g. `disable2FARemember`) is also supported:\nThe NixOS module will convert it automatically to\nupper case snake case (e.g. {env}`DISABLE_2FA_REMEMBER`).\nIn this conversion digits (0-9) are handled just like upper case characters,\nso `foo2` would be converted to {env}`FOO_2`.\nNames already in this format remain unchanged, so `FOO2` remains `FOO2` if passed as such,\neven though `foo2` would have been converted to {env}`FOO_2`.\nThis allows working around any potential future conflicting naming conventions.\n\nBased on the attributes passed to this config option an environment file will be generated\nthat is passed to vaultwarden's systemd service.\n\nThe available configuration options can be found in\n[the environment template file](https://github.com/dani-garcia/vaultwarden/blob/1.28.1/.env.template).\n\nSee [](#opt-services.vaultwarden.environmentFile) for how\nto set up access to the Admin UI to invite initial users.\n"}, "example": {"_type": "literalExpression", "text": "{\n  DOMAIN = \"https://bitwarden.example.com\";\n  SIGNUPS_ALLOWED = false;\n\n  # Vaultwarden currently recommends running behind a reverse proxy\n  # (nginx or similar) for TLS termination, see\n  # https://github.com/dani-garcia/vaultwarden/wiki/Hardening-Guide#reverse-proxying\n  # > you should avoid enabling HTTPS via vaultwarden's built-in Rocket TLS support,\n  # > especially if your instance is publicly accessible.\n  #\n  # A suitable NixOS nginx reverse proxy example config might be:\n  #\n  #     services.nginx.virtualHosts.\"bitwarden.example.com\" = {\n  #       enableACME = true;\n  #       forceSSL = true;\n  #       locations.\"/\" = {\n  #         proxyPass = \"http://127.0.0.1:${toString config.services.vaultwarden.config.ROCKET_PORT}\";\n  #       };\n  #     };\n  ROCKET_ADDRESS = \"127.0.0.1\";\n  ROCKET_PORT = 8222;\n\n  ROCKET_LOG = \"critical\";\n\n  # This example assumes a mailserver running on localhost,\n  # thus without transport encryption.\n  # If you use an external mail server, follow:\n  #   https://github.com/dani-garcia/vaultwarden/wiki/SMTP-configuration\n  SMTP_HOST = \"127.0.0.1\";\n  SMTP_PORT = 25;\n  SMTP_SSL = false;\n\n  SMTP_FROM = \"admin@bitwarden.example.com\";\n  SMTP_FROM_NAME = \"example.com Bitwarden server\";\n}\n"}, "loc": ["services", "vaultwarden", "config"], "readOnly": false, "type": "attribute set of (null or boolean or signed integer or string)"}, "services.vaultwarden.dbBackend": {"declarations": ["nixos/modules/services/security/vaultwarden/default.nix"], "default": {"_type": "literalExpression", "text": "\"sqlite\""}, "description": {"_type": "mdDoc", "text": "Which database backend vaultwarden will be using.\n"}, "loc": ["services", "vaultwarden", "dbBackend"], "readOnly": false, "type": "one of \"sqlite\", \"mysql\", \"postgresql\""}, "services.vaultwarden.enable": {"declarations": ["nixos/modules/services/security/vaultwarden/default.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable vaultwarden."}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["services", "vaultwarden", "enable"], "readOnly": false, "type": "boolean"}, "services.vaultwarden.environmentFile": {"declarations": ["nixos/modules/services/security/vaultwarden/default.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Additional environment file as defined in {manpage}`systemd.exec(5)`.\n\nSecrets like {env}`ADMIN_TOKEN` and {env}`SMTP_PASSWORD`\nmay be passed to the service without adding them to the world-readable Nix store.\n\nNote that this file needs to be available on the host on which\n`vaultwarden` is running.\n\nAs a concrete example, to make the Admin UI available\n(from which new users can be invited initially),\nthe secret {env}`ADMIN_TOKEN` needs to be defined as described\n[here](https://github.com/dani-garcia/vaultwarden/wiki/Enabling-admin-page).\nSetting `environmentFile` to `/var/lib/vaultwarden.env`\nand ensuring permissions with e.g.\n`chown vaultwarden:vaultwarden /var/lib/vaultwarden.env`\n(the `vaultwarden` user will only exist after activating with\n`enable = true;` before this), we can set the contents of the file to have\ncontents such as:\n\n```\n# Admin secret token, see\n# https://github.com/dani-garcia/vaultwarden/wiki/Enabling-admin-page\nADMIN_TOKEN=...copy-paste a unique generated secret token here...\n```\n"}, "example": {"_type": "literalExpression", "text": "\"/var/lib/vaultwarden.env\""}, "loc": ["services", "vaultwarden", "environmentFile"], "readOnly": false, "type": "null or path"}, "services.vaultwarden.package": {"declarations": ["nixos/modules/services/security/vaultwarden/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.vaultwarden"}, "description": {"_type": "mdDoc", "text": "Vaultwarden package to use."}, "loc": ["services", "vaultwarden", "package"], "readOnly": false, "type": "package"}, "services.vaultwarden.webVaultPackage": {"declarations": ["nixos/modules/services/security/vaultwarden/default.nix"], "default": {"_type": "literalExpression", "text": "pkgs.vaultwarden.webvault"}, "description": {"_type": "mdDoc", "text": "Web vault package to use."}, "loc": ["services", "vaultwarden", "webVaultPackage"], "readOnly": false, "type": "package"}, "services.xserver.autoRepeatDelay": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the autorepeat delay (length of time in milliseconds that a key must be depressed before autorepeat starts).\n"}, "loc": ["services", "xserver", "autoRepeatDelay"], "readOnly": false, "type": "null or signed integer"}, "services.xserver.autoRepeatInterval": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Sets the autorepeat interval (length of time in milliseconds that should elapse between autorepeat-generated keystrokes).\n"}, "loc": ["services", "xserver", "autoRepeatInterval"], "readOnly": false, "type": "null or signed integer"}, "services.xserver.autorun": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to start the X server automatically.\n"}, "loc": ["services", "xserver", "autorun"], "readOnly": false, "type": "boolean"}, "services.xserver.config": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "description": {"_type": "mdDoc", "text": "The contents of the configuration file of the X server\n({file}`xorg.conf`).\n\nThis option is set by multiple modules, and the configs are\nconcatenated together.\n\nIn Xorg configs the last config entries take precedence,\nso you may want to use `lib.mkAfter` on this option\nto override NixOS's defaults.\n"}, "loc": ["services", "xserver", "config"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.defaultDepth": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Default colour depth."}, "example": {"_type": "literalExpression", "text": "8"}, "loc": ["services", "xserver", "defaultDepth"], "readOnly": false, "type": "signed integer"}, "services.xserver.deviceSection": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Contents of the first Device section of the X server configuration file."}, "example": {"_type": "literalExpression", "text": "\"VideoRAM 131072\""}, "loc": ["services", "xserver", "deviceSection"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.display": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "0"}, "description": {"_type": "mdDoc", "text": "Display number for the X server."}, "loc": ["services", "xserver", "display"], "readOnly": false, "type": "null or signed integer"}, "services.xserver.dpi": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Force global DPI resolution to use for X server. It's recommended to\nuse this only when DPI is detected incorrectly; also consider using\n`Monitor` section in configuration file instead.\n"}, "loc": ["services", "xserver", "dpi"], "readOnly": false, "type": "null or signed integer"}, "services.xserver.enable": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the X server.\n"}, "loc": ["services", "xserver", "enable"], "readOnly": false, "type": "boolean"}, "services.xserver.enableCtrlAltBackspace": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to enable the DontZap option, which binds Ctrl+Alt+Backspace\nto forcefully kill X. This can lead to data loss and is disabled\nby default.\n"}, "loc": ["services", "xserver", "enableCtrlAltBackspace"], "readOnly": false, "type": "boolean"}, "services.xserver.enableTCP": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to allow the X server to accept TCP connections.\n"}, "loc": ["services", "xserver", "enableTCP"], "readOnly": false, "type": "boolean"}, "services.xserver.excludePackages": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Which X11 packages to exclude from the default environment"}, "example": {"_type": "literalExpression", "text": "[ pkgs.xterm ]"}, "loc": ["services", "xserver", "excludePackages"], "readOnly": false, "type": "list of package"}, "services.xserver.exportConfiguration": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to symlink the X server configuration under\n{file}`/etc/X11/xorg.conf`.\n"}, "loc": ["services", "xserver", "exportConfiguration"], "readOnly": false, "type": "boolean"}, "services.xserver.extraConfig": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Additional contents (sections) included in the X server configuration file"}, "loc": ["services", "xserver", "extraConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.extraDisplaySettings": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Lines to be added to every Display subsection of the Screen section."}, "example": {"_type": "literalExpression", "text": "\"Virtual 2048 2048\""}, "loc": ["services", "xserver", "extraDisplaySettings"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.filesSection": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Contents of the first `Files` section of the X server configuration file."}, "example": {"_type": "literalExpression", "text": "\"FontPath \\\"/path/to/my/fonts\\\"\""}, "loc": ["services", "xserver", "filesSection"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.fontPath": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Set the X server FontPath. Defaults to null, which\nmeans the compiled in defaults will be used. See\nman xorg.conf for details.\n"}, "example": {"_type": "literalExpression", "text": "\"unix/:7100\""}, "loc": ["services", "xserver", "fontPath"], "readOnly": false, "type": "null or string"}, "services.xserver.inputClassSections": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Content of additional InputClass sections of the X server configuration file."}, "example": {"_type": "literalExpression", "text": "[ ''\n    Identifier      \"Trackpoint Wheel Emulation\"\n    MatchProduct    \"ThinkPad USB Keyboard with TrackPoint\"\n    Option          \"EmulateWheel\"          \"true\"\n    Option          \"EmulateWheelButton\"    \"2\"\n    Option          \"Emulate3Buttons\"       \"false\"\n  ''\n]\n"}, "loc": ["services", "xserver", "inputClassSections"], "readOnly": false, "type": "list of strings concatenated with \"\\n\""}, "services.xserver.layout": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"us\""}, "description": {"_type": "mdDoc", "text": "Keyboard layout, or multiple keyboard layouts separated by commas.\n"}, "loc": ["services", "xserver", "layout"], "readOnly": false, "type": "string"}, "services.xserver.logFile": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"/dev/null\""}, "description": {"_type": "mdDoc", "text": "Controls the file Xorg logs to.\n\nThe default of `/dev/null` is set so that systemd services (like `displayManagers`) only log to the journal and don't create their own log files.\n\nSetting this to `null` will not pass the `-logfile` argument to Xorg which allows it to log to its default logfile locations instead (see `man Xorg`). You probably only want this behaviour when running Xorg manually (e.g. via `startx`).\n"}, "example": {"_type": "literalExpression", "text": "\"/var/log/Xorg.0.log\""}, "loc": ["services", "xserver", "logFile"], "readOnly": false, "type": "null or string"}, "services.xserver.moduleSection": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Contents of the Module section of the X server configuration file."}, "example": {"_type": "literalExpression", "text": "''\n  SubSection \"extmod\"\n  EndSubsection\n''"}, "loc": ["services", "xserver", "moduleSection"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.modules": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Packages to be added to the module search path of the X server."}, "example": {"_type": "literalExpression", "text": "[ pkgs.xf86_input_wacom ]"}, "loc": ["services", "xserver", "modules"], "readOnly": false, "type": "list of path"}, "services.xserver.monitorSection": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Contents of the first Monitor section of the X server configuration file."}, "example": {"_type": "literalExpression", "text": "\"HorizSync 28-49\""}, "loc": ["services", "xserver", "monitorSection"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.resolutions": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "The screen resolutions for the X server.  The first element\nis the default resolution.  If this list is empty, the X\nserver will automatically configure the resolution.\n"}, "example": {"_type": "literalExpression", "text": "[\n  {\n    x = 1600;\n    y = 1200;\n  }\n  {\n    x = 1024;\n    y = 786;\n  }\n]"}, "loc": ["services", "xserver", "resolutions"], "readOnly": false, "type": "list of (attribute set)"}, "services.xserver.screenSection": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Contents of the first Screen section of the X server configuration file."}, "example": {"_type": "literalExpression", "text": "''\n  Option \"RandRRotation\" \"on\"\n''"}, "loc": ["services", "xserver", "screenSection"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.serverFlagsSection": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Contents of the ServerFlags section of the X server configuration file."}, "example": {"_type": "literalExpression", "text": "''\n  Option \"BlankTime\" \"0\"\n  Option \"StandbyTime\" \"0\"\n  Option \"SuspendTime\" \"0\"\n  Option \"OffTime\" \"0\"\n''"}, "loc": ["services", "xserver", "serverFlagsSection"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.serverLayoutSection": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Contents of the ServerLayout section of the X server configuration file."}, "example": {"_type": "literalExpression", "text": "''\n  Option \"AIGLX\" \"true\"\n''"}, "loc": ["services", "xserver", "serverLayoutSection"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.terminateOnReset": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to terminate X upon server reset.\n"}, "loc": ["services", "xserver", "terminateOnReset"], "readOnly": false, "type": "boolean"}, "services.xserver.tty": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "7"}, "description": {"_type": "mdDoc", "text": "Virtual console for the X server."}, "loc": ["services", "xserver", "tty"], "readOnly": false, "type": "null or signed integer"}, "services.xserver.updateDbusEnvironment": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether to update the DBus activation environment after launching the\ndesktop manager.\n"}, "loc": ["services", "xserver", "updateDbusEnvironment"], "readOnly": false, "type": "boolean"}, "services.xserver.upscaleDefaultCursor": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Upscale the default X cursor to be more visible on high-density displays.\nRequires `config.services.xserver.dpi` to be set.\n"}, "loc": ["services", "xserver", "upscaleDefaultCursor"], "readOnly": false, "type": "boolean"}, "services.xserver.verbose": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "3"}, "description": {"_type": "mdDoc", "text": "Controls verbosity of X logging.\n"}, "example": {"_type": "literalExpression", "text": "7"}, "loc": ["services", "xserver", "verbose"], "readOnly": false, "type": "null or signed integer"}, "services.xserver.videoDriver": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The name of the video driver for your graphics card.  This\noption is obsolete; please set the\n{option}`services.xserver.videoDrivers` instead.\n"}, "example": {"_type": "literalExpression", "text": "\"i810\""}, "loc": ["services", "xserver", "videoDriver"], "readOnly": false, "type": "null or string"}, "services.xserver.videoDrivers": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"modesetting\"\n  \"fbdev\"\n]"}, "description": {"_type": "mdDoc", "text": "The names of the video drivers the configuration\nsupports. They will be tried in order until one that\nsupports your card is found.\nDon't combine those with \"incompatible\" OpenGL implementations,\ne.g. free ones (mesa-based) with proprietary ones.\n\nFor unfree \"nvidia*\", the supported GPU lists are on\nhttps://www.nvidia.com/object/unix.html\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"nvidia\"\n  \"nvidiaLegacy390\"\n  \"nvidiaLegacy340\"\n  \"nvidiaLegacy304\"\n  \"amdgpu-pro\"\n]"}, "loc": ["services", "xserver", "videoDrivers"], "readOnly": false, "relatedPackages": "- [amdgpu aka `pkgs.xorg.xf86videoamdgpu`](\n    https://search.nixos.org/packages?show=xorg.xf86videoamdgpu&sort=relevance&query=xorg.xf86videoamdgpu\n  )\n- [apm aka `pkgs.xorg.xf86videoapm`](\n    https://search.nixos.org/packages?show=xorg.xf86videoapm&sort=relevance&query=xorg.xf86videoapm\n  )\n- [ark aka `pkgs.xorg.xf86videoark`](\n    https://search.nixos.org/packages?show=xorg.xf86videoark&sort=relevance&query=xorg.xf86videoark\n  )\n- [ast aka `pkgs.xorg.xf86videoast`](\n    https://search.nixos.org/packages?show=xorg.xf86videoast&sort=relevance&query=xorg.xf86videoast\n  )\n- [ati aka `pkgs.xorg.xf86videoati`](\n    https://search.nixos.org/packages?show=xorg.xf86videoati&sort=relevance&query=xorg.xf86videoati\n  )\n- [chips aka `pkgs.xorg.xf86videochips`](\n    https://search.nixos.org/packages?show=xorg.xf86videochips&sort=relevance&query=xorg.xf86videochips\n  )\n- [cirrus aka `pkgs.xorg.xf86videocirrus`](\n    https://search.nixos.org/packages?show=xorg.xf86videocirrus&sort=relevance&query=xorg.xf86videocirrus\n  )\n- [dummy aka `pkgs.xorg.xf86videodummy`](\n    https://search.nixos.org/packages?show=xorg.xf86videodummy&sort=relevance&query=xorg.xf86videodummy\n  )\n- [fbdev aka `pkgs.xorg.xf86videofbdev`](\n    https://search.nixos.org/packages?show=xorg.xf86videofbdev&sort=relevance&query=xorg.xf86videofbdev\n  )\n- [geode aka `pkgs.xorg.xf86videogeode`](\n    https://search.nixos.org/packages?show=xorg.xf86videogeode&sort=relevance&query=xorg.xf86videogeode\n  )\n- [glide aka `pkgs.xorg.xf86videoglide`](\n    https://search.nixos.org/packages?show=xorg.xf86videoglide&sort=relevance&query=xorg.xf86videoglide\n  )\n- [glint aka `pkgs.xorg.xf86videoglint`](\n    https://search.nixos.org/packages?show=xorg.xf86videoglint&sort=relevance&query=xorg.xf86videoglint\n  )\n- [i128 aka `pkgs.xorg.xf86videoi128`](\n    https://search.nixos.org/packages?show=xorg.xf86videoi128&sort=relevance&query=xorg.xf86videoi128\n  )\n- [i740 aka `pkgs.xorg.xf86videoi740`](\n    https://search.nixos.org/packages?show=xorg.xf86videoi740&sort=relevance&query=xorg.xf86videoi740\n  )\n- [intel aka `pkgs.xorg.xf86videointel`](\n    https://search.nixos.org/packages?show=xorg.xf86videointel&sort=relevance&query=xorg.xf86videointel\n  )\n- [mga aka `pkgs.xorg.xf86videomga`](\n    https://search.nixos.org/packages?show=xorg.xf86videomga&sort=relevance&query=xorg.xf86videomga\n  )\n- [neomagic aka `pkgs.xorg.xf86videoneomagic`](\n    https://search.nixos.org/packages?show=xorg.xf86videoneomagic&sort=relevance&query=xorg.xf86videoneomagic\n  )\n- [newport aka `pkgs.xorg.xf86videonewport`](\n    https://search.nixos.org/packages?show=xorg.xf86videonewport&sort=relevance&query=xorg.xf86videonewport\n  )\n- [nouveau aka `pkgs.xorg.xf86videonouveau`](\n    https://search.nixos.org/packages?show=xorg.xf86videonouveau&sort=relevance&query=xorg.xf86videonouveau\n  )\n- [nv aka `pkgs.xorg.xf86videonv`](\n    https://search.nixos.org/packages?show=xorg.xf86videonv&sort=relevance&query=xorg.xf86videonv\n  )\n- [omap aka `pkgs.xorg.xf86videoomap`](\n    https://search.nixos.org/packages?show=xorg.xf86videoomap&sort=relevance&query=xorg.xf86videoomap\n  )\n- [openchrome aka `pkgs.xorg.xf86videoopenchrome`](\n    https://search.nixos.org/packages?show=xorg.xf86videoopenchrome&sort=relevance&query=xorg.xf86videoopenchrome\n  )\n- [qxl aka `pkgs.xorg.xf86videoqxl`](\n    https://search.nixos.org/packages?show=xorg.xf86videoqxl&sort=relevance&query=xorg.xf86videoqxl\n  )\n- [r128 aka `pkgs.xorg.xf86videor128`](\n    https://search.nixos.org/packages?show=xorg.xf86videor128&sort=relevance&query=xorg.xf86videor128\n  )\n- [rendition aka `pkgs.xorg.xf86videorendition`](\n    https://search.nixos.org/packages?show=xorg.xf86videorendition&sort=relevance&query=xorg.xf86videorendition\n  )\n- [s3virge aka `pkgs.xorg.xf86videos3virge`](\n    https://search.nixos.org/packages?show=xorg.xf86videos3virge&sort=relevance&query=xorg.xf86videos3virge\n  )\n- [savage aka `pkgs.xorg.xf86videosavage`](\n    https://search.nixos.org/packages?show=xorg.xf86videosavage&sort=relevance&query=xorg.xf86videosavage\n  )\n- [siliconmotion aka `pkgs.xorg.xf86videosiliconmotion`](\n    https://search.nixos.org/packages?show=xorg.xf86videosiliconmotion&sort=relevance&query=xorg.xf86videosiliconmotion\n  )\n- [sis aka `pkgs.xorg.xf86videosis`](\n    https://search.nixos.org/packages?show=xorg.xf86videosis&sort=relevance&query=xorg.xf86videosis\n  )\n- [sisusb aka `pkgs.xorg.xf86videosisusb`](\n    https://search.nixos.org/packages?show=xorg.xf86videosisusb&sort=relevance&query=xorg.xf86videosisusb\n  )\n- [suncg6 aka `pkgs.xorg.xf86videosuncg6`](\n    https://search.nixos.org/packages?show=xorg.xf86videosuncg6&sort=relevance&query=xorg.xf86videosuncg6\n  )\n- [sunffb aka `pkgs.xorg.xf86videosunffb`](\n    https://search.nixos.org/packages?show=xorg.xf86videosunffb&sort=relevance&query=xorg.xf86videosunffb\n  )\n- [sunleo aka `pkgs.xorg.xf86videosunleo`](\n    https://search.nixos.org/packages?show=xorg.xf86videosunleo&sort=relevance&query=xorg.xf86videosunleo\n  )\n- [tdfx aka `pkgs.xorg.xf86videotdfx`](\n    https://search.nixos.org/packages?show=xorg.xf86videotdfx&sort=relevance&query=xorg.xf86videotdfx\n  )\n- [tga aka `pkgs.xorg.xf86videotga`](\n    https://search.nixos.org/packages?show=xorg.xf86videotga&sort=relevance&query=xorg.xf86videotga\n  )\n- [trident aka `pkgs.xorg.xf86videotrident`](\n    https://search.nixos.org/packages?show=xorg.xf86videotrident&sort=relevance&query=xorg.xf86videotrident\n  )\n- [v4l aka `pkgs.xorg.xf86videov4l`](\n    https://search.nixos.org/packages?show=xorg.xf86videov4l&sort=relevance&query=xorg.xf86videov4l\n  )\n- [vboxvideo aka `pkgs.xorg.xf86videovboxvideo`](\n    https://search.nixos.org/packages?show=xorg.xf86videovboxvideo&sort=relevance&query=xorg.xf86videovboxvideo\n  )\n- [vesa aka `pkgs.xorg.xf86videovesa`](\n    https://search.nixos.org/packages?show=xorg.xf86videovesa&sort=relevance&query=xorg.xf86videovesa\n  )\n- [vmware aka `pkgs.xorg.xf86videovmware`](\n    https://search.nixos.org/packages?show=xorg.xf86videovmware&sort=relevance&query=xorg.xf86videovmware\n  )\n- [voodoo aka `pkgs.xorg.xf86videovoodoo`](\n    https://search.nixos.org/packages?show=xorg.xf86videovoodoo&sort=relevance&query=xorg.xf86videovoodoo\n  )\n- [wsfb aka `pkgs.xorg.xf86videowsfb`](\n    https://search.nixos.org/packages?show=xorg.xf86videowsfb&sort=relevance&query=xorg.xf86videowsfb\n  )\n- [xgi aka `pkgs.xorg.xf86videoxgi`](\n    https://search.nixos.org/packages?show=xorg.xf86videoxgi&sort=relevance&query=xorg.xf86videoxgi\n  )\n", "type": "list of string"}, "services.xserver.virtualScreen": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Virtual screen size for Xrandr.\n"}, "example": {"_type": "literalExpression", "text": "{\n  x = 2048;\n  y = 2048;\n}"}, "loc": ["services", "xserver", "virtualScreen"], "readOnly": false, "type": "null or (attribute set)"}, "services.xserver.xkbDir": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"${pkgs.xkeyboard_config}/etc/X11/xkb\""}, "description": {"_type": "mdDoc", "text": "Path used for -xkbdir xserver parameter.\n"}, "loc": ["services", "xserver", "xkbDir"], "readOnly": false, "type": "path"}, "services.xserver.xkbModel": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"pc104\""}, "description": {"_type": "mdDoc", "text": "Keyboard model.\n"}, "example": {"_type": "literalExpression", "text": "\"presario\""}, "loc": ["services", "xserver", "xkbModel"], "readOnly": false, "type": "string"}, "services.xserver.xkbOptions": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"terminate:ctrl_alt_bksp\""}, "description": {"_type": "mdDoc", "text": "X keyboard options; layout switching goes here.\n"}, "example": {"_type": "literalExpression", "text": "\"grp:caps_toggle,grp_led:scroll\""}, "loc": ["services", "xserver", "xkbOptions"], "readOnly": false, "type": "strings concatenated with \",\""}, "services.xserver.xkbVariant": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "X keyboard variant.\n"}, "example": {"_type": "literalExpression", "text": "\"colemak\""}, "loc": ["services", "xserver", "xkbVariant"], "readOnly": false, "type": "string"}, "services.xserver.xrandrHeads": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Multiple monitor configuration, just specify a list of XRandR\noutputs. The individual elements should be either simple strings or\nan attribute set of output options.\n\nIf the element is a string, it is denoting the physical output for a\nmonitor, if it's an attribute set, you must at least provide the\n{option}`output` option.\n\nThe monitors will be mapped from left to right in the order of the\nlist.\n\nBy default, the first monitor will be set as the primary monitor if\nnone of the elements contain an option that has set\n{option}`primary` to `true`.\n\n::: {.note}\nOnly one monitor is allowed to be primary.\n:::\n\nBe careful using this option with multiple graphic adapters or with\ndrivers that have poor support for XRandR, unexpected things might\nhappen with those.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"HDMI-0\"\n  {\n    output = \"DVI-0\";\n    primary = true;\n  }\n  {\n    monitorConfig = \"Option \\\"Rotate\\\" \\\"left\\\"\";\n    output = \"DVI-1\";\n  }\n]"}, "loc": ["services", "xserver", "xrandrHeads"], "readOnly": false, "type": "list of ((submodule) or string convertible to it)"}, "services.xserver.xrandrHeads.*.monitorConfig": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "Extra lines to append to the `Monitor` section\nverbatim. Available options are documented in the MONITOR section in\n{manpage}`xorg.conf(5)`.\n"}, "example": {"_type": "literalExpression", "text": "''\n  DisplaySize 408 306\n  Option \"DPMS\" \"false\"\n''"}, "loc": ["services", "xserver", "xrandrHeads", "*", "monitorConfig"], "readOnly": false, "type": "strings concatenated with \"\\n\""}, "services.xserver.xrandrHeads.*.output": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "description": {"_type": "mdDoc", "text": "The output name of the monitor, as shown by\n{manpage}`xrandr(1)` invoked without arguments.\n"}, "example": {"_type": "literalExpression", "text": "\"DVI-0\""}, "loc": ["services", "xserver", "xrandrHeads", "*", "output"], "readOnly": false, "type": "string"}, "services.xserver.xrandrHeads.*.primary": {"declarations": ["nixos/modules/services/x11/xserver.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Whether this head is treated as the primary monitor,\n"}, "loc": ["services", "xserver", "xrandrHeads", "*", "primary"], "readOnly": false, "type": "boolean"}, "specialisation": {"declarations": ["nixos/modules/system/activation/specialisation.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Additional configurations to build. If\n`inheritParentConfig` is true, the system\nwill be based on the overall system configuration.\n\nTo switch to a specialised configuration\n(e.g. `fewJobsManyCores`) at runtime, run:\n\n```\nsudo /run/current-system/specialisation/fewJobsManyCores/bin/switch-to-configuration test\n```\n"}, "example": {"_type": "literalExpression", "text": "{ fewJobsManyCores.configuration = { nix.settings = { core = 0; max-jobs = 1; }; }; }"}, "loc": ["specialisation"], "readOnly": false, "type": "attribute set of (submodule)"}, "specialisation.<name>.configuration": {"declarations": ["nixos/modules/system/activation/specialisation.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Arbitrary NixOS configuration.\n\nAnything you can add to a normal NixOS configuration, you can add\nhere, including imports and config values, although nested\nspecialisations will be ignored.\n"}, "loc": ["specialisation", "<name>", "configuration"], "readOnly": false, "type": "submodule"}, "specialisation.<name>.inheritParentConfig": {"declarations": ["nixos/modules/system/activation/specialisation.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Include the entire system's configuration. Set to false to make a completely differently configured system."}, "loc": ["specialisation", "<name>", "inheritParentConfig"], "readOnly": false, "type": "boolean"}, "system.configurationRevision": {"declarations": ["nixos/modules/misc/version.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "The Git revision of the top-level flake from which this configuration was built."}, "loc": ["system", "configurationRevision"], "readOnly": false, "type": "null or string"}, "system.nixos.codeName": {"declarations": ["nixos/modules/misc/version.nix"], "default": {"_type": "literalExpression", "text": "\"Stoat\""}, "description": {"_type": "mdDoc", "text": "The NixOS release code name (e.g. `Emu`)."}, "loc": ["system", "nixos", "codeName"], "readOnly": true, "type": "string"}, "system.nixos.release": {"declarations": ["nixos/modules/misc/version.nix"], "default": {"_type": "literalExpression", "text": "\"23.05\""}, "description": {"_type": "mdDoc", "text": "The NixOS release (e.g. `16.03`)."}, "loc": ["system", "nixos", "release"], "readOnly": true, "type": "string"}, "system.nixos.variant_id": {"declarations": ["nixos/modules/misc/version.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A lower-case string identifying a specific variant or edition of the operating system"}, "example": {"_type": "literalExpression", "text": "\"installer\""}, "loc": ["system", "nixos", "variant_id"], "readOnly": false, "type": "null or string matching the pattern ^[a-z0-9._-]+$"}, "system.stateVersion": {"declarations": ["nixos/modules/misc/version.nix"], "default": {"_type": "literalExpression", "text": "config.system.nixos.release"}, "description": {"_type": "mdDoc", "text": "Every once in a while, a new NixOS release may change\nconfiguration defaults in a way incompatible with stateful\ndata. For instance, if the default version of PostgreSQL\nchanges, the new version will probably be unable to read your\nexisting databases. To prevent such breakage, you should set the\nvalue of this option to the NixOS release with which you want\nto be compatible. The effect is that NixOS will use\ndefaults corresponding to the specified release (such as using\nan older version of PostgreSQL).\nIt\u2019s perfectly fine and recommended to leave this value at the\nrelease version of the first install of this system.\nChanging this option will not upgrade your system. In fact it\nis meant to stay constant exactly when you upgrade your system.\nYou should only bump this option, if you are sure that you can\nor have migrated all state on your system which is affected\nby this option.\n"}, "loc": ["system", "stateVersion"], "readOnly": false, "type": "string"}, "virtualisation.additionalPaths": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "A list of paths whose closure should be made available to\nthe VM.\n\nWhen 9p is used, the closure is registered in the Nix\ndatabase in the VM. All other paths in the host Nix store\nappear in the guest Nix store as well, but are considered\ngarbage (because they are not registered in the Nix\ndatabase of the guest).\n\nWhen {option}`virtualisation.useNixStoreImage` is\nset, the closure is copied to the Nix store image.\n"}, "loc": ["virtualisation", "additionalPaths"], "readOnly": false, "type": "list of path"}, "virtualisation.bios": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "An alternate BIOS (such as `qboot`) with which to start the VM.\nShould contain a file named `bios.bin`.\nIf `null`, QEMU's builtin SeaBIOS will be used.\n"}, "loc": ["virtualisation", "bios"], "readOnly": false, "type": "null or package"}, "virtualisation.bootLoaderDevice": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "lookupDriveDeviceName \"root\" cfg.qemu.drives"}, "description": {"_type": "mdDoc", "text": "The disk to be used for the boot filesystem.\nBy default, it is the same disk as the root filesystem.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/vda\""}, "loc": ["virtualisation", "bootLoaderDevice"], "readOnly": false, "type": "path"}, "virtualisation.bootPartition": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "if cfg.useEFIBoot then \"${cfg.bootLoaderDevice}1\" else null"}, "description": {"_type": "mdDoc", "text": "The boot partition to be used to mount /boot filesystem.\nIn legacy boots, this should be null.\nBy default, in EFI boot, it is the first partition of the boot device.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/vda1\""}, "loc": ["virtualisation", "bootPartition"], "readOnly": false, "type": "null or path"}, "virtualisation.cores": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "1"}, "description": {"_type": "mdDoc", "text": "Specify the number of cores the guest is permitted to use.\nThe number can be higher than the available cores on the\nhost system.\n"}, "loc": ["virtualisation", "cores"], "readOnly": false, "type": "positive integer, meaning >0"}, "virtualisation.diskImage": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "\"./${config.system.name}.qcow2\""}, "description": {"_type": "mdDoc", "text": "Path to the disk image containing the root filesystem.\nThe image will be created on startup if it does not\nexist.\n\nIf null, a tmpfs will be used as the root filesystem and\nthe VM's state will not be persistent.\n"}, "loc": ["virtualisation", "diskImage"], "readOnly": false, "type": "null or string"}, "virtualisation.diskSize": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "1024"}, "description": {"_type": "mdDoc", "text": "The disk size in megabytes of the virtual machine.\n"}, "loc": ["virtualisation", "diskSize"], "readOnly": false, "type": "null or positive integer, meaning >0"}, "virtualisation.efi.OVMF": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "''\n  (pkgs.OVMF.override {\n            secureBoot = cfg.useSecureBoot;\n          }).fd''"}, "description": {"_type": "mdDoc", "text": "OVMF firmware package, defaults to OVMF configured with secure boot if needed."}, "loc": ["virtualisation", "efi", "OVMF"], "readOnly": false, "type": "package"}, "virtualisation.efi.firmware": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "cfg.efi.OVMF.firmware"}, "description": {"_type": "mdDoc", "text": "Firmware binary for EFI implementation, defaults to OVMF.\n"}, "loc": ["virtualisation", "efi", "firmware"], "readOnly": false, "type": "path"}, "virtualisation.efi.variables": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "cfg.efi.OVMF.variables"}, "description": {"_type": "mdDoc", "text": "Platform-specific flash binary for EFI variables, implementation-dependent to the EFI firmware.\nDefaults to OVMF.\n"}, "loc": ["virtualisation", "efi", "variables"], "readOnly": false, "type": "path"}, "virtualisation.emptyDiskImages": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Additional disk images to provide to the VM. The value is\na list of size in megabytes of each disk. These disks are\nwriteable by the VM.\n"}, "loc": ["virtualisation", "emptyDiskImages"], "readOnly": false, "type": "list of positive integer, meaning >0"}, "virtualisation.fileSystems": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "The file systems to be mounted.  It must include an entry for\nthe root directory (`mountPoint = \"/\"`).  Each\nentry in the list is an attribute set with the following fields:\n`mountPoint`, `device`,\n`fsType` (a file system type recognised by\n{command}`mount`; defaults to\n`\"auto\"`), and `options`\n(the mount options passed to {command}`mount` using the\n{option}`-o` flag; defaults to `[ \"defaults\" ]`).\n\nInstead of specifying `device`, you can also\nspecify a volume label (`label`) for file\nsystems that support it, such as ext2/ext3 (see {command}`mke2fs -L`).\n"}, "example": {"_type": "literalExpression", "text": "{\n  \"/\".device = \"/dev/hda1\";\n  \"/data\" = {\n    device = \"/dev/hda2\";\n    fsType = \"ext3\";\n    options = [ \"data=journal\" ];\n  };\n  \"/bigdisk\".label = \"bigdisk\";\n}\n"}, "loc": ["virtualisation", "fileSystems"], "readOnly": false, "type": "attribute set of (submodule)"}, "virtualisation.fileSystems.<name>.autoFormat": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If the device does not currently contain a filesystem (as\ndetermined by {command}`blkid`, then automatically\nformat it with the filesystem type specified in\n{option}`fsType`.  Use with caution.\n"}, "loc": ["virtualisation", "fileSystems", "<name>", "autoFormat"], "readOnly": false, "type": "boolean"}, "virtualisation.fileSystems.<name>.autoResize": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, the filesystem is grown to its maximum size before\nbeing mounted. (This is typically the size of the containing\npartition.) This is currently only supported for ext2/3/4\nfilesystems that are mounted during early boot.\n"}, "loc": ["virtualisation", "fileSystems", "<name>", "autoResize"], "readOnly": false, "type": "boolean"}, "virtualisation.fileSystems.<name>.depends": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "List of paths that should be mounted before this one. This filesystem's\n{option}`device` and {option}`mountPoint` are always\nchecked and do not need to be included explicitly. If a path is added\nto this list, any other filesystem whose mount point is a parent of\nthe path will be mounted before this filesystem. The paths do not need\nto actually be the {option}`mountPoint` of some other filesystem.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"/persist\"\n]"}, "loc": ["virtualisation", "fileSystems", "<name>", "depends"], "readOnly": false, "type": "list of string (with check: non-empty without trailing slash)"}, "virtualisation.fileSystems.<name>.device": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Location of the device."}, "example": {"_type": "literalExpression", "text": "\"/dev/sda\""}, "loc": ["virtualisation", "fileSystems", "<name>", "device"], "readOnly": false, "type": "null or string (with check: non-empty)"}, "virtualisation.fileSystems.<name>.encrypted.blkDev": {"declarations": ["nixos/modules/tasks/encrypted-devices.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Location of the backing encrypted device."}, "example": {"_type": "literalExpression", "text": "\"/dev/sda1\""}, "loc": ["virtualisation", "fileSystems", "<name>", "encrypted", "blkDev"], "readOnly": false, "type": "null or string"}, "virtualisation.fileSystems.<name>.encrypted.enable": {"declarations": ["nixos/modules/tasks/encrypted-devices.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "The block device is backed by an encrypted one, adds this device as a initrd luks entry."}, "loc": ["virtualisation", "fileSystems", "<name>", "encrypted", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.fileSystems.<name>.encrypted.keyFile": {"declarations": ["nixos/modules/tasks/encrypted-devices.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Path to a keyfile used to unlock the backing encrypted\ndevice. At the time this keyfile is accessed, the\n`neededForBoot` filesystems (see\n`fileSystems.<name?>.neededForBoot`)\nwill have been mounted under `/mnt-root`,\nso the keyfile path should usually start with \"/mnt-root/\".\n"}, "example": {"_type": "literalExpression", "text": "\"/mnt-root/root/.swapkey\""}, "loc": ["virtualisation", "fileSystems", "<name>", "encrypted", "keyFile"], "readOnly": false, "type": "null or string"}, "virtualisation.fileSystems.<name>.encrypted.label": {"declarations": ["nixos/modules/tasks/encrypted-devices.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Label of the unlocked encrypted device. Set `fileSystems.<name?>.device` to `/dev/mapper/<label>` to mount the unlocked device."}, "example": {"_type": "literalExpression", "text": "\"rootfs\""}, "loc": ["virtualisation", "fileSystems", "<name>", "encrypted", "label"], "readOnly": false, "type": "null or string"}, "virtualisation.fileSystems.<name>.formatOptions": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "If {option}`autoFormat` option is set specifies\nextra options passed to mkfs.\n"}, "loc": ["virtualisation", "fileSystems", "<name>", "formatOptions"], "readOnly": false, "type": "string"}, "virtualisation.fileSystems.<name>.fsType": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "\"auto\""}, "description": {"_type": "mdDoc", "text": "Type of the file system."}, "example": {"_type": "literalExpression", "text": "\"ext3\""}, "loc": ["virtualisation", "fileSystems", "<name>", "fsType"], "readOnly": false, "type": "string (with check: non-empty)"}, "virtualisation.fileSystems.<name>.label": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "Label of the device (if any)."}, "example": {"_type": "literalExpression", "text": "\"root-partition\""}, "loc": ["virtualisation", "fileSystems", "<name>", "label"], "readOnly": false, "type": "null or string (with check: non-empty)"}, "virtualisation.fileSystems.<name>.mountPoint": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "description": {"_type": "mdDoc", "text": "Location of the mounted file system."}, "example": {"_type": "literalExpression", "text": "\"/mnt/usb\""}, "loc": ["virtualisation", "fileSystems", "<name>", "mountPoint"], "readOnly": false, "type": "string (with check: non-empty without trailing slash)"}, "virtualisation.fileSystems.<name>.neededForBoot": {"declarations": ["nixos/modules/system/boot/stage-1.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If set, this file system will be mounted in the initial ramdisk.\nNote that the file system will always be mounted in the initial\nramdisk if its mount point is one of the following:\n{file}`/`, {file}`/nix`, {file}`/nix/store`, {file}`/var`, {file}`/var/log`, {file}`/var/lib`, {file}`/var/lib/nixos`, {file}`/etc`, {file}`/usr`.\n"}, "loc": ["virtualisation", "fileSystems", "<name>", "neededForBoot"], "readOnly": false, "type": "boolean"}, "virtualisation.fileSystems.<name>.noCheck": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Disable running fsck on this filesystem."}, "loc": ["virtualisation", "fileSystems", "<name>", "noCheck"], "readOnly": false, "type": "boolean"}, "virtualisation.fileSystems.<name>.options": {"declarations": ["nixos/modules/tasks/filesystems.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"defaults\"\n]"}, "description": {"_type": "mdDoc", "text": "Options used to mount the file system."}, "example": {"_type": "literalExpression", "text": "[\n  \"data=journal\"\n]"}, "loc": ["virtualisation", "fileSystems", "<name>", "options"], "readOnly": false, "type": "non-empty (list of string (with check: non-empty))"}, "virtualisation.forwardPorts": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "When using the SLiRP user networking (default), this option allows to\nforward ports to/from the host/guest.\n\n::: {.warning}\nIf the NixOS firewall on the virtual machine is enabled, you also\nhave to open the guest ports to enable the traffic between host and\nguest.\n:::\n\n::: {.note}\nCurrently QEMU supports only IPv4 forwarding.\n:::\n"}, "example": {"_type": "literalExpression", "text": "[ # forward local port 2222 -> 22, to ssh into the VM\n  { from = \"host\"; host.port = 2222; guest.port = 22; }\n\n  # forward local port 80 -> 10.0.2.10:80 in the VLAN\n  { from = \"guest\";\n    guest.address = \"10.0.2.10\"; guest.port = 80;\n    host.address = \"127.0.0.1\"; host.port = 80;\n  }\n]\n"}, "loc": ["virtualisation", "forwardPorts"], "readOnly": false, "type": "list of (submodule)"}, "virtualisation.forwardPorts.*.from": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "\"host\""}, "description": {"_type": "mdDoc", "text": "Controls the direction in which the ports are mapped:\n\n- `\"host\"` means traffic from the host ports\n  is forwarded to the given guest port.\n- `\"guest\"` means traffic from the guest ports\n  is forwarded to the given host port.\n"}, "loc": ["virtualisation", "forwardPorts", "*", "from"], "readOnly": false, "type": "one of \"host\", \"guest\""}, "virtualisation.forwardPorts.*.guest.address": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The IPv4 address on the guest VLAN."}, "loc": ["virtualisation", "forwardPorts", "*", "guest", "address"], "readOnly": false, "type": "string"}, "virtualisation.forwardPorts.*.guest.port": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "description": {"_type": "mdDoc", "text": "The guest port to be mapped."}, "loc": ["virtualisation", "forwardPorts", "*", "guest", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "virtualisation.forwardPorts.*.host.address": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "\"\""}, "description": {"_type": "mdDoc", "text": "The IPv4 address of the host."}, "loc": ["virtualisation", "forwardPorts", "*", "host", "address"], "readOnly": false, "type": "string"}, "virtualisation.forwardPorts.*.host.port": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "description": {"_type": "mdDoc", "text": "The host port to be mapped."}, "loc": ["virtualisation", "forwardPorts", "*", "host", "port"], "readOnly": false, "type": "16 bit unsigned integer; between 0 and 65535 (both inclusive)"}, "virtualisation.forwardPorts.*.proto": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "\"tcp\""}, "description": {"_type": "mdDoc", "text": "The protocol to forward."}, "loc": ["virtualisation", "forwardPorts", "*", "proto"], "readOnly": false, "type": "one of \"tcp\", \"udp\""}, "virtualisation.graphics": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Whether to run QEMU with a graphics window, or in nographic mode.\nSerial console will be enabled on both settings, but this will\nchange the preferred console.\n"}, "loc": ["virtualisation", "graphics"], "readOnly": false, "type": "boolean"}, "virtualisation.host.pkgs": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "pkgs"}, "description": {"_type": "mdDoc", "text": "pkgs set to use for the host-specific packages of the vm runner.\nChanging this to e.g. a Darwin package set allows running NixOS VMs on Darwin.\n"}, "example": {"_type": "literalExpression", "text": "import pkgs.path { system = \"x86_64-darwin\"; }\n"}, "loc": ["virtualisation", "host", "pkgs"], "readOnly": false, "type": "An evaluation of Nixpkgs; the top level attribute set of packages"}, "virtualisation.memorySize": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "1024"}, "description": {"_type": "mdDoc", "text": "The memory size in megabytes of the virtual machine.\n"}, "loc": ["virtualisation", "memorySize"], "readOnly": false, "type": "positive integer, meaning >0"}, "virtualisation.mountHostNixStore": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "!cfg.useNixStoreImage && !cfg.useBootLoader"}, "description": {"_type": "mdDoc", "text": "Mount the host Nix store as a 9p mount.\n"}, "loc": ["virtualisation", "mountHostNixStore"], "readOnly": false, "type": "boolean"}, "virtualisation.msize": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "16384"}, "description": {"_type": "mdDoc", "text": "The msize (maximum packet size) option passed to 9p file systems, in\nbytes. Increasing this should increase performance significantly,\nat the cost of higher RAM usage.\n"}, "loc": ["virtualisation", "msize"], "readOnly": false, "type": "positive integer, meaning >0"}, "virtualisation.qemu.consoles": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "[\n  \"ttyS0,115200n8\"\n  \"tty0\"\n]"}, "description": {"_type": "mdDoc", "text": "The output console devices to pass to the kernel command line via the\n`console` parameter, the primary console is the last\nitem of this list.\n\nBy default it enables both serial console and\n`tty0`. The preferred console (last one) is based on\nthe value of {option}`virtualisation.graphics`.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"console=tty1\"\n]"}, "loc": ["virtualisation", "qemu", "consoles"], "readOnly": false, "type": "list of string"}, "virtualisation.qemu.diskInterface": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "\"virtio\""}, "description": {"_type": "mdDoc", "text": "The interface used for the virtual hard disks."}, "example": {"_type": "literalExpression", "text": "\"scsi\""}, "loc": ["virtualisation", "qemu", "diskInterface"], "readOnly": false, "type": "one of \"virtio\", \"scsi\", \"ide\""}, "virtualisation.qemu.drives": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "description": {"_type": "mdDoc", "text": "Drives passed to qemu."}, "loc": ["virtualisation", "qemu", "drives"], "readOnly": false, "type": "list of (submodule)"}, "virtualisation.qemu.drives.*.deviceExtraOpts": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra options passed to device flag."}, "loc": ["virtualisation", "qemu", "drives", "*", "deviceExtraOpts"], "readOnly": false, "type": "attribute set of string"}, "virtualisation.qemu.drives.*.driveExtraOpts": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Extra options passed to drive flag."}, "loc": ["virtualisation", "qemu", "drives", "*", "driveExtraOpts"], "readOnly": false, "type": "attribute set of string"}, "virtualisation.qemu.drives.*.file": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "description": {"_type": "mdDoc", "text": "The file image used for this drive."}, "loc": ["virtualisation", "qemu", "drives", "*", "file"], "readOnly": false, "type": "string"}, "virtualisation.qemu.drives.*.name": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "null"}, "description": {"_type": "mdDoc", "text": "A name for the drive. Must be unique in the drives list. Not passed to qemu."}, "loc": ["virtualisation", "qemu", "drives", "*", "name"], "readOnly": false, "type": "null or string"}, "virtualisation.qemu.guestAgent.enable": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable the Qemu guest agent.\n"}, "loc": ["virtualisation", "qemu", "guestAgent", "enable"], "readOnly": false, "type": "boolean"}, "virtualisation.qemu.networkingOptions": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Networking-related command-line options that should be passed to qemu.\nThe default is to use userspace networking (SLiRP).\n\nIf you override this option, be advised to keep\n${QEMU_NET_OPTS:+,$QEMU_NET_OPTS} (as seen in the example)\nto keep the default runtime behaviour.\n"}, "example": {"_type": "literalExpression", "text": "[\n  \"-net nic,netdev=user.0,model=virtio\"\n  \"-netdev user,id=user.0,\\${QEMU_NET_OPTS:+,$QEMU_NET_OPTS}\"\n]"}, "loc": ["virtualisation", "qemu", "networkingOptions"], "readOnly": false, "type": "list of string"}, "virtualisation.qemu.options": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "[ ]"}, "description": {"_type": "mdDoc", "text": "Options passed to QEMU."}, "example": {"_type": "literalExpression", "text": "[\n  \"-vga std\"\n]"}, "loc": ["virtualisation", "qemu", "options"], "readOnly": false, "type": "list of string"}, "virtualisation.qemu.package": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "config.virtualisation.host.pkgs.qemu_kvm"}, "description": {"_type": "mdDoc", "text": "QEMU package to use."}, "example": {"_type": "literalExpression", "text": "pkgs.qemu_test"}, "loc": ["virtualisation", "qemu", "package"], "readOnly": false, "type": "package"}, "virtualisation.qemu.virtioKeyboard": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Enable the virtio-keyboard device.\n"}, "loc": ["virtualisation", "qemu", "virtioKeyboard"], "readOnly": false, "type": "boolean"}, "virtualisation.resolution": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "{\n  x = 1024;\n  y = 768;\n}"}, "description": {"_type": "mdDoc", "text": "The resolution of the virtual machine display.\n"}, "loc": ["virtualisation", "resolution"], "readOnly": false, "type": "attribute set"}, "virtualisation.restrictNetwork": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If this option is enabled, the guest will be isolated, i.e. it will\nnot be able to contact the host and no guest IP packets will be\nrouted over the host to the outside. This option does not affect\nany explicitly set forwarding rules.\n"}, "example": {"_type": "literalExpression", "text": "true"}, "loc": ["virtualisation", "restrictNetwork"], "readOnly": false, "type": "boolean"}, "virtualisation.rootDevice": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "description": {"_type": "mdDoc", "text": "The disk or partition to be used for the root filesystem.\nBy default (read the source code for more details):\n\n- under EFI with a bootloader: 2nd partition of the boot disk\n- in legacy boot with a bootloader: 1st partition of the boot disk\n- in direct boot (i.e. without a bootloader): whole disk\n\nIn case you are not using a default boot device or a default filesystem, you have to set explicitly your root device.\n"}, "example": {"_type": "literalExpression", "text": "\"/dev/vda2\""}, "loc": ["virtualisation", "rootDevice"], "readOnly": false, "type": "null or path"}, "virtualisation.sharedDirectories": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "An attributes set of directories that will be shared with the\nvirtual machine using VirtFS (9P filesystem over VirtIO).\nThe attribute name will be used as the 9P mount tag.\n"}, "example": {"_type": "literalExpression", "text": "{\n  my-share = {\n    source = \"/path/to/be/shared\";\n    target = \"/mnt/shared\";\n  };\n}"}, "loc": ["virtualisation", "sharedDirectories"], "readOnly": false, "type": "attribute set of (submodule)"}, "virtualisation.sharedDirectories.<name>.source": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "description": {"_type": "mdDoc", "text": "The path of the directory to share, can be a shell variable"}, "loc": ["virtualisation", "sharedDirectories", "<name>", "source"], "readOnly": false, "type": "string"}, "virtualisation.sharedDirectories.<name>.target": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "description": {"_type": "mdDoc", "text": "The mount point of the directory inside the virtual machine"}, "loc": ["virtualisation", "sharedDirectories", "<name>", "target"], "readOnly": false, "type": "path"}, "virtualisation.useBootLoader": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, the virtual machine will be booted using the\nregular boot loader (i.e., GRUB 1 or 2).  This allows\ntesting of the boot loader.  If\ndisabled (the default), the VM directly boots the NixOS\nkernel and initial ramdisk, bypassing the boot loader\naltogether.\n"}, "loc": ["virtualisation", "useBootLoader"], "readOnly": false, "type": "boolean"}, "virtualisation.useDefaultFilesystems": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "If enabled, the boot disk of the virtual machine will be\nformatted and mounted with the default filesystems for\ntesting. Swap devices and LUKS will be disabled.\n\nIf disabled, a root filesystem has to be specified and\nformatted (for example in the initial ramdisk).\n"}, "loc": ["virtualisation", "useDefaultFilesystems"], "readOnly": false, "type": "boolean"}, "virtualisation.useEFIBoot": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "If enabled, the virtual machine will provide a EFI boot\nmanager.\nuseEFIBoot is ignored if useBootLoader == false.\n"}, "loc": ["virtualisation", "useEFIBoot"], "readOnly": false, "type": "boolean"}, "virtualisation.useNixStoreImage": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Build and use a disk image for the Nix store, instead of\naccessing the host's one through 9p.\n\nFor applications which do a lot of reads from the store,\nthis can drastically improve performance, but at the cost of\ndisk space and image build time.\n\nAs an alternative, you can use a bootloader which will provide you\nwith a full NixOS system image containing a Nix store and\navoid mounting the host nix store through\n{option}`virtualisation.mountHostNixStore`.\n"}, "loc": ["virtualisation", "useNixStoreImage"], "readOnly": false, "type": "boolean"}, "virtualisation.useSecureBoot": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "false"}, "description": {"_type": "mdDoc", "text": "Enable Secure Boot support in the EFI firmware.\n"}, "loc": ["virtualisation", "useSecureBoot"], "readOnly": false, "type": "boolean"}, "virtualisation.vlans": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "[\n  1\n]"}, "description": {"_type": "mdDoc", "text": "Virtual networks to which the VM is connected.  Each\nnumber \u00abN\u00bb in this list causes\nthe VM to have a virtual Ethernet interface attached to a\nseparate virtual network on which it will be assigned IP\naddress\n`192.168.\u00abN\u00bb.\u00abM\u00bb`,\nwhere \u00abM\u00bb is the index of this VM\nin the list of VMs.\n"}, "example": {"_type": "literalExpression", "text": "[\n  1\n  2\n]"}, "loc": ["virtualisation", "vlans"], "readOnly": false, "type": "list of unsigned integer, meaning >=0"}, "virtualisation.vmVariant": {"declarations": ["nixos/modules/virtualisation/build-vm.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Machine configuration to be added for the vm script produced by `nixos-rebuild build-vm`.\n"}, "loc": ["virtualisation", "vmVariant"], "readOnly": false, "type": "submodule"}, "virtualisation.vmVariantWithBootLoader": {"declarations": ["nixos/modules/virtualisation/build-vm.nix"], "default": {"_type": "literalExpression", "text": "{ }"}, "description": {"_type": "mdDoc", "text": "Machine configuration to be added for the vm script produced by `nixos-rebuild build-vm-with-bootloader`.\n"}, "loc": ["virtualisation", "vmVariantWithBootLoader"], "readOnly": false, "type": "submodule"}, "virtualisation.writableStore": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "cfg.mountHostNixStore"}, "description": {"_type": "mdDoc", "text": "If enabled, the Nix store in the VM is made writable by\nlayering an overlay filesystem on top of the host's Nix\nstore.\n\nBy default, this is enabled if you mount a host Nix store.\n"}, "loc": ["virtualisation", "writableStore"], "readOnly": false, "type": "boolean"}, "virtualisation.writableStoreUseTmpfs": {"declarations": ["nixos/modules/virtualisation/qemu-vm.nix"], "default": {"_type": "literalExpression", "text": "true"}, "description": {"_type": "mdDoc", "text": "Use a tmpfs for the writable store instead of writing to the VM's\nown filesystem.\n"}, "loc": ["virtualisation", "writableStoreUseTmpfs"], "readOnly": false, "type": "boolean"}}